100: DoD Contractor Cybersecurity requirements - Adam Austin

Описание к видео 100: DoD Contractor Cybersecurity requirements - Adam Austin

💎🙌🚀 30% off Government Contracting Course for businesses wanting more sales and small business contracts 🚀🚀 https://govconeric.com/join Up to $500 FREE videos included with this offer

Book Recommendations:
📖Launch your Government Contracting business: https://govconeric.com/launchbook
📖Suggested Reading: https://govconeric.com/books

🏎️Find Deals in Government Contracting: https://govconeric.com/deals
📈 Join our email list: https://govconeric.com/email
☎️ Capability Statement Templates: https://govconeric.com/templates
🛍️Cameras, Gear, Books https://govconeric.com/gear
👻Cyber/IT contracts opportunities https://govconeric.com/cyber
📷Eric on Instagram & Twitter @ ecoffie
💎 Find out what activities should you be doing over the next 360 Action Plan https://govconeric.com/360
🦆 14 Government contracting organizations to consider joining https://govconeric.com/partners


Programs
🙌SAM Registration + Government Contracting basics course https://govconeric.com/sam
🌎Government Contracting beyond SAM https://govconeric.com/aftersam
📈Becoming a Government Contracting Giant Course : https://govconeric.com/mastery
🗣Contact me: 🗣
Text me for questions: 786-261-0448
Call our office for help: 786-477-0477
Email questions: [email protected]
For immediate assistance: https://clarity.fm/ericcoffie
  / ecoffie  

#mariamartinez #govconalumni #makingagiant

DOD Contractor Cybersecurity Requirements:
1. RESTRICTIONS OF CLASSIFIED INFORMATION
“All information generated by or for a contract that you would not publish to the general public, it can’t be on your website… on LinkedIn. You can’t be taking pictures of it and putting it on Instagram, Facebook. None of that.”
2. THE LIFE CYCLE DETERMINATION OF INFORMATION
We call this the life cycle determination. It helps determine the scope and the footprint of your IT system that has to be protected.
3. MSP AND MSSP
Managed Service Providers (MSPs) ensure that your IT systems are operational. Managed Security Service Providers (MSSPs) perform monitoring and maintain security operations analysis and security operations centers.
4. TARGET AT LEAST ONE LEVEL OF CCMC CERTIFICATION
This includes lawn maintenance crews that mow the grass of the Pentagon or the waste management crews that have contracts to empty dumpsters at Idaho National Labs.

For Full Article Read: https://govcongiants.com/mastermind-m...

📜 Video Chapters
00:00:00 Start
00:01:39 Today's topic: DoD Contractor Cybersecurity Requirements
00:03:05 Let us know the city and industry you are in
00:06:32 Who you are and what do you do? | Totem Technologies & Haight Bey &
Associates
00:11:00 DoD Contractor Cybersecurity Requirements
00:15:44 How do we determine what's controlled and classified information-CUI?
00:19:39 Three-phase methodology for compliance
00:23:05 Who's gonna the implementation?
00:25:24 MSP
00:27:02 What is the objective of the workshop?
00:28:18 Do you recommend a particular network or system?
00:32:02 Must we be certified before pursuing an opportunity?
00:34:41 Rewarming the session
00:35:43 How about CompTia Security +ce?
00:36:08 How long does this actually take?
00:37:29 Life-cycle determination
00:42:21 Where can we get the information on the monthly cohorts?
00:44:20 Risk Assessment Template
00:46:56 Real costs for a small business to become compliant with the CMMC
00:51:03 Using cloud services | Safe Site
00:54:02 Separation of duties
00:55:19 What's about this e-book?
00:56:54 If you are an MSP or MSSP that utilizes contractors overseas, are there
restrictions on where these contractors reside/operate?
00:59:34 How much to secure 5 computers for a smaller office instead of 20?
01:02:22 What's the policy statement?
01:04:38 Are you willing to partner with newbies to enable growth?
01:05:19 Can you go through the layout of CMMC 1, 2, and 3 for everyone
01:07:02 How many sessions are in the workshop?
01:08:05 It seems complex but we've built a methodology and a roadmap
01:09:27 How do I choose an MSP?
01:12:12 Do insurance policies cover them?
01:12:52 Can PCI DSS certification help with the cyber security government?
01:13:30 Why do you think businesses don't have backups and encryption, which
helps big time with ransomware
01:15:24 Connect on LinkedIn
01:16:58 Can you restate what is not allowed on the website?
01:18:31 Are there any workload products for CMMC like there was for Hippa?
01:19:49 Wrapping Up

Комментарии

Информация по комментариям в разработке