Back to Search Begin New Search Save Search Auto-Notify
Export Control Reform for Military Elec...
Export Control Reform for Military Electronics — Attention Electronic Component Manufacturers Major changes are coming to both the International Traffic in Arms Regulations (ITAR) and the Export Administration Regulations (EAR) which will directly impact manufacturers and exporters of electronic components and equipment. These changes clarify controls on Printed Circuit Boards, Radar Systems and electronic components used in military it...
September 23, 2014
Organizer: Export Compliance Training Institute
Location: Webcast
Add Favorite
Subcontract Flowdown Webinar Workshop (...
Join Christine Wade of CaaSus, LLC and Gunjan Talati of Reed Smith LLP for the second installment of a 3-Part Series on Subcontracting, Teaming and Flow Downs. This course is being presented online in 3 parts on December 3rd, 10th, and 17th. Courses may be taken in isolation, or as a group. The webinars will present key purchasing/procurement instruction relative to: Subcontract Management & Administration - Complete on Dec 3.Teaming Agree...
December 17, 2013
Organizer: CaaSus LLC
Location: Webcast
Add Favorite
Cyber Resilience: Leveraging Real-Time...
Cyber Resilience: Leveraging Real-Time Analytics and Continuous Monitoring The administration underscored the importance of combating sophisticated or advanced cyber intruders by establishing FISMA priorities, #1 of which is continuous monitoring. The proposed federal IT budget for 2014 devotes more than $13 billion to cybersecurity programs, with $300 million in new funding for continuous monitoring as mandated by OMB and FISMA reporting requ...
December 11, 2013
Organizer: FEDINSIDER
Location: Webcast
Add Favorite
Teaming Agreements, Subcontract Agreeme...
Join Christine Wade of CaaSus, LLC and Gunjan Talati of Reed Smith LLP for the second installment of a 3-Part Series on Subcontracting, Teaming and Flow Downs. This course is being presented online in 3 parts on December 3rd, 10th, and 17th. Courses may be taken in isolation, or as a group. The webinars will present key purchasing/procurement instruction relative to: Subcontract Management & Administration - Complete on Dec 3.Teaming Agree...
December 10, 2013
Organizer: CaaSus LLC
Location: Webcast
Add Favorite
Subcontract Management & Administration
Join Christine Wade of CaaSus, LLC and Gunjan Talati of Reed Smith LLP for the first installment of a 3-Part Series on Subcontracting, Teaming and Flow Downs. Back from popular demand, this course will be presented online in 3 parts on December 3rd, 10th, and 17th. Courses may be taken in isolation, or as a group. The webinars will present key purchasing/procurement instruction relative to: Subcontract Management & AdministrationTeaming Ag...
December 3, 2013
Organizer: CaaSus LLC
Location: Webcast
Add Favorite
Securing Your Confidential Data: Threat...
Mobile device data faces significant security threats, creating very real danger for government agencies and corporations. How can you deal effectively with the risk of a data breach and the theft of personally identifiable information in a bring your own device (BYOD) era? We'll discuss: Strategies for managing a BYOD strategy, including what information can and should be monitored and the privacy implications of monitoring. Accessible vs. in...
November 20, 2013
Organizer: Deloitte & Touche LLP
Location: Webcast
Add Favorite
Subcontracting on a Commercial Item Bas...
NCMA Tysons Webinar "Subcontracting on a Commercial Item Basis to Reduce Risk and Increase Profit" This course will teach you how to benefit from conducting Part 12 Commercial Item subcontract procurements. From streamlining requirements, to reduced regulatory risk and a reduction of administrative costs, leveraging part 12 procurement methods to subcontract is a widely under-utilized procurement method that can save your company time, money a...
November 14, 2013
Organizer: NCMA
Location: Webcast
Add Favorite
SANS SEC 464 vLive Hacker Guard 464
SANS SEC 464 Hacker Guard is a technical security awareness program for privilege users.Tuition covers 4- 3 hour days of initial training, program materials, 11 hands on labs, and quarterly threat vector briefing and tool updates to reinforce what was originally instructed within the curriculum for a year.The three key components of the program:1. The importance of Baselining. -Knowing what is normal/abnormal for Windows and Unix systems -Not...
October 30 - November 2, 2012
Organizer: The SANS Institute
Location: Webcast
Add Favorite
Back to Search Begin New Search