Eoffer GSA/VA Schedule Preparation Workshop
Attendees will be taught how to prepare a new GSA or VA Schedule or a major modification to each using Eoffer/Emod.Instructor,Bob Griffin, has 17 years of experience in preparing Schedules(more than +300) and 30 years experience in Federal Contracting.Register at www.keynote-connections.com
Open-Source Intelligence
Acquiring open source intelligence (OSINT) requires more than just an ability to use the Internet. Special databases and off-line sources are among the many rich veins of intelligence which go unknown and untapped by law enforcement, business researchers, security personnel, terrorism, gang and financial researchers and intelligence analysts. This course provides a five step process developed over ten years and augmented by tips, hints, checkl...
2010 Seventh Annual Employment Law Conference
Topics Include: Employment Law Update TheWage and Hour Investigators are Coming: Be Prepared Update on Government Contractor Employment Issues Be Prepared for when the Government Comes Knocking: I-9 and Other Immigration-Related Audits Lunch Speaker: Business Etiquette for the High Impact Professional Cubicle Confidential – Employee Privacy in theWorkplace Promises, Promises…Litigation Solving the Employee Leave Puzzle: Once Step...
Blanco y Negro Awards Gala
The "Black and White" gala has become known as the premier formal awards banquet in the Latino community. This event brings together 700 community and civic leaders to honor and thank those individuals who have dedicated their lives to improving life opportunities for Latinos in the community, and to kick off Hispanic Heritage Month.Inaugurating Hispanic Heritage MonthKeynote Speaker...TBACocktails 5:30pmDinner 7:00pmDance/Dessert Reception 9:...
Getting a GSA Schedule: An Overview of...
Introduction to GSA Schedule Contracts: Understanding, Securing, & Managing a GSA Schedule Contract The GSA Schedule Contract is the most widely used government contract vehicle. In fiscal year 2009 government agencies purchased over $37.4 billion products and services through the GSA Schedules. Join us for this complimentary information session to learn more about what the GSA Schedule Contract is and what is involved in pursuing and hold...
Government IT Security: Emerging Threat...
Join us for an informative technology symposium at the beautiful JJ Moakley Courthouse, in the heart of Boston's waterfront Seaport District. Learn how your organization can achieve enterprise-wide security with centralized management and complete visibility. Today's threats touch every area of the Enterprise - from email, to endpoints, to web gateways to servers. As attackers are adopting new techniques, the technology required to protect ou...
CARVER Vulnerability Assessment
The Nation’s Critical Infrastructures face a myriad of physical and technical threats. These threats, whether natural, man-made, accidental or intentional, each carry a certain level of risk that could compromise national security, public safety, and the economy. The first step in securing Critical Infrastructures is the performance of a full spectrum Risk and Vulnerability Assessment (RVA). An RVA is an assessment of an organization...
Getting a GSA Schedule: An Overview of...
Introduction to GSA Schedule Contracts: Understanding, Securing, & Managing a GSA Schedule Contract The GSA Schedule Contract is the most widely used government contract vehicle. In fiscal year 2009 government agencies purchased over $37.4 billion products and services through the GSA Schedules. Join us for this complimentary information session to learn more about what the GSA Schedule Contract is and what is involved in pursuing and hold...
Midwest Security & Police Conference & Expo
The Midwest Security & Police Conference/Expo is the most dynamic industry trade show in the Midwest showcasing the latest products and services for security and law enforcement professionals. Now in its 10th year, MSPCE brings together an exciting 2-day marketplace featuring state-of-the-art security and law enforcement products, systems and services. ATTEND IN 2010! Your registration includes access to exhibit hall featuring full spectru...
Open-Source Intelligence
Acquiring open source intelligence (OSINT) requires more than just an ability to use the Internet. Special databases and off-line sources are among the many rich veins of intelligence which go unknown and untapped by law enforcement, business researchers, security personnel, terrorism, gang and financial researchers and intelligence analysts. This course provides a five step process developed over ten years and augmented by tips, hints, checkl...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.