I am Prepared, Right? Issues in ICP Pre...
You’ve taken the classes, skimmed DCAA’s "Information for Contractors," read DCAA's "ICE Manual," and utilized the official ICE Model to build your submission, but you are still wondering if you can draft an acceptable proposal. Worse yet, you wonder if the ICE submission could trigger an audit. The good news is that you can deploy a few processes to ensure that your first submission is your only submission. If you already know the...
Revenue Recognition for Government Cont...
Revenue recognition has been a hot topic since the introduction of ASC 606 in 2014 - an accounting standard that changed the criteria for recognizing revenue for all companies and introduced a nuance unique to government contractors. Many small companies struggle to understand and apply the concept of recognizing revenue when it is earned versus when cash is received. As part of GAAP compliance, our role is to ensure that revenue and costs are...
Federal Insights Exchange: A Conversati...
Department of Homeland Security (DHS) is one of the leading federal agencies in implementing in Cloud, UI/UX, SecDevOps and Cybersecurity capabilities. In 2021, President Biden signed Executive Orders (EO), some of them have a major impact on most components of DHS. First Executive Order is “Improving the Nation’s Cybersecurity”. It is a detailed overview of the Federal government’s plan to better secure America ...
August 3, 2022
Organizer:
ACT-IAC Location:
Webcast
GovForward CMMC Workshop
When DOD rolled out its Cybersecurity Maturity Model Certification program in 2020, it was designed to secure the Controlled Unclassified Information (CUI) in systems used by contractors in Defense Industrial Base that support business and warfighting efforts. Initially, an independent accreditation body was to certify a group of third-party assessment organizations. The plan ran into a number of obstacles as industry organizations questioned...
Cash vs Accrual Based Accounting for Go...
Cash basis accounting is easily understood and usually adopted by most start-up companies. Cash basis reports only consider the flow of cash in or out of the business without regard for the often complicated rules of accrual basis accounting. Accrual basis accounting requires matching of revenue and expenses and recognition of revenue when earned and expenses when incurred - all regardless of when the cash was received or spent. Accrual basis...
Managing Indirect Rates for Government...
Developing indirect rates is only one piece of the puzzle for government contractors. Managing indirect rates leads to financial and contract success. We find that many contractors only calculate indirect rates at the end of the year and do little to manage rates throughout the year. Several factors affect indirect rates including unplanned expenses, budget errors or oversights, and won or lost contracts. Monitoring and managing indirect rates...
Managing Data Access Policies for Zero Trust
Zero Trust is built around the idea of moving away from a single network perimeter to a layered defense with carefully controlled gateways. This model assumes everything is running independently and is always exposed to potential threats. It is imperative for the U.S. Department of Defense to set up authentication and authorization to protect their systems and data. Users and systems will need to re-authenticate and re-authorize frequently acr...
Accounting for SCA Contracts
Service Contract Act (SCA) contracts introduce a new layer of complexity and reporting to government contracts. Contractors must consider adjustments to the indirect rate structure such as a separate fringe pool or onsite and offsite overhead pools. Wage determinations instruct contractors on the minimum wages and fringe benefits required including the option for wages in lieu of benefits - a cash payment that is often miscalculated and posted...
Answer the White House Call to Action I...
In this webinar, Logan Brown, CEO at Exodus Intelligence, will explain the importance of vulnerability intelligence with the White House push to increase cyber defense, and the use of Exodus' methodology to analyze N-Day and Zero-Day threats. Exodus Intelligence employs some of the world's most advanced reverse-engineers and exploit developers to provide Government agencies the unique ability to understand, prepare, and defend against the ever...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.