Back to Search Begin New Search Save Search Auto-Notify
Cybersecurity Leadership and Governance
The word cybersecurity is thrown around, used and abused to scare people into buying more technology and tools. Yet the most important element of cybersecurity is the leadership of people and creating a culture that supports protecting your business. A study done by IBM noted that 95% of successful cyber-attacks came down to people. This session helps you understand how to structure your basic digital strategy to begin to implement a strong cy...
July 12, 2017
Organizer: Covenant Security Solutions, Inc.
Location: Webcast
Add Favorite
Ready, Aim, Fire: India Adopts the Wass...
New defense licensing procedures issued as well! Last month, India’s export control system underwent a significant overhaul that should help to facilitate India’s future admission into the Wassenaar Arrangement. The issuance of Notification No. 5/2015-2020 dated 24 April 2017 (in force as of May 1) served to significantly revise India’s primary dual-use and military-related control list, known as the Special Chemicals, Organi...
June 28, 2017
Organizer: Export Compliance Training Institute
Location: Webcast
Add Favorite
Cybersecurity Leadership and Governance
The goal for this course is to provide an understanding of cybersecurity leadership focused on people and not just technology and policy. It will give you an overview of frameworks to support your risk management activities. It is highly useful to any organizational executive, or leader seeking an understanding of building cybersecurity cultures and governance The word cybersecurity is thrown around, used and abused to scare people into buying...
June 28, 2017
Organizer: Covenant Security Solutions, Inc.
Location: Webcast
Add Favorite
National Preparedness: Countermeasures...
Our nation’s preparedness against chemical, biological, radiological, nuclear and explosive threats (CBRNE) hinges on improved threat awareness, advanced surveillance and detection, and responsive countermeasures. This video webinar will explore awareness, prevention, preparedness and response to CBRNE and how agencies are working together for the protection of life, health, property and commerce. Learning Objectives Define the strategie...
June 28, 2017
Organizer: FEDINSIDER
Location: Webcast
Add Favorite
From Hand-Carries to the Cloud: Global...
The licensing of all forms of transfers of strategic (dual-use and military) technology is ever-evolving across the globe, not just here in the U.S... From the introduction to controls on the “supply” of strategic technology in Australia, to the technology transfer restrictions proposed in Thailand’s draft weapons of mass destruction (WMD) act, to special (non-strategic) controls that many countries apply to imports and expor...
June 22, 2017
Organizer: Export Compliance Training Institute
Location: Webcast
Add Favorite
Cybersecurity Leadership and Governance
Scope: The goal for this course is to provide an understanding of cybersecurity leadership focused on people and not just technology and policy. It will give you an overview of frameworks to support your risk management activities. It is highly useful to any organizational executive, or leader seeking an understanding of building cybersecurity cultures and governance. Delivery: Live Online Instructor Led Session in a Virtual Classroom Purpose:...
June 21, 2017
Organizer: Covenant Security Solutions, Inc.
Location: Webcast
Add Favorite
BIS License Application 748P: How to Pr...
The BIS form 748P is used for export licenses, re-export licenses and commodity classifications among other things. This form is the major feature of the web-based application platform used by BIS,“SNAP-R”. The need to apply for BIS 748P applications for exports and re-exports is increasing significant, largely due to Export Control Reform. If you are new to the BIS 748P application, you need to know all of the above and more if yo...
June 20, 2017
Organizer: Export Compliance Training Institute
Location: Webcast
Add Favorite
EAR Technology Classifications: Learnin...
Getting your Export Administration Regulations (EAR) export classifications right is clearly one of the most important aspects of an export compliance program. While few people have claimed that classifying hardware and software is easy, most practitioners agree that classifying technology is much more difficult. Combine the increasing enforcement of export controls on technology with the increasing frequency of these exports and you clearly s...
June 7, 2017
Organizer: Export Compliance Training Institute
Location: Webcast
Add Favorite
19 Essential Ways Export and Security a...
As an export compliance professional there are a wide variety of ways that you might find yourself needing to work closely with, and understanding the function of, your security department. This webinar is designed to strengthen your knowledge and build bridges between your export compliance and security departments. In order to do your job effectively, you need to work together with your counterpart in security. Your missions are the same, to...
May 11, 2017
Organizer: Export Compliance Training Institute
Location: Webcast
Add Favorite
Making Lemonade Out of Consent Agreemen...
Why They Happen, How to Avoid Them, and What to Do if They Happen to You May 9, 2017 1:00-2:30 PM EDT Consent agreements are a feared, but recurring feature of the export control and enforcement landscape. The recent announcement of the ZTE consent agreement signals that the Trump Administration has not stepped away from this enforcement option and, in fact, is willing to apply it to new issue areas and regulatory regimes in order to further A...
May 9, 2017
Organizer: Export Compliance Training Institute
Location: Webcast
Add Favorite
Back to Search Begin New Search