How to Get Your Security Aligned with the CMMC

Katie Arrington, the acting CIO for the Department of Defense, is fiercely determined to enforce the requirements of the Cybersecurity Maturity Model Certification (CMMC), considering it a primary defense against China’s cyber incursions – and one she expects the Defense Industrial Base (DIB) to meet.
 
Among best practices suggested for achieving CMMC is maintaining a comprehensive, accurate asset inventory, because it defines the borders of an organization’s networks. This is often difficult to create - asset ecosystems are growing, vulnerability gaps are easy to miss, and compiling accurate reports on a tight budget is challenging. Having such an inventory requires continuous assessment, as IT ecosystems are in constant flux. It is be useful for other compliance requirements, such as meeting Peripheral Component Interconnect (PCI) communications standards or HIPAA privacy standards.
 
Join us as thought leaders discuss how to implement the CMMC framework in a simple, structured, and secure way, making management as easy as one, two, three.
 
Learning Objectives
  • Outline the ways that your agency’s system security plan and plan of action – with milestones – can work together and reinforce each other
  • Identify how to create the scope and security requirements of your agency’s attack surface using an accurate asset inventory
  • Review how to use policies and procedures as the foundation for CMMC compliance
  • Delineate other ways to utilize your agency’s asset inventory to meet additional regulatory and policy requirements

Speaker Details

Dave Scher, Deputy Chief Information Officer, MITRE

Dave Scher
Deputy Chief Information Officer,
MITRE

 

Abdul Dost

Managing Dorector of Infrastructure,

MITRE

 

David Bakin, Chief Information Security Officer, Peraton

David Bakin
Chief Information Security Officer,
Peraton

 

John Taggart, CMMC Lead, Booz Allen Hamilton

John Taggart
CMMC Lead,
Booz Allen Hamilton

 

Michael Kennedy, Moderator & Contributing Editor, FedInsider

Michael Kennedy
Contributing Editor,
FedInsider

Event Topic

Cybersecurity, IT

Relevant Audiences

All State and Local Government, All Federal Government, National Guard, Air Force, Coast Guard, Navy, City Government, County Government, Municipalities, State Government, Central Intelligence Agency, Department of Agriculture, Department of Commerce, Department of Defense, Department of Energy, Department of Health and Human Services, Department of Homeland Security, Department of Housing and Urban Development, Department of Interior, Department of Justice, Department of Labor, Department of State, Department of Transportation, Department of the Treasury, Environmental Protection Agency, Equal Employment Opportunity Commission, Federal Aviation Administration, Federal Communications Commission, Food and Drug Administration, Federal Emergency Management Agency, General Services Administration, Government Accountability Office, National Aeronautics and Space Administration, National Institute of Health, National Security Agency, U.S. Agency of International Development, U.S. Census Bureau, U.S. Office of Personnel Management, U.S. Postal Service, Veterans Affairs

Other Agency

Office of the President (includes OMB), Other Federal Agencies, Judicial Branch Agencies, Foreign Governments/Agencies
How to Get Your Security Aligned with the CMMC
Event Type
Virtual / Online
Event Subtype
Webinar / Webcast
When
Wed, Jul 09, 2025 | 2:00 pm - 3:00 pm ET
Registration Cost
Complimentary
Website
Click here to view event website
Sponsors
Carahsoft Technology Corp.