International Logistics Seminar in Phoenix
Seminar Information: Take the fear out of international shipping. This class is the perfect overview of the transportation process—whether you're shipping by ocean or air. Learn the steps you need to follow to move your products affordably, securely and within budget. Learn to control your international shipments by directly coordinating your documents with transportation rules and procedures. Review the air and ocean transportation ...
Cybersecurity Risk Program Training Academy
New cybersecurity risk regulations for all organizations are approaching faster than you might think. "Computers, software, programming and algorithms are all parts of a cybersecurity risk program, but it is the interaction with the "humans" that makes all the difference in the world." An effective cybersecurity risk program requires an organization to have everything from program policies to incident response plans to specific breach notifica...
Internal Audit Basic Training Workshop
Join us for a unique, interactive course that "walks you through" the Internal Audit process. "This course is not just for auditors or new auditors. It is for anyone who wants an understanding of the relationship between business objectives, risk, control, assessment and reporting." This comprehensive internal audit training course is for anyone who wants to have a strong base of knowledge and understanding of the essential audit and the perso...
SSAE SOC Audits: Auditee - Auditor - As...
Audits of "SOC" (System and Organization Controls) have been governed starting on May 1, 2017 by the application of "SSAE" (Statement of Standards for Attestation Engagements) 18. This new AICPA Standard replaces SSAE 16, just as SSAE 16 replaced SAS 70. This new standard will require the users of these reports to change their compliance programs to fit the new reporting standards. SSAE 18 is more comprehensive than the prior standards. Learn...
Internal Audit Advanced Training Course
This focused three-day course helps the experienced internal auditor to understand the underlying concepts and principles that drive the practice of internal auditing. The attendees will learn the concepts that are behind audit planning, performance, reporting, and followup. It is ideal for senior auditors and those preparing to be an audit team manager. "Internal Audit Advanced Training" is the perfect CPE course to provide a focused review o...
NES+ Pricing and Negotiating Commercial...
Join NCMA HQ as we host a full-day education and networking seminar. Attendees will receive extensive hands-on learning and scheduled opportunities to network with peers! Participants will earn 6.5 CPE/CLPs. Through hands-on experience you will learn how commercial contracts are priced and negotiated. Participants will work in buyer and seller teams (either government-to-industry or business-to-business perspectives) to perform assignments. P...
January 31, 2019
Organizer:
NCMA Location:
Jacksonville, FL
Special Issues in Government Contract P...
Cost and Pricing Data; “Fair and Reasonable Prices;” Commerciality Determinations (Formal and Informal) Contract pricing: everyone does it, but no one wants to talk about it. This course will deal with some of the most critical issues involving contract pricing. Taught by an experienced government contracts attorney, this course will cover: What is “cost or pricing data,” and what must the contractor provide to the gove...
Small Business Program Changes Review
The last several years have seen legislation enacted and rules promulgated which significantly impact small business programs in the Federal Marketplace. These changes result from the continuing implementation of the Small Business Jobs Act of 2010 (Public Law 111-240), and annual National Defense Authorization Acts. The new year will undoubtedly hold much promise for those engaged in the Federal Marketplace, and it may prove an opportune time...
ICIT Winter GOVSummit
Technology and data are business enablers. Yet too often, fears of privacy compromise, policy violations, and data breach overwhelm organizations to the point of becoming obstacles to innovation and change. To truly support the mission, technology and security leaders must harness the power of readily available tools and strategies that will enable them to build secure, trusted applications to meet the growing needs of internal and external cu...
Cybersecurity Technical Excellence Workshop
"How can you equip your staff with the policies and tools to make your business information, computers and devices as secure as possible?"This program focuses on the policies, methodologies, processes and tools needed to prevent, detect and monitor cybersecurity threats and provide for an effective program. As more and more data breaches are disclosed, cybersecurity remains at the front of many business leaders' minds. Data breaches are a con...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.