Cybersecurity Leadership and Governance
The goal for this course is to provide an understanding of cybersecurity leadership focused on people and not just technology and policy. It will give you an overview of frameworks to support your risk management activities. It is highly useful to any organizational executive, or leader seeking an understanding of building cybersecurity cultures and governance. The word cybersecurity is thrown around, used and abused to scare people into buyin...
Excel - Business Intelligence with Powe...
Do you work with "Big Data"? Do you import, manipulate and analyze massive datasets in Excel? If so you’ll already be familiar with the limitations of Excel. Power Pivot and Power Query, two free add-ons for Excel, are designed to get you past these limitations, allowing you to import and work with 1-million-plus-row datasets from virtually any source. If you ever need to create pivot tables from multiple datasets, Power Pivot is your fr...
Cybersecurity Leadership and Governance
The goal for this course is to provide an understanding of cybersecurity leadership focused on people and not just technology and policy. It will give you an overview of frameworks to support your risk management activities. It is highly useful to any organizational executive, or leader seeking an understanding of building cybersecurity cultures and governance. Purpose: The word cybersecurity is thrown around, used and abused to scare people i...
No More Excuses! Unleash the Power of A...
A single, powerful factor separates super-achieving teams from those that throw around phrases like 'not my job' and 'nobody told me': Accountability. Humans are more creative, more responsive to challenges, and more capable of serving the needs of others when they are held accountable. Great supervisors have a unique talent for tapping into employees' personal accountability. But teams with low levels of accountability are led by managers who...
ICE Audits - What All Employers Should Fear?
In this webinar, I will discuss the importance of being ready for a Notice of Inspection (NOI) - also referred to as audit by Immigration and Customs Enforcement (ICE), what happens when an ICE audit occurs, and an employer’s potential liability for I-9 errors discovered by ICE in the audit. The webinar will discuss the need for preventive maintenance – an employer performing an internal I-9 audit - which should discover many of th...
The Great Migration: Transitioning Agen...
In the world of legislative management, few things matter more than consistency. From building workflows and managing approvers, to storing your agendas and data, details matter. Granicus has been working with clerks on optimizing the agenda process over 15 years and knows what works best for managing day-to-day legislative needs. In our upcoming webinar on August 2, at 1:00 p.m. ET/10:00 a.m. PT, you’ll be able to learn from experts on...
August 2, 2017
Organizer:
GRANICUS Location:
Webcast
Managers as Coaches: Yes, You Can Boost...
Managers who coach their people become known as good managers to work for, developers of talent, and achievers of business results. They also become better leaders in the process.” -Jack Welch, Former CEO General Electric Are your people working harder yet performance is still below par? When a leader spends too little time managing performance, here’s what happens. Small sparks turn into creeping flames that, if not doused, quickl...
Office Hours for GCA members
Office Hours is a designated time for GCA members to receive consultation time to review government contract concerns. For example: proposal considerations team agreements assessment analysis strategy planning and more What: Office Hours for GCA Members When: Tuesdays at 6:00 pm (except 2nd Tuesdays) Where: 3300 Buckeye Road; Suite 500; Atlanta, GA 30341 Register: http://govassociation.org/event-2588634 Who Should Attend: GCA members What Will...
International Symposium on Forensic Sci...
NIST and the FBI invite you to the second International Symposium on Forensic Science Error Management, where speakers, panels, posters, and workshops will address ways to detect, measure, and mitigate forensic science errors. This symposium promises an eye-opening, candid appraisal of root causes and possible solutions while providing a forum for open dialog about this sensitive topic. The technical program will cover four tracks: Crime Scene...
Cybersecurity Leadership and Governance
The goal for this course is to provide an understanding of cybersecurity leadership focused on people and not just technology and policy. It will give you an overview of frameworks to support your risk management activities. It is highly useful to any organizational executive, or leader seeking an understanding of building cybersecurity cultures and governance.The word cybersecurity is thrown around, used and abused to scare people into buying...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.