Sat.May 20, 2023 - Fri.May 26, 2023

article thumbnail

Christopher Yukins to Address Brussels Conference on EU Foreign Subsidies Regulation

Public Procurement Intl

On June 7, 2023, GW Law School’s Prof. Christopher Yukins will address a Brussels conference , organized through Utrecht University, “Challenges for Public Procurement in Europe and Beyond: Concept Programme.” He will address the EU Foreign Subsidies Regulation (FSR), which will impose heavy disclosure requirements on vendors from abroad — including vendors from the United States — competing for EU Member State public procurements.

article thumbnail

[Pod] A GAAP in Judgement at Kraft Heinz

Art of Procurement

Procurement is used to being under pressure to deliver savings, but is that pressure enough to make procurement break the. The post [Pod] A GAAP in Judgement at Kraft Heinz appeared first on Art of Procurement.

professionals

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

How to Foster a Security Culture

FedTech Magazine

An agency’s workers play an essential role in its cybersecurity strategy. As frontline staff, they are perfectly positioned to notice anything unusual going on with IT systems. At the same time, end users can be the weak link in information security if they don’t have the proper training and don’t understand how important their contribution can be. Government IT teams can take specific steps to foster a culture of information security through education and preparedness exercises and by leveragin

Education 109
article thumbnail

Mapping the Cyber Threat Landscape

GovLoop

Cyber experts often emphasize that there’s no silver bullet for improving the security of government systems. The problem is not that technology always falls short. Instead, it’s that the cyber threats are so varied and always evolving. Here is a look at the current threat landscape, based on recent cyber-related news and events. A High-Level View According to the 2022 (ISC)2 Cybersecurity Workforce Study, the global cyber workforce has reached 4.7 million workers, but that still leaves 3.4 mill

article thumbnail

How to Create a Blueprint for Fleet Resilience

Speaker: Jeff Dickinson - President and CEO of Railgistixs Transport, Supply Chain and Logistics Thought Leader

Despite the ongoing transformation of the supply chain and logistics landscape, the steadfast importance of carrier safety remains a core principle. From prioritizing preventative maintenance to optimizing fleet utilization, the fundamentals persist. If you’re overlooking and neglecting essential safety precautions today, this could result in expensive repairs and potential safety hazards in the future. 🚧 Join Jeff Dickinson for a conversation on how to mitigate risk, enforce compliance,

article thumbnail

How to Crack Amazon’s Climate Pledge Friendly Code for Sustainable Products

The Softly Spark

Want to know how to crack Amazon’s code for sustainable products? It’s simple–download Softly! Do you know Amazon has certified sustainable products? Amazon’s Climate Pledge Friendly product badge signifies that the product has attained one or more third-party certifications. By clicking on the badge, you can discover the specific certifications associated with the product.

article thumbnail

[Pod] Getting to Know Should-Cost Analysis w/ Yushiro Kato

Art of Procurement

“Should-cost analysis is just a tool. Even if you have a clear breakdown, if you do not have a good. The post [Pod] Getting to Know Should-Cost Analysis w/ Yushiro Kato appeared first on Art of Procurement.

More Trending

article thumbnail

Zero Trust: What It Is and Why It Matters

GovLoop

Traditionally, organizations took a moat-and-castle approach to network security: Anything within a network’s perimeter was deemed safe, while external infrastructure and activity raised cybersecurity concerns. But that approach has proven costly and insufficient as cyber criminals devise new schemes to invade our networks and traditional on-premises systems become more scattered and diffuse.

IT 98
article thumbnail

Implications of the Debt Ceiling for Government Contractors

The Contractor's Perspective

The ongoing debt ceiling negotiations are approaching the “X Date” with little certainty of a resolution. The X Date, the date on which the U.S. Government runs out of money to pay all of its bills, is estimated to be June 1. Failing to raise the debt ceiling by that date would be unprecedented and, by most accounts, would have dire consequences for the economy.

article thumbnail

[Pod] Procurement 6 – May 26th, 2023

Art of Procurement

Procurement 6 is a short podcast from Art of Procurement that publishes in the Art of Procurement feed every Friday. The post [Pod] Procurement 6 – May 26th, 2023 appeared first on Art of Procurement.

article thumbnail

Review: Secure File Sharing Feature Protects Healthcare Collaboration

FedTech Magazine

Patient care in clinics and hospitals operated by federal agencies requires collaboration and information sharing between different departments or between primary care physicians and specialists. However, protecting patient privacy and security is paramount, which can make file sharing a lot more difficult than attaching a health record to an email and pressing send.

article thumbnail

How to Isolate the Weakest Link

GovLoop

If you think about it, there’s a fundamental disconnect between the concept of zero trust and the approach traditional security technology takes. As employees browse the internet or open email, legacy solutions scan the content for potential threats before allowing access. That’s not zero trust. That’s “innocent until proven guilty.” If you take zero trust seriously, you will treat all content as if it’s malicious, whether you detect a threat or not.

article thumbnail

Eco Friendly Party Ideas for Summer that You’ll Love

The Softly Spark

This summer make your get together eco friendly Whether it’s a graduation party, a Memorial Day picnic or a summer wedding, you can put together an eco friendly party that’s easy and won’t break your budget. Follow a few simple tips as you’re planning and enjoy your party—guilt-free. “Having less food but with more people to share time with is what is important in a picnic.

article thumbnail

From Cybersecurity Threats to Revenue Loss: How to Manage (and Minimize) Risk with Procurement

Art of Procurement

Cybersecurity tops the list of risks that keep c-suite leaders and procurement practitioners up at night. Organizations face repeated and. The post From Cybersecurity Threats to Revenue Loss: How to Manage (and Minimize) Risk with Procurement appeared first on Art of Procurement.

article thumbnail

Human-Centered Design Can Improve Users’ Trust in Government

FedTech Magazine

For government agencies, user loyalty is a prized attribute that is difficult to come by and tough to retain. Users base their loyalty on quality service but value a consistent, exceptional experience even more. Yet, agencies sometimes struggle to provide that level of experience, especially in times of tight staffing and overwhelmed contact centers.

article thumbnail

Best Practices for Successful Time Management  

GovLoop

Time is a precious commodity, and you want to make the most of it, both in your personal and professional life. During a recent virtual networking discussion with our Communities of Practice New Supervisors in Government group, experts Ray McCollum, DACS Policy Chief, National Science Foundation, and Kate Vendemio, Workplace Feedback Guru, Trainer, Speaker and Instructional Designer/Consultant for Small Businesses & Associations, shared advice for being as productive as possible in order to

article thumbnail

Can the government just go and ‘confidently and responsibly’ buy artificial intelligence?

University of Bristol

by Albert Sanchez-Graells , Professor of Economic Law and Co-Director of the Centre for Global Law and Innovation (University of Bristol Law School). On 29 March 2023, the UK Government published its much awaited policy paper ‘ AI regulation: a pro-innovation approach ’ (the ‘AI White Paper’). The AI White Paper made it clear that Government does not intend to create new legislation to regulate artificial intelligence (‘AI’), or a new AI regulator.

Buyers 52
article thumbnail

It’s Time! Apply to Be a Featured Contributor

GovLoop

It’s that time again! GovLoop is now accepting new applications for its Featured Contributor program — an opportunity for current and former government employees and industry representatives to write on topics about which they’re passionate. It’s a chance to share your knowledge with — and be recognized by — GovLoop’s community of 300,000+ public sector employees, industry partners, and knowledge experts.

Media 52
article thumbnail

A Proactive Cyber Strategy

GovLoop

Government often plays catchup to threat actors rather than tracking their activity early in the attack life cycle. But according to Kevin E. Greene, Public Sector Chief Technology Officer with OpenText Cybersecurity, it is time for government agencies to become more forward-leaning, especially considering the new National Cybersecurity Strategy (NCS), which underscores the need to disrupt threat actors.

Data 52
article thumbnail

In Chicago, Collaboration Makes Early Childcare Better

GovLoop

The Problem: Need for reliable, real-time data Agencies often lack reliable, real-time data that would expose the extent of a problem and suggest possible solutions. And when the issue is early childcare in a big city like Chicago, the demographic at risk is young and vulnerable, and misdirected efforts can have lifelong consequences. There are 175,000 Chicago children in “early childhood,” a category that ranges from prenatal to age 5.

article thumbnail

How to Address the Risks of Cloud-Native Apps

GovLoop

Software developers and malicious actors both love cloud-native applications, but for very different reasons. Developers understand the many benefits of using cloud-native applications, including architecture, agility, flexibility and scalability. Nefarious actors are increasingly exploiting the fact that traditional security solutions aren’t equipped to manage the growing threat landscape in cloud-native environments, especially with technologies such as containers, Kubernetes, functions and pi

article thumbnail

5 Steps to Personal Productivity

GovLoop

It’s common workplace wisdom that to get things done or be productive, you need to have a plan. It’s also common practice to start projects by making a list of what all needs to get done. But, there is a big difference between a to-do list and a plan. Do you know the difference? A to-do list is simply that – a list. It’s an unorganized ledger of tasks that need to be completed at some point, by someone.

Import 98
article thumbnail

Decision Intelligence: Data Ethics

GovLoop

By definition, data ethics refers to the norms of behavior that promote appropriate judgments and accountability when acquiring, managing or using data. There are three goals: protect civil liberties, minimize risks to individuals and society, and maximize the public good. It is about more than complying with legal requirements; in fact, some of the most controversial realms, such as AI, are largely unregulated anyway.

Ethics 98