Federal Policy Webinar: Election 2018 – Which Party Will Control Congress?

Democratic voters nationwide are eager to send a message to President Trump, but is there enough anti-Trump sentiment for Democrats to win control of the House? Are Trump’s voters unique, and will they turn out for Republican congressional candidates? In the Senate, Democrats must protect 10 incumbents in states Trump won in 2016. Can Republicans add to their narrow Senate majority, or will Democrats sweep both the House and Senate?
Watch Now

Spotlight

OTHER ON-DEMAND WEBINARS

U.S. State Data Protection Law Roundup for 2018

spirion

While the debate rages in Washington, D.C. as to what a federal data protection statute should look like, U.S. states have led the way advancing the privacy and security of the personal data of their respective residents. In fact, over the last 12 months, at least 10 states have promulgated such protections, and each has something unique to challenge data protection professionals.
Watch Now

2019 Federal Budget: Government Funding Landscape Impacts

Mentor Works

2019 will be a transitional year for government funding as many programs reach the end of their mandates and will either need to be renewed or replaced by new ones. This cyclical nature of government funding can be challenging for SMEs to keep up with, but we can help you stay mindful of the top concepts you need to know.
Watch Now

How President Trump’s First Budget Could Impact Affordable Housing

National Low Income Housing Coalition

The National Low Income Housing Coalition (NLIHC) and other leaders of the Campaign for Housing and Community Development Funding (CHCDF) invite you to join advocates from across the nation to learn more about the significant threats facing affordable housing and community development programs and how you can help protect these critical resources from severe funding cuts.
Watch Now

Standardizing Cloud Security: How to Protect Data During Cloud Migration

Cybersecurity is a complex and growing concern for federal, state and local governments. In their mission to serve the public, government agencies store and manage highly sensitive personal information, making them targets for cyber attacks. As more government offices shift their infrastructure to cloud-based tools, procurement teams need clear and efficient processes for vetting cloud service providers’ security standards.
Watch Now

Spotlight

resources