Back to Search Begin New Search Save Search Auto-Notify
How to Ship Consumer Commodities and Li...
Consumer commodities (ORM-D) and limited quantities are subject to somewhat less stringent regulations than other hazardous materials. However, this does not mean that DOT doesn't regulate them. And when you ship them by air, they are subject to more stringent regulations established by IATA and ICAO. Regulatory relief is also granted to sample shipments, materials that are transported by private motor carriers in support of a business, and sm...
September 14, 2010
Organizer: Environmental Resource Center
Location: Webcast
Add Favorite
Government IT Security: Emerging Threat...
Join us for an informative technology symposium at the beautiful JJ Moakley Courthouse, in the heart of Boston's waterfront Seaport District. Learn how your organization can achieve enterprise-wide security with centralized management and complete visibility. Today's threats touch every area of the Enterprise - from email, to endpoints, to web gateways to servers. As attackers are adopting new techniques, the technology required to protect ou...
September 8, 2010
Organizer: En Pointe GOV, Inc. & Symantec
Location: Boston, MA
Add Favorite
Computer Forensics for the Security Pra...
About This Training: Accidental/intentional destruction of data, hardware failure or cyber attacks can happen at any time and you may be called upon to respond, investigate, document, handle, and escalate the analysis to a formal investigation. In this two day hands-on workshop, you'll consider when investigations are appropriate or warranted, and learn how and when to recover lost or deleted information from the Recycler Bin (Info2 file), Dis...
September 2-3, 2010
Organizer: Government Horizons
Location: Arlington, VA
Add Favorite
CARVER Vulnerability Assessment
The Nation’s Critical Infrastructures face a myriad of physical and technical threats. These threats, whether natural, man-made, accidental or intentional, each carry a certain level of risk that could compromise national security, public safety, and the economy. The first step in securing Critical Infrastructures is the performance of a full spectrum Risk and Vulnerability Assessment (RVA). An RVA is an assessment of an organization...
August 16-19, 2010
Organizer: Government Training Inc.
Location: San Diego, CA
Add Favorite
Crisis Leadership For Local Officials
The National League of Cities (NLC) in cooperation with the International City/County Management Association (ICMA) will be conducting an emergency training program "Crisis Leadership for Local Officials" funded by the Department of Homeland Security. NLC will be providing two day training deliveries nationwide. This training program is intended to educate local leaders about their role in emergency management as well as support the National P...
August 13-14, 2010
Organizer: National League of Cities
Location: Grand Rapids, MI
Add Favorite
Crisis Leadership For Local Officials
The National League of Cities (NLC) in cooperation with the International City/County Management Association (ICMA) will be conducting an emergency training program "Crisis Leadership for Local Officials" funded by the Department of Homeland Security. NLC will be providing two day training deliveries nationwide. This training program is intended to educate local leaders about their role in emergency management as well as support the National P...
August 9-10, 2010
Organizer: National League of Cities
Location: Bloomington, IN
Add Favorite
Open-Source Intelligence
Acquiring open source intelligence (OSINT) requires more than just an ability to use the Internet. Special databases and off-line sources are among the many rich veins of intelligence which go unknown and untapped by law enforcement, business researchers, security personnel, terrorism, gang and financial researchers and intelligence analysts. This course provides a five step process developed over ten years and augmented by tips, hints, checkl...
August 2-3, 2010
Organizer: Government Training Inc.
Location: Las Vegas, NV
Add Favorite
Networking Skills: Making Your Contacts Count
Networking Skills: Making Your Contacts Count July 7, 2010 9 am - noon Create, Cultivate & Capitalize on Networking Relationships & Opportunities This workshop is based on the book Make Your Contacts Count: Networking Know-How for Business and CareerSuccess by authors Anne Baber & Lynne Waymon. Copies of the book will be available for purchase at the seminar. Networking Skills: Making Your Contacts Count Are you a natural-born net...
July 7, 2010
Organizer: Focusing on Solutions, LLC
Location: Yorktown, VA
Add Favorite
Win Win Negotiations and Consensus Building
WHO SHOULD ATTEND? Anyone who has an interest in learning or improving skills necessary to implement the Obama Labor Relations Executive Order. This includes HR practitioners, union officials, members of bargaining teams, legal staff, neutrals, and line managers. OVERVIEW OF TOPICS COVERED: - A close look at traditional or distributive bargaining and its limitations,- An in-depth review of win-win bargaining to include tools, techniques, and...
June 29-30, 2010
Organizer: GRA Training Institute
Location: Arlington, VA
Add Favorite
B2G Government Contractors Networking
B2G Government Contractors networking event is a monthly recurring event at the J F Kennedy Center, every 3rd Thursday of the month. This is a high-level professional event hosted by Jennifer Schaus & Associates along with MAK Advisors. There is no cost to attend. http://JenniferSchaus3.eventbrite.com
June 17, 2010
Organizer: Jennifer Schaus & Associates
Location: Washington, DC
Add Favorite
Back to Search Begin New Search