Back to Search Begin New Search Save Search Auto-Notify
CMMC 2.0: What's Changed and What's Next
When DOD rolled out its Cybersecurity Maturity Model Certification program in 2020, it was designed to secure the Controlled Unclassified Information (CUI) in systems used by contractors in Defense Industrial Base that support business and warfighting efforts. Initially, an independent accreditation body was to certify a group of third-party assessment organizations. The plan ran into a number of obstacles as industry organizations questioned...
July 28, 2022
Organizer: GovExec 360
Location: Virtual
Add Favorite
Multi-Domain Operations Workshop
As the DoD embarks on developing its capabilities to support a multi-domain operational environment (also known as the Joint All Domain C2), execution of the identified initiatives will require application of system of systems principles to assure a robust and effective solution. These principles and their application to adapting to multiservice, multinational, multi-platform players, will facilitate the creation of a flexible infrastructure c...
July 19-21, 2022
Organizer: International Test & Evaluation Association
Location: El Paso, TX
Add Favorite
Cash vs Accrual Based Accounting for Go...
Cash basis accounting is easily understood and usually adopted by most start-up companies. Cash basis reports only consider the flow of cash in or out of the business without regard for the often complicated rules of accrual basis accounting. Accrual basis accounting requires matching of revenue and expenses and recognition of revenue when earned and expenses when incurred - all regardless of when the cash was received or spent. Accrual basis...
July 12, 2022
Organizer: Left Brain Professionals Inc.
Location: Webcast
Add Favorite
FCW Workshop: DOD Cloud - An Evolving S...
Just as technology has been constantly changing and evolving, so has DOD’s strategy for the best way to modernize the tools it provides to the warfighters and their business support services. In 2018, the agency released a strategy to use cloud technology, which has been revised over the intervening years to reflect the cancellation of the JEDI contract and the adoption of DOD’s Software Modernization Strategy. The new strategy set...
June 15, 2022
Organizer: GovExec
Location: Virtual
Add Favorite
Managing Indirect Rates for Government...
Developing indirect rates is only one piece of the puzzle for government contractors. Managing indirect rates leads to financial and contract success. We find that many contractors only calculate indirect rates at the end of the year and do little to manage rates throughout the year. Several factors affect indirect rates including unplanned expenses, budget errors or oversights, and won or lost contracts. Monitoring and managing indirect rates...
June 14, 2022
Organizer: Left Brain Professionals Inc.
Location: Webcast
Add Favorite
Homeland Security & Law Forum
Coming Soon!
June 8, 2022
Organizer: ACT-IAC
Location: Webcast
Add Favorite
Managing Data Access Policies for Zero Trust
Zero Trust is built around the idea of moving away from a single network perimeter to a layered defense with carefully controlled gateways. This model assumes everything is running independently and is always exposed to potential threats. It is imperative for the U.S. Department of Defense to set up authentication and authorization to protect their systems and data. Users and systems will need to re-authenticate and re-authorize frequently acr...
May 17, 2022
Organizer: Red Hat Government Team at Carahsoft
Location: Webcast
Add Favorite
Accounting for SCA Contracts
Service Contract Act (SCA) contracts introduce a new layer of complexity and reporting to government contracts. Contractors must consider adjustments to the indirect rate structure such as a separate fringe pool or onsite and offsite overhead pools. Wage determinations instruct contractors on the minimum wages and fringe benefits required including the option for wages in lieu of benefits - a cash payment that is often miscalculated and posted...
May 10, 2022
Organizer: Left Brain Professionals Inc.
Location: Webcast
Add Favorite
Answer the White House Call to Action I...
In this webinar, Logan Brown, CEO at Exodus Intelligence, will explain the importance of vulnerability intelligence with the White House push to increase cyber defense, and the use of Exodus' methodology to analyze N-Day and Zero-Day threats. Exodus Intelligence employs some of the world's most advanced reverse-engineers and exploit developers to provide Government agencies the unique ability to understand, prepare, and defend against the ever...
April 21, 2022
Organizer: Exodus Government Team at Carahsoft
Location: Webcast
Add Favorite
Automating QuickBooks Invoices for Gove...
Government contractors often struggle with customer invoice creation because of the varying requirements from customer-to-customer and contract-to-contract. QuickBooks Online and Desktop provide opportunities for efficient creation of customer invoices from time and expense data. The keys to success lie in proper setup of Items for labor category and expenses, and the automated synchronization of time and expense data. We find many clients spe...
April 12, 2022
Organizer: Left Brain Professionals Inc.
Location: Webcast
Add Favorite
Back to Search Begin New Search