: Adding sensitivity labels to SharePoint: learn.microsoft.com/en-us/pur… unlabeled filed …

: Adding cross posting to Blue Sky

: People keep asking, “What they can do?” How can they help If you are a small business …

: Many companies are now hearing more and more about Multi-Factor Authentication. In fact for most …

:

: Certified CMMC Assessor: Spinning the Wheels of Trust in Much Bigger Systems Certified CMMC Assessors click into place as just another cog in a much larger system that already …

: Hanging at Converge Security and learning about Conway’s Law at the Keynote addresds

: Developing a Rubric to Assess Policies and Procedures for CMMC Compliance People panic when it comes to policy and procedures and CMMC. Rightfully so. Compliance with …

: Can you Engineer Culture in your Systems? As we try to create online communities focused on open learning we have to recognize the troubled …

: Guide to Microsoft's Security and Compliance Rebranding Many people might stare with wide eye confusion at the naming conventions Microsoft has used in …

: Matt Titcombe on the Compliance Trap from the Department of Defense.

: Amira Armond on how inheritance and CMMC works.

: Excited for Kyle Lai’s talk on ISO 2700. This is why I came.

: Cole French a C3PAO on preparing for CMMC.

: Victoria Pillitteri of NIST on future of 171

: Leopold Wildenauer Datacentric approaches to Protecting CUI: CMMC and Zero Trust

: Karen Evans, Why CMMC matters for SMBs.

: Stacy Bostjanick, CMMC Director, at CMMC Day

:

: CCMC: Asset Categorization and Systems Security Engineering Systems security engineering, establishing security by considering the problem, solution, and …

: In reply to us06web.zoom.us/meeting/r… I just RSVPd

: CMMC: Systems Security Engineering and the Cloud In systems security engineering requirements and constraints drive the design choices we make. They …

: CMMC Assessment: In Systems Security Engineering the Environment Drives Evidence From A Systems Security Engineering perspective, the environment will drive the evidence collected …

: CMMC, Asset Inventory, and Systems Security Engineering table, th, td { border: 1px solid; } You cannot protect what you do not know you have. Systems …

: System Security Engineering and CMMC Every organization has a philosophy behind their system security plan. These may range from an idea …

: Evaluating Organizations Seeking Certifcation: Document Based Requirements to Start a Conversation You do not jump out of a plane without first making sure a parachute works. Yet many Organization …

: CMMC and Asset Inventory Asset Inventory will drive your compliance. Whether you rely on the shared responsibility of zero …

:

: Any great conference should close with Amira Armond.

: 5 – A Vision for Software Bill of Materials (SBOM) in the DoD Jason Weiss DoD Chief Software …

: Joy Beland, CISM, CMMC Provisional Assessor / Instructor on insider threat.

: 2:10 – 2:50 – CMMC and Cyber Fraud: Costs of Non-Compliance Nick DeLena - Moderator Partner, DGC …

: Brigadier General (ret.) Blaine Holt Cybersecurity and Cascading Risks: A Dangerous Path to Global …

: Cooey Center of Excellence panel at New England NDIA.

: Stacy Bostjanick at NDIA on CMMC

: Hanging with Ryan Heildorn, Chris Lago, Patrick Perry, and Chris Hughes

: Zero TRUSTS given. Ryan Heidorn, David Lago, Chris Hughes, Patrick Perry

: DoD Thunderdome Program with Dr. Brian Hermann

: DoD Thunder dome Program with Dr. Brian Herman

: Identity is the New Perimeter : An introduction to Modern Security Concepts

: RSVPd Yes to 6th Annual NDIA New England Cyber Event - Zero Trust: Improving the Nation’s …

: Matt Carson on Lesson Learned from a DIBCAC assessment.

: Jacob Horne. Make 171 A framework again

: Ryan Bonner on working with your MSP on CMMC

: Allison Giddens on Signal versus Noise : Understanding Common CMMC Vendor Tactics

: Allison Giddens on Signal versus noise. Understanding Common CMMC Vendor Tactics

: Richard Wakeman on Microsoft’s Acceleration Program

: Richard Wakeman on Microsoft’s Acceleration Program

: Scott Goodwin CMMC is about Cybersecurity, Remember?

: At Summit 7 CS2 CMMC conference

: How to Use the CMMC Level One Assessment Guide Under the Cybersecurity Maturity Model Certification Program a level company who holds federal …

: CMMC Assessment Procedures: When Is Enough Data Enough? What Data Are In Scope? You are assessing against the 171 standard using the CMMC framework. While …

: Quick Reference Guide for CMMC Cyber attacks and the threat of intellectual property threaten our economy and national security. …

: I just RSVPd yes to 3rd Open Security Controls Assessment Language (OSCAL) Workshop

: Categorizing In-Scope FCI Assets using a CMMC Level One Self-Questionnaire CMMC 2.0 did not change much for level one beyond moving to a self-assessment model rather than …

: CyberSecurity Begins By Owning Your Digital Infrastructure “my-url-is from SXSW2003” by tantek is licensed under CC BY-NC If you do not own and …

: Had a wonderful kick off to our CyberDI CMMC classes yesterday. We have certified training classes …

: Announcing our apporved curriculum. Check out the table of contents.

: CMMC Scoping Number 15 in the CMMC infographic series Asset categorization, network diagrams, shared …

: CMMC Infographic CUI Data Transmission Policy Number 14 in the #cmmc infographic series Number …

: CMMC Infographic Number 12: Policies and Procedures What policies and procedures should you hvae as …

: CMMC Number 11: Infographic: CUI Marking Guidance This one more a fail. Too dense with information. …

: Number Nine Dropping Number Ten in the #CMMC 30 Day Infographic Challenge

: Number Eight Number Nine in the Series Talking MFA. Please turn on MFA

: Number Seven Here is number Eight in the series: An intro to FedRAMP

: Number Six Seven in the series: Internal Threats pdf: jgregorymcverry.com/readings/…

: Number Five Number six in the series: Asset Categorization PDF: …

: Number Four Fifth in the series: ABCs of DFARS 7012 pdf: jgregorymcverry.com/readings/…

: Number three Technically I think these last two out of order of publication. I may switch. Prolly …

: Number Two Number three in the series: DFARS Interim Rules

: Number One Number Two in the #cmmc series “Workstations and Controlled Environments pdf: …

: First #cybersecurity infographic about FIPS encryption and #cmmc. Trying to complete a 30 day …

: Asset Categorization and CMMC Many Certified CMMC Professional (CCP)will find the Configuration Management domain one of the …

: Attending the John Ellis Talk on CMMC 2.0 hosted by PrVeil

: Overview of CMMC 2.0 Ben Franklin once quipped, ““When you are finished changing, you are finished.” Nothing could …

: No CMMC Hot Takes. Just Take the Time for Some Slow Reads Inbox overflowing with email invitations to CMMC.20 webinars? Every consultant and software service …

: When Did Small Businesses Become the Enemy of Cybersecurity? When did growth become evil in America? When did we start believing the Government can handle …

: Cybersecurity: Did Bootcamps Break Us or Save Us The cybersecurity awareness and training industry tops a billion dollars in revenue and will only …

: How to Register on the CMMC-AB Class to Sign up for a CCP Class with an LTP Wow that title has a lot of letters. Luckily the registration process on the Cybersecurity Maturity …

:

: We want to transform CyberSecurity Awareness and Training into an active learning process. For far …

: Writing threat scenarios. www.isaca.org/resources…

: What does the NDAA say About CMMC? The NDAA goes deep into developing the Cyber Director role but for those looking to NDAA for …

: You are Doing Cyberscecurity Awareness and Training Wrong Let me tell you how most of my pitch calls go when someone needs instructional design work for their …

: Maturity models come to event logging for fe agencies www.whitehouse.gov/wp-conten… Per …

: It came out of the kiln. Check it folks. A-10 Warthog. A limited signed and numbered 13 run as part …

: Checked in to SENEDIA Defense Innovation Days

: Checking out lasers and CUI enclave policies

: hello

: The Basics of Controlled Unclassified Information When you cut through the marketing hype—and ignore all of the LinkedIn trolls predicting the doom of …

: Looking for a good Risk Awareness training program? Why not start with NIST-SP-800-30? …

: Another great meeting of the CT CMMC Coalition

: A must read —The Coast Guard 2021 Cybersecurity outlook www.uscg.mil/Portals/0…

: CMMC and Ethics At a recent Town Hall, the Cybersecurity Maturity Model Certification Accreditation Board (CMMC-AB) …

: CyberSecurity Begins with Awareness and Training It always comes down to the humans. Even with the best security, the tiniest friction can cause all …

: Roots of CyberSecurity So many people complain bout the forest and trees in the world of cybersecurity. Some look to the …

: Everyone should read this: FEDERAL CYBERSECURITY: AMERICA’S DATA STILL AT RISK …

: How do you use the Discussion Section of the CMMC Assessment Guides? Great post from Alex Johnson on the difference between the discussion and requirements of CMMC …

: Sample AWS Templates for incident respone. GitHub - aws-samples/aws-incident-response-playbooks …

: CMMC Essesntials Mocktini Recipes Moonlight Maze Martini Ingredients 2 oz cranberry juice 1 oz fresh lime juice 5 oz club soda, …

: Leslie Weinstein Joins Southern's CMMC Team as an Academic Advisor When you need quality you have to seek out talent. Southern Connecituct State University announce …

: Overview of Module Zero Kick Off: Do I need a Gap Analysis? Imagine going to the Grand Canyon and paying a tour guide to point out holes in the ground. It …

: Moving from Microsoft Teams to Google Classroom After two iterations of our CMMC Essentials, class we have decided to move away from Microsoft Teams …

: Inventory Matters Inventory matters. As Sarah Spencer CEO of SolonTek notes, “You cannot protect what you cannot …

: Domains, Practices, and Processes of CMMC When you join the CMMC Essentials class at Southern Connecituct State University, you interact with …

: CMMC Blues I’ve got them serious #CMMC blues Hated by every security recluse CEOs blame me for all their …

: RSVP yes to Pins and Pockets for Compliance Heroes

: I just RSVPd yes to CS2 excited to talk to other Higher Education folks about CMMC

: Creating Scenario Activities for CMMC Domains I have had the pleasure of working with Leighton Johnson, Vincent Scott, and Lauren Tucker on our …

: Prequisites for a DIBCAC CMMC Assessment While we await the release of the CMMC assessment process from the AB, we can look to how the …

: Public Act No. 21-119 AN ACT INCENTIVIZING THE ADOPTION OF CYBERSECURITY STANDARDS FOR BUSINESSES Now Law In Connecticut The market for -171 and CMMC compliance just got much bigger in Connecticut. On 2021-07-06 Governor …

: How Long Does a CMMC Assessment Take? I don’t know. You don’t know. Nobody knows. The scoping and final methodology guides …

: Avoid Shady CMMC Training! Enroll in Southern Connecticut State University's CMMC Classes Today! As a life-long public servant, nothing angers me more than swarmy consultants trying to make a quick …

: Controlled Unclassified Information Glossary Need a Controlled Unclassified Information cheat cheet? Getting an acronym induced migraine? Look no …

: Devoping and Testing CUI Scenario Questions Tomorrow in our CMMC Essentials class we will launch the module on Sensitive Data. This means …

: How would you teach the 17 Domains in the CMMC CCP class? Cybersecurity failed because cybersecurity training failed. Full stop. “Fail” by …

: Where do I Begin My CMMC Journey? Stop looking for the easy button. Hang up on those who say, “Turn Key” Then get started, …

: Who took the Cake Marked CUI from the Fridge? CMMC and Data Ownership We have all seen or felt the rage. You go into fridge to grab the gooey cooey chocolate volcano cake …

: Please support the DIMF Kids As part of our CMMC work we hope to create a Higher Education network to ensure we have the …

: Alex Sharpe Joins Our CMMC Essentials Course as an Instructor The learning team we have built for CMMC Essentials blows me away everyday. Just yesterday I spen …

: Course Descriptions of the Classes we Design for CyberDI The official launch of Certified CMMC classes approaches everyday. I am so proud of our time at …

: Mocktini Recipes for CMMC Essential Happy Hours Blah, blah, travel story. Please enjoy these recipes for the Mocktini Happy Hours scheduled every …

: What Practices and Assessment Objectives from CMMC apply to CUI? Sometimes to get a job done you just need Data. In the Cybersecurity Maturity Model Certification …

: An important read from the GAO. A report mandated by the 2020 NDAA on cybersecurity insurance …

: Memorial Day Poem

: We will establish the commercial viability of Wire Additive Manufacturing while collecting baseline …

: The Team: Grisha: FTE Principal Investigator and Project Manager Connecticut Center for Advanced …

: As an SBIR Team we will focus on the following goals: Duplicable Process and Procedures Integrator …

: callback to Note 5 Wire Additive Manufacturing leads to savings. You know what breaks a bunch? Stuff …

: Rewind to Note 4 Instead of subtracting, additive manufacturing works like a 3D printer. Hybrid …

: Back to Note 3 C&C Metals Inc. makes big parts for submarines. Imagine hot metal poruing into a …

: In reply to Note 2 The Team will focus on the immediate commercial applicability of Wire Additive …

: Note 1 Jeff will join the SBIR bid team I have built for C&C Metals inc. The core values of CCAT …

: Spent Friday at Connectict Center for Advanced Technology meeting with Jeff Crandall and Rick and …

: CMMC Process Assessments: Get better at Doing Business Getting lost in the different requirements of the Cybersecurity Maturity Model Certification? Pull …

: Is My Outsourced IT Provider in CMMC Scope? Let’s ask the Department of Defense "Q7: Our Company has outsourced its IT support and systems …

: www.itpromentor.com/best-prac… Good O365 compliance best practices.

: www.itpromentor.com/best-prac… Good O365 compliance best practices.

: I just RSVPd yes to NIST’s Cybersecurity Risk Management Virtual Event Series

: I just RSVPd yes to Microsoft Security and Compliance Ask Me Anything (AMA)

: What is Scope? A Jargon Free Explanation Our current definition of Scope comes from 16th century mid Europe when the firearm spread across …

: What are the different CMMC deadlines? The DFARS Interim Rules set the only known deadline for the Cybersecurity Maturity Model …

: Does CMMC apply to my company? In the Defense contracting world we speak of primes, those who sign the contracts, and subs, …

:

: Universities Starting Their CMMC Journey Yesterday during our weekly Coffee, Me, and CMMC SME breakfast meeting we discussed how University …

: Three Goals of the Cybersecurity Maturity Model Certification Program Yesterday the Office of the Under Secretary of Defense for Acquisition & Sustainment helped put …

: Some great @microsoft folks to follow on Twitter if you live in #cmmc or public sector space: …

: CMMC and the Customer Responsbility Matrix Defense Contract Management Agency says all customer responsibility matrices must be complete prior …

:

: Happy Mother's Day: Dr Tucker Joins the Team Mom’s make us mightier. Mom’s make our military fierce. In uniform and on the homefront …

: Module Five: Shrinking Your Scope Today we launched the next module in out CCP Essentials class. This week we focus on scoping from a …

: I am listening to Wayne Boline and RSVPd yes to CMMC Midwest Conference 2021

: Yes, I will be attending Gentle Introduction to Structural Equation Modeling because I love …

: Leighton Johnson Joins the Curriculum Writing Team I cannot wait to get into a room with people and just hack on curriculum. Learning is such an …

: Launching Module 3 Getting ready to launch our CCP-Essentials Module Three. We have designed our CMMC boot camps so …

: Just RSVPd yes to Cyber Operative Research Scholars Symposium

: “Have the Fire to Carry us deftly to new heights and to the future.” Thank you Micheael …

: What is CMMC? In 2019 the Department of Defense announced the creation of the Cybersecurity Maturity Model …

: My Module One Deliverable In our CCP-Essentials class being offered at Southern Connecticut State University our first module …

: 2021-04-23 My Morning Message to CCP-Essentials Class You always get jitters in our stomach the day of module launch. You worry will everything work? Will …

: 2021-04-22 My Morning Message to CPP-Essentials Gonna re-record yesterday’s movies and remember sound this time. he thing with filming off the …

: Thought of the Day: Maybe I had it wrong. It’s not #Cybersecurity at Scale begins with #UX but …

: Starting my morning off doing some sketch thinking while creating #cmmc courses #instructionaldesign

: I just RSVPd to Summit 7’s yes to Cloud Security and Compliance Series (CS2): Virtual

: OMG OMG look what the #connecticut #CMMC coalition finished: Our #cybersecurity glossary guide: …

: I just RSVPd yes to Connecticut Economic Update 2021 as a proud member of the @cbia

: Why would I even try to search for a better source mateiral on #cui #scope when I can just remix the …

: When you hear the words low, moderate, and high in terms of FedRamp, understand that these …

: Goal of DoDI 8510.01 DoD Risk Management Framework “provides procedural guidance for the …

: DoDI 8510.01 is the implementing policy for the DoD RMF based off of NIST SP-800-37 which …

: FedRamp: Federal Risk and Authorization Management Program was established in 2011 by the Office of …

: Back at the #cmmc #instructionaldesign tasks as I am amazed by the content and knowledge of Rick …

: requirement-security and obligations imposed on an organzation. “This is is what somebody said …

: access federal information system must: 1. defined security & privacy req 2. use state art …

: 800-53 establishes controls for system and orgs 1. Mandatory for federal information systems 2. …

: Spent the last few minutes of sun shine doing a deep dive into security and privacy policy of the …

: I am at #mozfest now. “It’s not just a font, it’s not just a technical solution. …

: Good luck @Sadik Shahadu Your rock as a #mozfest wrangler So proud of the co-founder of the Global …

: Access Control Policy Primary Documents #cmmc #nist Working on the Saturday morning hack for “Access Control Policy in Plain English” …

: Going to the campus in New Haven for first time since March. Kinda want to skip work and spend 1000s …

: Going to the campus in New Haven for first time since March. Kinda want to skip work and spend 1000s …

: Going to the campus in New Haven for first time since March. Kinda want to skip work and spend 1000s …

: Maturation Monday: Why #CyberSecurity Must Begin In School Monday again folks. Time for my weekly call for your organuizations to support the programs we have …

: Our CyberDI team had a wonderful meeting yesterday planning our #CMMC roll out. Yesterday we focused …

: Looking all official we got our partnership badge from the CMMC-AB

: We had a wonderful planning meeting around #cmmc yesterday and how we hope to leverage …

: I just RSVPd yes to Cybersheath’s Cyber Con

: I just RSVPd yes to Practical Advice + CMMC Compliance

: Presenting on #CMMC at Connecticut Commission of Education al Technologies When I say we have to build the culture of #cybersecurity well before the workplace I mean it. I am …

: End of Cybersecurity Month Do I have a System Security Plan? Check! Do I have proof I do the stuff in my plan? Check! Do I have …

: CMMC Maturation Level Begins at One. I think we should start at Grade One. I teach cybersecurity from kindergarten to Sikorsky. By the time we get to protecting the DIB we …

: Did you get your CUI Shot Your #MondayMessage Remember folks we pronounce #CUI as “ C U I” not “cooey” …

: Split Realities of Department of Defense Cost Estimates for DFARS Interim Rules It’s not that the pricing regulations are made up. They are just set in a different reality. …

: What is the impact of #cmmc on Connecticut Small Businesses? As the DFARS Interim rules go into effect this got me thinking about how will small businsses in the …

: Thinking About Flow Down/Up and the CMMC Allison Giddens on LinkedIn: #CMMC #manufacturer #CUI | 12 comments linkedin.comArchiving… …

: Microcredentialing and Cybersecurity I have worked in #OpenBadges and #microcredentialing for years with folks like Doug Belshaw and …

: Black Anvil LLC-NIST800-171-DoD Assessment Methodology.e drive.google.comArchiving… …

: What does the DIB think of CMMC? Let’s discuss with them. - YouTube …

: A Cloud’s Eye View Of Cyber VUCA In Age Of Rapid Change linkedin.comlinkedin.com …

: SPRS - Reference Material sprs.csd.disa.milArchiving… sprs.csd.disa.mil …

: Protecting FCI an CUI (This post is a pre-publication and draft of chapter two of a handbook I and Terry Lehman will …

: Sample Workbook Page from our DFARS Interim This is an example page from the Workbook Terry Lehman and I are working on a handbook for the DFARS …

: Good to see impact CMMC may have in protecting other government and public supply chains: …

: Future of Cyberesecurity: CMMC and the DFARS Interim Rule This post is co-written by Terry Lehman Nation Under Attack As American combat pilots scream across …

: Raw Notes on Katie Arrington on DFARS Interim Rule Katie Arrington on DFARS Interim Rule - YouTube youtube.comArchiving… youtube.com …

: Raw notes on Cybersecurity Maturity Model Certification (CMMC) Part 2: Process Maturity's Role in Cybersecurity Cybersecurity Maturity Model Certification (CMMC) Part 2: Process Maturity’s Role in …

: Raw note on the Capability Maturity Model for Software (Version 1.1, 1993) Capability Maturity Model for Software (Version 1.1) resources.sei.cmu.eduArchiving… …

: Trying to understand capabilities in terms of the CMMC by returning to McKinsey's Global Survey Building organizational capabilities: McKinsey Global Survey results | McKinsey …

: Raw notes An Introduction to the Cybersecurity Maturity Model Certification (CMMC) An Introduction to the Cybersecurity Maturity Model Certification (CMMC) insights.sei.cmu.eduRead: …

: Notes on Bob Metzger comments on DFAR Clause Bob Metzger on the DFARS Interim Rule and Cloud Compliance - YouTube youtube.comRead: …

: Hey folks anyone else getting the bookmark entry field to work. I just get a spin every time I try …

: Enjoy the third episode of Dr Mac’s CyberSecurity Brief. Today we dig deeper into CUI …

: Episode Two of Dr. Mac’s CyberSecurity brief. Join me as I define FCI. This show is licensed …

:

: Announcing My New Cybersecuirty Microcast Welcome to my new microcast on #cybersecurity where I reflect on my journey as a member of the …

: Hello everyone. This is @jgmac1106 here as well. Going to try microblog as a learning and reflection …