SBA announces free webinars for small businesses Sept. 3-6

NASHVILLE – The SBA has announced the following free webinars for small businesses. 

Tuesday, September 3, 2019, 12:00 p.m.-2:00 p.m. CST, Online

How to Qualify for the GSA Schedule: This course is designed to provide an overview of what is required to qualify for and respond to solicitations for the GSA schedule. For more information and to register, click here.


Tuesday, September 3, 2019, 4:00 p.m.-5:00 p.m. CST, Online

Facilities Clearances: This course is designed to introduce the process for small business contractors to obtain a facilities clearance. For more information and to register, click here.


Wednesday, September 4, 2019, 4:00 p.m.-7:00 p.m. CST, Online

Preparing Bids for Construction Contracting:  This course is designed to provide instruction on the process of bidding federal government construction contracts. For more information and to register, click here.


Wednesday, September 4, 2019, 12:00 p.m.-1:00 p.m. CST, Online

Module 5-Data Security: This module will discuss why protecting data should be at the heart of your cybersecurity program, the types of data you are responsible for and threats to that data. For more information and to register, click here.


Thursday, September 5, 2019, 1:30 p.m.-2:30 p.m. CST, Online

Module 6-Security Frameworks and Standards: In this module, you will learn about cybersecurity standards and discuss several frameworks that are relevant to cybersecurity. For more information and to register, click here.


Friday, September 6, 2019, 9:00 a.m.-10:00 a.m. CST, Online

Module 7-Laws and Regulatory Compliance: In this module, a discuss is held on State, Federal and international laws and regulations you and your company will be expected to follow
when you have a data breach or possess and process your customer’s or employee’s sensitive data. For more information and to register, click here.


Friday, September 6, 2019, 10:30 a.m.-11:30 a.m. CST, Online

Module 8-Breaches, Security Crises, and Incident Response: In this module, we’ll conduct a detailed exploration of the targets, motivations and techniques of hackers, as well as various types of common attacks. For more information and to register, click here.


This site uses Akismet to reduce spam. Learn how your comment data is processed.