WBC: 6 Trends Driving FY13 IT Opportunities
Do shrinking budgets, increased competition, and IT governance policies seeking to cut infrastructure costs to fund new and improved mission systems cause you to have a bleak outlook for IT business opportunities in FY13? Industry leader and immixGroup co-founderSteve Charles hopes to change your thinking as he discusses how companies can spot the opportunities driving the federal IT market forward. In a recent article, Mr. Charles reminds us...
CON 100: Shaping Smart Business Arrangements
This seminar provides a comprehensive introduction to the environment, responsibilities, and skills required of government contracting professionals. This wide-ranging course covers everything from how to work in teams, to the various DOD mission areas, to the regulatory framework governing acquisitions. Jumpstart your career with this exciting, expansive course, and be an integral player in fulfilling your agency’s mission. FCI’s...
Find Opportunites Early
Where do you find the business problems the government is trying to solve? The data is out there. Learn how and where to look for opportunites, potential teaming partners, and where not to spend your time and resources Become more efficient at researching and analyzing readily available data Be "smarter" than the competition
Security Clearance Expo December's Larg...
Security Clearance Expo Thursday, December 13th, 2012Sheraton Premiere At Tyson's Corner8661 Leesburg Pike Vienna, Virginia 22182 Interview times 10:00:00 AM - 3:00:00 PM December Largest Most Exclusive Hiring Events Interview for 1000's career opportunities of NEWLY AWARD TASK ORDERS Face to Face With The Areas Top Companies who will have PM's, Hiring Managers & More available to present contingency Offers To the Right Candidates! Thuirsd...
A Cut above, the Best in Network Securi...
A Cut Above, the Best in Network Security and Virtualization! Attacks against DNS infrastructure can have disastrous results, including lost revenue due to downtime, diminished customer satisfaction and lost productivity because of denial of service, and privacy breaches due to data hijacking. Are you prepared? Join Infoblox for an interactive seminar where you will learn DNS security best practices and how to tame virtualization. What you wil...
Security Clearance Expo August Largest...
Security Clearance Expo Wednesday, August 8th, 2012Sheraton Premiere At Tyson's Corner8661 Leesburg Pike Vienna, Virginia 22182 Interview times 10:00:00 AM - 3:00:00 PM August Largest Most Exclusive Hiring Events Interview for 1000's career opportunities of NEWLY AWARD TASK ORDERS Face to Face With The Areas Top Companies who will have PM's, Hiring Managers & More available to present contingency Offers To the Right Candidates! Wednesday,...
Security Clearance Expo April Virginia...
Security Clearance Expo Thursday, April 19, 2012Sheraton Premiere At Tyson's Corner8661 Leesburg Pike Vienna, Virginia 22182 10:00:00 AM - 3:00:00 PM April's Most Exclusive Hiring Events Spring to a New Career. Interview Face to Face With The Areas Top Companies For 1000's Fully Funded Cleared Career Opportunities At SecurityClearanceEXPO's Hiring Events Thursday, April 19th, 2012 Sheraton Premiere at Tyson's Corner 8661 Leesburg Pike Vienna,...
GSA's MAS Program & the False Claims Act
The panelists will walk through the lifecycle of a mock Civil False Claims Act case involving the GSA Schedules. The forum will provide an opportunity for an interactive discussion with defense counsel, relators’ counsel and government counsel. Event is perfect for: In-house Counsel Compliance Managers Government Contracting Officers Inspector General Accountants Ethics Officers
The Anatomy of an Enterprise Cyber Attack
In 2009, Chinese hackers began stealing sensitive intellectual property from U.S. oil, gas and petrochemical companies. The attacks were attributed to the Chinese based on recognition of Chinese hacking tools previously identified on underground hacking sites and the attacks apparent origin in Beijing. Termed “Night Dragon,” these attacks included social engineering, spear-phishing attacks, exploitation of Microsoft Windows OS vuln...
April 11, 2012
Organizer:
NVTC Location:
Vienna, VA
Social Media in the Public Sector
Join Market Connections and Strategic Communications Group for the release of the Public Sector Social Media Study. The second edition of this popular study takes a comprehensive look at use of and perceptions around social media among government agencies and contractors. Government employees and contractors alike will leave this event with at least three repeatable social media success stories! 8:00-8:30 a.m. – Networking and breakfast8...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.