EEO-1 Form Reporting for 2018 and Trend...
Are you prepared to handle the new EEO-1 reporting requirements? Learn the new and complex EEO-1 reporting requirements as well as practical approaches to completing and submitting the new EEO-1 report by the filing deadline. This engaging topic will also discuss OFCCP's latest enforcement practices. The focus on the OFCCP's new approach to audit and compliance enforcement will be discussed. Learning Objectives - You will be able to discuss th...
SANS Boston 2017
Develop much-needed techniques to protect against today's cyber-attacks. Join us for SANS Boston 2017 (August 7-12), and get hands-on training to sharpen your skills and accelerate your cybersecurity career.Take advantage of these opportunities to get the most out of your training: Challenge your skills during two nights of Core NetWars Experience (FREE with any 4-6 Day SANS course registration). Distinguish yourself as an information security...
Documenting Software for FDA Submissions 2017
When medical device companies consider Agile development methods, they often run into the key criticism that Agile groups produce little to no documentation, and that Agile stands in contradiction to the lifecycle standards outlined in IEC 62304. In fact, those principles - have clear processes for quality management system, risk management process, software maintenance, configuration management, and problem resolution - actually augment rathe...
Balanced Scorecard Professional (BSP) C...
The Balanced Scorecard Professional Certification Program provides participants with background and resources in all areas that are important to lead or participate on a team to build, implement, and sustain a balanced scorecard planning and management system in their organization. The program includes in-depth study of strategic thinking, strategic planning, organization assessment, strategy mapping, performance measures and target setting, s...
SANS San Antonio 2017
Success in information security requires committing to a career of learning, from fundamentals to advanced techniques, because the field is continually evolving. To put you on this learning path, join us at SANS San Antonio 2017 (August 6-11), featuring industry leaders addressing today's greatest cyber threats.Take advantage of these opportunities to get the most out of your training: Distinguish yourself as an information security leader by...
Overcoming Government Bottlenecks to th...
The Defense Information Systems Agency views the cloud as the centerpiece of data center consolidation, enabling the military to conserve budget as well as free up space in existing facilities for mission needs. The Department of Defense has a global mission to deliver capabilities and data to millions of soldiers and civilian employees around the world every day in real time. This video webinar will explore best practices for implementing a m...
August 10, 2017
Organizer:
FEDINSIDER Location:
Webcast
A Practical Guide to Government Contract Law
Did you know that subcontracts are not “Federal” contracts and are not subject to Government contract law? And that the Government can terminate your contract with no liability for damages? Did you know every FAR clause has a “prescription” explaining when and if it should be used? Or that you can use simplified acquisition procedures (SAP) for non-commercial items up to $7 million? The answers to all these questions an...
Cybersecurity Leadership and Governance
The goal for this course is to provide an understanding of cybersecurity leadership focused on people and not just technology and policy. It will give you an overview of frameworks to support your risk management activities. It is highly useful to any organizational executive, or leader seeking an understanding of building cybersecurity cultures and governance. The word cybersecurity is thrown around, used and abused to scare people into buyin...
Access Control Concepts and Entry Contr...
(ECF) Access Control Concepts and Entry Control Facility Design – Similar to the Maintaining Control Workshop conducted by the US Army Surface Deployment and Distribution Traffic Engineering Agency, this class is intended for government, military and contractor SECURITY or ENGINEERING personnel involved in designing entry control facilities. The curriculum focuses on the design features required for the effective and efficient operation...
Cybersecurity Summit: The Cyber Challen...
During the last two years, federal agencies have made tremendous strides toward improving the security of their networks, systems, and data. But it hasn’t been enough, and never could have been. Even as the federal government has put in place new, more sophisticated programs for defending against cyber threats, those threats have continued to evolve. Register today for the Cybersecurity Summit and hear Federal IT leaders from across gov...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.