Hi [[ session.user.profile.firstName ]]

CMMC Tips Part 2: Levels 1 and 2 and COTS

Where NIST 800-171 was one size fits all, CMMC has five levels of possible maturity that a company can achieve. The lower levels provide administrative relief compared to prior regulations.
Recorded Apr 28 2021 21 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Amy Williams and Chris Adkins, BlueVoyant
Presentation preview: CMMC Tips Part 2: Levels 1 and 2 and COTS

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • The latest on the M365 E5 Security Licensing Journey Aug 25 2021 1:00 pm UTC 52 mins
    Micah Heaton (BlueVoyant) and David Branscome (Microsoft) - hosted by Robert Hannigan (BlueVoyant)
    The latest on the M365 E5 Security Licensing Journey
  • Your greatest cybersecurity risk is your weakest link: Third Party Cyber Risk Aug 23 2021 1:00 pm UTC 46 mins
    Amy Williams, Tom Conway - Director, Federal Business Development, Thomas Lind - Strategic Intelligence
    CMMC regulation was born from recognition that the defense industrial base’s cyber security attack surface isn’t siloed, it’s connected. Subcontractor networks and their employees, third-party applications and anything else that touches a prime contractor’s systems present cyber risk, leaving sensitive data as vulnerable as the weakest link in the prime’s ecosystem.
    This webinar will cover why subcontractors are usually the first point of attack in the supply chain, common ways they are attacked and the value of assessment. Most importantly, we will provide guidance on how prime contractors can lead improvements in supply chain protection through continuous monitoring.
  • BlueVoyant Reveals Cybersecurity Weaknesses within Defense Industrial Base Aug 19 2021 5:00 pm UTC 56 mins
    Austin Berglas, Amy Williams and Thomas Lind III
    The latest BlueVoyant strategic threat intelligence report focuses on the continued challenges associated with securing the Defense Industrial Base. We analyzed hundreds of defense contractors, to identify clear patterns as well as the steps needed to improve their security posture.They will discuss key findings, and more, in a highly informative session that will delve into the detail of the report and discover more about the results.
  • A deep dive into Microsoft Security Aug 18 2021 2:00 pm UTC 49 mins
    Micah Heaton, Robert Hannigan and Adrian Grigorof
    BlueVoyant's deep dive into Microsoft Security - the first part in the Microsoft series
  • Today's Cyber Crime Pandemic and what to do about it Aug 18 2021 10:00 am UTC 62 mins
    Robert Hannigan
    Robert Hannigan joins the ISF Chairman and guests to discuss Cyber Crime
  • Defense Supply Chain Under Cyber Siege Aug 17 2021 5:00 pm UTC 40 mins
    Chairman of the Joint Chiefs of Staff, retired Admiral Michael Mullen, and BlueVoyant CEO, Jim Rosenthal.
    We’re incredibly honored to have had unique perspectives from former Chairman of the Joint Chiefs of Staff, retired Admiral Michael Mullen, and BlueVoyant CEO, Jim Rosenthal.

    Watch our revealing chat “The Defense Supply Chain Under Cyber Siege” about the continuing challenges of securing the Defense Industrial Base and the findings of our latest research report.
  • Secure your Edge with BlueVoyant MDR and Microsoft Defender for Endpoint Aug 16 2021 1:00 pm UTC 60 mins
    Micah Heaton & Owen Allen
    BlueVoyant’s Managed Detection and Response (MDR) service, powered by Microsoft Defender for Endpoint, enables you to get protected quickly and benefit from the always-on security operations coverage you need in today’s dangerous, highly interconnected world. In this webinar you’ll hear how we’ve combined the power of Microsoft Defender for Endpoint with BlueVoyant’s elite security operations team to work on your behalf 24x7 to identify, investigate and remediate today’s sophisticated, advanced and unrelenting cyber attacks. See how to maximize your protection by augmenting the device detection from Defender for Endpoint with a team of dedicated and trained Security Analysts. Join us as we describe how our joint solution protects user identities, devices, and data against Zero-Days, advanced attacks, and data breaches while providing you additional peace of mind. High-level Agenda:

    · Gain insights on endpoint security challenges in today’s highly connected world

    · Learn about the power of Microsoft Defender for Endpoint + managed security operations

    · Discover how businesses can leverage their existing investment to deploy this service

    · Hear implementation use cases and real-world results

    · Identify next steps to bring your endpoint security to the next level
  • CMMC Security for All: A Holistic Approach Aug 13 2021 5:00 pm UTC 28 mins
    Amy Williams and Chris Adkins
    The term ‘supply chain’ implies a straightforward linear process. But the reality of the Department of Defense (DoD) network is a tangled web of connected companies, big and small. And currently, the biggest attack targets are those smaller businesses, who have the leanest budgets. We will discuss:

    · Why cyber attack strategies have recently shifted to smaller companies
    · How to improve security in companies with smaller budgets
    · What actions SMB's in the Defense Industrial Base can take, in the short and longer term
  • 3rd Party Risk for Prime Contractors and Mitigation Steps Aug 12 2021 5:00 pm UTC 21 mins
    Amy Williams and Chris Adkins, BlueVoyant
    The DoD is looking for help from Prime Contractors. We will discuss why supply chain cybersecurity management is challenging and provide a demonstration of BlueVoyant’s offering to improve visibility.
  • CMMC Level 3: Description and Tips for Fast Tracking Aug 11 2021 5:00 pm UTC 21 mins
    Amy Williams and Chris Adkins, BlueVoyant
    Level 3 is the most commonly requested compliance level and is the most like prior regulations. We will offer some tips and tricks for getting organized quickly and being best prepared for the assessors.
  • CMMC Tips Part 2: Levels 1 and 2 and COTS Aug 10 2021 5:00 pm UTC 21 mins
    Amy Williams and Chris Adkins, BlueVoyant
    Where NIST 800-171 was one size fits all, CMMC has five levels of possible maturity that a company can achieve. The lower levels provide administrative relief compared to prior regulations.
  • What is Cybersecurity Maturity Model Certification (CMMC)? Aug 9 2021 5:00 pm UTC 19 mins
    Amy Williams and Chris Adkins, BlueVoyant
    The new Department of Defense cybersecurity regulation is here. What is it and where do you fit in?
  • Modern SOC & the optimization of Microsoft Security Aug 5 2021 1:00 pm UTC 60 mins
    Milan Patel (Head of Managed Services) & Micah Heaton (Director of Microsoft Security Solutions)
    Modern SOC & the optimization of Microsoft Security
  • M365 Security Solutions: Access & Security on the Endpoint Aug 4 2021 1:00 pm UTC 61 mins
    Micah Heaton - Director of Microsoft Security Solutions
    M365 Security Solutions: Access & Security on the Endpoint
  • Migrating to a cloud based SIEM: Microsoft Azure Sentinel and pitfalls to avoid Aug 3 2021 10:00 am UTC 41 mins
    Micah Heaton, Robert Hannigan and Adrian Grigorof
    Watch our LinkedIn Live Session on Migrating to a cloud based SIEM: Microsoft Azure Sentinel and pitfalls to avoid
  • Microsoft Security: Information Protection in the Microsoft Cloud Jul 29 2021 1:00 pm UTC 41 mins
    Micah Heaton, Robert Hannigan and Owen Allen
    How can you ensure that remote working doesn’t compromise your data control? By using the latest thinking from Microsoft, BlueVoyant is helping customers simplify compliance and reduce risk. Join Micah Heaton, Robert Hannigan and Owen Allen in the latest Microsoft webinar series. We take a closer look at what information protection means, the need for data governance and how Microsoft’s approach to information protection means it’s possible to minimise risk without affecting productivity.

    The webinar will give insights into best practice when building a data strategy and how Microsoft tools can help in areas such as:

    - keeping up with industry regulations and standards
    - identifying and mitigating insider risks
    - scaling data protection with automation
    - cost saving

    We will also cover record management, data classification and how Microsoft can extend the protective solution beyond the cloud perimeter.
  • Third-party risk dilemma: how secure is secure? ​ Recorded: Jul 26 2021 38 mins
    Phil Venables, Goldman Sachs Bank; Debora Plunkett, Board Director, BlueVoyant; Jim Penrose, COO, BlueVoyant;
    Third-party cyber risk is fast becoming the defining cybersecurity challenge of our time.

    That’s why we’ve surveyed 1500 CIOs, CISOs and CPOs to understand the scale and scope of third-party cyber risk, the impact it is having, and the way cyber risk professionals are approaching and mitigating the issue.

    80% revealed they have suffered a third-party related breach
    29% admitted they wouldn’t know if a cyber risk emerged in a third-party vendor
    77% do not monitor their entire supply chain

    Our panel will discuss the research and reveal ways your organization can gain more control over your cyber risk management program.
  • Threat Detection Thursday: Breaking all the rules! Recorded: Jul 22 2021 59 mins
    Owen Allen and Mike Scutt
    Threat Detection Thursday: Threat Hunting Edition, Mike Scutt, Head of Advanced Threat Detection, will break down detection methodology and guide you through implementing a robust, low-noise detection strategy. This session will provide an overview of detection types, applicability, and rule aggregation to help you better focus on events that matter. If you can't tell your RBA from your UBA, join us on our journey to detection excellence!
  • Gain Control of your Cyber Risk Recorded: Jul 22 2021 2 mins
    Robert Hannigan Chairman, BlueVoyant International
    Robert Hannigan shares his thoughts on the cyberrisks of the supplychain and where the first line of defence needs to be.
  • CMMC Security for All: A Holistic Approach Recorded: Jun 3 2021 28 mins
    Amy Williams and Chris Adkins
    The term ‘supply chain’ implies a straightforward linear process. But the reality of the Department of Defense (DoD) network is a tangled web of connected companies, big and small. And currently, the biggest attack targets are those smaller businesses, who have the leanest budgets. We will discuss:

    · Why cyber attack strategies have recently shifted to smaller companies
    · How to improve security in companies with smaller budgets
    · What actions SMB's in the Defense Industrial Base can take, in the short and longer term
BlueVoyant

BlueVoyant Company description


At BlueVoyant, we recognize that effective cybersecurity requires active prevention and defense across both your organization and supply chain. Our proprietary data, analytics and technology, coupled with deep expertise, works as a force multiplier to secure your full ecosystem.

Accuracy. Actionability. Timeliness. Scalability.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: CMMC Tips Part 2: Levels 1 and 2 and COTS
  • Live at: Apr 28 2021 2:30 pm
  • Presented by: Amy Williams and Chris Adkins, BlueVoyant
  • From:
Your email has been sent.
or close