Back to Search Begin New Search Save Search Auto-Notify
GovForward CMMC Workshop
When DOD rolled out its Cybersecurity Maturity Model Certification program in 2020, it was designed to secure the Controlled Unclassified Information (CUI) in systems used by contractors in Defense Industrial Base that support business and warfighting efforts. Initially, an independent accreditation body was to certify a group of third-party assessment organizations. The plan ran into a number of obstacles as industry organizations questioned...
July 28, 2022
Organizer: FCW | Carahsoft Technology Corp.
Location: Webcast
Add Favorite
Cash vs Accrual Based Accounting for Go...
Cash basis accounting is easily understood and usually adopted by most start-up companies. Cash basis reports only consider the flow of cash in or out of the business without regard for the often complicated rules of accrual basis accounting. Accrual basis accounting requires matching of revenue and expenses and recognition of revenue when earned and expenses when incurred - all regardless of when the cash was received or spent. Accrual basis...
July 12, 2022
Organizer: Left Brain Professionals Inc.
Location: Webcast
Add Favorite
Managing Indirect Rates for Government...
Developing indirect rates is only one piece of the puzzle for government contractors. Managing indirect rates leads to financial and contract success. We find that many contractors only calculate indirect rates at the end of the year and do little to manage rates throughout the year. Several factors affect indirect rates including unplanned expenses, budget errors or oversights, and won or lost contracts. Monitoring and managing indirect rates...
June 14, 2022
Organizer: Left Brain Professionals Inc.
Location: Webcast
Add Favorite
Homeland Security & Law Forum
Coming Soon!
June 8, 2022
Organizer: ACT-IAC
Location: Webcast
Add Favorite
Managing Data Access Policies for Zero Trust
Zero Trust is built around the idea of moving away from a single network perimeter to a layered defense with carefully controlled gateways. This model assumes everything is running independently and is always exposed to potential threats. It is imperative for the U.S. Department of Defense to set up authentication and authorization to protect their systems and data. Users and systems will need to re-authenticate and re-authorize frequently acr...
May 17, 2022
Organizer: Red Hat Government Team at Carahsoft
Location: Webcast
Add Favorite
Accounting for SCA Contracts
Service Contract Act (SCA) contracts introduce a new layer of complexity and reporting to government contracts. Contractors must consider adjustments to the indirect rate structure such as a separate fringe pool or onsite and offsite overhead pools. Wage determinations instruct contractors on the minimum wages and fringe benefits required including the option for wages in lieu of benefits - a cash payment that is often miscalculated and posted...
May 10, 2022
Organizer: Left Brain Professionals Inc.
Location: Webcast
Add Favorite
Answer the White House Call to Action I...
In this webinar, Logan Brown, CEO at Exodus Intelligence, will explain the importance of vulnerability intelligence with the White House push to increase cyber defense, and the use of Exodus' methodology to analyze N-Day and Zero-Day threats. Exodus Intelligence employs some of the world's most advanced reverse-engineers and exploit developers to provide Government agencies the unique ability to understand, prepare, and defend against the ever...
April 21, 2022
Organizer: Exodus Government Team at Carahsoft
Location: Webcast
Add Favorite
Automating QuickBooks Invoices for Gove...
Government contractors often struggle with customer invoice creation because of the varying requirements from customer-to-customer and contract-to-contract. QuickBooks Online and Desktop provide opportunities for efficient creation of customer invoices from time and expense data. The keys to success lie in proper setup of Items for labor category and expenses, and the automated synchronization of time and expense data. We find many clients spe...
April 12, 2022
Organizer: Left Brain Professionals Inc.
Location: Webcast
Add Favorite
Harmonize Cybersecurity and the User Ex...
Learn from staff at the Defense Information Systems Agency (DISA) who will discuss the key programs to provide for a secure cyber environment for the nation s warfighters. DISA is exploring ways to operate in a secure information environment while creating an optimal user experience. As the lead IT service provider for the Defense Department, the users experience is of the utmost importance.
March 30, 2022
Organizer: AFCEA | Signal Webinar Series
Location: Webcast
Add Favorite
Jumpstart CMMC 2.0 FCI & CUI Protection
Government, defense and defense industry base (DIB) must meet the demands of both the DoD and the critical infrastructure players and map to critical controls laid out in NIST 800-171, NIST 800-53, and the upcoming CMMC 2.0 to adequately protect Federal Contract Information (FCI) and Controlled Unclassified Information (CUI). But, for many agencies and DIBs, it's a challenge to implement required information security controls to data in their...
March 30, 2022
Organizer: archTIS Government Team at Carahsoft
Location: Webcast
Add Favorite
Back to Search Begin New Search