GovConnects BizBreakfast - Doing Busine...
Find out which Army-wide research and development efforts and mission critical contracts are a priority from Kenyata L. Wesley, Executive Director of the Army Contracting Command - Aberdeen Proving Ground. There will also be plenty of time for networking and a short presentation from Mark Millen from the Maryland Department of Labor, Licensing & Regulation, on the Registered Apprenticeship Program.
July 26, 2018
Organizer:
GovConnects Location:
Laurel, MD
AIAA DEFENSE Forum
The AIAA Defense and Security Forum (AIAA DEFENSE Forum) is a SECRET/NoFORN forum for classified discussion of technical, programmatic, and policy issues pertaining to aerospace in U.S. national security.
Cross Domain Technical Forum
For the past 40 years, the Federal Business Council has produced thousands of symposiums, expositions, training forums, and conferences, both on-site and off, for the Department of Defense, Intelligence Community, and civilian agencies. Cross domain technology is a unique section of the information technology world, as it allows users to access or send information from one security level network to another. The Unified Cross Domain Services Ma...
Undersea Warfare Threat Industry Day
This event is open to U.S. Citizens only who possess at least a Secret Clearance. The event is SECRET/NOFORN. Attendees must be affiliated with U.S. Companies. The Undersea Warfare (USW) Industry Threat Day is intended to update the US USW community on potential adversary USW advances and relevant technology trends to help ensure continued US superiority in this critical warfare domain. This event should help USW performers better understand t...
GovConnects BizBreakfast- Contracting O...
Join us for:GovConnects BizBreakfast- Contracting Opportunities with Homeland Security on the State and Federal LevelWednesday, January 24, 2018 7:30 AM - 9:30 AM ESTHomewood Suites - Columbia/Laurel 7531 Montpelier Rd. Laurel, MD 20723
Cross Domain Services Element Summer Workshop
For the past 41 years, the Federal Business Council has produced thousands of symposiums, expositions, training forums, and conferences, both on-site and off, for the Department of Defense, Intelligence Community, and civilian agencies. 2016 stands to improve upon our schedule, with over 100 events planned.The Unified Cross Domain Services Management Office (UCDSMO) is presenting a two-day unclassified workshop that will focus on delivering in...
AIAA Defense and Security Forum
AIAA DEFENSE is a premier conference for technical exchange within aersopace defense and security arenas. The forum will provide you with an opportunity to learn about developments in the field from a deep bench of technical and keynote presenters, and discuss your findings in a U.S., SECRET level (or higher) clearance community. Attendance is limited to U.S. Citizenship and at least a SECRET security clearance. Registration for AIAA DEFENSE 2...
BizBreakfast with Lieutenant Governor B...
Earlier this month, the Commission to Modernize State Procurement led by Lt. Gov. Boyd Rutherford issued a report which includes 57 recommendations that span multiple issue areas such as creating a uniform RFP template for all goods and services, streamlining A&E procurements, expanding small business and MBE procurement opportunities, promoting efficiencies through automation and technology upgrades, and removing redundant and unnecessary...
Cross Domain Technical Forum
For the past 40 years, the Federal Business Council has produced thousands of symposiums, expositions, training forums, and conferences, both on-site and off, for the Department of Defense, Intelligence Community, and civilian agencies. Cross domain technology is a unique section of the information technology world, as it allows users to access or send information from one security level network to another. The Unified Cross Domain Services Ma...
Insider Threat Program Management, Deve...
This interactive and practical seminar combines a comprehensive overview of how to develop an insider threat program, manage insider threats, and operate an insider threat program to prevent, detect, deter, and mitgate insider threats. The seminar will also review and discuss legal considerations and implications of executing an insider threat program. Learn how to initiate, develop, and implement a legally defensible insider threat program. T...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.