Truth from the CMMC Trenches
This presentation delves into the new government requirement for C.M.M.C. for all vendors and identifies the various ways to obtain certification.
Due to the increasing threat of hackers and cybercrime, federal legislation has been passed to regulate data, and states are following suit with upcoming legislation. Therefore, all government vendors and contractors should understand the controls in NIST800-171 and how it works in the C.M.M.C. program. They should also recognize the different levels of certification and the defined timeline. Most importantly, they must know the necessary steps to obtain vendor certification. If vendors wish to bid on DoD contracts in the future they must complete C.M.M.C.


Cyber Security and the Future of IT
This presentation reviews the challenges of cyber security and how federal and state legislation is regulating and shaping the future of IT.
We all face challenges in keeping our computer systems, networks, and data safe. Every time we log on to our computers, we are threatened by viruses, worms, spyware, adware, phishing, rogue security software, and much more. But perhaps the most dangerous risk to our cyber security comes from the Dark Web in the form of ransomware attacks. In an effort to protect against cyber attacks, legislation is already in effect in Europe, and in the U.S. State-level legislation is in the works as well. California has passed a new law that will affect banking across the rest of the country. Currently, the Department of Defense (DoD) is implementing the latest Cyber Security Maturity Model Certification (C.M.M.C.) that will require certification before any company can bid on a DoD contract. This new requirement affects 300,000+ current DoD suppliers. As a result, the future of IT departments will continue to change, and the challenges with talent and labor shortages will last well into the future.
Biography
Mr. Shaw has operated in the server-based computer industry since his graduation from Columbia College. For twenty years, he orchestrated a thriving cloud computing business which he built from start-up and took nationwide. This business served small- to medium-sized businesses and software companies in a wide variety of fields, including accounting, legal, financial, human resource staffing, lawn care, physical therapy, radiology, religious and state organizations and more. His company is versed in national and international cyber security, including successfully assisting an international business attorney with data security challenges resulting from her travel to third-world countries. Five years ago, Mr. Shaw started Five 9s Consulting in order to help fulfill the growing demand for experienced cyber security professionals. Since starting Five 9s, Mr. Shaw has been in high demand for speaking engagements and I.T. consulting services. To learn more about Mr. Shaw and Five 9s Consulting, contact him at wshaw@five9sconsulting.com or visit his website at www.five9sconsulting.com.
Need to talk, call me at: (573)-219-1948.
