Understanding CMMC 2.0: Maturity Levels, Implementation Use Cases and Costs

A deep dive into CMMC 2.0 maturity levels and outline of controls that need to be implemented for compliance.

WEBINAR

Access webinar replay now!

By completing this form, I consent to receiving calls, texts and/or emails from CyberSheath regarding services and programs.

Join us for an insightful webinar on understanding the Cybersecurity Maturity Model Certification (CMMC) and its implications for your organization's ability to retain or compete for DOD contracts. Here's what you can expect to learn:

    • Introduction to CMMC: Explore why Department of Defense (DOD) developed CMMC and who it applies to.
    • Three Maturity Levels of CMMC:
      • Level 1: Foundational - Learn about the entry-level certification focusing on safeguarding Federal Contract Information (FCI) with 17 cybersecurity practices.
      • Level 2: Advanced - Understand the requirements for protecting Controlled Unclassified Information (CUI) with 110 security controls and 320 assessment objectives.
      • Level 3: Expert - Discover the highest-level certification for handling CUI, building upon Level 2 with additional requirements from NIST SP 800-172.
    • Overview of CMMC 2.0 Controls:
      • Level 1 Controls: Foundational cybersecurity practices for protecting FCI, including access control, personnel security, and system integrity.
      • Level 2 Controls: Intermediate cybersecurity practices for protecting CUI, covering areas such as configuration management, incident response, and physical protection.
      • Level 3 Controls: Advanced cybersecurity measures for handling CUI with additional requirements to be determined from NIST SP 800-172.
    • Implementation Use Cases and Costs:
      • People, processes, and technologies required to achieve compliance.
      • Implementation use cases for Cloud, On-prem or Hybrid environments.
      • Key insights when budgeting for implementation and ongoing compliance.

Why Attend?

  • Gain a comprehensive understanding of CMMC and its implications for your organization's cybersecurity practices.
  • Discover best practices for implementing CMMC controls tailored to your organization's needs and level of certification.
  • Learn how to budget for the implementation of CMMC controls and ongoing compliance with DOD requirements.

Next Steps:

Don't miss this opportunity to enhance your knowledge of CMMC requirements and strengthen your organization's cybersecurity defenses. Register now to secure your spot in this informative webinar!

Eric Noonan - CyberSheath CEO

Eric Noonan

CyberSheath CEO

Eric Noonan is a respected cybersecurity expert having testified before the House Armed Services Committee (HASC) Subcommittee on Emerging Threats and Capabilities and served on the Council on Cyber Security expert panel to review and update the Critical Security Controls. Prior to founding CyberSheath, Eric was the Global Chief Information Security Officer for BAE Systems plc, based in London. Concurrently Eric served as Vice President and General Manager of North American IT operations, overseeing engineering, architecture, and IT operations support for approximately 39,000 employees.

Rich Baron - Security

Rich Baron

Security

Rich Baron runs Security at CyberSheath and has nearly 10 years of cybersecurity expertise and a passion for sharing that knowledge with others. Starting his career in IT Managed Services, Rich progressed through roles managing infrastructure, networks, servers, security, and cloud environments for Charles IT, Insurity, and McLaughlin Research Corporation. His experience includes leading infrastructure teams, architectural design, executing complex migrations, implementing security controls, security assessments, documenting standards, and driving results.

Join our May 29th 12 pm ET webinar Mastering CUI Boundaries: A Comprehensive Guide to Scoping, SPRS Input and Audit Navigation.
This is default text for notification bar