2019 Equity & Excellence
Equity & Excellence: Access in Higher Education, AHEAD's 42nd annual, international conference will draw approximately 1,500 participants from around the world for a week of extraordinary professional development and networking. Presenters and participants come from diverse fields, including education, technology, law, scholarship, and government. Join us in Boston! OR, if you cannot make it to Boston: the conference Opening Plenary addres...
Preparing for What's Next in U.S. Healt...
Preparing for What’s Next in U.S. Health Reform will offer key lessons involving health reform and policy, focusing on its impact on you as a leader and on your organization. The nation’s leading health policy experts will explain essential lessons from current reform efforts, discuss what to anticipate with the next round of policy innovations under the new national administration, and offer insights to help you thrive in the rapi...
Designing Secure Buildings: Integrating...
(DSB) Designing Secure Buildings – This 3-day workshop is designed to familiarize students with twenty-one design principles used in preventing and detecting criminal activity and reducing the effects of acts of terrorism on the safety of personnel and damage to facilities and critical infrastructure. Specific modules include; Terrorism Ideologies, Security Basics, Philosophies and Design Strategies, Blast Fundamentals, Glazing and Windo...
Ergonomics and Human Factors: Strategic...
This applied program brings together professionals from across industries and sectors to prevent work-related musculoskeletal disorders and improve workplace health and safety through ergonomics. Ergonomics and Human Factors explores both the technical skills required to perform job assessments and the organizational factors which contribute to successful ergonomics programs. Participants will complete this program ready to control health and...
Leadership Strategies for Information T...
Learn to Add Value to Health Care with Health IT This advanced course brings together the diverse stakeholders impacted by health information technology – including CEOs, CIOs, physicians, nurses, informaticists, researchers, vendors, and academics – to ensure you receive an in-depth, applied understanding of the challenges and opportunities health IT presents. This unique continuing education course is designed for learners who wa...
Red Hat Summit 2019
Red Hat Summit is a collaborative forum, a place to expand your possibilities. This year, we’re thinking about AND. AND is about scaling your technology and culture in whatever size or direction you need, when you need to, with what you actually need―not a bunch of bulky add-ons. From the right foundation―an open foundation―AND adapts with you. It’s interoperable, adjustable, elastic. Think Linux AND containers. T...
May 7-9, 2019
Organizer:
Red Hat Location:
Boston, MA
Internal Audit Basic Training Workshop
Join us for a unique, interactive course that "walks you through" the Internal Audit process. "This course is not just for auditors or new auditors. It is for anyone who wants an understanding of the relationship between business objectives, risk, control, assessment and reporting." This comprehensive internal audit training course is for anyone who wants to have a strong base of knowledge and understanding of the essential audit and the perso...
The GAO Green Book Training Seminar
A Practical Approach to The Green Book Compliance The Green Book sets the standards for an effective internal control system for federal agencies, and is a crucial safeguard over public resources. State, local, and quasi-governmental entities, as well as not-for-profit organizations, may adopt the new Green Book standards as a framework for an internal control system. This one-day CPE seminar provides an overview of the principles-based Green...
Cybersecurity Technical Excellence Event
"How can you equip your staff with the policies and tools to make your business information, computers and devices as secure as possible?"This program focuses on the policies, methodologies, processes and tools needed to prevent, detect and monitor cybersecurity threats and provide for an effective program. As more and more data breaches are disclosed, cybersecurity remains at the front of many business leaders' minds. Data breaches are a con...
Cybersecurity Risk Program Training Academy
New cybersecurity risk regulations for all organizations are approaching faster than you might think. "Computers, software, programming and algorithms are all parts of a cybersecurity risk program, but it is the interaction with the "humans" that makes all the difference in the world." An effective cybersecurity risk program requires an organization to have everything from program policies to incident response plans to specific breach notifica...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.