Content ROT: How to Find and Treat It
Content ROT: How to Find and Treat It Class Format: Seminar Instructor: Delia Konizeski, WelchmanPierpoint Date: Tuesday, June 1, 2010 Time: 9:00 AM – 12:00 PM Place: Department of Labor (DOL) Directions to DOL Fee: $50 federal, state, or local U.S. government; $75 for non–government Seminar Description With thousands of government websites, there is a lot of ROT (redundant, outdated, and trivial) content. You can't engage citizens...
Critical Roles and Responsibilities of...
The contracting officer’s representative (COR/COTR) plays an essential role in the planning, awarding and management of the government contract. They are the “eyes and ears” of the contracting officer in ensuring that technical requirements are being met and that the contractor is adhering to the terms and scope of the contract. Their technical expertise and project management skills are critical in designing performance-base...
The Reality of Cyberattacks: Emerging S...
Recent research shows clearly that our critical infrastructure is under repeated cyberattack often from high-level adversaries like foreign nation-states. In fact the estimated cost from downtime, caused by major attacks, exceeds $6M per day. It's now confirmed: Our critical infrastructure is under repeated cyberattack from high-level adversaries. Register for this webinar to learn: The top cyber risks to public and private sector organization...
OmniGov Training Institute’s EEO Wednesdays
TOPIC: Informally Resolve More Cases! If you are an EEO Counselor or other EEO professional involved in informally resolving dispute, you won't want to miss this discussion. Participants will learn about their role as a facilitator and how they can get the parties to talk about what is REALLY bothering them. Participants will be able to articulate to the parties of the dispute the true benefits of informal resolution, talk them through the man...
Video Bootcamp
Video Bootcamp Class Format: Two–Day Course Instructor: Michael Rosenblum, Rosenblum TV Date: Tuesday – Wednesday, May 25 – 26, 2010 Time: 9:00 am – 6:00 pm NOTE: the time of this course is LONGER than other two–day WMU courses. Place: Mathematical Association of America Carriage House Conference Center Washington, DCDirections to MAA Fee: $1,950 federal, state, or local U.S. government; $2,925 for non–gover...
Webcast: The Identity Enabled Network:...
As we have seen from recent domestic and global threats, the federal IT enterprise is under constant attack. Today's network access technologies are a starting point for securing federal agency networks, but they are not enough. Today's secure network requires pervasive security measures that leverage existing infrastructure to meet tomorrow's needs - and are rooted in users' fundamental security asset: Their identities. Register for this sess...
Advanced COR/COTR Workshop
This two-day forum goes above and beyond basic training to focus on current, real-life issues COTRs face under changing procurement rules. The course is organized to give COR/COTRs a direct opportunity to discover better ways of communicating in resolving contractor concerns as well as problems between the program/project offices and the contracts area. Recent contracts will be used to illustrate state-of-the-art topics and concerns presented...
The 26th Annual William Oliver Baker Aw...
The Intelligence and National Security Alliance cordially invites you to attend: The 26th Annual William Oliver Baker Award Dinner honoring Dr. Robert M. Gates, Secretary of Defense For his lifetime of public service and outstanding achievements. Black Tie or Mess Dress. Past Recipients 2009 - Senator John Warner 2008 - Mr. Richard J. Kerr 2007 - William O. Studeman 2006 - James R. Clapper, Jr. 2005 - Brent Scowcroft 2004 - The Honorable Joan...
May 21, 2010
Organizer:
INSA Location:
McLean, VA
The 2010 ADFSL Conference on Digital Fo...
Digital forensics is playing a more prominent role in law enforcement, network security, and information assurance. The field of study encompasses not just digital evidence, but also the areas of cyber law, sociology, and security to name a few. Its increasing importance is reflected in its growing role within crime investigations, civil cases and homeland security. An in-depth understanding of digital forensics is needed by college students w...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.