Cybersecurity Updates

Cybersecurity: Understanding, Complying, and Implementing the Cybersecurity Maturity Model Certification (CMMC) 2.0 as Part of a DoD-Wide Strategy for Readiness

Cybersecurity: Understanding, Complying, and Implementing the Cybersecurity Maturity Model Certification (CMMC) 2.0 as Part of a DoD-Wide Strategy for Readiness

The Defense Industrial Base (DIB) is the target of increasingly frequent and complex cyberattacks. To protect American ingenuity and national security information, the DoD developed CMMC 2.0 to dynamically enhance DIB cybersecurity to meet evolving threats and safeguard the information that supports and enables our warfighters. Learn how the progression of CMMC 2.0 program requirements and other DoD initiatives will be implemented through the acquisition and contracting process and what steps industry needs to take for cyber-readiness and compliance.

USTRANSCOM Cybersecurity Newsletter

I am sure most of you are already aware of the potential threats of Russia invading Ukraine. CISA and DHS have assessed there is a high likelihood that cyberattacks will be part of Russia’s playbook if they choose to invade. This out-of-cycle newsletter is being sent...

CISA Issues “Shields Up” Advisory

NDTA Members, Due to increasing geopolitical tensions, the Department of Homeland Security’s (DHS) Cyber and Infrastructure Security Agency (CISA) has issued a “Shields Up” advisory (www.cisa.gov/shields-up). The Defense Industrial Base is one of 16 official United...

Responding to the Presidential Executive Order on Cybersecurity

Responding to the Presidential Executive Order on Cybersecurity

Microsoft is proposing a session on the Executive Order on Improving the Nation’s Cybersecurity (14028). This session will discuss how to better understand and accurately respond to the EO and rapidly deploy Zero Trust security principals. We also plan to discuss the DoD’s cybersecurity maturity model certification (CMMC) program to help organizations understand how they need to prepare for these requirements and how they correlate to the tools used to meet the cybersecurity EO.

Share This