SBA offers free webinars May 13-17

NASHVILLE – The SBA will offer the following free webinars for small businesses May 13-17. Please note that the times for security webinars are in EST. 

Monday, May 13, 2019, 1:00 p.m.-2:00 p.m. EST, Online

SBA Virtual Events: Market Research in Federal Procurement: Effectively conduct and respond to market research. For more information and to register, click here.


Monday, May 13, 2019, 12:00 p.m.-3:00 p.m. CST, Online

Managing and Administering Government Contracts: Basics of Managing and Administrating Government Contracts. For more information and to register, click here.


Tuesday, May 14, 2019, 12:30 p.m.-1:30 p.m. CST, Online

How to Qualify for the GSA Schedule: This course is designed to provide an overview of what is required to qualify for and respond to solicitations for the GSA schedule. For more information and to register, click here.


Tuesday, May 14, 2019, 1:00 p.m.-2:00 p.m. EST, Online

Module 7-Laws and Regulatory Compliance: In this module, we’ll discuss State, Federal and international laws and regulations you and your company will be expected to follow when you have a data breach or possess and process your customer’s or employee’s sensitive data. For more information and to register, click here.


Tuesday, May 14, 2019, 4:00 p.m.-8:00 p.m. CST, Online

Negotiating Government Contracts: Learning is reinforced by interactive exercises allowing participants to apply their knowledge in case studies. For more information and to register, click here.


Tuesday, May 14, 2019, 2:30 p.m.-3:30 p.m. EST, Online

Module 8-Breaches, Security Crises, and Incident Response: In this module, we’ll conduct a detailed exploration of the targets, motivations and techniques of hackers, as well as various types of common attacks. For more information and to register, click here.


Wednesday, May 15, 2019, 12:00 p.m.-3:00 p.m. CST, Online

Audits and Accounting Systems: Overview of Audits & Accounting Systems for government contractors. For more information and to register, click here.


Wednesday, May 15, 2019, 1:00 p.m.-2:00 p.m. EST, Online

Module 5-Data Security: In this module, you will learn about cybersecurity standards and discuss several frameworks that are relevant to cyber security. For more information and to register, click here.


Wednesday, May 15, 2019, 2:30 p.m.-3:30 p.m. EST, Online

Module 6-Security Frameworks and Standards:In this module, you will learn about cybersecurity standards and discuss several frameworks that are relevant to cyber security. For more information and to register, click here.


Thursday, May 16, 2019, 12:00 p.m.-4:00 p.m. CST, Online

Federal Acquisitions Regulations Primer: This course is designed to provide small business contractors with essential knowledge of the Federal Acquisition Regulation to improve their chances of success. For more information and to register, click here.


Thursday, May 16, 2019, 1:00 p.m.-2:00 p.m. EST, Online

Module 9-Prevention and Remediation: In this module, we’ll consider some basic truths about cybersecurity and data breaches, as well as some limitations of your cybersecurity efforts. For more information and to register, click here.


Thursday, May 16, 2019, 2:30 p.m.-3:30 p.m. EST, Online

Module 10-Management Responsibilities and the Cyber Future: This module will explore how executives must take responsibility for their company cybersecurity efforts and support and oversee these efforts. For more information and to register, click here.


Friday, May 17, 2019, 10:00 a.m.-11:00 a.m. EST, Online

Module 7-Laws and Regulatory Compliance: In this module, we’ll discuss State, Federal and international laws and regulations you and your company will be expected to follow when you have a data breach or possess and process your customer’s or employee’s sensitive data. For more information and to register, click here.


Friday, May 17, 2019, 11:30 a.m.-12:30 p.m. EST, Online

Module 8-Module 8-Breaches, Security Crises, and Incident Response: In this module, we’ll conduct a detailed exploration of the targets, motivations and techniques of hackers, as well as various types of common attacks. For more information and to register, click here.

This site uses Akismet to reduce spam. Learn how your comment data is processed.