Minimizing Your Legal Risk for Whistleb...
PilieroMazza’s Labor & Employment for Government Contractors Team is presenting a multi-part series to help employers understand the legal and business implications of operating as a government contractor. Attorneys from the Team will share their experience and thought leadership in labor and employment-related federal and state legislation and regulations. In this series, PilieroMazza will identify hot-button issues, provide practic...
AF IT Modernization and Digital Transfo...
The remote work force is here to stay. This relatively rapid expansion of the Air and Space Force’s digital footprint comes with a growing number of infrastructure challenges and cyber security threats, requiring leaders to re-assess how networks and services are delivered. While JADC2, zero trust, artificial intelligence, and machine learning remain at the forefront of most senior leader discussions today, many of these are dependent o...
Contractor's Performance Assessment Rep...
When you are looking for a good contractor to do work on your house, you may likely go to Consumer Reports, Angie’s List, the Better Business Bureaus or other sites that post performance reviews and ratings generated by customers. If you see one or more reviews that are negative or indicate potential problems, how likely are you to select that company? Don’t you want the company with glowing reviews to perform the work? Of course,...
Contractor's Performance Assessment Rep...
When you are looking for a good contractor to do work on your house, you may likely go to Consumer Reports, Angie’s List, the Better Business Bureaus or other sites that post performance reviews and ratings generated by customers. If you see one or more reviews that are negative or indicate potential problems, how likely are you to select that company? Don’t you want the company with glowing reviews to perform the work? Of course,...
Reimagining the Future of Intelligence
Reimagining the Future of Intelligence We ask 16 experts to describe their vision of how Intelligence will change to more accurately predict future threats in the coming years. All plenary sessions will be live-streamed so you may register to attend virtually or in-person.
Understanding and Protecting Technical...
This session will begin by setting a foundation of traditional intellectual property found in the commercial sector. We will shift our focus to Government Data Rights under both the FAR and DFARS, defining the different level of technical data rights and rights in software, and discussing the distinctions between the two. Next, we will discuss SBIR/STTR technical data rights both before and after May 2, 2019, as well as how commercial data rig...
GovCon Conference for Veterans, Minorit...
GovCon Conference for Veterans, Minorities and Women is hosted by Government Contracting University-GCU and is the first of its kind. It's specifically designed for veterans, minorities and women small business owners. Taking place over the Veteran Day Holiday at the Hilton Garden Inn Atlanta Airport North, the conference helps inform, prepare and equip small business owners who are interested in the Government Contracting Industry with the ap...
The Cost of AI
Traditional budgeting plans for developing, training, and deploying the latest applications. However, these factors may generalize the cost of long-term sustainment and transformation needed for agile adaptation to technology disruptions. When planning for an artificial intelligence (AI) solution, disruption should be an expected cost driver throughout its lifecycle. The increasing interconnectivity of the rapidly growing enterprise AI ecosys...
Section 889 in 2021: Prohibition on Cer...
Section 889 of the FY2019 National Defense Authorization Act has been seen as a significant change to Federal procurement and financial assistance, and it impacts every contractor and Federal award recipient working with the federal Government. Known as the Prohibition on Certain Telecommunications and Video Surveillance Services or Equipment, contractors are prohibited from selling or using certain Chinese-made telecommunications equipment or...
CMMC: Policy and Technical Requirements
This course will provide an overview of the Cyber Security Maturity Model Certification (CMMC) requirements from a governments contracts and a data security perspective. The course begins with a foundation in the law and regulatory requirements required today and in the near future. Then the course will examine what it takes for defense contractors to address CMMC requirements and satisfy associated audits, by delving into the CMMC domains, le...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.