Back to Search Begin New Search Save Search Auto-Notify
Zscaler CMMC Webinar Series
The DOD’s Cybersecurity Maturity Model Certification, or CMMC is designed to protect its Supply Chain partners from cyber-attacks. CMMC will require any company providing a product or service to the DOD, directly, or indirectly, to achieve CMMC certification by 2025, with some contracts already calling out CMMC as a requirement. This will impact roughly 300,000 companies and over $400B of DOD contract awards annually. View this two part...
Add Favorite
7 Steps To Winning FED GOV Q4 Contracts
Join Jennifer Schaus & Associates for a special webinar on 7 STEPS TO WINNING Q4 CONTRACTS. Please see our website for our full webinar schedule. All webinars are recorded and complimentary. Recordings are posted on our YouTube channel and website once complete. Thank you!
Add Favorite
COVID-19 - Understanding & Leveraging T...
Send us your questions in advance to Hello@JenniferSchaus.comQuestions are ANONYMOUS.-----------------------------------------Join JSchaus & Associates for the 4th in a multi-part series of special webinars covering the impact of the novel COVID-19 Corona Virus. Webinar is complimentary and will be recorded. Send us your questions (anonymous) now/in advance to Hello@JenniferSchaus.com OUR CONFIRMED PANELIST INCLUDE:Mark Ries - LEGALKevin J...
Add Favorite
How to Prepare for CMMC Mandate
RegScale and Carahsoft hosted this webinar to help you and your cybersecurity team prepare for DoD’s mandated Cybersecurity Maturity Model Certification (CMMC) program. Under the CMMC program, all Defense Industrial Base (DIB) contractors will be required to implement certain cybersecurity protection standards and perform self-assessments or obtain third-party certification as a condition of DoD contract award to better protect controlle...
Add Favorite
Securing Mission-Critical Communication...
Defense industries deal with sensitive information that, if leaked, could compromise national security. Want to enable commanders and ground operators to exchange classified information securely? A self-hosted, air-gapped environment is the way to go! Air-gapped collaboration tools ensure a high level of security. They isolate sensitive data from unsecured networks — which empowers users to communicate securely without compromising the...
Add Favorite
Back to Search Begin New Search