Back to Search Begin New Search Save Search Auto-Notify
Proofpoint Information Archive: A Cloud...
IT and Records Management teams struggle to retain, access, discover, and dispose of content in compliance with today's evolving regulations. Our FedRAMP-certified information archiving solution helps U.S. government agencies meet regulatory guidance—such as National Archives and Records Administration’s (NARA) Capstone—to improve data capture, and achieve legally defensible retention and disposition. Proofpoint’s Gartn...
July 25, 2017
Organizer: Proofpoint Team at Carahsoft Technology Corp.
Location: Webcast
Add Favorite
Cybersecurity Leadership and Governance
The goal for this course is to provide an understanding of cybersecurity leadership focused on people and not just technology and policy. It will give you an overview of frameworks to support your risk management activities. It is highly useful to any organizational executive, or leader seeking an understanding of building cybersecurity cultures and governance The word cybersecurity is thrown around, used and abused to scare people into buying...
July 19, 2017
Organizer: Covenant Security Solutions, Inc.
Location: Webcast
Add Favorite
BGOV Outlook for Federal Agency Program...
Federal agencies are managing complex programs with evolving missions and growing customer expectations. Improving outcomes and efficiency, while reducing overspending and waste, are essential priorities for policymakers, agency staff, contractors, and taxpayers. Program management and acquisition reform remain key drivers of federal performance, but implementation remains a work in progress. Additional reforms and initiatives from the White H...
July 19, 2017
Organizer: Bloomberg Government
Location: Washington, DC
Add Favorite
Cybersecurity Leadership and Governance
The word cybersecurity is thrown around, used and abused to scare people into buying more technology and tools. Yet the most important element of cybersecurity is the leadership of people and creating a culture that supports protecting your business. A study done by IBM noted that 95% of successful cyber-attacks came down to people. This session helps you understand how to structure your basic digital strategy to begin to implement a strong cy...
July 12, 2017
Organizer: Covenant Security Solutions, Inc.
Location: Webcast
Add Favorite
HEC-HMS
Course Objectives Participants will gain a practical knowledge of methods for simulation of runoff from storm rainfall. The methods covered relate to the processing of historical and hypothetical (design-storm) rainfall data; estimation of losses (infiltration); transformation of rainfall excess to direct runoff with unit hydrographs; routing of flood waves; calibration of model parameters; and modeling of runoff from watersheds. Experience wi...
June 27-29, 2017
Organizer: Association of State Dam Safety Officials
Location: Austin, TX
Add Favorite
Ready, Aim, Fire: India Adopts the Wass...
New defense licensing procedures issued as well! Last month, India’s export control system underwent a significant overhaul that should help to facilitate India’s future admission into the Wassenaar Arrangement. The issuance of Notification No. 5/2015-2020 dated 24 April 2017 (in force as of May 1) served to significantly revise India’s primary dual-use and military-related control list, known as the Special Chemicals, Organi...
June 28, 2017
Organizer: Export Compliance Training Institute
Location: Webcast
Add Favorite
Cybersecurity Leadership and Governance
The goal for this course is to provide an understanding of cybersecurity leadership focused on people and not just technology and policy. It will give you an overview of frameworks to support your risk management activities. It is highly useful to any organizational executive, or leader seeking an understanding of building cybersecurity cultures and governance The word cybersecurity is thrown around, used and abused to scare people into buying...
June 28, 2017
Organizer: Covenant Security Solutions, Inc.
Location: Webcast
Add Favorite
National Preparedness: Countermeasures...
Our nation’s preparedness against chemical, biological, radiological, nuclear and explosive threats (CBRNE) hinges on improved threat awareness, advanced surveillance and detection, and responsive countermeasures. This video webinar will explore awareness, prevention, preparedness and response to CBRNE and how agencies are working together for the protection of life, health, property and commerce. Learning Objectives Define the strategie...
June 28, 2017
Organizer: FEDINSIDER
Location: Webcast
Add Favorite
From Hand-Carries to the Cloud: Global...
The licensing of all forms of transfers of strategic (dual-use and military) technology is ever-evolving across the globe, not just here in the U.S... From the introduction to controls on the “supply” of strategic technology in Australia, to the technology transfer restrictions proposed in Thailand’s draft weapons of mass destruction (WMD) act, to special (non-strategic) controls that many countries apply to imports and expor...
June 22, 2017
Organizer: Export Compliance Training Institute
Location: Webcast
Add Favorite
Contract Changes Pitfalls to Avoid
Contract changes present a number of challenges to the contract administrator—on both the buying and selling sides. This webinar will identify several common issues that often arise, including out-of-scope changes, unpriced changes, and de-scoping the contract effort. Takeaways: What changes may and may not be made to a contract. How to respond to unpriced change orders. Negotiating equitable adjustments.
June 22, 2017
Organizer: National Contract Management Association
Location: Webcast
Add Favorite
Back to Search Begin New Search