Paid Leave Laws in Washington: What You...
Learn everything you need to know about paid leave laws in Washington and how they will affect your organization. Sometimes it seems like paid sick leave obligations are changing by the month, the week or even the day. Just when you come up with a proposal and an agreed-upon solution that works for one location, another law in a nearby city gets passed. Surely there must be a compliance solution that works across the board? This topic will dev...
Tips for Auditing Cybersecurity
Cybersecurity is a critical issue for everyone in today‘s big data world, thus auditors have to respond appropriately and incorporate cybersecurity in their audits. Cybersecurity might have different meanings to different audiences, and as a result there are many misconceptions. This webinar will first cover taxonomy (what cybersecurity is and what it is not), then elaborate on how cybersecurity can be integrated to the different phases...
October 18, 2016
Organizer:
ISACA Location:
Webcast
Huntsville EAR/OFAC Export Controls Sem...
Huntsville 2016 CLICK HERE FOR FULL SCHEDULE OF SEMINARS SEMINAR SERIES in Huntsville AL OCTOBER 17-20, 2016 EAR Export Controls / ITAR Defense Trade Controls Seminar Series at the Westin Huntsville Hotel 6800 Governors West, NW, Huntsville, AL 35806 REGISTER NOW DOWNLOAD SEMINAR BROCHURE EAR & OFAC Controls SEMINAR SEMINAR AGENDA ECoP® EAR renewal credits = 4 OCT 17-18, 2016 USD $1175 ITAR Controls SEMINAR SEMINAR AGENDA ECoP® IT...
SANS Baltimore 2016
Information security training in Baltimore, MD from SANS Institute, the global leader in information security training. Attend SANS Baltimore 2016 and choose from 10 hands-on, immersion-style security training courses taught by real-world practitioners. Don't miss the new SEC578: Cyber Threat Intelligence course, which will train you and your team to detect, scope, and select resilient courses of action in response to intrusions and data breac...
Import Focused Assessment (Audit) Semin...
Importers: Are you prepared for a Customs Audit? Sign up for our Import Audit Class and protect yourself from business disruption, fines, and penalties that can result from regulatory intervention from U.S. Customs and Border Protection. Learn how to prepare for a Focused Assessment. Explore strategies for self-auditing your import program. Learn record keeping requirements, how to exercise reasonable care, how to create a compliance manual, a...
2016 IT MODERNIZATION FORUM
This year's theme is "Federal Systems Legacy Systems Modernization: Oxymoron or Get a Move On?" Most federal departments and agencies are burdened with a large portfolio of legacy technologies that dampen the pace of innovation needed to transform agile service delivery and improve cybersecurity. The pressure on agencies to successfully modernize their systems is increasing from the Administration, Congress, and the Government Accountability O...
October 13, 2016
Organizer:
ACT-IAC Location:
Washington, DC
Leveraging As-a-Service to Overcome Gov...
According to the Office of Management and Budget, three-quarters of IT budgets are going toward the maintenance of legacy IT investments. As a means to adopt more efficient, secure, and modern IT systems and infrastructure, government is turning to an “as-a-service” model. This technique provides a self-sustaining mechanism for Federal agencies to regularly refresh their IT systems based on up-to-date technologies and best practice...
October 13, 2016
Organizer:
FEDINSIDER Location:
Webcast
Competitive Negotiations
Abstract: Government and industry must understand the rules of engagement as both parties enter into contract negotiations. Key Take-aways: Understanding FAR Part 15. Using the appropriate types of exchanges. Competitive discussions. Interested in learning more about the Federal Acquisition Regulation (FAR)? Join NCMA for our first three-week FAR Webinar Series! Earn 4.5 CPE hours by attending all three webinars or 1.5 CPE hours for each indi...
Inspection and Assessment of Dams
This seminar provides comprehensive instruction in inspection and evaluation techniques for dams. The principles, concepts and procedures taught will be readily adaptable to any organization conducting dam inspections and evaluating their compliance with current design standards. The target audience is state and federal dam owners/regulators, local and private dam owners/operators, consulting engineers and personnel responsible for the operati...
The Framework for Mobile Security in Go...
Government agencies have a combination of policy, technology and workforce requirements to address when mapping the framework for mobile security within their agencies. Security options are available at both the hardware and software levels and include encryption, rooted trust, kernel protection, and containerization. While crafting their security set-ups, technology staff also has to remember that users – real, live people – have...
October 12, 2016
Organizer:
FEDINSIDER Location:
Webcast
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.