Federal Contractors’ Evolving Cybersecurity Requirements
Format: Live webinar (on-demand recording available on December 10, 2020)
Duration: Approx. 90 minutes
Instructor: Adam Austin, Totem Technologies
NCMA Certifications: 1.5 CPEs
APTAC Certifications: 0.75 ATC
APTAC BOK: D.14 Cybersecurity
*Your registration includes access to the on-demand recording.
We know that the CMMC is going to be a mandatory element for anyone who wants to work with the Department of Defense. Knowing what is required and needed for your company is as important as knowing your proprietary and confidential information is safe from unscrupulous hackers or inadvertent mishaps. In this course, you will learn about the different cybersecurity requirements for DoD contractors, what they mean, and much more.
After taking this course, you will:
- Understand the regulatory drivers behind federal contractor cybersecurity requirements.
- Become acquainted with the 17 basic protections for Federal Contract Information (FCI) required by FAR clause 52.204-2.
- Recognize the advanced protections for Controlled Unclassified Information (CUI) required by DFARS 252.204-7012, 7019, 7020, and 7021.
- Understand the key critical decisions required of an organization to properly implement a compliant cybersecurity program.
- Gain insight into what the Cybersecurity Maturity Model Certification (CMMC) is, and how it differs from current compliance requirements.
- Have the ability to differentiate between the NIST SP 800-171 Controls and the CMMC Level 3 Practices.
Meet Your Instructor:
ADAM AUSTIN has a decade of experience securing classified and HIPAA-environment US Government IT systems, having worked with NASA, the Centers for Medicare and Medicaid (CMS), and all branches of the Department of Defense. Adam holds a Master’s in Information Assurance from Capitol Technology University, and is an ISACA Certified Information Security Manager (CISM) and Certified Information Systems Auditor (CISA). Adam’s goal is to leverage his experience and education to help small businesses implement affordable risk-based cybersecurity programs.