Acquisition Hour: Export Controls – ITAR and Associated Requirements
This is Part 2 of a six part Acquisition Hour: Cyber Security series. Imagine giving away part of your war fighting equipment to your enemy and then fighting a war […]
This is Part 2 of a six part Acquisition Hour: Cyber Security series. Imagine giving away part of your war fighting equipment to your enemy and then fighting a war […]
This is Part 2 of a five part Acquisition Hour: Cyber Security series. In today’s constantly evolving marketplace, DOD contractors and subcontractor should adopt a cyber framework and develop flexible […]
*Please note - this webinar has been cancelled and will be rescheduled.* Administration of federal government contracts can be challenging. Understanding the Contractor’s rights and responsibilities when changes and other […]
This is Part 3 of a five part Acquisition Hour: Cyber Security series. It’s one thing to be hacked at home or at the office and have personal information stolen. […]
Do you currently have or are you considering bidding on a federal contract for transportation, janitorial, lawn mowing, catering, repair/maintenance or similar services? If you answered yes, then you have […]
This is Part 4 of a five part Acquisition Hour: Cyber Security series. The details of NIST 800-171 r1 always seem to drive any conversation about CUI and being in […]
There are several procurement methods used by federal agencies when acquiring services, supplies and construction. The procurement method that the government utilizes directly impacts what offerors should submit when competing for […]
Meet the new SAM.gov! beta.SAM.gov will become the official U.S. government website for people who make, receive, and manage federal awards. It will be the central HUB for the entire federal awards […]
There are numerous types of federal contracts. The type of contract can affect how much a contractor is paid, risk allocation on cost overruns, and the contractual obligations of the […]
This is Part 5 of a five part Acquisition Hour: Cyber Security series. Cyber-threats are pervasive and the ranks of cyber-criminals continues to grow as do their tools and techniques. […]