7 Steps To Winning FED GOV Q4 Contracts
Join Jennifer Schaus & Associates for a special webinar on 7 STEPS TO WINNING Q4 CONTRACTS. Please see our website for our full webinar schedule. All webinars are recorded and complimentary. Recordings are posted on our YouTube channel and website once complete. Thank you!
COVID-19 - Understanding & Leveraging T...
Send us your questions in advance to Hello@JenniferSchaus.comQuestions are ANONYMOUS.-----------------------------------------Join JSchaus & Associates for the 4th in a multi-part series of special webinars covering the impact of the novel COVID-19 Corona Virus. Webinar is complimentary and will be recorded. Send us your questions (anonymous) now/in advance to Hello@JenniferSchaus.com OUR CONFIRMED PANELIST INCLUDE:Mark Ries - LEGALKevin J...
FREE Webinar - COVID-19 Outbreak: Antic...
The worldwide coronavirus outbreak has created new challenges for everyone, including those tasked with compliance with U.S. export controls and sanctions laws. Border closures, prohibitions on large gatherings and social distancing have produced new compliance challenges, as well as novel issues related to due diligence, internal investigations, and enforcement. In this webinar, compliance professionals and in-house counsel will learn how to...
Delivering on Defense: DevSecOps for Se...
As digital services boom, Federal civilian agencies must keep security top-of-mind – starting with their application development processes. How can teams cut across agency siloes to ensure a unified, secure experience for the citizens they serve? Join us Tuesday, April 27 to learn about the progress VA is making, executing on the common mission of continuous application integration, testing, and delivery – all while maintaining the...
Charting China's Climb as a Leading Glo...
Recorded Future and Carahsoft are excited to invite you to join us subsequent to WEST 2024 to explore how your team can innovate, adapt, and collaborate in service of your mission goals by utilizing emerging technologies. Over the last five years, Chinese state-sponsored cyber operations have transformed, emerging as a more mature, stealthy, and coordinated threat than in previous years, exemplified by the exploitation of zero-day vulnerabilit...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.