Joint Engineer Training Conference and Expo
The Joint Engineer Training Conference & Expo (JETC) will be held on May 9-12 in Aurora, Colorado. Registration will be available in February. JETC includes over 70 hours of educational […]
The Joint Engineer Training Conference & Expo (JETC) will be held on May 9-12 in Aurora, Colorado. Registration will be available in February. JETC includes over 70 hours of educational […]
The Wisconsin Employer Support of the Guard and Reserve (ESGR), Region 2 will be hosting the annual Breakfast with the Boss on May 16, 7:30 - 9:30 AM at the […]
The Government and Defense contractors are facing increasing challenges – supply shortages, cost escalation, labor shortages, new requirements, and security challenges to name a few. This year’s event will […]
A Defense Logistic Agency (DLA) Training, Knowledge, and Opportunities (TKO) seminar will be held May 17, 2022 from 1:00 - 2:00 PM. The topic will be, "Technical Data Packages (TDPs)/c-Folders." […]
The U.S. General Services Administration will be hosting its next virtual Federal Acquisition Service Training (FAST) virtual seminar on Wednesday, May 18, 2022 at 12:00 PM. The topic will be, […]
Significant opportunities exist for small businesses to sell to State and Local governments and educational institutions. Please join us and learn about how to do business with the Madison Metropolitan […]
Logs are an essential component of a cyber security program. Logs help to identify malicious activity and they are critical to performing forensic analysis. Understanding logs and their essential roles […]
Past Performance will impact future contract awards. As a Federal Contractor it is very important to understand the Contractor Performance Assessment Reporting System (CPARS), which collects and maintains Contractor’s Past […]
SAME LMP Industry Day is going LIVE! Click here for the event's informational flyer! A copy of the agenda can be found here. Join area Federal agency representatives, small and large […]
Plans and procedures alone are not enough to secure sensitive information. They are a critical start but cyber security relies upon each individual’s knowledge and personal efforts. Companies also need […]