BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//Wisconsin Procurement Institute - ECPv6.15.17.1//NONSGML v1.0//EN
CALSCALE:GREGORIAN
METHOD:PUBLISH
X-ORIGINAL-URL:https://www.wispro.org
X-WR-CALDESC:Events for Wisconsin Procurement Institute
REFRESH-INTERVAL;VALUE=DURATION:PT1H
X-Robots-Tag:noindex
X-PUBLISHED-TTL:PT1H
BEGIN:VTIMEZONE
TZID:America/Chicago
BEGIN:DAYLIGHT
TZOFFSETFROM:-0600
TZOFFSETTO:-0500
TZNAME:CDT
DTSTART:20180311T080000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0500
TZOFFSETTO:-0600
TZNAME:CST
DTSTART:20181104T070000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0600
TZOFFSETTO:-0500
TZNAME:CDT
DTSTART:20190310T080000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0500
TZOFFSETTO:-0600
TZNAME:CST
DTSTART:20191103T070000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0600
TZOFFSETTO:-0500
TZNAME:CDT
DTSTART:20200308T080000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0500
TZOFFSETTO:-0600
TZNAME:CST
DTSTART:20201101T070000
END:STANDARD
END:VTIMEZONE
BEGIN:VEVENT
DTSTART;TZID=America/Chicago:20191015T120000
DTEND;TZID=America/Chicago:20191015T130000
DTSTAMP:20260427T201817
CREATED:20190820T192318Z
LAST-MODIFIED:20190820T192318Z
UID:10002041-1571140800-1571144400@www.wispro.org
SUMMARY:Acquisition Hour: Export Controls - ITAR and Associated Requirements
DESCRIPTION:This is Part 2 of a six part Acquisition Hour: Cyber Security series. \nImagine giving away part of your war fighting equipment to your enemy and then fighting a war against your tanks\, your planes\, enemy combatants using your encryption and even your night vision goggles; essentially fights a war without any technical advantage. \nAlternatively\, imagine competing in business against companies that have access to your intellectual property to our intellectual property. \nCompetitive advantage is very closely linked to scientific discoveries and technological improvements and there are rules and programs in place to help keep U.S. based technology and intellectual capital from being used again the United States as either economic weapons or weapons of war. \nThis webinar will provide an overview of: \n\nThe International Traffic in Arms Regulations (ITAR)\nResources to build awareness of requirements\nActions you should take\n\nSpeaker: Marc Violante\, Wisconsin Procurement Institute (WPI) \nThis webinar is eligible for 1 CPE credit. \nTo view a schedule of all upcoming webinars CLICK HERE.
URL:https://www.wispro.org/event/export-controls-itar/
CATEGORIES:Virtual Event/ Webinar,WPI Events
ORGANIZER;CN="Benjamin Blanc":MAILTO:benjaminb@wispro.org
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Chicago:20191016T120000
DTEND;TZID=America/Chicago:20191016T130000
DTSTAMP:20260427T201817
CREATED:20190820T192719Z
LAST-MODIFIED:20190820T192719Z
UID:10002043-1571227200-1571230800@www.wispro.org
SUMMARY:Acquisition Hour: Integrating DFARS Requirements Into Your Day-to-Day Cyber Practices
DESCRIPTION:This is Part 2 of a five part Acquisition Hour: Cyber Security series. \nIn today’s constantly evolving marketplace\, DOD contractors and subcontractor should adopt a cyber framework and develop flexible policies that will assist in hardening their computers and networks to the ever evolving threats and attacks. \nRealistically\, there is no one strategy or set of steps that can be taken that will defend against all current and future threats. Deciding on a starting point and what factors to include is not always a straightforward decision. \nBoth the NIST Cyber Framework and NIST 800-171 r1 provide a reasonable methodology\, factors and other resources for companies to use whether they are looking to comply with DFARS 252.204-7012 or mainly interested in developing a more secure and usable cyber posture for their company. \nThis webinar will focus on integrating the NIST Framework and associated publications into a company’s cyber planning efforts. \nSpeaker: Marc Violate\, Wisconsin Procurement Institute (WPI) \nThis webinar is eligible for 1 CPE credit. \nTo view a schedule of all upcoming webinars CLICK HERE
URL:https://www.wispro.org/event/acquisition-hour-integrating-dfars-cyber-practices/
LOCATION:TBD\, Washington\, DC\, United States
CATEGORIES:Virtual Event/ Webinar,WPI Events
ORGANIZER;CN="Benjamin Blanc":MAILTO:benjaminb@wispro.org
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Chicago:20191029T130000
DTEND;TZID=America/Chicago:20191029T140000
DTSTAMP:20260427T201817
CREATED:20190919T195510Z
LAST-MODIFIED:20190919T195510Z
UID:10002046-1572354000-1572357600@www.wispro.org
SUMMARY:Rescheduled - Acquisition Hour: Changes\, Delays and Disputes in Federal Construction Contracts
DESCRIPTION:*Please note – this webinar has been cancelled and will be rescheduled.*\nAdministration of federal government contracts can be challenging.  Understanding the Contractor’s rights and responsibilities when changes and other issues arise helps immensely. \nThis webinar will cover: \n\nDirected and Constructive Changes\nExcusable and Non-Excusable Delay\nProcedures for Resolving Disputes\n\nSpeaker: Helen Henningsen\, Wisconsin Procurement Institute (WPI) \nThis webinar is eligible for 1 CPE credit. \nTo view a schedule of all upcoming webinars CLICK HERE
URL:https://www.wispro.org/event/acquisition-hour-changes-delays-and-disputes-in-federal-construction-contracts/
CATEGORIES:Virtual Event/ Webinar,WPI Events
ORGANIZER;CN="Benjamin Blanc":MAILTO:benjaminb@wispro.org
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Chicago:20191030T120000
DTEND;TZID=America/Chicago:20191030T130000
DTSTAMP:20260427T201817
CREATED:20190820T193728Z
LAST-MODIFIED:20190820T193728Z
UID:10002044-1572436800-1572440400@www.wispro.org
SUMMARY:Acquisition Hour: Cyber Security for Current and Prospective DOD Contractors and Subcontractors
DESCRIPTION:This is Part 3 of a five part Acquisition Hour: Cyber Security series. \nIt’s one thing to be hacked at home or at the office and have personal information stolen. It’s another thing to have been entrusted with Controlled Unclassified Information (CUI) or other equally as sensitive defense information and have it stolen by a hacker or individual working on behalf of a foreign government. \nTo help protect its information\, the Department of Defense requires both Prime contractors and subcontractors to be compliant with contract clauses and NIST 800-171 r1. \nThis webinar will provide background information and an overview of these requirements and related publications. \nSpeaker: Marc Violate\, Wisconsin Procurement Institute (WPI) \nThis webinar is eligible for 1 CPE credit. \nTo view a schedule of all upcoming webinars CLICK HERE
URL:https://www.wispro.org/event/acquisition-hour-cyber-security-dod-contractors-subcontractors/
CATEGORIES:Virtual Event/ Webinar,WPI Events
ORGANIZER;CN="Benjamin Blanc":MAILTO:benjaminb@wispro.org
END:VEVENT
END:VCALENDAR