CMMC Webinar Series
ATI, in partnership with Cuick Trac by Beryllium InfoSec, is hosting a webinar series
to provide you information regarding the upcoming implementation of the
Cybersecurity Maturity Model Certification (CMMC) Program.
Part 6 CMMC Webinar Series
The latest webinar of this series has past, however the presentation and slides
for Part 6 are here, and the others are below.
6
Part Webinar Series
Kicked off on May 21st, 2024 and was held monthly to November 14th, 2024. Recordings and presentations of past webinars can be viewed on this page, just below.
- May 21, 2024: Part 1 – Past, Present, and Future of CMMC
- June 20, 2024: Part 2 – Scoping of Sensitive Data
- July 18, 2024 : Part 3 – Segmenting & Enclaving
- August 28, 2024: Part 4 – Still More To Do / Responsibility Matrix
- September 24, 2024: Part 5 – Read, Set, Pass....Or Fail?
- November 14, 2024 2PM ET: It's Here. What's next?
6 Part Webinar Series
Kicked off on May 21st, 2024 and is held monthly. Recordings of past webinar sessions can be viewed on this page.
- May 21, 2024: Part 1 – Past, Present, and Future of CMMC
- June 20, 2024: Part 2 – Scoping of Sensitive Data
- July 18, 2024 2PM ET: Part 3 – Segmenting & Enclaving
- August 28, 2024 2PM ET: Part 4 – Still More To Do / Responsibility Matrix
- September 2024: Part 5 – What It Means to be Audit Ready
- October 2024: Part 6 – Series Wrap Up
So what does the future of CMMC hold for government contractors?
Webinar Presentation is Available Here!
Protecting CUI starts with scoping. Since not all information is on the same level of sensitivity as CUI, CDI, and CTI, you’ll need to define a scoping boundary around the technology, people, and places that will process, store, or transmit sensitive data.
Paul Netopski, Director of Compliance Advisory for Cuick Trac, and Derek White, Co-founder & Chief Product Officer of Cuick Trac, examine the steps to scoping and why the order of process matters. They also discuss how to determine your infrastructure needs-on-prem, GovCloud or enclave-and how to build this into a continuous compliance program.
Webinar Presentation is Available Here!
Since not all data is CUI-related or in scope, data segmentation is a critical step to enclaving. But not all enclaves are created equal.
Join Jeff Baldwin, D.Sc., Beryllium InfoSec’s Chief Information Security Officer (CISO), and Heather Engel, Managing Partner at Strategic Cyber Partners, to learn the steps to segmentation, plus the pros and cons of enclaving, and which type of enclave takes the burden of configuration, systems administration, data management, audit and reporting, and more out of your team’s hands.
Webinar Presentation is Available Here!
Webinar Presentation Available Here!
Webinar Presentation Available Here!
On October 16, 2024, 32 CFR Part 170 was officially added to the Federal Register, making CMMC an official program. This major milestone will have significant impact on organizations that want to be awarded DoD contracts.
View the presentation slides here!