FIND BY MONTH
FIND BY LOCATION
Get 10% Off Your Next Purchase
SIGN UP FOR OUR EMAILS
Email Address * Name
Title Organization
Privacy Policy

THANK YOU FOR SIGNING UP

You'll soon be receiving updates about special offers, events, books & more.
Continue to browse our site to:
 
Trending Industry News

Recent GAO Decision Gives Ammunition To Protesters Challenging Technical Specifications
By: Franklin Turner
March, 2017

In the course of responding to a Request for Proposals (“RFP”) or Request for Quotations (“RFQ”), have you ever encountered technical specifications that you regard as unreasonable?  Have you ever wondered why the Government included those specifications in the first place and, more generally, whether those specifications are even necessary to fulfill the requirements giving rise to the acquisition?  If your company is like most out there, the answer to these questions is a resounding "yes!”  What to do next, you ask?  A recent case before the Government Accountability Office (“GAO”) is instructive.
Download article >>

ITAPS Releases White Paper on Protecting Federal Information and Data
March 27, 2017

WASHINGTON—Today, the IT Alliance for Public Sector (ITAPS) released a white paper titled Federal Actions to Enable Contractors to Protect “Covered Defense Information” and “Controlled Unclassified Information” discussing federal requirements on contractors to protect federal data and information. The white paper comes as contractors are growing concerned over the increasingly complicated regulatory landscape they face to ensure information assurance while providing services to federal agencies.
Download

What the Changes to Cyber Security Legislation Mean for Your Business
Presented by: Rob Wilson, CTO, NeoSystems Corp
at the Orlando Government Contracts Conference on March 22, 2017.

Download presentation slides from a discussion on thehistory and future of cyber security in our ever-changing government contracting industry. Learn how we got here, get an overview of the legislation and a review of the current situation, and what to expect in the future. Click here >>

Press Releases

December 8, 2016
 
Federal Publications Seminars Partners with
Norwich University to Provide Credits Toward Online Graduate Programs

Government contracting professionals wishing to earn a master’s or bachelor’s degree will now be able to get a significant jump start through the completion of Federal Publications Seminars (FPS) classroom courses.  Students who successfully complete either of two FPS certificate programs will receive credit toward designated Norwich University online graduate or undergraduate degree programs. Learn more.


White Papers


A GUIDE TO INDIRECT COST RATES IN GOVERNMENT CONTRACTING
Released September, 2016 by RyanSharkey
You can also view the webinar, "Navigating the Waters of Indirect Cost Rates in Government Contracting" here.  Please note that this webinar is part of our FPSOnline Subscription.
Download

SECURITY AS A SERVICE
Released September, 2016 by Robert Metzger, Shareholder, Rogers Joseph O'Donnell PC
This white paper, commissioned by Exostar and written by Robert Metzger, discusses Incorporating NIST 800-171 Requirements into the Defense Supply Chain.
Download

A POCKET GUIDE TO FEDERAL GOVERNMENT CONTRACT DEBRIEFINGS (AUGUST 2016)
Released August, 2016 by Holland and Hart LLP
You can also view the webinar, "A Pocket Guide to Federal Government Contract Debriefings" here.  Please note that this webinar is part of our FPSOnline Subscription.
Download

KEYS TO ANSWERING THE DCAA KNOCK AT THE DOOR
Released May 27, 2016 by Capital Edge Consulting and JAMIS Software

Download
You can also view a complimentary podcast that addresses some questions that have come in from government contractors regarding DCAA audits. Click here.

CRISIS HANDBOOK FOR GOVERNMENT CONTRACTORS
A Desktop Survival Guide for In-House Counsel
Download
Free On-Demand Webinars
CPSR
The object of this session is to discuss immediate practical steps that your firm can take to improve your opportunity to obtain an approved purchasing system. Even though most firms will not pass their initial CPSR, proactive corrective actions taken prior to the review will reduce the amount of post-review activities. During this webinar, J.A. White & Associates Inc. provides practical steps that your firm can leverage today.
CYBERSECURITY
Organizations plan for security internal to their network walls. Each organization will operate in its own enlightened interest from the narrow perspective of its internal view. Cyber exercises with critical business partners informs organizations of how their partners will react under stress. These events create an environment to collaborate and build trust. The outcome is systemic solutions that improves results and resilience across the sector.
CYBERSECURITY
You will be attacked, you will be breached, now what do you do? Organizations focus on securing the cyber infrastructure, monitoring the networks, and hunting for threats. At the moment of the breach how do you respond? Organizations must develop the response and recovery plans that include operational decision impacts at the business process level, continuity of business responses, public relations, as well as technology driven decisions. The leadership of the organization must practice when to escalate and ask for help from outsider providers, informing law enforcement, and engaging with critical business partners. We will discuss how the elements of the response framework and how to practice and improve your plan.
CYBERSECURITY
The results from the eighth Global Information Security Workforce Study (GISWS) were released earlier this year. The cybersecurity workforce gap is estimated to be growing, with the projected shortage reaching 1.8 million professionals by 2022. The nation is at risk from this severe shortage of cyber security professionals. One of the main problems is the lack of a robust national cybersecurity workforce pipeline focused on building entry level professionals. The solution may be a hybrid education model that applies vocational, experiential and higher education models. The speaker will discuss this model as applied to current cyber security education public-private partnership programs.
DCAA - FOLLOW-UP PODCAST
This podcast is a follow up to questions asked by the audience during the June 1, 2016 webinar entitled, "Keys to Successfully Answering the DCAA Knock at the Door," sponsored by JAMIS and presented by Craig Stetson of Capital Edge Consulting.
EVMS
Join FedPubs for an interactive webinar to learn about the new Defense Contract Management Agency (DCMA) risk based surveillance process for Earned Value Management Systems (EVMS). We'll review the draft metrics for DCMA's Earned Value Analysis System (EVAS) and discuss some of the challenges government contractors will have to overcome to ensure their EVMS is not subject to additional surveillance under the new process. BDO will also introduce our approach for meeting the reporting requirement and producing timely and accurate EVM metrics.
FPSONLINE SUBSCRIPTION
Please join FPS Account Executive Steve Barry as he hosts a webinar showcasing our FPSOnline subscription. An FPSOnline sub offers unlimited access to a robust online library including hundreds of webinars, webinar series and premier programs - both live and on demand. Learn how FPSOnline complements classroom learning by keeping you current on government contracting hot topics in an easy-to-digest format. Steve will walk through some highlights, answer questions, and show how FPSOnline will benefit you and your organization.
ONLINE DEGREES FROM FPS AND NORWICH
Government contracting and procurement professionals wishing to earn a graduate or undergraduate degree will now be able to get a significant jump start through the completion of Federal Publications Seminars (FPS) classroom courses. In this webinar you will learn how the program will work and how you can get started. You'll have an opportunity to hear from representatives at Norwich University and Federal Publications and ask questions.
SOCIAL MEDIA
What impact has social media had on cyber politics and conversely, what impact has cyber politics had on social media? According to the Pew Research Center in an article entitled, " The Political Environment on Social Media," October 25, 2016, more than one-third of social media users were worn out by the amount of political content they encountered on all social media sites. This webinar will explore the recent research surrounding social media vs face to face political communication. As a leadership topic, it will inform attendees about the value of social media and how some aspects of it can enhance (or damage) personal and professional relationships, even unintentionally. It will also help the attendee understand the importance in their career of seeking diverse viewpoints.
SUBCONTRACTING
As a small business, once you have taken on the role of being a prime contractor, your firm is expected to comply with all applicable purchasing and subcontracting regulations. The purpose of this webinar is to provide an overview of the laws, government policies, and regulations that apply to subcontracts and subcontract management. The course will begin with an overview of the CPSR process and it will address all of the recent changes that have occurred in procurement.