Discover how to meet CMMC 2.0 compliance standards effectively
By: Google View more from Google >>
Download this next:
Streamline CMMC compliance for defense industry organizations
By: Google Workspace
Type: eBook
This eBook explores how Google Workspace aids organizations in achieving Cybersecurity Maturity Model Certification (CMMC) compliance, focusing on its purpose and impact on DoD contractors. It highlights Workspace's secure data management, enhanced cybersecurity, and compliance credentials.
Key features include:
• Encryption of Controlled Unclassified Information (CUI)
• Data Loss Prevention (DLP)
• Multi-factor authentication
• Vendor access control
• Certifications and audits
The eBook emphasizes Workspace's scalable, cost-effective solutions for CMMC requirements and a security-first culture.
Discover how Google Workspace supports your CMMC compliance journey by reading the eBook.
These are also closely related to: "Discover how to meet CMMC 2.0 compliance standards effectively"
-
Guide for aligning Google Workspace with CMMC Level 2
By: Google Workspace
Type: eBook
Google Workspace CMMC Level 2 Configuration Guide offers instructions for organizations aiming to comply with CMMC Level 2 using Google Workspace. Key topics include:
• Access controls and user authentication
• Audit logging and monitoring
• Secure communication protocols
• Device security for mobile and ChromeOS
• Data loss prevention policiesThe guide provides step-by-step instructions on using Google Workspace features to meet CMMC controls, including customer-implemented and Google-provided controls. It also covers controls needing implementation outside Google Workspace.
For IT admins, this eBook is a helpful resource for implementing security measures within Google Workspace.
-
Cybersecurity Maturity Model Certification (CMMC) 101
By: Corsica Technologies
Type: Webcast
The Cybersecurity Maturity Model Certification (CMMC) is a framework that’s important to manufacturers and distributors – but if you’re wondering what, exactly, CMMC is and how to achieve compliance, you’re not alone.
This video provides an overview of CMMC 2.0, shining a light on key topics such as:
- What CMMC 2.0 is and who it impacts
- The different levels of CMMC and requirements of each
- The resources out there to help you navigate this process
- And more
Find more content like what you just read:
-
Preparing Your Projects for CMMC 2.0
By:
Type: Replay
Preparing your projects for CMMC 2.0 is top of mind for many companies conducting business with the Department of Defense (DoD). While this cyber security requirement represents DoD’s effort to improve the security posture of contractors who store sensitive defense information on their systems, it’s also an excellent opportunity to strengthen an organization’s overall cyberhealth. In this session, we’ll discuss the evolution of CMMC, provide an overview of the specialized EgnyteGov environment, and answer your questions about CMMC 2.0. Topics Include: 1. Key Government Frameworks 2. CMMC 2.0 Update 3. Egnyte for CMMC Compliance Speakers include: Kris Lahiri, Chief Security Officer, Egnyte Neil Jones, Director of Security Evangelism, Egnyte
-
Maneuver Through the CMMC 2.0 Maze
By:
Type: Talk
Do you directly or indirectly support the Department of Defense (DoD)? Under the federal government’s new CMMC 2.0 cybersecurity framework, DoD contractors and suppliers with controlled unclassified information (CUI) must demonstrate compliance through a formal assessment. Get ahead of the curve with insider insights on the CMMC 2.0 practice and control requirements, so you are not shocked by the changes when they are requested by the DoD. Join us for this deep dive session as Sanjay Deo, President and Founder of 24By7Security, examines the new rules and requirements. By the end of this session, you’ll walk away with a clear understanding of the cybersecurity standards you need to follow to stay compliant and close more DoD deals. Take the next step. Brace yourself for the changes with CMMC 2.0 by attending this event. Register now! Do you need CPE/ CEU Credits? You may be eligible for CEUs or CPE credits at some professional associations by attending this webinar. Please check with your professional association and its policies to see if you may apply for CEUs or CPE credits for this webinar. You can download a certificate of completion from BrightTALK after viewing the entire webinar. What is the CMMC 2.0? With the goal post constantly shifting, how can my organization be compliant? The Department of Defense (DoD) announced an update to the CMMC program back in November 2021, dubbed CMMC 2.0. The rule-making process for CMMC 2.0 has been underway now for a lengthy amount of time, and it was expected to take between 9 to 24 months. CMMC 2.0 is now a mandatory contractual obligation for suppliers, organizations, contractors, and sub-contractors providing products and services to the DoD.
-
Cybersecurity Maturity Model Certification (CMMC) 101: The essentials
By: Corsica Technologies
Type: Webcast
The Cybersecurity Maturity Model Certification (CMMC) is a program designed to enforce the protection of sensitive unclassified information shared by the DoD. Tune into this webinar to gain a CMMC 101 overview so your organization is adequately prepared to comply moving forward.
-
The Road To CMMC 2.0
By:
Type: Talk
The Department of Defense has made cybersecurity a top priority as cyberattacks against the Defense Industrial Base (DIB) have become more common and complicated. The Department of Defense developed the Cybersecurity Maturity Model Certification (CMMC) 2.0 to protect national security information by dynamically strengthening DIB cybersecurity to meet new threats and safeguard the sensitive data that supports our military efforts. In this webinar, Sanjay Deo, President and Founder of 24By7Security, will examine just how the CMMC 2.0 program helps organizations in the DIB improve their cybersecurity. He will also review how the CMMC initiative incorporates a robust set of cybersecurity standards into procurement programs to ensure that contractors and subcontractors are in compliance. Program Elements: o Defining CMMC and Its 3 Levels o The Current Cyber Trends in Manufacturing o Cyber Budgets For Every Industry o Stolen Designs From Other Countries o How Will The CMMC 2.0 Affect You? CPE/ CEU Credits: You may be eligible for CEUs or CPE credits at some professional associations by attending this webinar. Please check with your professional association and its policies to see if you may apply for CEUs or CPE credits for this webinar. You can download a certificate of completion from BrightTALK after viewing the entire webinar.
-
CMMC 2.0: Preparing Your Project's for DoDs Complete Roll Out
By:
Type: Replay
Now more than ever, it is time to get processes in order to prepare for the US Department of Defense’s (DoD’s) complete rollout of CMMC. CMMC’s rollout is top of mind for companies who do business with the DoD and with recent developments, there are a lot of questions. While this compliance requirement represents DoD’s effort to improve the cybersecurity posture of contractors who store sensitive defense information on their systems, it’s also an excellent opportunity to strengthen your organization’s overall cyberhealth. In this session, we’ll discuss the evolution of CMMC, provide an overview of Egnyte’s specialized US Federal environment, and answer your questions about CMMC 2.0.
-
Secure admin accounts, customer identities under new compliance rules
By: CyberQP
Type: White Paper
Explore how MSPs can secure admin accounts and customer identities to meet NIST and CMMC compliance requirements. Learn about privileged access management, password updates, and other best practices to protect your environment. Read the full white paper for more insights.
-
Compliance Kit Unlocks Actionable Strategies for Governance
By: Omada
Type: Landing Page
Access Omada's Compliance and IGA Toolkit to unlock strategies and best practices for strengthening your identity governance and meeting regulatory requirements. Read on to enhance your organization's security and compliance.
-
CMMC 2.0 or NIST 800-171. Either one, you are on the hook!
By:
Type: Talk
The DoD announced CMMC 2.0, which many believe is a more pragmatic approach to securing the government supply chain. For many DIB companies it removed the third party attestation requirement, however, it added an annual self-assessment and executive sign-off requirement, along with real consequences for companies that miss these requirements through greater use of the False Claims Act. Companies need to move forward to secure their businesses now. In this webinar, our expert speakers will share what they are seeing when they work with companies that are moving forward with CMMC. Topics include: What to expect from CMMC 2.0 Why DIBs should understand NIST SP 800-171 requirements and prepare to meet them even prior to the issuance of final rules on CMMC 2.0 True timeline from compliance to assessment Ways to minimize disruption to your business Meeting the requirements of reporting and proof
-
Infinite Paths to Achieving CMMC 2.0 Success
By:
Type: Replay
With a deadline on the horizon, CMMC 2.0 implementation is top of mind. Unfortunately it’s not as simple as following a recipe—the path to success varies widely based on the specifics of your organization and environment. Are you team Microsoft or team Google? What’s your technology ecosystem? In this webinar featuring Matt Koehr, President of Xage Government, and moderated by Carol Caley, PMM at Xage Security, we’ll discuss the requirements of CMMC and dig into how getting it right varies depending on your systems and setup.
-
CMMC 2 is finally coming into force and here is what contractors must do now!
By:
Type: Video
Join Aerospace and Defense industry experts PCG, BDO, and Infor as we address the current status of the Government decision on CMMC, the DOD Ruling/Timeline, the impact for contractors and clarity around grey areas. You’ll leave knowing: DOD Ruling/Timeline CMMC 2.0 Client impact/Compliance specifics Current status of the Government decisions on CMMC Clarity around Grey Area Requirements Christina Reynolds, Managing Director, BDO Alex Plitsas Title: Principal, Industry Director for A&D, PCG
-
Live Demo: Automating CMMC 2.0 - EMEA
By:
Type: Replay
CyberSaint is pleased to offer CMMC 2.0, which includes the practices from 171A and automated Interim Rule scoring. We have made it simple for suppliers to benchmark themselves on a standard that is becoming essential to doing business, bringing the cost of compliance down by making the requirements clear and taking the complexities out of the subtractive scoring model. With CyberSaint's expanding integrations, companies will be able to automate significant parts of the standard, and see significant ROI as they become more secure. CMMC is likely to become standard in other critical infrastructure sectors, and CyberSaint is excited to be doing its part in this worthy endeavor. CyberSaint’s addition of CMMC 2.0 allows customers to automate the scoring for CMMC 2.0, allowing customers to select whether they have met or not met compliance requirements and automatically giving them a validated score associated with their programs. Customers can walk through the process of scoring controls to measure compliance while automating the new scoring process so that customers do not have to spend time or energy learning how to calculate their score.
-
Live Demo: Automating CMMC 2.0 - MENA
By:
Type: Replay
CyberSaint is pleased to offer CMMC 2.0, which includes the practices from 171A and automated Interim Rule scoring. We have made it simple for suppliers to benchmark themselves on a standard that is becoming essential to doing business, bringing the cost of compliance down by making the requirements clear and taking the complexities out of the subtractive scoring model. With CyberSaint's expanding integrations, companies will be able to automate significant parts of the standard, and see significant ROI as they become more secure. CMMC is likely to become standard in other critical infrastructure sectors, and CyberSaint is excited to be doing its part in this worthy endeavor. CyberSaint’s addition of CMMC 2.0 allows customers to automate the scoring for CMMC 2.0, allowing customers to select whether they have met or not met compliance requirements and automatically giving them a validated score associated with their programs. Customers can walk through the process of scoring controls to measure compliance while automating the new scoring process so that customers do not have to spend time or energy learning how to calculate their score.
-
Live Demo: Automating CMMC 2.0
By:
Type: Talk
CyberSaint is pleased to offer CMMC 2.0, which includes the practices from 171A and automated Interim Rule scoring. We have made it simple for suppliers to benchmark themselves on a standard that is becoming essential to doing business, bringing the cost of compliance down by making the requirements clear and taking the complexities out of the subtractive scoring model. With CyberSaint's expanding integrations, companies will be able to automate significant parts of the standard, and see significant ROI as they become more secure. CMMC is likely to become standard in other critical infrastructure sectors, and CyberSaint is excited to be doing its part in this worthy endeavor. CyberSaint’s addition of CMMC 2.0 allows customers to automate the scoring for CMMC 2.0, allowing customers to select whether they have met or not met compliance requirements and automatically giving them a validated score associated with their programs. Customers can walk through the process of scoring controls to measure compliance while automating the new scoring process so that customers do not have to spend time or energy learning how to calculate their score.
-
Live Demo: Automating CMMC 2.0 - EMEA
By:
Type: Replay
CyberSaint is pleased to offer CMMC 2.0, which includes the practices from 171A and automated Interim Rule scoring. We have made it simple for suppliers to benchmark themselves on a standard that is becoming essential to doing business, bringing the cost of compliance down by making the requirements clear and taking the complexities out of the subtractive scoring model. With CyberSaint's expanding integrations, companies will be able to automate significant parts of the standard, and see significant ROI as they become more secure. CMMC is likely to become standard in other critical infrastructure sectors, and CyberSaint is excited to be doing its part in this worthy endeavor. CyberSaint’s addition of CMMC 2.0 allows customers to automate the scoring for CMMC 2.0, allowing customers to select whether they have met or not met compliance requirements and automatically giving them a validated score associated with their programs. Customers can walk through the process of scoring controls to measure compliance while automating the new scoring process so that customers do not have to spend time or energy learning how to calculate their score.
-
Live Demo: Automating CMMC 2.0 - APAC
By:
Type: Replay
CyberSaint is pleased to offer CMMC 2.0, which includes the practices from 171A and automated Interim Rule scoring. We have made it simple for suppliers to benchmark themselves on a standard that is becoming essential to doing business, bringing the cost of compliance down by making the requirements clear and taking the complexities out of the subtractive scoring model. With CyberSaint's expanding integrations, companies will be able to automate significant parts of the standard, and see significant ROI as they become more secure. CMMC is likely to become standard in other critical infrastructure sectors, and CyberSaint is excited to be doing its part in this worthy endeavor. CyberSaint’s addition of CMMC 2.0 allows customers to automate the scoring for CMMC 2.0, allowing customers to select whether they have met or not met compliance requirements and automatically giving them a validated score associated with their programs. Customers can walk through the process of scoring controls to measure compliance while automating the new scoring process so that customers do not have to spend time or energy learning how to calculate their score.
-
CMMC 2.0 - A View Through the C3PAO Looking Glass
By:
Type: Talk
The Cybersecurity Maturity Model Certification 2.0 (CMMC 2.0) release now has Organizations Seeking Certification (OSCs) preparing for their CMMC Level 2 certification. Many OSCs seek assistance from Registered Provider Organizations (RPOs) and CMMC Third-Party Assessor Organizations (C3PAOs) to help prepare, while others feel they are ready for their certification assessments. To be ready for CMMC, folks should know the latest information on CMMC, including when certifications will begin: • Three Levels to CMMC 2.0 • Certification Timeline • Common Pitfalls Additionally, C3PAOs are receiving many questions about managed service providers (MSPs) and cloud service providers (CSPs). Outsourcing IT or cybersecurity services to a third-party provider can provide quality services that a company cannot afford with an on-premises solution and for a lower overall cost. Outsourcing to an MSP can provide significant cost savings for OSCs. • Benefits of using an MSP or CSP • Is the MSP part of the assessment process • What level of certification does the MSP require Finally, what should OSCs be doing now to prepare for CMMC. • Prepare on your own • Seek assistance; the RPO route • Schedule with a C3PAO now Do you need CPE/ CEU Credits? Attending this webinar may make you eligible for CEUs or CPE credits at some professional associations. Please check with your professional association and its policies to see if you may apply for CEUs or CPE credits for this webinar. After viewing the entire webinar, you can download a certificate of completion from BrightTALK.
-
Secure admin access and align with CMMC Access Control requirements
By: CyberQP
Type: Buyer's Guide
As organizations prepare for CMMC compliance, securing privileged accounts is critical. This CMMC Access Control Checklist outlines key steps, including limiting admin access, implementing just-in-time access, and applying the principle of least privilege. Review the checklist to ensure alignment with CMMC access control best practices.
-
CMMC Final Rule: What Actions Do You Need to Take?
By:
Type: Video
At long last, the U.S. Department of Defense (DoD) has issued a final rule on CMMC 2.0. As a result, DoD contractors and subcontractors need to take immediate action to comply with CMMC by early- to mid-2025. Join cybersecurity experts Bridget Wilson, SVP of Governance, Risk & Compliance at Network Coverage; strategic cybersecurity advisor Colonel J. Carlos (JC) Vega, US Army (Retired); and Neil Jones, Cybersecurity Evangelist at Egnyte, as they take a deep dive into the final rule.
-
CMMC 2.0 – What’s changed, what to expect and what you should be doing today
By:
Type: Replay
Late last year CMMC 2.0 was announced, and as we expected, it came several changes: 3 fewer control families, 5 maturity levels were consolidated into 3, and different assessment methods depending on the maturity level you need to achieve. But what hasn’t changed is that every DoD contractor is affected and will need to satisfy compliance requirements sooner than originally expected. While the rule making is still underway, and level 3 is yet to be defined, organizations shouldn’t think they have time. The time to prepare is still now. Join us for this webinar where Stuart Itkin, VP CMMC & FedRAMP Assurance at Coalfire Federal, will break down the latest changes that came with CMMC 2.0 and some key considerations as you get ready for certification.
-
How an MSP Supported the Journey to CMMC Certification
By: ARG, Inc.
Type: Case Study
A government contracting firm searched for a managed service organization that could supply high-quality documentation along the firm’s journey to CMMC certification. Take a look through this case study to learn about an organization that met the firm’s needs.
-
CMMC 2.0 Update: The Future of DoD Cybersecurity
By:
Type: Talk
As we approach the finalization of rulemaking in early/mid-2024, it's crucial for organizations not to delay assessing their compliance with the Cybersecurity Maturity Model Certification (CMMC). This is especially true given that joint surveillance program (JSVAP) assessments have already begun, and DFARS 7012 remains in play. Don't kick the "compliance can" down the road – the time to act is now! But that's not all – CMMC is not the only rule organizations must worry about. Updates have been submitted for the FAR regulation and CFR 32, which could mean that every Federal agency must comply with CMMC and NIST 800-171r2 if approved. It's more important than ever to stay on top of compliance requirements and ensure your organization is fully prepared. In addition, the DCMA DIBCAC is ramping up the JSVAP to account for the extended rulemaking period. If your organization feels prepared, scheduling your assessment now could offer numerous advantages over waiting. In this webinar, we will be going over the following topics: • A breakdown of the latest CMMC 2.0 updates • What JSVAP assessments are and how DFARS 7012 will be affected • What does the extended rulemaking period mean for DoD contractors and businesses • The major differences between acting now vs. acting later Join us for this timely and informative webinar and get the latest insights, tips, and strategies for navigating the complex landscape of CMMC compliance. Don't miss this opportunity to learn from Redspin industry experts Robert Teague, CMMC Manager, and Dr. Thomas Graham, CISO, as they review the importance of staying ahead of the compliance curve to ensure your DoD organization is fully prepared for what's to come! Who Should Attend? • Contractors and Subcontractors handling government info • Companies bidding for defense contracts • Senior executives and cybersecurity professionals
-
Are you Ready for CMMC (Cybersecurity Maturity Model Certification)?
By:
Type: Video
Ready or not CMMC is coming! Companies can no longer self-certify, and the CMMC is a pass/fail certification. It'll be a tough journey with lots of trials and tribulations, but Archer will help you. Join us as we review the CMMC deadlines, how to get ready, and best practices for passing the CMMC audit. Also we will take you through several real-life examples including how the Department of Defense's new cybersecurity certification applies to any company with a government contract.
-
Doing business with the US Fed? You need to understand CMMC
By:
Type: Replay
Cybersecurity Maturity Model Certification (CMMC) is a program established by the US Department of Defense (DoD) to improve security by requiring certification of external contractors. While DoD has already started to incorporate CMMC requirements into certain RFPs and RFIs, CMMC is also gaining traction across the Defense Industrial Base (DIB) including the Department of Homeland Security (DHS) and other federal agencies especially in the wake of the SolarWinds breach. Participants in this webinar will learn: Benefits of the webcast - Key dates and departments related to the adoption of CMMC - An overview of the 17 different CMMC domains and associated 5 levels of compliance - How Entrust solutions can help you address several/8 domains including Identity & Authentication (IA), Access Control (AC), and Audit & Accountability (AU), and Systems and Communication Protection (SC).
-
Secure Critical Infrastructure for Continuous Compliance Standard Panel
By:
Type: Talk
Join CISQ and Puppet by Perforce on February 15th and February 29th for a two-part series on Secure Critical Infrastructure for Continuous Compliance Standard. On February 15th, 2023 at 11:00am CT we'll kick off with a panel that will discuss the need and elements of SCI and why and how to meet Compliance Framework Regulatory Standards like CMMC, NIST, CIS, DISA STIG, PCI, and FINRA. Our event moderator, Chris Ganacoplos, VP of East and Federal for Puppet Perforce IT Operations, Perforce will be joined by Tim Schilbach, CEO Penacity, for the first part of the series on February 15th, where they will discuss the challenges of Secure Critical Infrastructure. We will touch on Why Secure Critical Infrastructure is important, especially for stakeholders who need CMMC 2.0 certified with the NIST framework. We will discuss strategic and tactical topics you must implement in your program to be successful. On February 29th, we'll be back with the addition of Paul Reed, Principal Solutions Engineer, Puppet by Perforce, who will give a presentation with Tim Schilbach and an in-depth demonstration that discusses the challenges of Secure Critical Infrastructure. We will review what it takes to build and deliver Secured Critical Infrastructure leveraging CMMC 2.0 certified and Center for Internet Security frameworks. We will demo an automated environment with policy as code, reporting, and auditing dashboards.
-
CMMC 101: Class is in Session
By:
Type: Talk
If your organization has contracts with the U.S. Department of Defense, you can’t go more than a couple of days without hearing about the Cybersecurity Maturity Model Certification (CMMC). The messaging surrounding this new certification has many companies either in panic or denial about their future CMMC requirements. With the CMMC requirement set to determine who can compete for DoD contracts, the time has come for those in the DoD supply chain to get in the race or get left in the dust. Join Law Floyd, Director of Cloud and Cybersecurity Consulting, and Gianna Price, Xacta Solutions Architect, for a rational discussion on CMMC and how to prepare for current and future requirements. During the webinar, Law and Gianna will also highlight Telos’ CMMC product and service tier offerings intended to help small, medium, and large organizations conduct CMMC self-assessments and/or prepare for a third-party audit. Program Elements: o The importance and meaning of CMMC o Who needs to comply and when? o About the CMMC ecosystem o How to get started in your CMMC journey o How automation and the Xacta CMMC solutions can benefit you CPE/ CEU Credits: You may be eligible for CEUs or CPE credits at some professional associations by attending this webinar. Please check with your professional association and its policies to see if you may apply for CEUs or CPE credits for this webinar. You can download a certificate of completion from BrightTALK after viewing the entire webinar.
-
A Computer Weekly eGuide to Workspaces
By: TechTarget ComputerWeekly.com
Type: eGuide
In this eGuide we focus on all thing's workspace related. We dive into Google's new privacy settings, how the landscape of workspaces will look when the world of work fully returns and Google's new G Suite workspace overhaul.
-
Achieving Compliance with the Cybersecurity Maturity Model Certification (CMMC)
By:
Type: Talk
In response to the increasing trend of cyber threats, the U.S. Department of Defense has launched a new information security framework and audit program to assure its vendors are adequately securing their confidential data. The Cybersecurity Maturity Model Certification (CMMC) combines certifications into a unified cybersecurity standard and will assess the maturity of an organization’s cybersecurity practices. Defense Industrial Base (DIB) partners and contractors have to meet the DOD’s new CMMC to bid on future procurement In this webinar, we will discuss steps to take to meet specific CMMC level compliance in relation to Identity and Access Management (IAM), including Privileged Access, how compliance can be achieved to pass your audit, and which technologies can aid preparations. How to work within the CMMC timeframe MFA best practices to achieve compliance under the mandate What to consider when choosing the right MFA security partner How to implement a future-proof and scalable MFA solution for your company in preparation for the future requirement changes.CMMC, Cyber Maturity, Certification, ISO, NIST
-
Connecting the dots for CMMC
By:
Type: Talk
Compliance (and reaching more customers) might be simpler than you think As cyberattacks continue to evolve, so do the cybersecurity frameworks designed to address them. The latest example is the Cybersecurity Maturity Model Certification (CMMC), which establishes security requirements for vendors who do business with the U.S. Department of Defense. But it’s not just DoD, as civilian agencies and even other governments are also planning to adopt this model. The good news for vendors is that they have likely already taken steps to address many of the CMMC’s requirements. Join us for our webinar as we look under the hood and discuss what makes up the CMMC domains. There’s a good chance your ongoing security investments put you in position for compliance. In this webinar we’ll examine: • What standards and frameworks are built into CMMC • How you can leverage your existing security practices in your CMMC program • Where to find useful resources to position you for more business
-
Conquering CMMC: Tackling the Most Difficult CMMC Controls
By:
Type: Talk
The Cybersecurity Maturity Model Certification (CMMC) sets a new minimum bar to hit if you want a shot at doing business with the Department of Defense (DoD). That means that CMMC compliance is likely at the top of your cybersecurity list and you’ve probably already done at least a little research. As you may have noticed, one of the more difficult controls those pursuing CMMC Level 3 and up must meet is keeping a detailed log of all devices. Some levels even require 24/7 monitoring of these logs. Talk about a herculean task! In this on-demand webinar, Darren Cathey, Sales Engineer at LogRhythm, and Scott McDaniel, Vice President of Technology at Simple Helix, go beyond understanding CMMC! They discuss: • A quick overview of the CMMC standard • How LogRhythm’s set of out-of-the-box content can help you move through compliance before the 2026 deadline • How to make keeping track of your log files easy Watch this fireside chat today and discover the less arduous path to CMMC compliance that has resulted in a perfect DCMA High Audit Score of 110 for a Simple Helix customer!
-
Level up DoD CMMC with FedRAMP identity security
By:
Type: Video
The Department of Defense (DoD) relies on robust cybersecurity measures to protect sensitive data and ensure national security. A key component of these measures is the Cybersecurity Maturity Model Certification (CMMC) framework, which mandates stringent security protocols for DoD contractors to safeguard controlled unclassified information (CUI) across the defense supply chain. This presentation explores how FedRAMP authorized SailPoint Identity Security Cloud aligns with and supports the DoD's CMMC requirements, enhancing identity governance, access management, and compliance. This session will detail specific capabilities of SailPoint that align with the CMMC's five maturity levels, highlighting use cases and implementation strategies that demonstrate effective compliance and risk management.
-
Achieving Compliance with the Cybersecurity Maturity Model Certification (CMMC)
By:
Type: Video
In response to the increasing trend of cyber threats, the U.S. Department of Defense has launched a new information security framework and audit program to assure its vendors are adequately securing their confidential data. The Cybersecurity Maturity Model Certification (CMMC) combines certifications into a unified cybersecurity standard and will assess the maturity of an organization’s cybersecurity practices. Defense Industrial Base (DIB) partners and contractors have to meet the DOD’s new CMMC to bid on future procurement. In this webinar, we will discuss steps to take to meet specific CMMC level compliance in relation to Identity and Access Management (IAM), including Privileged Access, how compliance can be achieved to pass your audit, and which technologies can aid preparations. Key takeaways: 1) How to work within the CMMC timeframe. 2) MFA best practices to achieve compliance under the mandate. 3) What to consider when choosing the right MFA security partner. 4) How to implement a future-proof and scalable MFA solution for your company in preparation for the future requirement changes.
-
The time to prepare for CMMC is now
By:
Type: Replay
CMMC, which affects organizations in the DoD supply chain, establishes a minimum threshold of cyber maturity that all organizations must achieve. CMMC is pass-fail, and failure to become certified disqualifies an organization from being able to supply to the DoD. While CMMC requirements begin roll out this year, many organizations don’t appreciate the effort and the time required to satisfy those requirements, and many have not begun. Certification requirements and the certification process are both exacting. Organizations looking to become CMMC compliant are surprised to learn how exacting and difficult it is to satisfy the requirements. We are pleased to be joined by Stuart Itkin, VP CMMC & FedRamp Assurance at Coalfire Federal, to discuss: • Why CMMC is important and why it was created • A quick overview and description of the CMMC framework • How to undertake the journey from where you are and need to be • The assessment process: what to expect • The impacts of CMMC beyond the DoD supply chain
-
Understanding the DFARS Interim Rule: Key Takeaways for Your CMMC Strategy
By:
Type: Replay
This webinar focused on helping defense Primes, Contractors, and Subcontractors understand the DFARS Interim Rule and its implications for their Cybersecurity Maturity Model Certification (CMMC) strategy. The webinar features Bernhard Bock, CISO, who just finished his Provisional Assessor training and was able to explain to viewers what the Interim Rule requires of contractors. Padraic O’Reilly, technology innovator and frameworks expert, also presents and discussed how defense companies can determine, remediate, and maintain their NIST and CMMC compliance scores. We close out the webinar by providing attendees a look at how the choice of the right technology, presented by Sanjeev Verma, Co-Founder, is critical to demonstrating the maturity required by the Interim Rule as well as enabling CMMC compliance. Speakers: Bernhard Bock- CISO @ SysArc Padraic O’Reilly- Co-founder @ CyberSaint Sanjeev Verma – Co-founder @PreVeil Stuart Itkin – CEO @Cycurity Advisors
-
Securing Government Contractors under CMMC with Phishing-resistant MFA
By:
Type: Talk
Over the past year, complex cyberattacks have skyrocketed—and it is no surprise that the U.S. defense industrial base and government contractors are primary targets. In this context, following the DoD Cybersecurity Maturity Model Certification (CMMC) is now more important than ever. Typically seen as phishing and account takeovers targeting digital identities, these attacks result in data exposure, denial of service, erosion of data integrity, and risk to critical assets. What if the solution was not to make passwords stronger, but rather to remove them entirely? Join Axiad and Atos on April 14th to learn why passwordless phishing-resistant Multi-factor Authentication is the most secure and practical defense. We’ll discuss: 1) General challenges of implementing CMMC identification and authentication controls 2) Actions to validate your workforce and machine identities in compliance with CMMC 3) What to look for in a phishing-resistant Multi-factor Authentication solution
-
Security Analyst Diaries - EP4: Detection and Response on Google Workspace
By:
Type: Video
Google’s Cloud Native SIEM, Chronicle, provides native integrations for modern productivity and collaboration suite, Google Workspace. In today’s Security Analyst Diary we’re going to cover: - Why integrate Google Workspace with Chronicle? - How to integrate Workspace with Chronicle: Ingestion - Using Chronicle for Detection & Response with Google Workspace You can also read the blog here - https://chronicle.security/blog/posts/security-analyst-diaries-4-detection-and-response-on-google-workspace-with-chronicle/
-
Boost your company’s productivity with Google Workspace
By:
Type: Video
Understanding how to use Google Workspace and learn how products like Gmail, Docs, Drive, and Meet help your team reimagine the way they work and how deeply they collaborate. Please join Dell and Google Workspace and find out how your organization will benefit by implementing Google Workspace as employees want to use tools at work that they’re comfortable and familiar with. Google Workspace Specialist will demonstrate how Google Workspace: • Enhanced collaboration adds value to your organization; • Built for flexibility allows all workers to work on any device; • Easy to adopt in a safe and secure platform
-
Enhance government agency data security with Google Workspace
By: Google Workspace
Type: Product Overview
Google Workspace for Government enhances security and compliance for federal, state, and local agencies. With fewer email security incidents, strong malware detection, and zero critical vulnerabilities in Gmail, it offers a secure option. Learn how Workspace can safeguard government data and streamline productivity.
-
10 Questions to Ask Your CMMC Compliance Partner
By:
Type: Video
Finding the right partner for CMMC compliance is a critical business decision, so you need to get it right. Unfortunately, organizations are claiming they'll get you “CMMC compliant” in no time, and at a low cost. However, a major compliance decision isn’t that simple. In this session, we’ll ask industry veterans, Bridget Wilson, CISO at Network Coverage, and Neil Jones, Egnyte’s Cybersecurity Evangelist, for their recommendations on CMMC vendor evaluation, including what capabilities you should look for. You’ll also learn why every organization’s CMMC journey is unique.
-
CMMC 2.0 Compliance: Your Key to Future DoD Business
By:
Type: Video
You will gain valuable insight into the latest CMMC requirements, compliance strategies, and best practices to safeguard your construction business. You will also learn why the time to take action on CMMC is now.
-
New Ways Google Workspace works with the tools you already use
By:
Type: Video
Google Workspace provides best-of-breed real-time collaboration and is designed to sit alongside—and improve—Microsoft Office. Modern collaboration with Google Workspace can drive more impact across an organization than chat, video calling, and storage solutions. Please join Dell and Google Workspace and find out how your organization will benefit by implementing Google Workspace as employees want to use tools at work that they’re comfortable and familiar with, while modern organizations want to attract and retain talent with safe, secure and proven technologies. In this live webinar session on December 1st, Katie Tobin, Google Workspace Specialist and Global Innovation will demonstrate how Google Workspace: o Enhanced collaboration adds value to your organization; o Built for flexibility allows frontline workers to work on any device; o Easy to adopt in a safe and secure platform Presented by Katie Tobin Head of Workspace Innovation Global Public Sector, Google Racho Iyer Customer Engineer Specialist Productivity and Collaboration, Google John Manley Google Cloud and Workspace Specialist Software Sales, Dell
-
CMMC: Recommendations to navigate the new Cyber Certification requirements
By:
Type: Replay
Join Cyber Armed, ID.me, Intercede, and Yubico for a roundtable on key recommendations to navigate and get started with Cybersecurity Maturity Model Certification (CMMC). Defense Industrial Base (DIB) partners and contractors need to meet the Department of Defense’s (DOD) new CMMC to bid on future procurement, but what does CMMC compliance entail? The roundtable will focus on: 1. CMMC levels and domains to pay attention to in relation to Identity and Access Management, including Access Controls and Privileged Access 2. Steps to take to adapt current projects and practices to meet specific CMMC level compliance Confidentiality and Data Processing: The information you provide in this form will be held in accordance with applicable privacy laws by Yubico, Inc., its Affiliates, and its Works with YubiKey partners: Cyber Armed Security, ID.me, Inc., and Intercede Ltd. Any personal information submitted in this form will be used by Yubico, Inc., its Affiliates, Cyber Armed Security, ID.me, Inc., and Intercede Ltd for their performance of this webinar, and as such, you agree to being contacted and receiving relevant marketing materials. “Affiliate” means an entity that, directly or indirectly, controls, is controlled by, or is under common control with Yubico, Inc. Your personal data is retained by Yubico only as needed in accordance with Yubico data retention practices. Works with YubiKey partners will retain your personal data only as needed and in accordance with the respective data retention practices of each Works with YubiKey partner. The Yubico Privacy Notice offers more information about Yubico privacy practices, including the lawful basis for processing of personal data, how to lodge a complaint with the supervisory authority, and how to contact Yubico to exercise your data subject rights. Please refer to the respective privacy policies of the listed companies for more information about their privacy practices.
-
Stop Security Breaches Cold With CrowdStrike On Google Cloud
By: Google Cloud & Crowdstrike
Type: Product Overview
CrowdStrike and Google Cloud have partnered to deliver AI-powered security solutions that protect cloud workloads, enhance visibility, and accelerate threat response. Their offerings provide protection across Google Cloud services, Chrome Enterprise, and Workspace, helping organizations stop breaches and secure assets. Read the overview for more.
-
Preparing For the Cybersecurity Maturity Model Certification (CMMC)
By:
Type: Video
There’s plenty of talk right now among the defense community about the Cybersecurity Maturity Model Certification (CMMC) — and with good reason. The new certification will demand significant changes of any government contractor working either directly for the Department of Defense (DoD) or in its supply chain. Whereas previously they were responsible for maintaining their own security, contractors will now be forced to adhere to strict DoD-mandated requirements. An estimated 300,000 businesses could be affected. So what are the challenges of securing modern supply chains? And what should contractors be aware of before they start their CMMC compliance journey? Tanium’s James Hoscheit, global technology expert and Chris Hodson, chief information security officer (CISO) answer those questions and more in this "To the Point" webcast.
-
CMMC Demystified: What Defense and Aerospace Suppliers Need to Know
By:
Type: Video
The Cybersecurity Maturity Model Certification (CMMC), based on NIST 800-171 and other global standards, is the unified cybersecurity standard the DOD will use moving forward to verify that all of its contractors have the appropriate level of cybersecurity practice and processes in place to protect controlled unclassified information (CUI) and federal contract information (FCI) on their networks. Companies that contract with the DoD will start to see CMMC requirements as part of RFIs as early as Fall of 2020. Covered entities will need to pass a third-party assessment and receive certification prior to contract award. Further, the CMMC is expected to create ripple effects across industries and be adopted by governmental agencies and private sector organizations. Watch this webinar to learn all about the CMMC and how to prepare for its requirements.
-
Exploring a Severe Design Weakness in Google Workspace - Hunters & Orca Security
By:
Type: Talk
In this webinar we will learn about the vulnerability recently discovered by Hunters’ Team Axon called DeleFriend - what it is, how it is exploited, and what you can do to protect yourself from it. More than just a series of slides we’ll have the threat researchers demonstrate the vulnerability and breach a demo environment. We shall see that Google Workspace depends on Google Cloud Platform and why you need to rigorously protect yourself across both. We’ll discuss attacks on Google Cloud Platform and Google Workspace as well as a live demo of the exploit. Key takeaways: - How GCP and Google Workspace are interconnected - How to detect and prevent this demonstrated attack - What you need to do to protect yourself from this exploitable vulnerability
-
Getting Ready to Meet CMMC Requirements
By:
Type: Talk
The Cybersecurity Maturity Model Certification (CMMC), based on NIST 800-171 and other global standards, is the new unified cybersecurity standard the DOD will use moving forward to verify that all of its contractors have the appropriate level of cybersecurity practice and processes in place to protect controlled unclassified information (CUI) and federal contract information (FCI) on their networks. Companies that contract with the DoD will start to see CMMC requirements as part of RFIs as early as the end of 2020. Covered entities will need to pass a third-party assessment and receive certification prior to contract award. Further, the CMMC is expected to create ripple effects across industries and be adopted by other governmental agencies and private sector organizations. Join this conversation featuring Josh Bobbit, Founder, and CEO of Fortified Logic, and Matt Monroe, Operations Manager at Omnistruct, on how the CMMC may impact your industry and organization, your internal cybersecurity processes, and third-party due diligence processes. Understand key steps your organization can take in the immediate term to become CMMC ready and demonstrate your compliance posture.
-
NLP-Backed Crosswalking: CIS Top 18 to CMMC 2.0 Controls
By:
Type: Replay
Easily map controls between CIS Top 18 to CMMC 2.0 in seconds using CyberStrong’s patented AI technology. Attain actionable gap analysis between these top industry frameworks to see where you are and are not compliant to help your organization build a robust cyber risk posture. Performing cyber risk assessments across compliance requirements is challenging, especially for enterprises complying with multiple frameworks or standards. CyberStrong leverages Natural Language Processing (NLP) to decipher the actions and intent of the control, enabling a much more accurate mapping result. Join this live demo that will walk you through the technology CyberSaint leverages to perform rapid crosswalks and demonstrates how to set up a crosswalking project within the CyberStrong environment.