Home page

  • From Paul Pethel

    0 likes 3 plays 0  
    What if it was possible to reduce the amount of obsolescence issues in a system by thinking way out of the box? Join us for this engaging presentation highlighting the…
  • From Kelley Kiernan

    0 likes 2 plays 0  
    The DFARS 252.204-7012 requires contractors who are provided or generate Controlled Unclassified Information for the DoD to implement the cybersecurity standard NIST SP…
  • From Karla Oconnor

    0 likes 23 plays 0  
    Are you aware of the various enriching Career Development Program opportunities available to you? This webinar panel will share insights into the multiple career…
  • From James Valley

    2 likes 159 plays 0  
    In this episode of Contracting Conversations, Jim and Scott talk with Eric Obergfell of MITRE. We discuss the challenges contractors have with the new chat bot and…
  • From James Valley

    3 likes 122 plays 0  
    In this episode of Contracting Conversations, Jim and Scott are chatting about the future role of AI in the Acquisition workforce, and guess what? The future is now! …
  • From Robert Raygan

    0 likes 451 plays 0  
    Although there are restrictions on the use of Generative AI for acquisition artifacts in the DoD, it is important to know what type of capabilities are “coming…
  • From Renee Reynolds

    0 likes 6 plays 0  
    Mr. Ken Carkhuff discusses the new small business credential, CSBP 001 A. Check out our links:DAU Small Business Media -…
  • From Kenneth Carkhuff

    0 likes 87 plays 0  
    The Small Business Innovation Research (SBIR) and Small Business Technology Transfer (STTR) programs are the nation's largest source of early-stage research and…
  • From Renee Reynolds

    0 likes 36 plays 0  
    Mr. Ken Carkhuff talks with LaDonne Liebler about small business opportunities at Naval Air Systems Command. Check out our links: DAU Small Business Media -…
  • From James Valley

    0 likes 12 plays 0  
    In this episode of Contracting Conversations, hosts Scott Williams and Jim Valley are joined by Kevin White, a professor of contract management at DAU. Kevin shares his…
  • From James Valley

    0 likes 22 plays
    In this episode of Contracting Conversations, hosts Scott Williams and Jim Valley are joined by Kelley Kiernan, a cybersecurity expert from DAU, for the third segment of…
  • From James Valley

    0 likes 24 plays 0  
    Welcome to Contracting Conversations with hosts Jim Valley and Scott Williams. In this episode, cybersecurity expert Kelley Kiernan joins to discuss the critical role of…
  • From Peter Schmick

    0 likes 141 plays 0  
    DoD MOSA is an integrated business and technical strategy to achieve competitive and affordable acquisition and sustainment of a new or legacy system or…
  • From Garth Mcmurray

    0 likes 290 plays 0  
    The U.S. Space Force is launching a significant procurement initiative for next-generation communications satellites, essential for the nation’s nuclear command,…
  • From Yvette Rodriguez

    0 likes 134 plays 0  
    DoD MOSA is an integrated business and technical strategy to achieve competitive and affordable acquisition and sustainment of a new or legacy system or…
  • From William Long

    0 likes 4 plays 0  
    Topic: DoD Instruction 3020.41 Operational Contract Support Outside the United States
  • From Cindy Baker

    0 likes 21 plays 0  
    COR Office Hour Topic: PIEE Open Forum led by Guest Speakers Michael Wedekind
  • From Tonya Guy-Green

    0 likes 23 plays 0  
    Are you curious about the management of Government property? Do you want to engage with subject matter experts and peers in the field? Join us for our monthly web event,…
  • From Thomas Bagwell

    1 likes 61 plays 0  
    2024 ACQUISITION INSIGHT DAYS - Defense Acquisition in Action - Lessons from the Field https://www.dau.edu/events/acquisition-insight-days-0 Event Date: 27 - 29…
  • From George Alves

    0 likes 250 plays 0  
    Zero Trust (ZT) potentially transforms DoD Cybersecurity. ZT is a cybersecurity strategy wherein security policy is applied based on context established through…
  • From Kelley Kiernan

    0 likes 306 plays 0  
    Basic Cyber Hygiene: “How to” for contractors and “How to verify” for federal contracting teamsLearn basic cybersecurity! Every federal…
  • From Trish Zeleznik

    0 likes 108 plays 2  
    This video shows users new updates and features in the media player of DAU Media.