The Expanding Impact of US Sanctions on...
What You Need to Know and Do Now Over the past six months, the US has pieced together a complex and continuously expanding combination of export and trade controls on Russia that are unlike any US rules on any other countries. No one wants to be the first enforcement poster child and face all of the publicity that would come with a critical violation of the new rules. That means compliance personnel worldwide have two tasks. First, to learn a...
Government Email: Public or Private Record?
Dirty laundry and county board meetings - what do these have in common? Both could be subject to the Freedom of Information Act. Whether and when electronic communications such as emails, text messages, social media posts and tweets are subject to public records laws is a confusing and challenging question for public officials and journalists alike. This live webinar explains when such electronic communications must be disclosed and when they...
Using Multiple Award Schedules
This webinar is open to all. This comprehensive training provides an overview of GSA Schedules contracting and ordering procedures. Learn about placing orders against Multiple Award Schedules, as outlined in FAR Subpart 8.4. You will also learn about unique flexibilities within the GSA Schedules program. By taking this training you may receive a training certificate with credit toward your warrant requirements. Date: Thursday, Feb. 6, 2014 The...
February 6, 2014
Organizer:
GSA Location:
Webcast
Federal Mobility: Creating a Lean, Mode...
Government Cloud Brokerage: Who, What, When, Where, Why? Presented by FedInsider, WTOP, and Federal News Radio 1500 AM, this complimentary one-hour video training webinar will explore the Administration’s establishment of the Cloud First policy and how agencies are taking full advantage of cloud computing in order to maximize capacity utilization, improve IT flexibility and responsiveness, and minimize cost. As agencies seek to combine...
Government Cloud Brokerage: Who, What,...
Government Cloud Brokerage: Who, What, When, Where, Why? Presented by FedInsider, WTOP, and Federal News Radio 1500 AM, this complimentary one-hour video training webinar will explore the Administration’s establishment of the Cloud First policy and how agencies are taking full advantage of cloud computing in order to maximize capacity utilization, improve IT flexibility and responsiveness, and minimize cost. As agencies seek to combine d...
NEPA: Understanding the Basics
Since 1970, the National Environmental Policy Act has been the cornerstone for environmental protection in the United States. To implement NEPA, federal agencies must prepare environmental impact statements or environmental assessments to study the impacts of their proposed actions. Unfortunately, some federal agencies, their consultants and affected citizens do not fully understand the regulations, legal interpretations and practices for pro...
Eliminating the Pitfalls: Steps to Virt...
Eliminating the Pitfalls: Steps to Virtualization in Government Presented by FedInsider, WTOP, and Federal News Radio 1500 AM, this complimentary one-hour video training webinar will explore how agencies are tackling the pitfalls inherent in virtualization to fulfill Administration initiatives like cloud adoption, data center consolidation, .greening of I.T., and telework. Virtualization is at the heart of these programs, and government...
The Intersection of Customer Service an...
The Intersection of Customer Service and Security in the Cloud For the past two years, agencies have been making the jump to the cloud. Many first made the jump to the cloud for back-office systems, such as email or Web hosting. But more recently, agencies are seeing value in putting mission critical IT systems in the cloud. At the same time, federal chief information officers still are coming to terms with how cloud providers secure their pub...
Cyber Resilience: Leveraging Real-Time...
Cyber Resilience: Leveraging Real-Time Analytics and Continuous Monitoring The administration underscored the importance of combating sophisticated or advanced cyber intruders by establishing FISMA priorities, #1 of which is continuous monitoring. The proposed federal IT budget for 2014 devotes more than $13 billion to cybersecurity programs, with $300 million in new funding for continuous monitoring as mandated by OMB and FISMA reporting requ...
December 11, 2013
Organizer:
FEDINSIDER Location:
Webcast
Understand Federal Big Data and Maximiz...
As volumes of big data grow rapidly, government agencies are looking to leverage federal big data to support their missions and improve overall program outcomes and performance. Government, however, still face issues in adopting a federal big data strategy: bandwidth, storage capacity, retrieval, security, computational power, and trained personnel. The greatest challenge for government organizations in managing big data lies in the ability to...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.