Acquisition Hour: The Spend to the End

REGISTRATION FOR WEBINARS WILL CLOSE 24 HOURS BEFORE THE START The closer we get to the end of the Federal Fiscal Year, the closer we get to the start of the federal buying season. This webinar will explore how federal data can be used to better understand end-of-year opportunities, and also general efforts that will […]

Locating Opportunities with Federal, State and Local Governments – Webinar

The government is continuing to spend money on goods and services even during these challenging times.  Last year the Federal government spent almost $600 billion and the State Wisconsin spent about $3 billion.  There are opportunities for manufacturing, construction, technology, professional services, research and a wide range of goods and general services. During this session […]

Acquisition Hour: Introduction to CMMC Level 1

REGISTRATION FOR WEBINARS WILL CLOSE 24 HOURS BEFORE THE START Whether your goal is to be certified at CMMC Level 3 or higher, in the near future, all DoD contractors will have to show a mastery of 17 basic cyber-security requirements associated with CMMC Level 1. Mastering these 17 principle requirements is the first step. […]

Acquisition Hour: The Spend to the End

REGISTRATION FOR WEBINARS WILL CLOSE 24 HOURS BEFORE THE START The closer we get to the end of the Federal Fiscal Year, the closer we get to the start of the federal buying season. This webinar will explore how federal data can be used to better understand end-of-year opportunities, and also general efforts that will […]

Acquisition Hour: State and Federal Certifications for Veteran and Service Disabled Veteran Owned Businesses

REGISTRATION FOR WEBINARS WILL CLOSE 24 HOURS BEFORE THE START Securing government contracts and subcontracts is not easy. As a Veteran Owned Small Businesses (VOSBs) or Service Disabled Veteran Owned Small Businesses (SDVOSBs) you may gain preference when competing for contracts with the State of Wisconsin and Federal government agencies. This webinar will focus on […]

Acquisition Hour: The Path to CMMC Level 3

REGISTRATION FOR WEBINARS WILL CLOSE 24 HOURS BEFORE THE START By all accounts getting to CMMC Level 3 will be a significant undertaking for most if not all DoD Contractors and/or Subcontractors. It is a project – a major project that will require “a whole of company approach.” Senior leadership will have to recognize and […]

Cyber Friday: A Deep Dive into DFARS 252.204-7012 – Looking beyond NIST 800-171 r1

While the Cybersecurity Maturity Model Certification (CMMC) continues to evolve and take form, DFARS 252.204-7012 is still the active cyber security clause/requirement for defense contractors. Those who are loosely involved with defense contracting know about the clause, its relationship to NIST 800-171 r1 and two very well-known requirements - The System Security Plan and The […]

Acquisition Hour: Analyzing and Responding to Federal Government Construction Solicitations

Federal government construction solicitations might initially seem intimidating, complex, and out of reach. However, the Federal Government spends billions of dollars every year on construction, and therefore learning how to read, understand, and respond to these solicitations is worth the effort. Join us in this webinar and learn what types of construction projects the Federal Government […]

Green Bay Packers Mentor-Protégé Program Networking Event – Virtual

  SCHEDULE FOR BUYER ROOMS - PDF In collaboration with the Wisconsin Procurement Institute, the Green Bay Packers Mentor-Protégé Program offers a virtual panel discussion & networking event. Experts share their vast knowledge to benefit small business at our two-part event. Part One "Roadmap to doing Business with Private Companies and Public Agency Partners" The […]

Cyber Friday: Information Security – An overview of programs, general requirements and resources

Today's companies deal with emails, prints, models, algorithms, computer code and more. Employees meet, discuss and converse about opportunities and projects. For companies in the defense space much of the information that they work with is sensitive or controlled unclassified information. No matter the medium, this type of information needs to be safeguarded and protected […]