2024: FAR Part 45, Government Property
Join Washington DC based, Jennifer Schaus & Associates in the 2024 Webinar Series covering The FAR, Federal Acquisition Regulations. This series features guest speakers who will uncover the important details and nuances of The FAR. Get educated about the rules and regulations in the game of federal contracting. This series is COMPLIMENTARY & RECORDED. Recordings are posted on our YouTube Channel. CORPORATE SPONSORSHIPS of this Webinar...
OASIS CPRM Vouchers and CAF Remittance
This training class focuses on the process for submitting CAF vouchers in CPRM and remitting CAF payments. Analysts will be on hand to answer your questions. Failure to ensure the Contract Access Fee (CAF) is appropriately included in all task order solicitation responses and subsequent task order awards, on a separate line item, may lead to contract non-compliance. It is critical to ensure CAF is paid to you by ordering contracting offices, s...
Facilitating Low-Head Dam Removals and...
Join us on July 9, from 12:00 PM - 2:00 PM Eastern for Facilitating Low-Head Dam Removals and Improving Aquatic Resource Restoration Outcomes. Many low-head dams no longer serve their original purpose and their existence often poses a public safety risk and continues to have negative impacts on aquatic resources. This webinar will focus on effective strategies for low head dam removal and aquatic resource restoration in Pennsylvania over the l...
Electric Vehicles, Charging Station Inf...
Concern for the environment and a move away from fossil fuels has supercharged the growth of the electric vehicle market. While in many ways this is a sign of progress, the explosion of electric transport has placed new demands on local infrastructure and created new security risks. The digitization of a previously analog process has opened the door to a new kind of cyber crime, which in turn has prompted a new kind of cyber security. What doe...
Practical Threat Modeling Based on Comm...
Every organization professes that risk management is at the heart of its cybersecurity program. Threat modeling is at the heart of this proactive approach: a systematic process that helps organizations identify, understand, and mitigate potential threats. However, with technology's ongoing advancement and the rising complexity of digital systems, constructing exhaustive threat models from the ground up can be daunting. In this presentation, Ja...
Understanding Your Federal Retirement B...
An Overview of FERS & Different Types of Retirement Types of service used for determining eligibility to retire under FERS Employee and agency contributions to FERS Military service and temporary time The FERS annuity computation Minimum age and service requirements Early retirement Deferred retirement and “postponed” retirement Understanding the Annuity Computation Amount of an annuity Length of service and unused sick leave H...
2024: FAR Part 46, Quality Assurance
Join Washington DC based, Jennifer Schaus & Associates in the 2024 Webinar Series covering The FAR, Federal Acquisition Regulations. This series features guest speakers who will uncover the important details and nuances of The FAR. Get educated about the rules and regulations in the game of federal contracting. This series is COMPLIMENTARY & RECORDED. Recordings are posted on our YouTube Channel. CORPORATE SPONSORSHIPS of this Webinar...
Beyond the Horizon: Use AI to Expand Th...
In the rapidly evolving landscape of cybersecurity, the ability to effectively detect and respond to threats is paramount for organizations across the globe. Traditional threat intelligence mechanisms have often been reactive, focused on addressing vulnerabilities after they have been exploited. However, with the increasing sophistication of cyber threats and the expanding digital footprint of modern enterprises, there is a critical need to pi...
Continuous Attack Surface Discovery and...
As the nature of our technology landscape changes more and more frequently, it’s challenging for many security operations teams to keep pace with the current threat surface we have on the internet, as well as the state of vulnerabilities and risks associated with these assets. Many security teams are performing vulnerability and web application scanning in a relatively ad hoc manner, and don’t truly have a continuous view of what e...
Deploy Full Stack Spectrum Situational...
Everything goes wireless/RF, it is the matter of life for both commercial and military communication. Desired and undesired signals are on top of each other, whether it is intentional or unintentional, the effectiveness, integrity and security of the communications are at mercy how the spectrum is managed and operated. It is critically important that military communication networks can run on intended spectrum without interruption, system can...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.