Address End-to-End Security from Applic...
Gain insight into how HP's Enterprise Security portfolio can be extended within DHS. This three-part Webinar will address how to: Achieve better visibility into the entire security risk profile Manage application data as part of DHS's SIEM solution for continuous monitoring Secure mobile device management Improve the C&A process (DHS 4300 policy) for timely accredidation Part 1: Extending Your SEIM Investment to Address Application Securit...
NEPA: Understanding the Basics
Since 1970, the National Environmental Policy Act has been the cornerstone for environmental protection in the United States. To implement NEPA, federal agencies must prepare environmental impact statements or environmental assessments to study the impacts of their proposed actions. Unfortunately, some federal agencies, their consultants and affected citizens do not fully understand the regulations, legal interpretations and practices for prop...
Document Retention and Destruction Poli...
Most nonprofit organizations are aware of their responsibility to retain important documents, but document retention obligations go beyond board minutes, resolutions, and governance documents. Federal laws, regulations, and ethics rules impose obligations on organizations and counsel to retain documents in certain instances, and prevent them from being destroyed or altered in others. Failure to comply with some of these rules can result in cri...
Hidden Infrastructure Development and M...
Many individuals associated with underground construction do not know information on the accuracy of existing underground utilities and structures. This live audio conference helps the persons responsible for paying, financing, designing and building a project that involves underground construction cost effectively manage the risk. This live audio conference also explains the methodology required for finding and analyzing underground infrastru...
NITAAC Monthly WebEx Training Session
The NIH Information Technology Acquisition and Assessment Center, NITAAC, is now holding free trainings for all those involved in the purchase of information technology products, services and solutions. Earn 2 CLPs as you learn about our government-wide acquisition contracts (GWACs): ECS III for products, CIO-SP3 for services/solutions and CIO-SP3 Small Business for services/solutions with socioeconomic set-asides. You’ll find NITAAC GWA...
June 27, 2013
Organizer:
NITAAC Location:
Webcast
Introduction to Financing with New Mark...
The New Markets Tax Credit (NMTC) program is a powerful source of financing to help bridge funding gaps for development projects and operating businesses in low-income and rural communities. Come learn the nuts and bolts of the program from both the business and legal perspectives. We will give you an overview of the program and practical steps on how to reach out to the various parties to put a deal together. In the second part of the program...
Business Ethics & The Bottom Line
There is a connection between organizational ethics and business value. People do business with organizations they trust. Once consumer confidence has been betrayed, it is an uphill battle for businesses to recover--assuming that recovery is even possible. Establishing an organizational culture of ethical behavior is a strategic imperative for leaders.
Coordinating Emergency Response When Di...
Despite over 50 years of emergency management experience, many jurisdictions are still unsure if their plans are adequate to deal with disaster. This is largely a result of focusing on the development of plans that address various phases of response rather building overall organizational resilience. This live audio conference considers emergency response in the context of a jurisdiction-wide emergency management program and demonstrates the li...
The Convergence of Cyber and Physical S...
Physical security is as critical as cyber security in the federal government. A mix of cyber security and physical security threats hold the potential for severely impacting your agency’s mission. Physical Security gaps resulting from aging equipment or lack of funding can be potential weaknesses the federal government cannot ignore. To address the challenge, we bring you this Physical and Cyber Security webcast where you will hear from...
Current Issues in Cell Tower Leases and...
The wireless industry has built more than 250,000 cell sites in the United States in the past 20 years. But many more cell sites are needed as iPhones®, iPads®, Droids and the like strain existing network capacity. New cell sites and significant modifications to existing cell sites will also be needed to meet the government's goal of using wireless to increase broadband speeds and coverage. At the same time, 'tower management' companie...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.