Doing Business with the National Park Service – Webinar
Join us as the National Park Service Regional Small Business Lead explains what it takes to do business with the NPS. Learn about the agency, what they buy, how they […]
Join us as the National Park Service Regional Small Business Lead explains what it takes to do business with the NPS. Learn about the agency, what they buy, how they […]
REGISTRATION is open at this link. Growing small businesses no longer have the luxury of a slow ramp-up to cybersecurity. Ransomware does not discriminate by business size, ownership, location, or industry. Learn […]
Mark your calendar for the Lieutenant Governor’s Small Business Academy, a four-day virtual conference taking place in the mornings from May 3 to 6. On May 6, you will also […]
DOD’s Basic Assessment captures a snapshot of a company’s System Security Plan and its Plan of Action. It reflects the efforts at a point in time and provides a baseline, […]
The Government and Defense contractors are facing increasing challenges – supply shortages, cost escalation, labor shortages, new requirements, and security challenges to name a few. This year’s event will […]
Significant opportunities exist for small businesses to sell to State and Local governments and educational institutions. Please join us and learn about how to do business with the Madison Metropolitan […]
Logs are an essential component of a cyber security program. Logs help to identify malicious activity and they are critical to performing forensic analysis. Understanding logs and their essential roles […]
Past Performance will impact future contract awards. As a Federal Contractor it is very important to understand the Contractor Performance Assessment Reporting System (CPARS), which collects and maintains Contractor’s Past […]
SAME LMP Industry Day is going LIVE! Click here for the event's informational flyer! A copy of the agenda can be found here. Join area Federal agency representatives, small and large […]
Plans and procedures alone are not enough to secure sensitive information. They are a critical start but cyber security relies upon each individual’s knowledge and personal efforts. Companies also need […]