30 results found for CMMC
30 results found for CMMC:
Jared McWherter
EXPERIENCEJared McWherter started his career in IT nearly 10 years ago performing system support and administration while studying Information Security. After obtaining his BS in Information Assurance & Cyber Defense, he brought his expertise to…
Lee Quinton
EXPERIENCELee Quinton has over 22 years of Network and Information Security experience. He began as a backbone engineer deploying GSRs and maintaining corporate firewalls but has worked predominantly as an InfoSec consultant since 2005. Lee has…
Steph Saunders
Senior Information Security expert Steph Saunders, with 10+ years of experience, offers cybersecurity guidance, education, and awareness training, connecting the Pittsburgh community through events, mentorship, and exper
Government Contractor’s Ultimate Guide to CUI
Controlled Unclassified Information (CUI) is information the Government creates or possesses, or that an entity creates or possesses for or on behalf of the Government, requiring safeguarding or dissemination controls to
Navigating Compliance: FCI and CUI Requirements for Federal Contractors
TrustedSec Advisory Compliance Services Practice Lead Chris Camejo provides a comprehensive overview of the definition, scope, and protection requirements for government contractors handling FCI and CUI, and the relationship between FCI and CUI…
CUI For the Rest of Us: The New Government-Wide CUI Protection Contract Clause
U.S. government contractors need to start preparing for a proposed new government-wide Controlled Unclassified Information (CUI) protection requirement.
Dealing With Unmarked and Mismarked CUI
Implementing CMMC and other Controlled Unclassified Information (CUI) protection obligations depends on the accurate identification of CUI, and in some cases also depends on the identification of the CUI categories and limited dissemination controls…
Active Directory Security Assessment
Active Directory (AD) serves as the foundation of enterprise identity management, controlling authentication, access controls, and trust relationships across your entire IT environment.
Helpful Hints for Writing (and Editing) Cybersecurity Reports
When it comes to reading (and editing) (and proofreading) technical documents, it's important to remember that the details are key, and can make all the difference. Not all readers of technical documents have technical prowess, and even those…
Updated GSA Contractor CUI Protection Requirements
CMMC has been getting much of the Controlled Unclassified Information (CUI) attention lately due to the size of the defense industrial base, but General Services Administration (GSA) requirements for protecting CUI are also very important as that…