Developing a Winning Cost Volume - Bid...
It’s a given – price is the most important part of the offer. This is especially true in the days when Lowest Price Technically Acceptable (LPTA) rules, and even when it is a Best Value procurement, the lowest bidder will most likely get the award. Most companies, however, miss the most important elements of process and deliverable for the cost volume, and fail to shine in an area where they could dominate. Manage the cost volume e...
Advanced FAR Workshop
The Advanced FAR Workshop goes beyond entry level discussion to examine important and emerging topics in greater depth using cases studies and current examples. Topics Covered Include: Labor Laws and ApplicationCompetition RequirementsSmall Business ProgramsFederal Supply Schedule ContractingModificationsTerminationsUnique elements of Simplified Acquisition ProceduresContractor Teaming: joint ventures, mentor-protegeEvaluation Factors...
Dell EMC & RSA Ransomware Government Briefing
How do you effectively defend your organization against something that's never been seen before? The key is to have secure endpoints and a trusted recovery process. Join us for a Government Briefing in Washington, DC that focuses on Dell EMC's Ransomware and Cyber Recovery and RSA Archer. Dell EMC's vendor-agnostic Ransomware and Cyber Recovery solution has advanced air-tight protection services to ensure that the "heartbeat" of your organizat...
San Diego: ITAR / EAR / OFAC Compliance...
International Traffic in Arms Regulations (ITAR), Export Administration Regulations (EAR), and Office of Foreign Assets Controls & Embargoes (OFAC) Explained - complete with all Export Control Reform Changes and New Administration Priorities: This seminar series provides both novice and experienced export compliance professionals with a comprehensive education on complying with United States export regulations. We will review recent ECR ch...
Cloud & MGT: Powering Government Innovation
Cloud computing is the engine accelerating modernization across government. Agencies want to put AI, IoT, and advanced analytics to work – and cloud is the quickest way to turn on these new services. And, with MGT now law, Federal agencies get to reprogram one-year savings to fund three-year IT transformations. That’s a game changer – it provides new incentives for agencies to accelerate change. We’ll sit down with gove...
June 6, 2018
Organizer:
MeriTalk Location:
Washington, DC
Intelligent Automation in Government: F...
Intelligent automation (IA) is the combination of artificial intelligence and automation and covers a spectrum of technologies from robotics to chat bots and self-driving cars. Uses for these technologies range from the routine to the revolutionary: from collecting, analyzing, and making decisions about textual information to guiding autonomous vehicles and advanced robots. This webinar will take an in-depth look at how agencies are using inte...
June 6, 2018
Organizer:
FEDINSIDER Location:
Webcast
FAR Less Complicated
The Federal Acquisition Regulation (FAR) is the source document when contracting with the procurement offices of both federal defense and civilian agencies for the purchase goods and services. A close and detailed working knowledge of the FAR is mandatory for government, contractor, and subcontractor personnel in order to maintain the best possible contracts and compliance with its requirements. This two-day FAR “Less Complicated...
SANS Atlanta 2018
Cyber Security Training in Atlanta, GeorgiaNow is the time to advance your career and develop skills to better protect your organization from today’s cyber threats. Join us at SANS Atlanta 2018 (May 29-June 3), and learn directly from the world’s top cyber security practitioners. Through hands-on immersion training, our courses provide you with the cutting-edge skills needed to defend your organization against security breaches and...
ISSA Mid Atlantic Information Security...
Join us for a full day of training by industry leaders discussing some of the latest topics in tactics and techniques for preparing for cyber-attacks. This conference will feature a variety of presentations and cutting edge training opportunities, including hands-on demonstrations and workshops. About ISSA Developing and Connecting Cybersecurity Leaders Globally. The Information Systems Security Association (ISSA)® is the community of choi...
Cyber Security Conference & Expo
Data security threats continue to increase in number and sophistication. The growing use of collaborative technologies – from mobile devices and social media to virtualization and cloud computing – will continue to be one of the most significant factors impacting the security landscape. For these reasons, the federal government has increased efforts to minimize and prevent cyber security attacks, and will continue to place signific...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.