DCAA AUDIT HOT TOPICS - WHAT YOU NEED T...
OVERVIEW Thousands of contractors are subject to routine audits by DCAA every year. This webinar will focus on the highlights relative to DCAA audits, compliance and updates in 2016 that you need to know heading into 2017. Industry experts will address recent legislation and rules impacting government contracting as well as provide valuable DCAA audit guidance and strategies to mitigate potential setbacks. WHO SHOULD ATTEND? The Webinar is int...
Insider Threat Program Management, Deve...
This interactive and practical seminar combines a comprehensive overview of how to develop an insider threat program, manage insider threats, and operate an insider threat program to prevent, detect, deter, and mitgate insider threats. The seminar will also review and discuss legal considerations and implications of executing an insider threat program. Learn how to initiate, develop, and implement a legally defensible insider threat program. T...
Re-Imagining the Licensing and Regulati...
Attendees of this on-demand webcast learned how the innovative Salesforce Licensing Solution helps agencies to: Efficiently deliver responsive customer service to both licensees and businesses. Enable staff to leverage insights to make data-driven decisions with service delivery. Synchronize with the latest regulations, compliance, and legislation on an agile and secure platform. This webcast featured Michael Miller, Deputy Director, from the...
Mastering HTSUS and Schedule B Code Cla...
Importers and exporters alike require a firm understanding of the Harmonized Tariff Schedule of the United States (HTSUS) and the Schedule B Code in order to properly apply the rules for classifying their products for import and export. Tariff classifications drive the duty rates that will be applied to imported merchandise, while Schedule B Codes (as well as their HTSUS classification counterparts) are required to be reported in exporters...
Insider Threat Panel Discussion
The potential for insider attacks poses a looming and constant threat to government agencies who must protect their data. Is your agency prepared? Join CA Technologies and Mach 37 for dinner, drinks, and a panel discussion around Insider Threats. Learn real-life examples and industry perspectives on how to reduce your agency’s risk by leveraging Cybersecurity Framework standards and integrating continuous monitoring requirements into exi...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.