INTERFACE Boise 2022
WELCOME TO INTERFACE Boise 2022! IT Infrastructure is constantly changing, bringing more new challenges with it every day. From ransomware and the latest security threats to needs for increased bandwidth and storage, it’s nearly impossible to keep up to date. Our conference is designed to help. We’ve assembled a combination of Best-in-Breed hardware and software solutions, along with local experts and organizations, to help educate...
AUSA Noon Report - Developing Leadershi...
CANCELED
AUSA’s Noon Report Webinar series invites you to join us on Wednesday 21 September at 12:00 EDT to hear a presentation by LTG Donna Martin.LTG Martin will discuss her 34 year leadership journey with an emphasis on how she led Military Police units during Desert Shield / Desert Storm and Operation Enduring Freedom – Afghanistan. LTG Martin will also discuss how she continues to develop as a senior Army leader through challenging Ge...
NextGen Virtual Training Summit
Ready to take the next step in your professional development journey? Register now to join us online at the NextGen Virtual Training Summit: Supporting and Developing Gov Supervisors on Wednesday, Sept. 21, 2022.
September 21, 2022
Organizer:
GovLoop Location:
Webcast
B.E.A.D. Government and Industry Panel:...
Join us for a panel discussion on the Broadband Equity, Access and Deployment (B.E.A.D) Program. B.E.A.D. appropriates $42.45 billion for states, territories and the District of Columbia to utilize for broadband deployment, mapping and adoption projects. Discussion topics: Digital inclusion planning for unserved and underserved communities One-size doesn't fit all (feasible studies, funding and technology options) Prioritizing and localizing f...
Understanding Mission Critical Back Off...
“Workflow warfare” is a term within the Department of Defense that calls attention to and places value on back office functions, which serve a critical role in mission success but can be overlooked when considering modernization and digital transformation. That concept is applicable beyond the boundaries of the military, however; accelerating those workflows will allow faster transformation and provide advantages in meeting any age...
September 21, 2022
Organizer:
FEDINSIDER Location:
Webcast
Stop Checking Boxes: How the Federal Ra...
Join Blackboard on September 21, at 11:00am, EST for an engaging conversation where David Casaceli, Railroad Safety Specialist-Technical Training at the Federal Railroad Administration discusses how the FRA approaches training and utilizes Blackboard Learn to deliver education and training.
Marketing Lab-Understand the Marketing...
Marketing Lab Understand the Marketing Process in the Government Sector This week’s lab is set up to help you understand the marketing process in the government sector. LAB TOPIC: Review attendee Dream 100s Review attendee marketing emails Email marketing Strategies Who to contact What you not allowed to do Networking rules Networking events Phone strategies Associations SUBMIT DOCUMENTS: If you want your instructor to review your conten...
Internal Control & Fraud Prevention Tra...
Welcome to AGA's 2022 Internal Control & Fraud Prevention Training! The Internal Control & Fraud Prevention Training focuses on management’s responsibility for ensuring good systems of internal control, and the role of accountability professionals to minimize the risk of fraud, waste and abuse. Leaders in government and private industry discuss the latest discovery techniques, lessons learned and how governments are cooperating t...
The GAO Green Book Compliance Academy (...
A Practical Approach to Internal Controls under the GAO Green Book. Join us for a unique, interactive workshop that "walks you through" the latest update of The Green Book which now conforms to the Internal Control Integrated Framework (COSO 2013) from the Committee of Sponsoring Organizations of the Treadway Commission (COSO). This training is focused on the current Standards for Internal Control in the Federal Government as detailed in the G...
Cybersecurity Tools and Techniques for...
"How can we implement a holistic approach to cybersecurity?" "What methodologies, policies, technologies, and specific tools can we deploy to prevent, detect and monitor cybersecurity threats"? "How can we build a more effective program?" As more data breaches are disclosed, cybersecurity is at the forefront of Boards, executives, employees and consumers. Breaches are a continuing threat to an organization's reputation through the disclosure o...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.