335 past events found
Back to Search Begin New Search Save Search Auto-Notify
2022 - FAR Supplement - DIAR - Interior
FAR Agency & Department Supplement - Webinar Series Complimentary & Recorded Find recordings on our website and YouTube Channel Sponsorships available at hello@jenniferschaus.com
Add Favorite
(ISC)2 CCSP | Certified Cloud Security...
The (ISC)² Certified Cloud Security Professional (CCSP) credential to ensures that cloud security professionals have the required knowledge, skills, and abilities in cloud security design, implementation, architecture, operations, controls, and compliance with regulatory frameworks. The CCSP OnDemand is a self-paced learning solution that covers the 6 domains of the CCSP Common Body of Knowledge (CBK) in order to study for the CCSP examin...
Add Favorite
Cloud Security Alliance| CCSK Foundation v4.1
The Certificate of Cloud Security Knowledge OnDemand Training program promotes the use of best practices for providing security assurance within Cloud Computing. Intrinsec’s OnDemand CCSK Foundation resources will help you successfully prepare for the Certificate of Cloud Security Knowledge (CCSK) exam. Official CCSK Foundation Student Handbook Over 10 Hours of CCSK Video Content Accessible via your provided student account, you can conv...
Add Favorite
Crush Your Government Contracting Sales Goals
The federal government is the world’s Fortune One Customer- it buys more than any other entity in the world. Over $450 billion is spent every year with small, medium and large companies selling every service and product imaginable. With that rich of a market, is it easy to reach sales goals? No! A newly-released third party sales benchmark study by a national organization determined: Only 7% of companies and salespeople exceed their sale...
Add Favorite
How to Catch Advanced Persistent Threat...
Join Dr. Richard T. White and Robert D. Long of Tennessee Department of Transportation's Cyber Security Team on how they secure of the Top 5 highway systems in the U.S. against advanced persistent threats (APTs) and ransomware attacks. Richard and Robert will be interviewed by Val Bercovici, CEO and co-founder of Chainkit about the their new architecture and highlights published in their new technical paper: Secure Connectivity for Intelligent...
Add Favorite
FAR Part 42- Contract Administration An...
This part prescribes policies and procedures for assigning and performing contract administration and contract audit services.
Add Favorite
Federal Government Q4 Opportunities
Join JSchaus & Associates for our Webinar Wednesday Series JSchaus & Associates helps product, service and software firms with professional services: proposal writing marketing capture compliance GSA Schedules and more To learn about us or our services please visit: https://www.jenniferschaus.com All webinars are complimentary and recorded. Contact info: Email: hello@jenniferschaus.com Phone: 202-365-0598
Add Favorite
Dcode Virtual: Federal Chief Informatio...
Don't miss the chance to hear the perspective of Federal Chief Information Officer Suzette Kent on using tech tools to the fullest extent during a crisis and how Covid-19 will impact government modernization in the long term. To be the first to know about Dcode events, sign up for our newsletter at dcode.co/subscribe.
Add Favorite
Dcode Virtual: GSA Deputy Administrator...
Join us for a conversation with Allison Fahrenkopf Brigati, Deputy Administrator of the U.S. General Services Administration (GSA), about how GSA is supporting its mobile workforce while continuing to deliver on its mission and how widespread telework during the Covid-19 pandemic will affect the future. To be the first to know about Dcode events, sign up for our newsletter at dcode.co/subscribe.
Add Favorite
An EA Approach to Technology Business M...
Enterprise Architecture as a practice is well understood by IT teams due to well-understood categorization models for tracking and managing assets. IT Finance Management was driven by accounting standards that we often poorly aligned to IT assets. Now, TBM is bringing a complete methodology to both Business and IT groups within a single enterprise. Learn how Business groups benefit from the foundations of EA, and how IT groups can better under...
Add Favorite
Back to Search Begin New Search