Houston EAR Export Controls / ITAR Defe...
Export Administration Regulations (EAR), International Traffic in Arms Regulations (ITAR) and Office of Foreign Assets Controls & Embargoes (OFAC) Explained - complete with the latest updates on Export Control Reform (ECR): This seminar series provides both novice and experienced export compliance professionals with an in-depth education on export control regulations administered by the US Departments of State, Commerce & Treasury. Ex...
Contracting Officer's Representative (C...
Other dates and locations available for immediate registration. Reviewed and verified by the Federal Acquisition Institute (FAI) as meeting the training requirements for FAC-COR Level I. The Contracting Officer’s Representative (COR) is a crucial link between the Contracting Officer (CO) and the contractor. In effect, CORs are the eyes and ears of the contracting officer, ensuring that the work the contracting officer has authorized gets...
The Cyber Threat
A 2014 study found that out of 1,000 organizations, 84% were infected with malware and most had at least one bot in network. However, few were aware of the situation. Understanding the Cyber Threat is critical to preparing your defenses prior to attack and also instrumental in mounting a defense during attack. This webinar explores the threat and the role of the emerging discipline of Cyber Intelligence as a way of making threat information a...
October 21, 2015
Organizer:
PVBS Location:
Virtual
State and Local Tech Trends Virtual Training
State and local governments face a lot of challenges: shrinking budgets, federal mandates, resource constraints, an aging workforce, and the constant threat of a cyberattack. In our 2nd Annual State and Local Innovators Virtual Summit we surveyed attendees to learn about specific challenges facing public servants and their communities. On October 21st, join us for our State and Local Tech Trends Virtual Training as we share those results and s...
October 21, 2015
Organizer:
GovLoop Location:
Webcast
Accident Site Photography
Three courses in one training event – two days of photography instruction and practical exercises in addition to one day of digital image processing. Day One – Technical Photography The principles of digital imaging will be explained and demonstrated. Participants will create images to apply techniques discussed in class. Participants should be familiar with the operation of their digital camera prior to attending the course. Day T...
CSX 2015 North America
Announcing the inaugural CSX 2015 North America Conference. An ISACA® cyber event. 19 – 21 October 2015. ISACA’s Cybersecurity Nexus™ (CSX) was created as a result of our commitment to address the urgent global need for skilled cybersecurity professionals. CSX is a knowledge platform and professional program designed to be a single source for all things cybersecurity that will help you through every step of your career, n...
October 19-21, 2015
Organizer:
ISACA Location:
Washington, DC
Federal IT Acquisition Summit
Register today for the second event in the Federal IT Acquisition Summit series on October 20th in Washington, DC. Hear from seasoned government professionals and decision makers as they provide insight on key issues that are reshaping the federal acquisition environment, as well as contract-specific training opportunities. Featured vehicles include GSA Alliant (including an Alliant 2 update), Army ITES-3S and ADMC-3, NASA SEWP V, and NIH CIO-...
Enterprise Transformation in Government
Budget-constrained government CIOs have worked to make computing more efficient and less expensive by reducing the size of its data center portfolio. Since the Federal Data Center Consolidation Initiative was first launched in 2010, efforts to close hundreds of data centers and streamline government IT operations have fallen short of the goal set by the Office of Management and Budget (OMB). Government officials are now looking at cutting cost...
October 20, 2015
Organizer:
FEDINSIDER Location:
McLean, VA
F5 Air Force TechTalk - SSL Break and Inspect
Join F5 Networks and Carahsoft to earn one (ISC)2 CPE credit and discuss how to create an SSL/TLS strategy for Application Cybersecurity protection in the Datacenter. Learn which SSL/TLS standards are necessary to meet the new DoD requirements and how to increase application performance, security, and reliability with an SSL/TLS design. During this Cybersecurity TechTalk, you will: Learn about building SSL/TLS designs to mitigate web-based app...
Renewable Energy Strategies for Commerc...
Infocast’s Renewable Energy Strategies for Commercial & Industrial End-Users will bring together early-adopting corporate end-users, leading renewable developers, and financiers to outline the business case of developing and buying renewable energy. Commercial & industrial customers, utilities, distributed energy, energy storage, microgrid, and energy management technology providers will hear the wants and technical needs of cust...
October 19-20, 2015
Organizer:
Infocast Location:
San Diego, CA
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.