When The Military Comes Home: USERRA, V...
Don't let your company become a liability; understand the employee's rights and employer's responsibilities on military leave. As a result of the continuing global war on terrorism, employers are faced with an unprecedented level of impact of military service on the workplace. What must an employer do when an employee gets orders to be activated? Do you have to hold the job open? What if it's an employee's family member with the orders - what...
Debunking the Myths of Modernizing Fede...
According to IDC, outdated federal IT networks are incapable of fully exploiting the extensive advantages of the mobility, cloud, social networking, and big data analytics technologies collectively. This modern infrastructure will allow agencies to develop flexible networks that can easily and cost-effectively adapt to the changing needs of federal employees, citizens, and warfighters. Agencies are holding back because of concerns that moderni...
October 8, 2015
Organizer:
FEDINSIDER Location:
Webcast
Write a Powerful Capability Statement
Capability Statements may be your most important marketing tool. An effectiveCapability Statement can open doors to over $500 billion dollars that will be won in government contracts. Unfortunately, most contractors make the huge mistake of taking the “one size fits all” approach by providing the same generic Capability Statement for every opportunity. Attend this class virtually or in-person at our new office. Do you know how to e...
Accident Investigation Orientation for...
This course, led by senior NTSB management and investigators, details how the Safety Board investigates major aircraft accidents and what it expects of participants in an investigation. Upon completion of this course the participant will: Improve the overall preparedness of an airline response team Reduce confusion following an accident event by proactively managing the on-scene situation Explain the role of the air carrier as a part of the ...
Vulnerability Assessments and Risk Anal...
A variety of five qualitative and quantitative methodologies are discussed in detail during this three-day workshop. The “do’s & don’t” of report writing are covered. Field evaluations are conducted. Students will learn the differences between qualitative and quantitative risk analysis. They will use a variety of methodologies by evaluating single or multiple buildings and critical infrastructure nodes. This worksho...
Amsterdam US Export Controls for Non-US...
Export Administration Regulations (EAR), International Traffic in Arms Regulations (ITAR) and Office of Foreign Assets Controls & Embargoes (OFAC) Explained - complete with the latest updates on Export Control Reform (ECR) as they apply to NON-US COMPANIES: This seminar series provides both novice and experienced export compliance professionals with an in-depth education on export control regulations administered by the US Departments of...
Validation and Part 11 Compliance of Co...
Overview: Analytical equipment should be qualified and computer systems should be validated to demonstrate suitability for the intended use. Electronic records must comply with FDA Part 11 and EU/PICS GMP Annex 11 requirements to ensure data integrity, security and availability. Recent EU and FDA inspection documents prove that qualification, validation and electronic laboratory are records are on target of inspectors. The large number of warn...
Current Issues On Bidding, Contracting...
Discover how to navigate the minefields of California procurement code and public contracting with ease. This topic is designed to provide persons working in public works construction with a review of new developments in procurement, a review and refresher on common bid protest issues, and a discussion of new developments and major claim and risk issues that arise on many public projects. We will review changes in recent years that have expand...
Beyond the Breach -- Security in the Cloud
There are two types of people – those who know they’ve been hacked, and those who don’t. Federal agencies, companies, and individuals are under attack every day from hackers, and our wealth of data is the ultimate prize. With outdated government data centers taking much of the blame in recent attacks, agencies are increasingly turning to the cloud for security. Still, no defense is impenetrable, and it’s only a matter o...
Cybersecurity vs. Data Security: Govern...
Digital networks across the country are currently threatened by wide-scale data theft, like the recent breach of the networks of the Office of Personnel Management (OPM), not destruction or compromise. What is the difference between cybersecurity and data security? And, what strategies are agencies using to prevent future data loss? This webinar will hear from government and industry experts who will discuss what government needs to do now to...
October 6, 2015
Organizer:
FEDINSIDER Location:
Webcast
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.