This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Strictly Necessary: Used for the proper function of the website
Performance/Analytics: Used for monitoring website traffic and interactions
How I got into procurement My peers all have a 'story' about how they got into procurement without knowing they were actually working in a SupplyChain Management (SCM) role. I've never met anyone who studied supplychain management at university because they knew that's what they wanted to do. Read on to find out.
Prior to Akamai, Mr. Bonci was involved in the Open Source community as an engineer at VA Linux and as a contributor to the Debian Linux Distribution. Dave joined GAO in July 2002. He has co-authored three books and has a patent pending for supplychain assurance using Blockchain technology. He is also an Eagle Scout.
One could be forgiven for simplifying the goal of procurement to ensuring that public money is well spent , which could be further elaborated (following Schooner 2002 ) to encompass promoting integrity and value for money in the award of public contracts, and acting transparently to facilitate accountability.
The proposed rule creates a framework for ensuring that contractors provide the protections for CUI required in 32 CFR part 2002 which requires that contractors handling CUI meet the cybersecurity and privacy requirements of NIST SP 800-171 Rev. 2 among other cyber requirements. AFCEA Bethesda Health IT Summit (HITS), Jan.
2 , for contractors storing or transmitting Controlled Unclassified Information (CUI), as required in 32 CFR part 2002. If you are not already on a committee distribution list and would like to sign up, please email Mady Whiting at mwhiting@thecgp.org with which committees you are interested in joining.
2 , for contractors storing or transmitting Controlled Unclassified Information (CUI), as required in 32 CFR part 2002. If you are not already on a committee distribution list and would like to sign up, please email Mady Whiting at mwhiting@thecgp.org with which committees you are interested in joining.
2 , for contractors storing or transmitting Controlled Unclassified Information (CUI), as required in 32 CFR part 2002. If you are not already on a committee distribution list and would like to sign up, please email Mady Whiting at mwhiting@thecgp.org with which committees you are interested in joining.
We organize all of the trending information in your field so you don't have to. Join 5,000+ users and stay up to date on the latest articles your peers are reading.
You know about us, now we want to get to know you!
Let's personalize your content
Let's get even more personalized
We recognize your account from another site in our network, please click 'Send Email' below to continue with verifying your account and setting a password.
Let's personalize your content