Proposal Graphics Conceptualization and...
It is impossible to imagine modern sales and marketing without visual elements—and proposals are no different. Graphics serve as one of the most important proposal persuasion elements. Professional graphics artists are not the only ones who need to learn how to conceptualize and design persuasive proposal graphics. It also happens to be an indispensable skill for capture managers, proposal managers, and proposal writers. Desktop publishe...
Cloud Content Management at the Center...
Government agencies are facing ever increasing challenges to modernize and engage with citizens and stakeholders through digital channels. But you can’t just flip a switch to become a digital government. Change like that takes new tools, new processes and a new way of thinking. Essentially, you need to transform the way you work. But with regulations, security concerns and diminishing resources that can be easier said than done. That...
October 25, 2018
Organizer:
GovLoop Location:
Washington, DC
Understanding the EEOC Strategic Plan f...
Gain an insight on the EEOC’s goals for the coming years and what to prepare for.To address the nearly 90,000 discrimination charges filed with the Equal Employment Opportunity Commission (EEOC) each year, the agency must target its resources strategically to carry out its mission of preventing and remedying unlawful employment discrimination in U.S. workplaces. This topic will delve into the EEOC’s latest Strategic Plan and offer...
October 25, 2018
Organizer:
Lorman Location:
Webcast
2018 Phoenix Security Solutions Summit (ES3)
Join us for the 2018 Phoenix Security Solutions Summit (ES3) on October 25th at The Phoenician in Scottsdale, AZ! During this FREE event, experts from Optiv and our partners will present insights, best practices and real-world applications for top industry trends and technologies. PLUS, you’ll get access to: Vendor expo with representatives from leading security tech companiesAfter-hours networking eventContinuing education credits
October 25, 2018
Organizer:
Optiv Location:
Scottsdale, AZ
Desktop-as-a-Service: The Value of Clou...
Government is transforming to better serve tech-savvy citizens, and IT modernization is driving the change. Modern, “born in the cloud” applications are freeing government technology professionals from day to day desktop management and enabling them to assume the role of agents of change. This webinar will discuss how cloud-native technology is being used in government to provide robust, multi-cloud Desktop-As-A-Service for an easy...
October 25, 2018
Organizer:
FEDINSIDER Location:
Webcast
EC-Council Certified Security Analyst (...
The course meets Monday- Thursday from 5:30 pm to 9:30 pm for 8 nights. The ECSA program takes the tools and techniques you learned in the Certified Ethical Hacker (CEH) course and elevates your ability into full exploitation by teaching you how to apply the skills learned in CEH by utilizing EC-Council’s published penetration testing methodologies. It is a highly interactive, comprehensive, standards-based and methodology intensive 5-da...
Tariff Classification Seminar in Louisville
Seminar Information: This class is for importers and exporters. The classification and valuation of goods must be done correctly for a successful international trade transaction. If you classify or value your products incorrectly, your shipment may not reach its destination, and/or you may be subjected to severe penalties. You will also learn how to determine whether goods are subject to quotas, restraints, embargoes or other restrictions. Thi...
Defense Modernization: Unified Collabor...
To remain safe against growing threats, the military is developing a unified approach to securely communicate and collaborate. At this half-day training event, you'll join in discussions with experts from military and private sector and discover new technology being used to modernize communications infrastructure while providing additional security at Impact Level 5 (IL5). Attendees will walk away with a keen understanding of how to deliver vo...
October 24, 2018
Organizer:
FEDINSIDER Location:
Arlington, VA
Whats Next for Government: A New Approa...
In the next few years, there will be 25 million network-connected devices, all subject to malware attack, and public sector networks are by far the biggest target. The Federal Information Technology Acquisition Reform Act is driving agencies to improve the management of their information assets and, through license compliance and up-to-date security patch adherence, to close the door to cyber-attacks. This webinar will explore best practices i...
October 24, 2018
Organizer:
FEDINSIDER Location:
Webcast
Winning GWACs, IDIQs and Task Orders fo...
The trend toward more Task Order contracts continues including the use of GWACs, Strategic Sourcing initiatives and cross-agency agreements. Agencies establish patterns of use of Task Order contracts and make proclamations about future use, which sometimes come to fruition and sometimes don’t. Being on the right vehicle and being successful in the pursuit of Task Orders present multiple levels of challenges to the government contractor....
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.