Back to Search Begin New Search Save Search Auto-Notify
AFCEA Bethesda's 4th Annual Data Symposium
The growing data pool created by citizens sharing information in their daily lives through sensors, open data initiatives and the proliferation of the Internet of Things positions government agencies to deliver improved services and mission outcomes. The Data Symposium is focused on how government data enhances the life of the citizen. Highlights: With more than 130,000 data sets, learn out how the government currently uses data and the plans...
June 30, 2015
Organizer: AFCEA Bethesda
Location: Washington, DC
Add Favorite
GTRA GovTech Council Meeting & Summit
The GTRA GovTECH Council Meeting & Summit brings together an elite group of federal IT leaders who believe in the importance of executive-level collaboration and information exchange to support the transformation of the federal government through IT. Collaborative discussions will focus on the critical issues currently facing the community, including: Innovation: Improving efficiency through innovation, creating innovative cultures Cloud S...
June 28-30, 2015
Organizer: GTRA
Location: Gettysburg, PA
Add Favorite
Application Security Imperatives: Where...
How are agencies providing the anywhere, anytime access to data while still safeguarding information? Government legacy applications may permit clandestine access to exfiltrate data and explose personally identifiable information or other vital information to hackers. Demands for secure access along with a quality user experience mandates that the IT staff, the networking team, and the program managers work together. This webinar will feature...
June 29, 2015
Organizer: FEDINSIDER
Location: Webcast
Add Favorite
SANS Rocky Mountain 2015
Mile high...mile deep, SANS cybersecurity training!When you attend SANS Rocky Mountain 2015, you will see the SANS promise in action - what you learn in the classroom you will be able to use immediately upon returning to the office.Take advantage of the opportunity to put the skills you'll learn to practical use and join more than 64,000 GIAC certified professionals who make the IT security industry safe!Information security training in Denver...
June 22-27, 2015
Organizer: SANS Institute
Location: Denver, CO
Add Favorite
2015 Defense Systems Acquisition Manage...
Important Note All course materials and handouts will be provided to students on CD ROM. Please bring a laptop computer that is equipped with a CD ROM with you to the class. If you do not have access to a laptop, please contact the respective meeting planner as soon as possible. There will be a limited number of laptops available for use through NDIA, so please call early. Overview The Defense Systems Acquisition Management course meets the ne...
June 22-26, 2015
Organizer: NDIA - National Defense Industrial Association
Location: San Francisco, CA
Add Favorite
Contracting Officer's Representative (C...
Other dates and locations available for immediate registration. Reviewed and verified by the Federal Acquisition Institute (FAI) as meeting the training requirements for FAC-COR Level II. Moving beyond the basics covered in COR Level I Training, this hands-on, interactive 5-day course builds on your experience, deepens your understanding of the acquisition process, and takes your skills and capabilities to the next level. It is taught by train...
June 22-26, 2015
Organizer: American Management Association
Location: Dallas, TX
Add Favorite
Contracting Officer's Representative (C...
Other dates and locations available for immediate registration. Reviewed and verified by the Federal Acquisition Institute (FAI) as meeting the training requirements for FAC-COR Level I. The Contracting Officer’s Representative (COR) is a crucial link between the Contracting Officer (CO) and the contractor. In effect, CORs are the eyes and ears of the contracting officer, ensuring that the work the contracting officer has authorized gets...
June 25, 2015
Organizer: American Management Association
Location: Arlington, VA
Add Favorite
Contextual Intelligence: Deciphering Di...
Agencies face two primary challenges in knowledge management: Data diversity. Within a given agency, much information resides in relational databases against which the IT shop writes sources such as documents of all types. These may be documents, spreadsheets, presentations; PDFs; or the many other formats such as XML (e.g. NIEM data), maps, electronic messages, Tweets and other social media postings, news items, videos, and images. Institutio...
June 25, 2015
Organizer: FEDINSIDER
Location: Webcast
Add Favorite
Encryption and Cybersecurity Export Reg...
BIS relaxes rules while proposing a wide range of new controls on “cybersecurity” products. This webinar will bring companies up to date on the latest regulations affecting exporters of products using encryption as well as discussing new and proposed rules on cyber security products. These new rules are a result of agreements made by the Wassenaar Arrangement in the past two years, as well as an ongoing US interagency review of cyb...
June 25, 2015
Organizer: Export Compliance Training Institute
Location: Webcast
Add Favorite
Better Buying Power 3.0
The Department of Defense, and specifically the under secretary of defense (acquisition, technology, and logistics), have been focused on Better Buying Power (BBP) for some time. This is the third iteration of the overall effort that focuses on obtaining better efficiencies and productivity in our defense spending. BBP 3.0 emphasizes innovation and technical superiority, while continuing all the previous efforts to improve how we do business....
June 25, 2015
Organizer: National Contract Management Association
Location: Webcast
Add Favorite
Back to Search Begin New Search