Preventing Fatalities in Confined Space...
Join us on May 14, from 12:00 PM - 2:00 PM Eastern for Preventing Fatalities in Confined Spaces at Dams. Most dams have facilities that include permit-required confined spaces. These spaces can include towers, risers, galleries, manholes, vaults, conduits, instrument enclosures, tunnels, adits, drainage systems, etc., that are often unmarked and possess several unique hazards to dam inspectors, operators, and trespassers that are not intuitive...
Construction Quality Control / Informat...
Join us on June 11, from 12:00 PM - 2:00 PM Eastern for Construction Quality Control / Information Data Systems for Dam Rehabilitation. We live in an information age. A huge variety of digital tools and methods are in use to assure quality in dam construction. These tools can be leveraged to verify compliance with specifications, excavation limits, production rates, construction limits, structure size, geotechnical instrumentation trends, and...
The GAO Green Book Compliance Academy
A Practical Approach to A-123 Compliance Programs Join us for a unique, interactive workshop that "walks you through" the latest update of The Green Book which now conforms to the Internal Control Integrated Framework (COSO 2013). This training is focused on the current Standards for Internal Control in the Federal Government as detailed in the Green Book. This 18 hour CPE course provides you with the tools to implement a compliance program th...
Facilitating Low-Head Dam Removals and...
Join us on July 9, from 12:00 PM - 2:00 PM Eastern for Facilitating Low-Head Dam Removals and Improving Aquatic Resource Restoration Outcomes. Many low-head dams no longer serve their original purpose and their existence often poses a public safety risk and continues to have negative impacts on aquatic resources. This webinar will focus on effective strategies for low head dam removal and aquatic resource restoration in Pennsylvania over the l...
Election Security: Protecting the Found...
States’ voter registration systems and voter access have undergone a host of changes over the past five years, thanks in large part to the Covid-19 pandemic. Many states expanded vote-by-mail options, stepped up automatic voter registration programs, or both. Cities took action, as well – Los Angeles, for instance, has overhauled its voting system infrastructure, using open source, the cloud, and cybersecurity partnerships to updat...
July 18, 2024
Organizer:
FedInsider Location:
Webcast
The GAO Green Book Compliance Academy
A Practical Approach to A-123 Compliance Programs Join us for a unique, interactive workshop that "walks you through" the latest update of The Green Book which now conforms to the Internal Control Integrated Framework (COSO 2013). This training is focused on the current Standards for Internal Control in the Federal Government as detailed in the Green Book. This 18 hour CPE course provides you with the tools to implement a compliance program th...
Using the Cone Penetrometer Test (CPT)...
Join us on August 13, from 12:00 PM - 2:00 PM Eastern for Using the Cone Penetrometer Test (CPT) for Evaluation of Dams and Levees. This webinar will comprehensively cover the Cone Penetrometer Test (CPT) from the most basic ideas to advanced topics. It will be engaging, interesting, and enjoyable to watch. The most important concepts will be fully described. There will be numerous examples of state-of-the-art evaluations. Stratigraphy evaluat...
CMMC Level 1 Implementation
This CMMC (Cybersecurity Maturity Model Certification) Level 1 Implementation training event focuses on helping organizations establish a security foundation required for higher levels of the CMMC model. DoD contractors are required to be CMMC Level 1 certified by January 1, 2026. This first 4 CPE training event overviews the practices outlined in 48 CFR 52.204-21, which sets basic safeguarding requirements for covered contractor information...
Zero Trust Architecture (NIST SP 800-207)
In this CPE training event, we overview the principles and implementation of Zero Trust Architecture to enhance your organization's security posture. Zero Trust Architecture, based on the NIST SP 800-207 criteria, revolutionizes the traditional approach to cybersecurity. It challenges the assumption of implicit trust within networks and promotes a model where trust is never granted by default. Instead, it emphasizes continuous analysis and eva...
Protecting Controlled Unclassified Info...
This 2 CPE training event "Protecting Controlled Unclassified Information" is based on NIST SP 800-171 R3." In this webinar, we will overview the essential strategies and guidelines outlined in NIST SP 800-171 Revision 3 (R3) to safeguard Controlled Unclassified Information (CUI). Our CPE training is designed to equip participants with the knowledge and tools needed to protect sensitive information from unauthorized access, disclosure, or los...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.