Remove Professional Services Remove Strategic Sourcing Remove Supply Chain
article thumbnail

Washington 2020 – Jon Stevens

ivalua

He has built and led successful global supply chain teams that have delivered sustainable bottom line results for Fortune 500 companies. Jon led the largest B2B Network Network allow a company to connect and transact effectively with their supply chain partners. Jon has extensive software and technology experience.

article thumbnail

Thank You for a Successful Spring Training Conference!

The Coalition for Government Procurement

Day One Speakers Keynote Speakers: Christine Harada , Senior Advisor, OFPP, OMB Moshe Schwartz , President, Etherton and Associates Panelists: Bonnie Evangelista , Acting Deputy Chief Digital and Artificial Intelligence Officer for Acquisitions, DoD Polly Hall , Senior Advisor to the Chief Procurement Officer, DHS Udaya Patnaik , Chief Innovation (..)

professionals

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Friday Flash 09/20/2024

The Coalition for Government Procurement

The priority areas are: Asset Management Vulnerability Management Defensible Architecture Cyber Supply Chain Risk Management (C-SCRM) Incident Detection & Response Each priority area includes further alignment goals to address these variations. Registration is required and attendance is limited to six people per company.

Price 52
article thumbnail

Friday Flash 01/17/2025

The Coalition for Government Procurement

Armys Streamlined Professional Services Contract The Accounting Corner provides the procurement community with an opportunity to share insights and comments on relevant issues of the day. Army contracts: the Information Technology Enterprise Solutions 3 Services (ITES-3S) and the Responsive Strategic Sourcing for Services (RS3).

article thumbnail

Friday Flash 11/10/23

The Coalition for Government Procurement

In addition, for certain systems, contractors will be required to develop a System Security Plan, implement and maintain extensive security controls, conduct annual security assessments and cyber threat hunting and vulnerability assessments, and comply with continuous monitoring and supply chain risk management requirements.