Back to Search Begin New Search Save Search Auto-Notify
Navigating Risk And Compliance In GovCon M&A
Join JSchaus & Associates (Washington DC based consulting firm) for our 2020 webinar series. Webinars are RECORDED and COMPLIMENTARY. Check our YouTube channel or website for the upcoming schedule and previous recordings. Contact us for help with your federal procurement needs including market analysis, SBA 8a Cert, GSA Schedules, pricing, proposal writing, sales & business development, contract administration and more. Thank you for r...
Add Favorite
FAR Part 51- Use Of Government Sources...
This part prescribes policies and procedures for the use by contractors of Government supply sources and interagency fleet management system (IFMS) vehicles and related services.
Add Favorite
M&A: Understanding GovCon Novation Agreements
Join JSchaus & Associates (Washington DC based consulting firm) for our 2020 webinar series. Webinars are RECORDED and COMPLIMENTARY. Check our YouTube channel or website for the upcoming schedule and previous recordings. Contact us for help with your federal procurement needs including market analysis, SBA 8a Cert, GSA Schedules, pricing, proposal writing, sales & business development, contract administration and more. Thank you for r...
Add Favorite
FAR Part 52- Solicitation Provisions An...
FAR Part 52 provides instruction on using provisions and clauses in solicitations and contracts, provides those provisions and clauses in full text, and presents a matrix to assist contract writers in selecting clauses applicable to their contracts.
Add Favorite
How to Catch Advanced Persistent Threat...
Join Dr. Richard T. White and Robert D. Long of Tennessee Department of Transportation's Cyber Security Team on how they secure of the Top 5 highway systems in the U.S. against advanced persistent threats (APTs) and ransomware attacks. Richard and Robert will be interviewed by Val Bercovici, CEO and co-founder of Chainkit about the their new architecture and highlights published in their new technical paper: Secure Connectivity for Intelligent...
Add Favorite
Crush Your Government Contracting Sales Goals
The federal government is the world’s Fortune One Customer- it buys more than any other entity in the world. Over $450 billion is spent every year with small, medium and large companies selling every service and product imaginable. With that rich of a market, is it easy to reach sales goals? No! A newly-released third party sales benchmark study by a national organization determined: Only 7% of companies and salespeople exceed their sale...
Add Favorite
Cloud Security Alliance| CCSK Foundation v4.1
The Certificate of Cloud Security Knowledge OnDemand Training program promotes the use of best practices for providing security assurance within Cloud Computing. Intrinsec’s OnDemand CCSK Foundation resources will help you successfully prepare for the Certificate of Cloud Security Knowledge (CCSK) exam. Official CCSK Foundation Student Handbook Over 10 Hours of CCSK Video Content Accessible via your provided student account, you can conv...
Add Favorite
Fraud Beyond the Pandemic: The Role of...
Public sector agencies’ digital strategies were put to the test by the pandemic. With legacy and manual systems pushed to their limits by the new digital age, agency leaders were faced with the unprecedented task of scaling digital solutions which suddenly became the default channel for millions of interactions with the population. Public sector professionals stepped up to the challenge. However, as the effects of the pandemic ease, indi...
Add Favorite
(ISC)2 CCSP | Certified Cloud Security...
The (ISC)² Certified Cloud Security Professional (CCSP) credential to ensures that cloud security professionals have the required knowledge, skills, and abilities in cloud security design, implementation, architecture, operations, controls, and compliance with regulatory frameworks. The CCSP OnDemand is a self-paced learning solution that covers the 6 domains of the CCSP Common Body of Knowledge (CBK) in order to study for the CCSP examin...
Add Favorite
Scaling Digital Defenses: The Building...
Government agencies continue to expand their digital service offerings, making it easier than ever before for the public to access critical benefits and services online. However, this rapid expansion of digital services has opened the door to unprecedented identity fraud and abuse, costing billions of dollars. In many cases, additional customer friction was introduced for identity verification processes as a mechanism for reducing fraud. But t...
Add Favorite
Back to Search Begin New Search