A PRACTICAL GUIDE TO THE INCURRED COST...
Who should attend: CFOs, Directors, Managers in functional areas of Contract Administration, Accounting, Finance, Compliance and Consulting. Any organization who are required to submit their incurred costs to the Federal Government What you will learn: Government contractors subject to an Allowable Cost and Payment contract clause must submit an adequate incurred cost proposal together with supporting data for each fiscal year within six month...
22nd Annual Government Contracting Update
As a government contractor, you cannot afford to be reactive. Attend DHG's 22nd Annual Update and stay ahead of the competition. In 2016, over 350 attendees, both professionals and representatives from the government and the industry, collaborated to provide the most up-to-date information, materials, industry insights and experience to help you navigate and succeed in this turbulent fiscal environment. DHG's Government Contracting Practice ha...
LAS VEGAS: US Export Controls / Defense...
Export Administration Regulations (EAR), International Traffic in Arms Regulations (ITAR) and Office of Foreign Assets Controls & Embargoes (OFAC) Explained - complete with the latest updates on Export Control Reform (ECR): This seminar series provides both novice and experienced export compliance professionals with an in-depth education on export control regulations administered by the US Departments of State, Commerce & Treasury. Exp...
Face-to-Face Cloud: The Next Steps for...
In some ways, cloud has become a foregone conclusion in federal IT strategies. As agencies look to modernize their IT enterprise, consolidate their data centers, and develop a new generation of IT services, the importance of the cloud is beyond argument. Cloud is expected to play a critical role in two major initiatives: Legacy IT modernization and data center consolidation. In both cases, cloud is seen as a way to make existing systems more f...
Ohio Cyber Dialogue with Industry
The Cyber Revolution: Great Disruption Leading to Positive Transformation In 2017 a revolution in cyber security is unfolding that will see hacking evolve supported by a supercharged connectivity with the IoT., bringing with it unmanaged risks. It’s anticipated Crime syndicates will take quantum leaps with crime-as-a-service, brand reputation and trust will be a target, all culminating in new regulations accompanied by new compliance ris...
May 3, 2017
Organizer:
DaytonDefense Location:
Wright Patterson AFB, OH
North America CACS 2017
Gain the Knowledge to Move Ahead Register for North America CACS 2017 Today! Mark your calendar for 1 – 3 May 2017 and join us in Las Vegas, Nevada! Don’t miss the opportunity to earn up to 39 CPE hours and be a part of the top conference for IS audit and security professionals! North America CACS 2016 was ISACA’s best rated conference ever and attracted record-breaking attendance. In 2017, we will continue to grow, improve a...
May 1-3, 2017
Organizer:
ISACA Location:
Las Vegas, NV
Adobe Digital Government Symposium 2017
People today are more connected, more discerning, and more overwhelmed than ever before. So when they transition from a consumer to a citizen or to a government employee, they expect a seamless shift. One that’s simple, personalized, and exceptional—whether it’s online, mobile, or social. Join Adobe for an all-day event where you’ll hear how other agencies are leading digital transformation and providing new, exciting s...
ACT-IAC Small Business Alliance: Agile...
Agencies such as Department of Homeland Security, Health and Human Services, and General Services Administration are among the many that indicate they rely on the Agile approach to IT development. Additionally several agencies have recently urged their procurement offices to operate using Agile principles in addition to buying from known Agile Services vendors. As the pressure continues to mount on Federal agencies to embrace Agile development...
May 2, 2017
Organizer:
ACT-IAC Location:
Washington DC, DC
Conquer (Un)Predictable Intelligence
The explosion of connectivity and multiplying data sets have opened millions of entry and exit points for data – consequently identifying a breach is about as easy as looking for a needle in a haystack. Hence, advanced analytics and artificial intelligence now stand shoulder to shoulder with our cyber defenders on the thin digital line. So, how are agencies leveraging big data analytics to harden systems without sacrificing performance,...
May 2, 2017
Organizer:
MeriTalk Location:
Webcast
SANS Baltimore Spring 2017
SANS' instructors are innovative thought leaders and industry experts teaching constantly updated, practical cybersecurity techniques. Join us for SANS Baltimore Spring 2017, April 24-29, and learn how to out-think and out-maneuver cyber adversaries with cutting-edge cybersecurity tactics. Choose from nine courses in IT security, penetration testing, forensics, and security management. Register today. Information Security Courses Available at...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.