Compliance Wars: Episode V – The Dod Strikes Back
Tuesday, August 22nd, at 12:30 PM EST
Join Kevin Mann of Resilient IT as he co-hosts with Dr. Jeff Baldwin of Space Coast Cyber to cut through the noise and offer clarity on CMMC topics. Kevin and Jeff will shed light on the misinformation surrounding CMMC and provide clear answers to common concerns.
In this episode of Compliance Wars, we’ll tackle the following misinformation:
- System Level Requirements vs System Component Level Requirements: Thinking about systems as made up of system components and requirement flowdown and allocation to components. N/A vs the alternative by meeting practice through policy – practices prohibited by default, permitted by exception. Document exception process and then just have no exceptions.
- Assessment Procedures for Self and Certification Assessment Preparation: Strategies for effective assessment procedures and Continuous monitoring for ongoing sustainment.
Who Should Tune In?
C-Level executives and managers who are concerned about: lost or stolen devices, privacy of confidential information, employment litigation introduced when employees use personal devices to access company data and State and Federal laws that carry heavy fines for lost or stolen data. This is of particular importance for those organizations that handle ANY sensitive data such as credit card and financial information, medical records (or serve clients who have medical records) or who simply want to avoid having their bank account wiped out due to a cyber-attack.