Taking the Guesswork Out of CMMC Compliance: Mobile Security Edition

Presented by

Jim Kovach, Zimperium; Brian Chapman, Zimperium; JT Keating, Zimperium; Steve Kruse, Zimperium; David Mihelcic, DISA (rtd)

About this talk

Organizations of all sizes in the Defense Industrial Base (DIB) are in the process of preparing to comply with the Cybersecurity Maturity Model Certification (CMMC) 2.0, which requires DIB members managing Controlled Unclassified Information (CUI) to undergo third-party assessments based on all 110 practices of the National Institute of Standards and Technology (NIST) Special Publication (SP) 800-171. Mobile device security is a critical topic of discussion among those in the DIB who are assessing and strategizing about how to address their existing endpoint security. In particular, there are specific requirements around incorporating mobile device usage restrictions, scanning a device for software updates and patches, and conducting operating system (OS) integrity checks within their current cybersecurity mix. As many organizations race to meet these updated CMMC standards, they will all but certainly fall short if they neglect to incorporate mobile threat defense (MTD) as part of their mobile device security controls. Join us for an in-depth webinar discussion as we break down in detail which standards will require an MTD or mobile application security solution in order to help you take the guesswork out of meeting these important compliance mandates.

Related topics:

More from this channel

Upcoming talks (0)
On-demand talks (41)
Subscribers (3789)
As the only mobile security platform purpose-built for enterprise environments, Zimperium provides security solutions for mobile devices and applications, ensuring safe and secure access to critical data. Our patented, on-device, machine learning-based security provides visibility and protection against known threats and zero-day attacks, and our mobile application protection suite combines comprehensive in-app protection with centralized threat visibility. Here we share resources and information related to our mobile threat research, and best practices for securing mobile devices and mobile applications in the context of the modern threat landscape.