Cyber Friday: Building a CMMC Program: 3.1.1 Access Control Lists, Account Request Documentation, and Acceptable User Policies

To address the pressing need for cybersecurity compliance within the defense industry, the Wisconsin Procurement Institute (WPI) is proud to offer a series of no-cost webinars dedicated to assisting companies in navigating the complexities of the Department of Defense's Cybersecurity Maturity Model Certification (CMMC) Model. Recognizing the challenges businesses face in understanding and implementing the […]

Acquisition Hour: Negotiation Strategies in Federal Contracting

Negotiating with the federal government can seem challenging and, at times, even frustrating.  Negotiators must not only be familiar with the positions and motivations of the Government, they must also know and understand the rules and regulations that govern the negotiation process in federal procurements.  Further, the scope of what is negotiable can vary.  Negotiations […]

Emerging Issues: Vetting and securing your supply chain

This series, WPI’s Emerging Issues Series, is intended as an information tool and resource for contract managers and those with a compliance function. The topics selected for the initial group of Webinars are just some of the important topics. Some have not held the spotlight like others but nevertheless they are important. Others, such as […]

Cyber Friday: Building a CMMC Program: 3.1.2 Security Awareness Training, Role-Based Training, and Insider Threat Training

To address the pressing need for cybersecurity compliance within the defense industry, the Wisconsin Procurement Institute (WPI) is proud to offer a series of no-cost webinars dedicated to assisting companies in navigating the complexities of the Department of Defense's Cybersecurity Maturity Model Certification (CMMC) Model. Recognizing the challenges businesses face in understanding and implementing the […]

Acquisition Hour: Registering in SAM.gov

For many businesses intent on contacting with the federal government, registration in SAM.gov is often a significant hurdle, with its many legal questions and references to the FAR (Federal Acquisition Regulations). But the hurdles can be surmounted with professional expertise on your side. Join WPI as we de-mystify the quest for the all-important CAGE code! […]

Cyber Friday: Building a CMMC Program: 3.1.3 Audit and Accountability Policy, Log Review Procedure

To address the pressing need for cybersecurity compliance within the defense industry, the Wisconsin Procurement Institute (WPI) is proud to offer a series of no-cost webinars dedicated to assisting companies in navigating the complexities of the Department of Defense's Cybersecurity Maturity Model Certification (CMMC) Model. Recognizing the challenges businesses face in understanding and implementing the […]

Emerging Issues: Beyond Contracts: Conducting Business with the Federal Government

This series, WPI’s Emerging Issues Series, is intended as an information tool and resource for contract managers and those with a compliance function. The topics selected for the initial group of Webinars are just some of the important topics. Some have not held the spotlight like others but nevertheless they are important. Others, such as […]

Emerging Issues: Regulation Making – the process and the important role businesses play

This series, WPI’s Emerging Issues Series, is intended as an information tool and resource for contract managers and those with a compliance function. The topics selected for the initial group of Webinars are just some of the important topics. Some have not held the spotlight like others but nevertheless they are important. Others, such as […]

Cyber Friday: Building a CMMC Program: 3.1.4 Configuration Management Policy, Change Request Process, Baseline Configurations

To address the pressing need for cybersecurity compliance within the defense industry, the Wisconsin Procurement Institute (WPI) is proud to offer a series of no-cost webinars dedicated to assisting companies in navigating the complexities of the Department of Defense's Cybersecurity Maturity Model  Certification (CMMC) Model. Recognizing the challenges businesses face in understanding and implementing the requisite […]