This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Strictly Necessary: Used for the proper function of the website
Performance/Analytics: Used for monitoring website traffic and interactions
Like every industry Procurement & SupplyChain software vendors are having to find new approaches in the pandemic world, and firms are coming up with ways of holding events virtually, some of which work better than others. The post Procurement & SupplyChain Experts lined up for Ivalua NOW Virtual 2020 on May 5th!
From this discussion, we compiled a list of 8 critical supplychainmanagement activities that to improve, build, and maintain supplychain resilience now and in the years to come. But building an agile, resilient supplychain doesn’t happen overnight; it requires forethought and planning.
They discussed the impact of the Covid-19 pandemic on Procurement and came up with this list of 8 critical supplychainmanagement activities that can help Procurement teams build and maintain supplychain resilience now and in the years to come.
P rocurement, a critical component of supplychainmanagement, is transforming, driven by the expertise of certified procurement professionals. The impact of such training is significant, leading to more streamlined procurement processes and better decision-making in supplychainmanagement.
Additional goals called out in the memo include leading an information security program grounded in technical expertise and riskmanagement, increasing the marketplace rapidly through offering additional authorization paths, and leveraging shared infrastructure in public and private relationships.
We remain committed to this mission at the upcoming Spring Training Conference, ensuring that attendees leave with comprehensive updates on acquisition policies, programs, and initiatives in subjects like artificial intelligence (AI), cybersecurity, the medical supplychain, and much more. We look forward to seeing you in May!
CART (communication access realtime translation) provides instant accessibility for all participants by delivering the spoken word as a realtime stream of text. He oversees riskmanagement and cybersecurity accountability for information systems, weapon systems and operational technology supporting military cyberspace operations.
CTA April 28, 2023 | | SupplyChain by Vishal Patel Cost, Risk, and Sustainability. Gaps and dysfunction in the supplychains and a lack of visibility are making it difficult to support Environment, Social, and Governance (ESG) initiatives. Those are three hot topics in the enterprise today.
Ivalua Spend Management Insights [ivory-search] A Balancing Act: Drive Sustainability while Managing Cost and Risk April 27, 2023 | | SupplyChain by Vishal Patel Cost, Risk, and Sustainability. According to SupplyChain Now’s Greg White, the cracks have been exposed and there is nowhere to hide.
The Coalition for Government Procurement would like to thank everyone who attended and participated in this week’s Spring Training Conference – What is Fair and Reasonable, Part 2: Let’s Continue the Dialogue!
The most fundamental spend categorization in Procurement is the line between direct and indirect spend, but one effort that transcends this split is supplier management. This includes supplier information management, supplychainriskmanagement/mitigation, and supplier performance management.
The award decisions received protests on the evaluations of small business participation, veteran employment, and relevant experience. He added that several small businesses that work with the Army “were at least partially at risk” to cyber threats. James Peake , M.D., James Peake , M.D.,
Currently, under CICA, the MAS program is deemed a competitive procedure if participation is open to all responsible sources, and if orders and contracts under the program “result in the lowest overall cost alternative to meet the needs of the Federal Government.” ( Cf. Supplychainriskmanagement and domestic sourcing.
Currently, under CICA, the MAS program is deemed a competitive procedure if participation is open to all responsible sources, and if orders and contracts under the program “result in the lowest overall cost alternative to meet the needs of the Federal Government.” ( Cf. Supplychainriskmanagement and domestic sourcing.
Non-compliance with DFARS can result in serious ramifications for defense contractors, including contract issues, legal action, financial penalties, and reputational damage, emphasizing the importance of leveraging expert guidance and ensuring compliance across the supplychain.
Williams, and Mickey Liebner; Mayer Brown Bipartisan, bicameral legislation in the US Congress would mandate the use of the National Institute of Standards and Technology’s (“NIST”) Artificial Intelligence RiskManagement Framework (“Framework”) by federal agencies. The guidance does not apply to the Federal Supply Schedule.
Williams, and Mickey Liebner; Mayer Brown Bipartisan, bicameral legislation in the US Congress would mandate the use of the National Institute of Standards and Technology’s (“NIST”) Artificial Intelligence RiskManagement Framework (“Framework”) by federal agencies. The guidance does not apply to the Federal Supply Schedule.
GSA Requesting Feedback on Draft SupplyChainRiskManagement Questionnaire The General Services Administration’s (GSA) Office of Information Technology Category has developed a supplier assurance questionnaire to gather information regarding cybersecurity supplychainriskmanagement (C-SCRM).
The report recommends that the AI sandbox should operate on the basis of a ‘ commitment from the participant regulators to make joined-up decisions on regulations or licences at the end of each sandbox process and a clear feedback loop to inform the design or reform of regulatory frameworks based on the insights gathered.
During the training, Jason, Liam, and Alex will cover the following topics and more: Pricing – Transactional Data Reporting (TDR)/Commercial Sales Practices (CSP); Domestic Preferences; SupplyChain; Enforcement/Mandatory Disclosure/Ethics; Sustainability Requirements/Policy; and Bid Protests Update. James Peake , M.D.,
From reforms in the Department of Defense’s budgeting process to new Small Business Administration (SBA) lender fees and innovative proposals for small business participation in federal contracts, these updates reflect a dynamic and responsive regulatory environment. 2, 2024 first appeared on SmallGovCon - Government Contracts Law Blog.
Golfers of all skill levels are encouraged to participate. The Software Acquisition Guide for Government Enterprise Consumers was created by the Information and Communications Technology SupplyChainRiskManagement Task Force, a group co-led by CISA and industry representatives.
The priority areas are: Asset Management Vulnerability Management Defensible Architecture Cyber SupplyChainRiskManagement (C-SCRM) Incident Detection & Response Each priority area includes further alignment goals to address these variations.
The document, officially titled “Incident Response Recommendations and Considerations for Cybersecurity RiskManagement: A CSF 2.0 The new draft guidance also shifts the focus away from “detecting, analyzing, prioritizing, and handling incidents” to incorporating incident response into overall cybersecurity riskmanagement activities.
Barring size status protests, the number of companies authorized to participate by domain is as follows: Domain Awardees Total companies found responsible to do cost-type work (i.e., OASIS+ Small Business Awardees Announced On July 30, the General Services Administration (GSA) announced the first OASIS+ Small Business contract awardees.
Participants have the opportunity to win monetary prizes and receive education and mentorship through the accelerator program. This month, CISA extended the charter through 2026 for the Information and Communications Technology SupplyChainRiskManagement Task Force.
Last year, the Coalition was fortunate to raise $13,000 for PPH through the generosity of our members and participants of the tournament. In 2013, Paws for Purple Hearts launched its first Training Boot Camp, where Service Dogs who participated in Canine-Assisted Warrior Therapy® were matched with an impaired Warrior.
Last year, the Coalition raised $13,000 for PPH through the generosity of our members and participants of the tournament. The RFI included 13 questions on infrastructure/supplychain resilience, workforce, innovation, acquisition, policy, and regulatory environment. is an external authentication provider.
Additionally, on March 28, 2024 the Office of Management and Budget released the final guidance on Memorandum M-24-10, Advancing Governance, Innovation, and RiskManagement for Agency Use of AI as we address here. participation from stakeholders, such as government contractors, in critical AI-based activities.
Don’t miss your chance to participate in the Joseph P. The new guidance reminds agencies that they need to have “up-to date, written remote work policies that include clear criteria for position determination, and employee eligibility and participation in remote work.” Register for Next Week’s Joseph P.
We’re focused not only on the dollars, but also in the breadth and depth of small business participation in the federal marketplace. That is really contributing to that greater sense of empowerment problem solve within the acquisition workforce.”
We remain committed to this mission at the upcoming Spring Training Conference, ensuring that attendees leave with comprehensive updates on acquisition policies, programs, and initiatives in subjects like artificial intelligence (AI), cybersecurity, the medical supplychain, and much more. We look forward to seeing you in May!
In particular, the report notes that CISA “will continue to engage in three lines of efforts to facilitate harmonization of duplicative reporting requirements[,] including: Participating in the Cyber Incident Reporting Council (“CIRC”) which is “to coordinate, deconflict, and harmonize Federal incident reporting requirements, including those issued (..)
Other topics addressed include measures to increase small business participation, improvements to the continuous monitoring process that reviews authorized apps, and upgrades to the FedRAMP Marketplace to handle new products. Per the memo, in FY22, Federal agencies awarded SDBs a record-breaking $69.9 billion, which accounted for 11.4
The full schedule of tables for both the governmentwide and healthcare conference days can be found below: “Ask the PMO” Session Date Invited Government Participants GSA MAS: Program officials from GSA’s MAS Program will be available to answer any Schedule-related questions.
In addition, for certain systems, contractors will be required to develop a System Security Plan, implement and maintain extensive security controls, conduct annual security assessments and cyber threat hunting and vulnerability assessments, and comply with continuous monitoring and supplychainriskmanagement requirements.
The AISIC will develop guidelines for “red-teaming, capability evaluations, riskmanagement, safety and security, and watermarking synthetic content,” and will be housed within the U.S. We look forward to your participation! We look forward to your participation! AI Safety Institute. To register, click here.
These and many other incidents demonstrate the importance of IT riskmanagement, including automation of cybersecurity programs that can provide actionable insights and shift to proactive riskmanagement. Just a month earlier, researchers had discovered Salt Typhoon, a Chinese attack breaching eight U.S.
Program Level: Beginner/Intermediate Delivery Method: Group Online Training * To receive a Training Certificate you must arrive on time and participate in the surveys throughout the webinar. Additional Information Prerequisites & Advance Preparation: None required. For more information: KPMG Privacy Statement.
pharmaceutical supplychain. Keith likes to brag that he is a participation trophy award-winning backyard BBQ pit master. Army veteran with a bachelors degree in computing and security technologies from Drexel University and a masters in cybersecurity and information security from Capitol Technology University.
As CISA has noted , [an SBOM] has emerged as a key building block in software security and software supplychainriskmanagement. SBOMs are defined by CISA as a formal record containing the details and supplychain relationships of various components used in building software.
Day Two – Healthcare Focus November 16, the healthcare focused day, will begin with keynote remarks from the Department of Veterans Affairs’ (VA) Chief Acquisition Officer Michael Parrish on “Modernizing the VA SupplyChain in 2024 and Beyond.” There is a separate open FAR case (No. To register click here.
We organize all of the trending information in your field so you don't have to. Join 5,000+ users and stay up to date on the latest articles your peers are reading.
You know about us, now we want to get to know you!
Let's personalize your content
Let's get even more personalized
We recognize your account from another site in our network, please click 'Send Email' below to continue with verifying your account and setting a password.
Let's personalize your content