Cyber Friday: Ransomware
Discover the practical steps that can be used to combat Ransomware. Ransomware has become a major threat to all businesses not only from an operational perspective but also as the […]
Discover the practical steps that can be used to combat Ransomware. Ransomware has become a major threat to all businesses not only from an operational perspective but also as the […]
Cybersecurity plans and processes will often have limitations and are not absolute in their ability to protect. If a cyber incident occurs, are you ready? Do key players know their […]
Successful contractors do their homework – or their market research. They determine who at the agency is buying, how they are buying, when they will be buying, how much they […]
Today, companies deal with emails, prints, models, algorithms, computer code, and more. Employees meet, discuss and converse about opportunities and projects. For companies in the defense space, much of the […]
REGISTRATION is open at this link. Lack of cybersecurity is a factor of risk and a major concern among Fortune 100, 500, and 1000 corporations. They have invested substantial resources […]
Small businesses that work with the Federal government are well aware of the SAM.GOV and U.S. SBA Small Business Programs. Over the last few years, the requirement of being registered in […]
Small businesses that work with the Federal government are well aware of the SAM.GOV and U.S. SBA Small Business Programs. Over the last few years, the requirement of being registered in […]
The Historically Underutilized Business Zone (HUBZone) program assists small businesses in designated urban and rural communities gain preferential access to federal procurement opportunities. This presentation is recommended for any business […]
This will be the 9th year that the Wisconsin Procurement Institute (WPI) and the National Contract Management Association (NCMA) Wisconsin Chapter will be hosting and presenting this series. These sessions […]
Quality, price, and on-time performance remain important factors to consider when identifying and selecting subcontractors and suppliers. However, changes to cybersecurity requirements have established new regulations and, consequently, concerns that […]