This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Strictly Necessary: Used for the proper function of the website
Performance/Analytics: Used for monitoring website traffic and interactions
To view the CART feed for this webinar: Register for this webinar, login from the link provided, and click on the CART Tab and click the link to begin using CART. Certificates will be e-mailed to registrants. In accordance with the standards of the National Registry of CPE Sponsors, 50 minutes equals 1 CPE.
To view the CART feed for this webinar: Register for this webinar, login from the link provided, and click on the CART Tab and click the link to begin using CART. He has over 30 years of experience in IT that spans software engineering, application security and project management across government agencies and private industry.
PWC has been publishing the annual procurement survey since 2015, capturing many of the trends in procurement that we now see in organisations, such as the focus on supplier riskmanagement.
In a recent webinar with PricewaterhouseCoopers (PwC), we compared 3 different global studies where Procurement and C-level Management stakeholders addressed digitalization, risk, and ESG. . RiskManagement is Top of Mind. On the increased importance of managingrisk. CEO RiskManagement Priorities.
That was highlighted in a recent webinar I enjoyed, which featured my old friend and ex-colleague Jason Busch of Spend Matters as well as KPMG and Ivalua. First of all, to really make the most of what your suppliers can offer, you need to manage the basics of supplier management well.
The audience was extremely engaged as many of them continue to look for better ways to generate the most value from the supplier selection process and ongoing supplier management. lack of integration among the ERP, PLM, contract systems, spend analytics, BI, riskmanagement, and other platforms.
To view the CART feed for this webinar: Register for this webinar, login from the link provided, and click on the CART Tab and click the link to begin using CART. In his career, he has served as a subject matter expert on cybersecurity topics related to riskmanagement, incident response, cybersecurity analysis, and cyber policy.
Seasoned practitioners in public procurement can be jaded from situations that have gone wrong, and it is common for inexperienced public buyers to experience risk aversion and fear of the unknown. Additionally, a simplistic risk transfer strategy may reduce market interest, and the number of bids submitted.
A recent webinar hosted by Supply Chain Now, “Balancing Cost, Risk and Sustainability in the Midst of Uncertainty, ” took an in-depth look on what it takes to transform Procurement into a highly efficient function that supports these key initiatives. Watch the webinar recording on-demand to hear the full discussion.
A recent webinar hosted by Supply Chain Now, “Balancing Cost, Risk and Sustainability in the Midst of Uncertainty, ” took an in-depth look on what it takes to transform Procurement into a highly efficient function that supports these key initiatives. Watch the webinar recording on-demand to hear the full discussion.
To view the CART feed for this webinar: Register for this webinar, login from the link provided, and click on the CART Tab and click the link to begin using CART. Gilkeson has served in various leadership roles since he joined the TSA in 2013, first as a program manager and later as director of the agency’s Innovation Task Force (ITF).
The audience was extremely engaged as many of them continue to look for better ways to generate the most value from the supplier selection process and ongoing supplier management. lack of integration among the ERP, PLM, contract systems, spend analytics, BI, riskmanagement, and other platforms.
CPO’s are now being asked to manage not only the transactional piece of the supply chain, but to also create partnerships with suppliers who are beginning to become more deeply vested in the entire product lifecycle. Challenges in this new manufacturer/supplier partnership Burton cites include: Riskmanagement. Integration.
To view this webinar: Letting the Good Ones In, Keeping the Bad Ones Out: Managing Access for Zero Trust. Featured Speakers: Alper Kerman × Alper Kerman Security Engineer & Project Manager Alper Kerman is a security engineer and project manager at the National Cybersecurity Center of Excellence (NCCoE), NIST.
To view this webinar: Be Prepared: The Cyber Wild West is Still Wild. She has led audits on government-wide cybersecurity, privacy, and information management issues, including reviews of the efficiency of federal privacy programs, the implementation of cybersecurity riskmanagement practices, and the transition to electronic records.
Procurement Leaders Webinar. Arnaud (Ivalua) – Buyers’ objectives have expanded over the years – initially responsible for savings and cost avoidance, Byers were then tasked with handling riskmanagement, and also expected to contribute to the organization’s sustainability initiatives. .
We are thrilled to have assembled this engaging agenda of healthcare acquisition leaders and look forward to the collaborative discussions at the conference. The plan notes that the effectiveness of cyber riskmanagement varies among agencies. To view the draft agenda for the healthcare day, click here.
To view the CART feed for this webinar: Register for this webinar, login from the link provided, and click on the CART Tab and click the link to begin using CART. Certificates will be e-mailed to registrants. In accordance with the standards of the National Registry of CPE Sponsors, 50 minutes equals 1 CPE.
The document, officially titled “Incident Response Recommendations and Considerations for Cybersecurity RiskManagement: A CSF 2.0 The new draft guidance also shifts the focus away from “detecting, analyzing, prioritizing, and handling incidents” to incorporating incident response into overall cybersecurity riskmanagement activities.
GSA will host a webinar on July 22 at 1:00 PM (ET) to discuss the changes outlined in the Refresh. GSA collaborated with OEMs to facilitate the issuance of the letters, resulting in small business sales exceeding large business sales by 22 percent in the first quarter of the year for those items. largest healthcare payment system.
To view the CART feed for this webinar: Register for this webinar, login from the link provided, and click on the CART Tab and click the link to begin using CART. Certificates will be e-mailed to registrants. In accordance with the standards of the National Registry of CPE Sponsors, 50 minutes equals 1 CPE.
The AISI will create evaluation tools, test AI models and safeguards, issue guidance on AI safety and riskmanagement, and conduct technical research. The Manufacturing USA institute will develop “cost-effective, AI-based advanced manufacturing capabilities by collaborating with industry, academia, and government.”
We strongly encourage you to nominate a deserving colleague or collaborator who has demonstrated their commitment and expertise in the Federal procurement space. Now Available: Pharmaceutical Pricing Fun in the Sun Summer Webinar Series The Coalition’s “Pharmaceutical Pricing Fun in the Sun Summer Webinar Series” is now available!
John Schneider, Senior Systems Engineer, Axonius Federal, discussed the challenges inherent in managing IoT and OT devices for federal agencies, stressing interoperability and automation as best practices. To view this webinar: CDM Success Stories in an Age of Cyber-Attack Surface Expansion.
In addition, he will provide updates on the RiskManagement Framework (RMF) and Authority to Operate (ATO) processes as part of the integration of technology in delivering best value healthcare. Because of your partnership, we can provide invaluable opportunities for learning, networking, and collaboration.
Through collaboration, we are able to promote the creation of innovative solutions and systems, improve the efficiency of processes, and enhance problem-solving through the sharing of expertise and lessons learned. The Coalition seeks to find ways to facilitate this collaboration through our various engagements and policy efforts.
GSA and DoD Announce Plans to Purchase Record-Setting Amount of Carbon-Free Power GSA announced last Friday, February 9, that it is collaborating with the Department of Defense (DoD) on a search for suppliers to provide Federal facilities with 100 percent carbon-pollution free electricity by 2030. AI Safety Institute.
FedRAMP must update its security baselines for authorizations in collaboration with the Cybersecurity and Infrastructure Security Agency to “leverage the use of threat information” and focus on controls that address the highest priority threats. Webinar: What Contractors Need to Know about NIST SP 800-171 Cybersecurity, Nov.
With cyberthreats on constant rise, Federal Leaders consider what role automation can play in managing cloud involvement and best practices to ensure their commitment to securing the nations data. To view this webinar: Bringing Automation to Cloud RiskManagement.
The Department of Defense in June hosted a climate resilience workshop that addressed ways to enhance adaptation and resilience through collaboration, and an interagency event will build on its success. Certificates will be e-mailed to registrants.
CPE Effective cybersecurity requires collaboration across IT infrastructure, security, and data protection, since each team has distinct roles and responsibilities. CPE credit in Business Management & Organization.* * To receive CPE credit you must arrive on time and participate in the surveys throughout the webinar.
Among the innovative ways agencies are responding to the ever-evolving threat landscape are expanded collaboration between federal and state/local agencies, initiatives such as Zero Trust to raise the security bar, and FedRAMP/StateRAMP vehicles to provide a uniform security baseline. Certificates will be e-mailed to registrants.
In March, the Office of Management and Budget released guidance on improving governance and managing the risks of AI. After 20 years of service, Santina retired from the military and returned to the Texas Military Department as a civilian where she now serves as the agency’s Information Systems Security Manager (ISSM).
John Schneider, Senior Systems Engineer, Axonius Federal, discussed the challenges inherent in managing IoT and OT devices for federal agencies, stressing interoperability and automation as best practices. To view this webinar: CDM Success Stories in an Age of Cyber-Attack Surface Expansion.
Leadership Connect is organizing two webinars for government contractors about what agencies are focusing on right now. For Federal Information Systems using cloud computing services agencies will require Federal Risk and Authorization Management Program (FedRAMP) authorization at the level determined by the agency.
We organize all of the trending information in your field so you don't have to. Join 5,000+ users and stay up to date on the latest articles your peers are reading.
You know about us, now we want to get to know you!
Let's personalize your content
Let's get even more personalized
We recognize your account from another site in our network, please click 'Send Email' below to continue with verifying your account and setting a password.
Let's personalize your content