Maritime Security 2013 Caribbean
Maritime Security 2013 Caribbean is hosted by Homeland Security Outlook, who has facilitated six maritime security conferences since 2011. At each of these events, security experts, government officials, law enforcement, and solutions providers converged from around the world to network and learn of best practices and tools to enhance securing their maritime domain. Every day poses new challenges for Caribbean maritime security. Every day, ten...
BES Training Conference
CONFERENCE OVERVIEW: In our ever-changing world mitigating risk is a key factor to ensure your business maintains sustainability. SSI Global Compliance, LLC and our BES team of subject matter experts would like to share with you their experiences on current trends and best practices as they relate to your global market risk and overall supply chain security. The agenda highlights include: Workplace Violence and the impact of social media / act...
Understanding the Authority of Agency O...
L2 Federal Resources presents an exclusive contracting webinar... Understanding the Authority of Agency Officials: Don't Get Caught Holding the Bag A thorough understanding of the authority and roles of government agency contracting officials can determine whether your company falls victim to mission creep, bid mistakes, improper agency actions or is able to draw a line in the sand. With the sequester providing unprecedented budget pressure,...
Managing the Foreign Corrupt Practices Act
L2 Federal Resources presents an exclusive contracting webinar... Managing the Foreign Corrupt Practices Act U.S. companies that are looking to grow via international expansion and who are otherwise performing contracts overseas must comply with the Foreign Corrupt Practices Act (“FCPA”). The FCPA, a highly enforced anti-bribery statute, prohibits all U.S. companies from paying bribes to foreign government officials in order to in...
Intellectual Property Rules in Governme...
L2 Federal Resources presents an exclusive contracting webinar... Intellectual Property Rules in Government Contracts Legal Update: Know Your Technical Data and Patent Rights There are a myriad of unique rules and regulations governing the rights to intellectual property in U.S. Government contracting. These rules and regulations are designed toadvance U.S. Government procurement policy considerations while, at the same time, balancing the co...
7th National Emergency Management Summit
CANCELED
Over the past ten years an extraordinary confluence of events, both environmental and geopolitical, has created a heightened risk and a heightened awareness of natural disasters, epidemics, and terrorism in the United States. The National Emergency Management Summit seeks to assess these risks and articulate practical approaches to strategies for planning, response and recovery. For 2013 the Summit will be in Atlantic City, roughly a year afte...
Contract Claims Arising from the Seques...
L2 Federal Resources presents an exclusive contracting webinar... Contract Claims During the Sequester: Improve Your Chances of Cost Recovery By now, most people have heard of sequestration; however, sequestration’s effect on Government procurement policy and practice continues to present unexpected and difficult challenges for Government contractors. This is especially true of Government contract claims – including the types of c...
Procurement Integrity Act: A High Risk...
L2 Federal Resources presents an exclusive contracting webinar... Procurement Integrity Act: A High Risk Area for Government Contractors The purpose of the Procurement Integrity Act is to maintain and establish a fair playing field for government contractors. Failing to comply with this Act can result in criminal prosecution, fines, penalties, loss of business, and exclusion from government contracting. The Act and the corresponding regulatio...
Cyber Security for National Security (CS4NS)
The First Southeast Regional CS4NS Conference focuses on the immediate need of strengthening the critical cyber infrastructure of our nation. The conference will address the current cyber security state and rank vulnerabilities of our Critical Infrastructure/Key Resources (CI/KR), Internet Infrastructure, and available security resources. Discussions will highlight future development needs and solutions, especially for underserved businesses a...
Cloud Computing - The Shifting Role of...
The shift to cloud computing involves a lot more than just adopting new technology. It's a total business transformation. As an IT professional, are you prepared for the changing roles in the cloud? If you answered no, you need to arm yourself with information about how IT jobs are evolving and which new skills are needed in the new cloud-focused landscape. Join us for this free, one-hour webinar that will uncover: Why and how cloud computing...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.