Back to Search Begin New Search Save Search Auto-Notify
Sensitive Compartmented Information Fac...
Sensitive Compartmented Information Facility Design and Construction – After attending this unclassified Workshop, students will be able to oversee design and construction of a sensitive compartmented information facility (SCIF), classified storage vaults and open storage spaces which meets official government requirements for a secure area where classified information is handled. The stringent physical security requirements; such as, ac...
February 19-21, 2019
Organizer: Haines Security Solutions
Location: Gretna, LA
Add Favorite
Flowdowns: Are you Flowing FAR and DFAR...
The Federal Acquisition Regulation (FAR) and the Defense Federal Acquisition Regulation Supplement (DFARS) requires Federal prime contractors and subcontractors, small and large alike, to flow-down certain clauses from their contracts when buying items from their suppliers and subcontractors. Although Small businesses are exempt from the requirement for subcontracting plans, small businesses are not exempt from FAR and DFARS flowdown requireme...
February 20, 2019
Organizer: Centre Law and Consulting
Location: Webcast
Add Favorite
Introduction to the Defense Federal Acq...
The DFARS provides Department of Defense (DoD) implementation and supplementation of the Federal Acquisition Regulation (FAR). The DFARS contains requirements of the law, DoD-wide policies, delegations of FAR authorities, deviations from FAR requirements, and policies/procedures that have a significant effect on the public. Relevant procedures, guidance, and information that do not meet the criteria for inclusion in the DFARS are issued in the...
February 14, 2019
Organizer: Centre Law and Consulting
Location: Webcast
Add Favorite
Defense Systems Summit
IT Everywhere: Technology's Role in Tomorrow's Military The Defense Department operates a vast and sometimes-disjointed IT ecosystem that is as complicated an enterprise as any that exists today. Throughout the department, IT teams manage operations by maintaining legacy systems alongside emerging technology. The common thread throughout is the desire for speed, insight, and security. The 2018 Defense Systems Summit brings together thought lea...
July 11, 2018
Organizer: 1105 Media Public Sector Events
Location: Arlington, VA
Add Favorite
Face-to-Face Cybersecurity: CDM: New In...
Big changes are coming with the third phase of the Continuous Diagnostics and Mitigation program. Even as agencies continue to work on the first and second phases, the Department of Homeland Security and the General Services are laying the groundwork for CDM Phase 3, with its focus on providing much greater and timelier insight into what’s happening on the network—and providing the tools for rapid response and recovery. GSA has alr...
May 23, 2018
Organizer: 1105 Media Public Sector Events
Location: Washington, DC
Add Favorite
Leveraging CDM DEFEND: Agile Cybersecur...
Earn 1 CEU! Nation-state, mercenary, cyber-jihadist and other adversaries continue to exploit vulnerabilities in Frankensteined legacy systems despite the growing outcry among agency and legislative leaders demanding action. Meaningful change requires tools which give agency leaders the agility, flexibility, visibility, and contract vehicles to quickly acquire new, cutting-edge cybersecurity solutions. CDM DEFEND is a powerful single award tas...
May 10, 2018
Organizer: Institute for Critical Infrastructure Technology
Location: Webcast
Add Favorite
Risk Based Self-Assessment as a Critica...
Risk Based Self-Assessment as a Critical Element to Measure Risk, Performance, and Improvement “A hands-on approach to implementing and leveraging a risk assessment to increase compliance program effectiveness and lean performance.” A proactive, systematic risk assessment is an essential first step to developing and implementing an effective compliance program. Performance culture, sound economics, and regulator expectations all re...
December 14, 2017
Organizer: Export Compliance Training Institute
Location: Webcast
Add Favorite
Using Building Design to Reduce the Eff...
Based on the assumption that preventive measures must be in place to be effective, students learn 25 mitigation strategies that when successfully applied reduce the impact of terrorist attack. We examine the current state of terrorism in the United States, its evolving nature and the future use of weapons of mass destruction. A variety of options are explored for addressing the most common manmade threats we face today and for the foreseeable...
November 17, 2017
Organizer: Haines Security Solutions
Location: New York, NY
Add Favorite
Defense Systems Summit
THE INTERSECTION OF DEFENSE IT AND DEFENSE READINESS IT is essential to readiness. Cloud, network modernization, analytics, mobility, and related technologies are reshaping how the military services and supporting agencies manage core operations and deliver mission-critical services. These technologies also provide an opportunity to reengineer those operations and services to create a much more agile and responsive IT environment—one tha...
November 14, 2017
Organizer: 1105 Media Public Sector Events
Location: Arlington, VA
Add Favorite
CSX Brainstorm
We’ve seen all of the cyber headlines this year – new policies emerging, old policies evolving, the cyber workforce is multiplying, and rapidly growing connected devices are complicating governance. While the Federal government is focused on security, new adversaries and attack vectors still emerge hourly. What are the early grades on the new Administration’s response to the growing cyber threat? How can collaborative tactics...
September 20, 2017
Organizer: MeriTalk
Location: Washington, DC
Add Favorite
Back to Search Begin New Search