Defense CUI
As a defense prime or sub-contractor, if you handle controlled unclassified information (CUI) you must comply with NIST 800-171 today and soon CMMC to keep your organization safe from cyber threats.
Defense CUI
As a defense prime or sub-contractor, if you handle controlled unclassified information (CUI) you must comply with NIST 800-171 today and soon CMMC to keep your organization safe from cyber threats.
CyberCatch is a CMMC-AB approved RPO with a team of cybersecurity experts that are all RPs that also hold multiple cybersecurity certifications and have helped many attain a perfect 110 score and pass DIBCAC audits with flying colors.
CyberCatch is also now helping several to be among the first to obtain CMMC certification. Because of our expertise and premier solution, these are among the few to receive early CMMC certification from the DoD and C3PAO.
CyberCatch is a CMMC-AB approved RPO with a team of cybersecurity experts that are all RPs that also hold multiple cybersecurity certifications and have helped many attain a perfect 110 score and pass DIBCAC audits with flying colors.
CyberCatch is also now helping several to be among the first to obtain CMMC certification. Because of our expertise and premier solution, these are among the few to receive early CMMC certification from the DoD and C3PAO
WATCH NOW ON-DEMAND!
NIST 800-171 & CMMC: Secrets Revealed
Topics Covered by OUR Cybersecurity Expert Speakers:
- Live Simulation of Recent Cyber Attack: The Missing Controls That Could Have Prevented The Loss
- NIST 800-171 and CMMC: What You Need to Do and How to Comply Cost-Effectively
- Case Study: How To Pass DoD SPRS NIST Assessment, C3PAO and DIBCAC Assessment and get CMMC Certified
WATCH NOW ON-DEMAND!
NIST 800-171 & CMMC: Secrets Revealed
Topics Covered by OUR Cybersecurity Expert Speakers:
- Live Simulation of Recent Cyber Attack: The Missing Controls That Could Have Prevented The Loss
- NIST 800-171 and CMMC: What You Need to Do and How to Comply Cost-Effectively
- Case Study: How To Pass DoD SPRS NIST Assessment, C3PAO and DIBCAC Assessment and get CMMC Certified
MEET THE EXPERT SPEAKERS:
Sai Huda
Founder and CEO, CyberCatch; Author of Best-Seller, Next Level Cybersecurity; Co-Author of Canada’s National Cybersecurity Standard; GM, Risk, Information Security and Compliance, FIS (NYSE: FIS); Founder and CEO, Compliance Coach
Andy Kim
VP, CISO, CyberCatch; Former CISO, Allstate (NYSE: ALL); Head of Cybersecurity Consulting, FIS (NYSE: FIS); Cybersecurity Leader, Citigroup (NYSE: C)
As a Defense Contractor, You Need to Ask Yourself These Questions
Answer: An attack surface map is a diagram of IT assets and network topology to highlight where data is located and how users access to focus on how attackers could make intrusion, to jump-start a cybersecurity compliance and controls assessment. As part of our solution we develop an attack surface map.
Answer: The control is a System Security Plan (3.12.4) mandated in NIST 800-171 and if not developed or not periodically updated and is outdated, will result in making whatever the score was calculated or reported to be considered as null and void (in essence a zero score) and deemed noncompliance with DFARS clause 7012. With CyberCatch, you will not only generate a fully compliant SSP, but also you will be able to update and maintain it to remain fully compliant and secure. Check out the demo to learn more.
Answer: A key control mandated in NIST 800-171 is testing of the incident response plan. If you don’t test you will not be prepared to thwart an attack because you will be unprepared to detect, respond and recover from a data theft and ransomware attack. Periodically, CyberCatch hosts podcasts and law enforcement join CyberCatch experts to educate. In our podcast on incident response, the FBI shared how in a ransomware attack, companies are wiping the hardware as part of recovery, however, this wipes out the evidence and prevents forensics to be performed to enable going after the attackers. To listen to the recording, visit our Podcast web page.
Answer: APT 40 is a group of cyber attackers sponsored by China’s military intelligence and government, and was indicted by the FBI and the indictment was led by the San Diego field office. The top FBI expert joined CyberCatch experts on a podcast that CyberCatch hosted and shared that MFA (3.7.5) was a key control weighted 5 points that was not implemented and if so would have thwarted the attackers. To listen to the recording, visit our Podcast web page.
Answer: There are two controls (3.12.1 and 3.12.3) in NIST 800-171 each weighted as 5 points, so if you are not testing the controls you are out of compliance, and your score needs to be lowered by 10 points and you are not safe from cyber attackers since you very likely will have security holes you are not aware of. This is why you need CyberCatch.