SBA offers free local workshop; webinars May 20-23

NASHVILLE – The SBA will offer a free local workshop on SBA and USDA financing options for small businesses on Tuesday, May 21, at the Cumberland Business Incubator in Crossville. A variety of free webinars will be available throughout the week. Please note that security webinars are in EST.


Tuesday, May 21, 2019, 12:00 p.m.-1:00 p.m. CST, Crossville

SBA and USDA Financing Options: This workshop covers SBA and USDA financial assistance programs for small businesses as well as the importance of a business plan and how to create one. This event is hosted by the Cumberland Business Incubator. For more information and to register, click here


Webinars


Monday, May 20, 2019, 12:00 p.m.-1:30 p.m.CST, Online

Facilities Clearances: This course is designed to introduce the process for small business contractors to obtain a facilities clearance. For more information and to register, click here.


Tuesday, May 21, 2019, 1:00 p.m.-2:00 p.m. EST, Online

Module 1-Why Cybersecurity? This module, will focus on a discussion of what cybersecurity means for your company, employees, partners and customers. For more information and to register, click here.


Tuesday, May 21, 2019, 2:30 p.m.-3:30 p.m. EST, Online

Module 2-: Cybersecurity Basics: This module is specifically focused on fundamental concepts of cyber security. For more information and to register, click here.


Tuesday, May 21 , 2019, 1:00 p.m.-2:00 p.m. EST, Online

Capabilities Statement and Briefings:  Utilize 4 types of capabilities briefings to influence, shape, and capture business opportunities. For more information and to register, click here.


Tuesday, May 21, 2019, 12:00 p.m.-3:00 p.m. CST, Online

Introduction to Managing Government Construction Projects:  This training will cover the following: Define principals of Construction Project Management and controls; Describe documentation techniques and info to be monitored/reported; and Explain accounting procedures, importance of job cost accounting, why bonding is controlled by net worth. For more information and to register, click here.


Wednesday, May 22, 2019, 10:00 a.m.-11:00 a.m. CST, Online

Bids and Proposals: How to effectively review RFPs and put forth a winning proposal. For more information and to register, click here.


Wednesday, May 22, 2019, 1:00 p.m.-2:00 p.m. EST, Online

Module 9-Prevention and Remediation: This module will focus on some basic truths about cybersecurity and data breaches, as well as some limitations of your cybersecurity efforts. For more information and to register, click here.


Wednesday, May 22, 2019, 12:00 p.m.-3:00 p.m. CST, Online

Marketing to the Government Buyer: This course is designed to provide an introduction to methods used to market a company’s goods/services to buyers within the Federal Government. For more information and to register, click here.


Wednesday, May 22, 2019, 2:30 p.m.-3:30 p.m. EST, Online

Module 10-Management Responsibilities and the Cyber Future: This module will explore how executives must take responsibility for their company cybersecurity efforts and support and oversee these efforts. For more information and to register, click here.


Thursday, May 23, 2019, 12:00 p.m.-3:00 p.m. CST, Online

Capture Management: This course is designed to provide an introduction to methods used to market a company’s goods/services by developing tools, plans and strategies, identifying customer agencies, and executing marketing concepts. For more information and to register, click here


Thursday, May 23, 2019, 1:00 p.m.-2:00 p.m.EST, Online

Module 3-Endpoint Security: In this module, participants will learn about how endpoint devices such as laptops, desktops, tablet computers and mobile devices can offer cybercriminals a gateway into your company’s networks and data. For more information and to register, click here.


Thursday, May 23 2019, 2:30 p.m.-3:30 p.m. EST, Online

Module 4-Network Security: This module will focus on a discussion of what it takes to properly secure a business network, explore the various threats networks commonly face, and how the concept of defense-in-depth applies to protecting your network. For more information and to register, click here.


This site uses Akismet to reduce spam. Learn how your comment data is processed.