The Contracting Academy (TCA) – Virtual
The Contracting Academy (TCA) will be held virtually on Wednesday April 20, 2022. TCA is an opportunity for businesses to grow their technical knowledge of contracting with Federal Government, State/Local […]
The Contracting Academy (TCA) will be held virtually on Wednesday April 20, 2022. TCA is an opportunity for businesses to grow their technical knowledge of contracting with Federal Government, State/Local […]
Join us as we hear from the USDA Forest Service Procurement and Property Services Team about what it takes to do business with them. Learn about the agency, what they […]
Calculating a Cyber Summary Score is not sufficient to provide adequate security and providing adequate security will not by itself comply with DFARS 252.204-7020. There are similarities between these clauses […]
Join us as the National Park Service Regional Small Business Lead explains what it takes to do business with the NPS. Learn about the agency, what they buy, how they […]
REGISTRATION is open at this link. Growing small businesses no longer have the luxury of a slow ramp-up to cybersecurity. Ransomware does not discriminate by business size, ownership, location, or industry. Learn […]
Mark your calendar for the Lieutenant Governor’s Small Business Academy, a four-day virtual conference taking place in the mornings from May 3 to 6. On May 6, you will also […]
DOD’s Basic Assessment captures a snapshot of a company’s System Security Plan and its Plan of Action. It reflects the efforts at a point in time and provides a baseline, […]
The Government and Defense contractors are facing increasing challenges – supply shortages, cost escalation, labor shortages, new requirements, and security challenges to name a few. This year’s event will […]
Significant opportunities exist for small businesses to sell to State and Local governments and educational institutions. Please join us and learn about how to do business with the Madison Metropolitan […]
Logs are an essential component of a cyber security program. Logs help to identify malicious activity and they are critical to performing forensic analysis. Understanding logs and their essential roles […]