Trade Compliance Toolbox: A Jurisdictio...
Trade Compliance Toolbox: A Jurisdiction and Classification Deep Dive In today's globalized business landscape, adherence to export compliance is paramount, and accurate classification is the foundation of ensuring regulatory compliance. Join former regulators Candace Goforth, Tony Dearth, and Bruce O’Cain as they analyze the classification process and provide benchmarking information and tips on conducting classification assessments for...
Benefits of Designing for Exportability...
Benefits of Designing for Exportability to Maximize Your International Business Join us for an insightful webinar on designing for exportability to master navigating the International Traffic in Arms Regulations (ITAR) and Technology Security and Foreign Disclosure (TSFD) requirements of the Arms Export Control Act (AECA). In this one-hour webinar, we will examine the jurisdiction and classification process, TSFD processes, and best practices...
DoD: Embracing Continuous Monitoring
Federal cyber leaders are tasked with the challenge of balancing active defense efforts, particularly when the U.S. is involved in international conflict, with building an infrastructure secure from the individual device all the way to enterprise environment. To do all of that, defending their networks and building for the future, DoD leaders must prioritize continuous monitoring of their cyber systems to address hidden vulnerabilities to addr...
May 21, 2024
Organizer:
FedInsider Location:
Webcast
Recovering Empowered Officials: A Day i...
Recovering Empowered Officials: A Day in the Life REGISTRATION IS FREE AND OPEN TO THE PUBLIC Webinar Panel: Debi Davis, Moderator (Davis ITC); Andrew Booth (Sierra Nevada Corporation); Steve Casazza (Defense Trade Solutions); Ashley Farhat (HRL Laboratories); Greg Hill (Leonardo DRS) NCBFAA/NEI Credits: 1.5 CES/MES The International Traffic in Arms Regulations (ITAR) places significant responsibilities on individuals designated as empowered o...
Tricks of the Trade: ITAR Agreement Pro Tips
Join us for an insightful webinar on mastering International Traffic in Arms Regulations (ITAR) agreements – Technical Assistance Agreements (TAAs), Manufacturing License Agreements (MLAs), Warehouse and Distribution Agreements (WDAs), and associated amendments. In this session, we will delve into the intricacies of ITAR agreements, offering expert guidance and pro tips to ensure compliance and success in navigating the complex landscape...
Cyber Defenders Workshop
Cybersecurity is a cornerstone of the Biden administration’s priorities and has never been more important to securing the nation’s infrastructure and data from cyber threats than it is today. Government IT leaders must remain vigilant against near-constant cyber threats while maintaining legacy systems and securing a remote workforce. In this workshop, Nextgov/FCW will examine the most important trends in cybersecurity across the f...
CyberTalks
Cybersecurity and digital privacy concerns permeate every aspect of government and industry, driving geopolitical decisions and determining how organizations battle ransomware. Cyber is a critical component in the Ukraine war and informs how the U.S. confronts China's global influence. And the need for digital privacy protections has lawmakers pushing for new technology regulations. In the face of these developments, the brightest minds from...
November 16, 2023
Organizer:
CyberScoop Location:
Washington, DC
Passport to Proficiency on the ITAR
ACI is excited to announce the 4th Virtual Passport to Proficiency on the International Traffic in Arms Regulations, scheduled from October 17 – November 9, 2023. Whether you and your colleagues are new to the ITAR or are looking for a refresher, this immersive masterclass will impart the building blocks for your success on the job. This program stands apart as the most hands-on, all-inclusive masterclass on the critical, “need-to-...
America's Software Supply Chain: How Se...
The persistence of nation-state actors has introduced a threat to America’s cybersecurity landscape that has never been seen before. Ample countermeasures have been prescribed through various White House, DoD, and CISA guidance that places responsibility on government and private industry to follow these new guidelines for the development of secure software. As we turn the corner toward the close of the federal fiscal year and begin cybe...
August 31, 2023
Organizer:
ATARC Location:
Webcast
CyberThreats 2023: Department of Defens...
The cyber threat landscape is constantly changing. New threats are always emerging, as are new bad actors, whether pursuing criminal activities or working on behalf of nation-states hostile to U.S. interests. The Pentagon already is moving quickly to implement its Zero Trust strategy, and sees it as a foundational part of IT modernization and digital transformation, whether on a battlefield or in essential functions such as logistics. The DoD...
April 26, 2023
Organizer:
FEDINSIDER Location:
Webcast
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.