Winvale Blog
The latest insights for government contracting success, GSA Schedule assistance, & IT Manufacturer support.
Kevin Lancaster leads Winvale’s corporate growth strategies in both the commercial and government markets. He develops and drives solutions to meet Winvale’s business goals while enabling an operating model to help staff identify and respond to emerging trends that affect both Winvale and the clients it serves. He is integrally involved in all aspects of managing the firm’s operations and workforce, leading efforts to improve productivity, profitability, and customer satisfaction.
By:
Kevin Lancaster
June 3rd, 2015
Understanding and mastering the government proposal process, as well as the capture process, is one of the greatest challenges for even the most seasoned of government contractors. Therefore we will break down the capture and proposal management process into manageable pieces and explain the best practices used across the industry. Capture planning objectives are:
By:
Kevin Lancaster
June 2nd, 2015
Data breaches are becoming one of government’s highest IT concerns. It is no longer a question of IF, but WHEN a data breach will occur. According to an April 2014 GAO report titled “Information Security - Agencies Need to Improve Cyber Incident Response Practices”, security incidents at Federal Agencies that have involved the probable exposure of citizens’ personal information have increased from 10,400 to 25,500 plus, between 2009 and 2013. This increase has Federal Agencies turning to the requirements set forth in the Privacy Act of 1974.
Do you know what the real benefits of being on the GSA Schedule are? Learn the top 10 reasons (and advantages) why you should consider it.
By:
Kevin Lancaster
May 27th, 2015
The IRS has announced that over 104,000 taxpayers have had their personal data stolen, including names, dates of birth, and social security numbers, as the result of a data breach last month. The repercussions of this data breach have been severe for those affected, as hackers have already been able to use the stolen past tax returns to submit fraudulent tax returns under their stolen identity and direct the tax refunds to prepaid debit cards. As a result of government data breaches, the IRS has announced that over 200,000 tax returns were received from “questionable” email domains, and it is estimated that 100,000 were able to clear the IRS’ authentication system.
By:
Kevin Lancaster
May 27th, 2015
One of the first things you should do when considering bidding on a request for proposal (RFP) is a bid/no-bid assessment. When responding to a request for proposal (RFP), you have to submit a compliant proposal. Below are four basic questions you should ask yourself when trying to decide if you want to bid or not. If you ask yourself these questions before you start putting pen to paper, you will be able to identify whether or not you will be able to submit a compliant response.
By:
Kevin Lancaster
May 22nd, 2015
There has been a lot of talk the last couple of years regarding when the FedRAMP certification program for cloud computing products would officially go into effect for the federal government. A couple of weeks ago we finally started seeing signs of progress with The Department of Defense (DoD) announcing security approvals for 23 cloud providers. Additionally, the GSA has implemented a new SIN 132-40 for Cloud IT Services under the IT 70 schedule.
By:
Kevin Lancaster
May 21st, 2015
Did you miss our presentation yesterday afternoon? You can now download a copy of this presentation. If you're a vendor, or are preparing a submission for the SeaPort-e Rolling Admissions for 2015, you'll want to look towards the SeaPort-e vehicle. Download our webinar Are You Ready for the Navy's Multi-Billion Dollar SeaPort-e Contract to learn:
Copyright Winvale | All Rights Reserved