Introduction to Federal Government Cont...
This four-day course covers the key elements of the entire federal government contracting process. Introduction to Federal Government Contracting is designed to provide those new to government contracts (or those looking for a basic refresher) with an understanding of the entire government contracting process. By providing this framework, you will be able to understand how your work relates to the overall process and will be able to more easil...
GAO's Principles of Federal Appropriati...
In 1982, GAO released the first edition of Principles of Federal Appropriations Law – a collection of the body of law governing the expenditure of federal funds commonly known as the Red Book. Today, agency program managers, general counsel, contracts administrators and financial officers are all faced with significant challenges in meeting organization needs within current budgets. What are the rules? How are they applied in practice? W...
JCMO EKMS/Controlling Authority WGM
The JCMO Provides Joint COMSEC support to meet the operational needs of the Joint Staff, Combatant Commanders, Services, Defense Agencies, Traditional and Non-Traditional Allies, and Non-Defense Agencies. To this end, this office serves as the Controlling Authority for all Joint Inter-Theater COMSEC Package (JICP) material and other Joint Programs as assigned by the Joint Chiefs of Staff (JCS). Although we control JCS owned material the JCMO i...
***CANCELED*** Explore Apple's Color wi...
Chesapeake Systems' host, Apple, has partnered with Avid to enhance your "Color" experience with the Euphonix Artist Series Control Surfaces. Come witness the benefits of using a fully integrated Control Surface to unleash the immense power behind Apple's Color application.Colorists, Editors, Motion Graphics Artists, Digital Filmmakers, Final Cut Pro/Studio enthusiasts and professionals in Digital Video, Digital Cinema, New Media, Broadcast an...
Open-Source Intelligence
Acquiring open source intelligence (OSINT) requires more than just an ability to use the Internet. Special databases and off-line sources are among the many rich veins of intelligence which go unknown and untapped by law enforcement, business researchers, security personnel, terrorism, gang and financial researchers and intelligence analysts. This course provides a five step process developed over ten years and augmented by tips, hints, checkl...
Government IT Security: Emerging Threat...
Join us for an informative technology symposium at the beautiful JJ Moakley Courthouse, in the heart of Boston's waterfront Seaport District. Learn how your organization can achieve enterprise-wide security with centralized management and complete visibility. Today's threats touch every area of the Enterprise - from email, to endpoints, to web gateways to servers. As attackers are adopting new techniques, the technology required to protect ou...
CARVER Vulnerability Assessment
The Nation’s Critical Infrastructures face a myriad of physical and technical threats. These threats, whether natural, man-made, accidental or intentional, each carry a certain level of risk that could compromise national security, public safety, and the economy. The first step in securing Critical Infrastructures is the performance of a full spectrum Risk and Vulnerability Assessment (RVA). An RVA is an assessment of an organization...
Open-Source Intelligence
Acquiring open source intelligence (OSINT) requires more than just an ability to use the Internet. Special databases and off-line sources are among the many rich veins of intelligence which go unknown and untapped by law enforcement, business researchers, security personnel, terrorism, gang and financial researchers and intelligence analysts. This course provides a five step process developed over ten years and augmented by tips, hints, checkl...
Pacific Spectrum Management Conference
The Annual Spectrum Management Conference is hosted by the Joint Frequency Management Office PACIFIC (JFMOPAC). This 5 day conference will be the forum for JFMOPAC to meet the Frequency Managers from each regional office. The Conference consists of forums and discussions regarding updates in the frequency and spectrum arenas, with exhibit days Tuesday and Wednesday.Through the displays, vendors will showcase the latest advancements in telecomm...
Government I.T. Made Simple--A Study of...
Government I.T. Made Simple...A Study of the Government Case for Security, Virtualization & Storage Agenda: Keynote VIP Guest Speaker: Warren T. Bamford, Special Agent in-Charge (SAC) FBI’s Boston Field Office. IT Security & its’ ‘Happening Now’ impact on the Public Sector to reduce victimization & build security awareness. McAfee: Dave Marcus, Director, Security Research and Communications McAfee Labs McAf...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.