CMMC for SMBs: Affordable Compliance Strategies

Learn how you can achieve Cybersecurity Maturity Model Certification (CMMC) compliance without breaking the bank in this expert-led webinar, featuring guest speaker, Bridget Wilson, SVP of Governance Risk and Compliance at Network Coverage. 

Implementing CMMC affordably begins with careful scoping and developing an initial organization-specific perimeter definition. The controls and processes designed to fulfill NIST SP 800-171 and CMMC requirements serve a single, simple-sounding purpose: control and protect the flow of Controlled Unclassified Information (CUI). This means the entirety of your organization’s physical footprint and soft assets may not be inside the perimeter, reducing the scope and allowing for more economical CMMC solutions.  

Watch the recording to learn more about: 

  • Identifying and Assessing CUI: To begin that scoping and design evaluation, you must first identify which files obtained or created in the service of a DoD contract are defined as CUI. The CMMC 2.0 framework does promise to label CUI in contract documents when the rule is final. It is also useful to think about who at your organization accesses CUI and how they access it.
  • Evaluating Solutions: When deciding on solutions and defining budgets, it is important to understand the methods of correspondence that will be used with contracting officers and in service of the contract, from estimating to project inception and sign-off.
  • CUI Enclave Options: We’ll unpack several implementation models and discuss scenarios that determine the suitability of CUI enclave designs specific to small- to medium-sized businesses (SMBs) within the Defense Industrial Base (DIB)—all with a focus on efficiency and affordability. 

The Department of Defense (DoD) has stated the cost of CMMC implementation and certification will not be prohibitive. This is extremely important to understand as you consider whether compliance expenses will exceed revenue from DoD subcontracts. Watch the webinar recording to start planning you path to efficient, cost-effective CMMC compliance. 

Our Speakers

Bridget Wilson

A recognized thought leader in cybersecurity, asset protection and threat management, and standing at the intersection of those foundational elements and ever-changing and increasing compliance standards and requirements, Bridget Wilson leads Network Coverage’s Security Division. She manages a sophisticated Incident Response Team that prevents and mitigates malicious impact on confidentiality, data integrity, and network availability while minimizing disruption of critical services. She has deep and vast experience developing cybersecurity strategies, implementing security policies, and designing SOPs to monitor and address current and emerging risks. Wilson has garnered unparalleled experience and expertise with nuanced governance and compliance challenges, most recently working with customers to ensure they meet the new CMMC requirements and has helped clients implement security frameworks and controls that meet their internal standards and the specific regulatory compliance protocols they are held to.

image-1

 

Kevin Hancock

Kevin Hancock has over 20 years experience in secure collaboration with distributed teams and partners in highly regulated markets. He has led Sales Engineering, Customer Success, and Professional Services Teams across a broad technology spectrum including Agile Development and DevOps tools and practices; Zero Trust Networking; and Identity and Access Management just to name a few. Focusing on driving adoption, managing change, and helping customers learn, Kevin joined Exostar in May 2021 as Director, Sales Engineering.