Categories
Business Technology CMMC Compliance

Why You Should Partner with an Expert to Prepare for CMMC 2.0

The Cybersecurity Maturity Model Certification (CMMC) 2.0 is a comprehensive framework that aims to protect the controlled unclassified information (CUI) of the Defense Industrial Base (DIB) from frequent and increasingly complex cyberattacks. Failure to meet the controls within the CMMC 2.0 standard and gain a certification can eliminate your ability as a firm to be […]

Categories
Business Technology CMMC Compliance

Navigating the Challenges of CMMC Certification for Defense Contractors

Becoming compliant with Cybersecurity Maturity Model Certification (CMMC) is expected to become a requirement in March of 2024 for government contractors handling Federal Contract Information (FCI) or Controlled Unclassified Information (CUI) / Covered Defense Information (CDI). Attaining this certification, designed to enhance cybersecurity standards within the Defense Industrial Base, can be a complex and challenging process. […]

Categories
Business Technology CMMC Compliance

Takeaways from the CMMC Rule Publication

The Department of Defense’s CMMC program has taken a giant step ahead with the publication of the CMMC Proposed Rule on December 26th in the Federal Register . This begins a 60-day comment period, with the expectation that CMMC will begin to appear in contracts by late 2024 or early 2025.  While the proposed rule […]

Categories
CMMC Uncategorized

It’s a win-win for Maryland small businesses: Lower taxes and cybersecurity

As we make our way through the summer and into the final quarters of the year, you might be looking at all the IT projects you have left to tackle and figuring out how to make your IT budget dollars go farther.  In Maryland, that opportunity exists through the Cyber Tax Credit, with the added […]

Categories
CMMC Compliance

CMMC 2.0

CMMC 2.0 What are the changes to CMMC In January of 2020, the DoD issued a new standard that the Defense Industrial Base (DIB) needed to adhere to be eligible to bid on ANY contract with DFARS requirements.  This standard known as the Cybersecurity Maturity Model Certification or CMMC, would become the law of the […]

Categories
CMMC Summit

C3PAO for CMMC

We have been talking with CMMC maturity Level 1 and Level 3 seekers for months now, and one thing we keep hearing is, “I am looking for a C3PAO to do our CMMC audit.” My immediate reaction is, “Oh, so you ready for the audit? You have all 110+ controls covered, with 300 or so […]

Categories
Business Technology CMMC

CMMC Update and Emergency Action by the DoD

The CMMC is making progress towards training new CMMC auditors. With the first round of trainees through, they are gearing up to begin the next round. This is an exciting time, and recently we have seen an emergency action that is now included in the finalization of the DFARS rules change.  Approved by the Office […]

Categories
CMMC Uncategorized

CMMC: The Journey So Far

Let the Games Begin After its announcement in January 2020, we have been anxiously awaiting more information on the implementation of the CMMC standard. Summit Business Technology has been on top of every announcement and preparing for the application process to become a C3PAO certified auditor. Beginning June 20th, the CMMC board began accepting applications. […]

Categories
CMMC Summit

The 5 P’s of CMMC: Why Wait And See Is A Bad Mentality

It is now June, and we are still waiting on the finalization of the audit process and training of the Cybersecurity Maturity Model Certification (CMMC) auditors. This is one of the final steps before members of the Defense Industrial Base (DIB) can begin the audit process, and eventually receive the coveted CMMC certification level required […]

Categories
Business Technology CMMC IT Support Security Awareness

Offset The Cost of Your CMMC Assessment

The Cybersecurity Maturity Model Certification (CMMC) is redefining the cybersecurity requirements for all companies that work with the Department of Defense (DoD) in any capacity. This means that these companies will need to take the time to analyze their cybersecurity solution and compare it to the listed requirements for each certification level—if you don’t have […]