FAR and DFARS Updates
This annual webinar will cover the most important changes to the Federal Acquisition Regulation (FAR) and the Defense Federal Acquisition Regulation Supplement (DFARS) in the last year. There have been major changes to a variety of labor and employment law sections in the regulations, as well as new compliance requirements in a wide variety of areas. These, along with more modest but still important changes and updates, will be covered. New FA...
CyberMaryland Job Fair Thursday, Octobe...
Cyber security professionals and students meet face-to-face with leading cyber security employers at the CyberMaryland Job Fair Thursday, October 20, from 11am - 3pm at the Baltimore Hilton. The CyberMaryland Job Fair is held in conjunction with the CyberMaryland conference. Opportunities for all aspects of cyber security / information security including Technical Writers, Software Engineers, CNO Engineers and Analysts, Database Administrators...
Essentials of Compliant Subcontracting...
This course prepares the new and/or small federal government prime contractor on the basics of compliant procurement. In the federal government’s eyes, the term “subcontracting” is very broad and the government expects prime contractors to spend prime contract funds using the same regulations the government uses. Therefore, prime contractors become stewards of taxpayer money and are entrusted to comply with proper procurement...
Presidential Transition - “Transforming...
Advance the conversation of transition at your organization. Register for the ACT-IAC Presidential Transition webinar, "Transforming Government Using Technology" to get a preview of the upcoming Presidential Transition report. This report include insights and recommendations on seven management topics that are important to the success of agency IT programs and their support to mission programs including innovation, cybersecurity, customer expe...
October 20, 2016
Organizer:
ACT-IAC Location:
Webcast
From Sea to Shining Sea: Connected Gove...
Whether to open government for greater transparency, secure Federal buildings, networks and IoT, or improve healthcare delivery, public sector technologists have staggering workloads. Regardless of the mission, modernizing entries operations are a first step in enabling the connected government. This briefing will touch on critical aspects of technology modernization that can affect engagement, secure networks, the smart city, and healthcare I...
October 20, 2016
Organizer:
FEDINSIDER Location:
Webcast
Dell EMC World Technology Conference
Experience Dell EMC’s debut and join us in Austin, Texas, to learn how the ultimate enterprise technology provider can transform your organization.Use our Top 3 Reasons to Attend Infographic or Justification Letter to make the case. Collaborate and connect This is your opportunity to rub shoulders with the top folks at Dell EMC for the first time. We’ll connect you with people from your industry, as well as peers from other industr...
October 18-20, 2016
Organizer:
Dell Location:
Austin, TX
Predictive Analytics World for Governme...
Predictive Analytics World for Government is the largest and only vendor-neutral analytics conference for government. We are holding our sixth annual conference this October 17-20th in Washington, DC at the Grand Hyatt Washington Hotel. Predictive Analytics World for Government (PAWGOV) is a practically-focused conference that highlights case studies of how government agencies are currently using data analytics to solve real world problems. At...
October 17-20, 2016
Organizer:
Rising Media Location:
Washington, DC
Collaborate with Confidence: A Secure C...
The Federal Risk and Authorization Management Program (FedRAMP), provides standardization on security assessment and authorization. It also offers continuous monitoring for cloud products and services and helps government agencies cut costs, build confidence in security, and speed adoption of cloud technologies. Now, agencies and organizations can create and join meetings from computers or mobile devices, invite participants to share content i...
Security TechTalk: Protect Your Brand w...
Modern attacks on organizations may generally be organized by type, into a taxonomy that includes network attacks (layers 3 and 4), session attacks (layers 5 and 6), application attacks (layer 7), and business logic attacks. Each type may be matched with the best F5 technology for mitigating that attack. Taken together, the F5 BIG-IP portfolio of products provide effective anti-attack technology for each layer of the taxonomy and can also defe...
Re-Imagining the Licensing and Regulati...
Attendees of this on-demand webcast learned how the innovative Salesforce Licensing Solution helps agencies to: Efficiently deliver responsive customer service to both licensees and businesses. Enable staff to leverage insights to make data-driven decisions with service delivery. Synchronize with the latest regulations, compliance, and legislation on an agile and secure platform. This webcast featured Michael Miller, Deputy Director, from the...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.