CMMC regulation was born from recognition that the defense industrial base’s cyber security attack surface isn’t siloed, it’s connected. Subcontractor networks and their employees, third-party applications and anything else that touches a prime contractor’s systems present cyber risk, leaving sensitive data as vulnerable as the weakest link in the prime’s ecosystem.
This webinar will cover why subcontractors are usually the first point of attack in the supply chain, common ways they are attacked and the value of assessment. Most importantly, we will provide guidance on how prime contractors can lead improvements in supply chain protection through continuous monitoring.