Remove Professional Services Remove Risk Management Remove Strategic Sourcing
article thumbnail

Thank You for a Successful Spring Training Conference!

The Coalition for Government Procurement

Day One Speakers Keynote Speakers: Christine Harada , Senior Advisor, OFPP, OMB Moshe Schwartz , President, Etherton and Associates Panelists: Bonnie Evangelista , Acting Deputy Chief Digital and Artificial Intelligence Officer for Acquisitions, DoD Polly Hall , Senior Advisor to the Chief Procurement Officer, DHS Udaya Patnaik , Chief Innovation (..)

article thumbnail

EBA Guidelines – A Call to Action for Banking Sector Procurement?

ivalua

While it does not include cleaning or catering services, or most professional services (lawyers, consultants etc), it will include a significant proportion of IT services contracts, as well as outsourced back-office, processing and similar services that are specific to each institution.

professionals

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

AI effort to improve contractor performance ratings stalls

Federal News Network

The results of the pilot will be helpful as we evaluate security considerations regarding access and as we consider ways to leverage AI with appropriate risk-management safeguards as envisioned by Executive Order 14110, OMB Memorandum M-24-10, the AI in Government Act and the Advancing American AI Act.”

article thumbnail

Friday Flash 09/20/2024

The Coalition for Government Procurement

The priority areas are: Asset Management Vulnerability Management Defensible Architecture Cyber Supply Chain Risk Management (C-SCRM) Incident Detection & Response Each priority area includes further alignment goals to address these variations. To register, click here.

Price 52
article thumbnail

Friday Flash 11/10/23

The Coalition for Government Procurement

In addition, for certain systems, contractors will be required to develop a System Security Plan, implement and maintain extensive security controls, conduct annual security assessments and cyber threat hunting and vulnerability assessments, and comply with continuous monitoring and supply chain risk management requirements.