Logo video2dn
  • Сохранить видео с ютуба
  • Категории
    • Музыка
    • Кино и Анимация
    • Автомобили
    • Животные
    • Спорт
    • Путешествия
    • Игры
    • Люди и Блоги
    • Юмор
    • Развлечения
    • Новости и Политика
    • Howto и Стиль
    • Diy своими руками
    • Образование
    • Наука и Технологии
    • Некоммерческие Организации
  • О сайте

Скачать или смотреть $150K Cybersecurity Compliance Bombshell: 80% of DOD Contractors Will Be Eliminated by 2026

  • Scalium AI
  • 2025-08-06
  • 3
$150K Cybersecurity Compliance Bombshell: 80% of DOD Contractors Will Be Eliminated by 2026
  • ok logo

Скачать $150K Cybersecurity Compliance Bombshell: 80% of DOD Contractors Will Be Eliminated by 2026 бесплатно в качестве 4к (2к / 1080p)

У нас вы можете скачать бесплатно $150K Cybersecurity Compliance Bombshell: 80% of DOD Contractors Will Be Eliminated by 2026 или посмотреть видео с ютуба в максимальном доступном качестве.

Для скачивания выберите вариант из формы ниже:

  • Информация по загрузке:

Cкачать музыку $150K Cybersecurity Compliance Bombshell: 80% of DOD Contractors Will Be Eliminated by 2026 бесплатно в формате MP3:

Если иконки загрузки не отобразились, ПОЖАЛУЙСТА, НАЖМИТЕ ЗДЕСЬ или обновите страницу
Если у вас возникли трудности с загрузкой, пожалуйста, свяжитесь с нами по контактам, указанным в нижней части страницы.
Спасибо за использование сервиса video2dn.com

Описание к видео $150K Cybersecurity Compliance Bombshell: 80% of DOD Contractors Will Be Eliminated by 2026

January 1, 2026 will eliminate 80% of Department of Defense contractors. Are you prepared for the $150K compliance reality?

Ken Fanger, President of OnTechnology Partners and 30-year cybersecurity veteran, reveals the shocking truth about CMMC (Cybersecurity Maturity Model Certification) and why most MSPs are completely unprepared for what's coming.

Critical Reality Check:
→ CMMC compliance becomes mandatory January 1, 2026 (no extensions)
→ Minimum $150K investment per company for certification
→ 12-month implementation timeline with zero shortcuts
→ 80% of current DOD contractors expected to be eliminated

Why This Impacts Every MSP:
You might think this doesn't apply to you, but if you manage IT for ANY company that supplies parts to major manufacturers (Ford, Boeing, etc.), you're handling DOD subcontractor data without knowing it. One breach and you're facing DOD investigators—your liability waiver won't protect you.

The Real Cost Breakdown:
$30K-$2.3M for third-party audit (based on company size)
Additional implementation costs (security controls, documentation, training)
Ongoing compliance monitoring and maintenance
Ken's $1.3M company is paying $150K minimum

Game-Changing Insights You'll Learn:
→ The "cyber friction" trap that makes security measures counterproductive
→ Why "users are the weakest link" thinking is destroying cybersecurity
→ How "psychological safety" prevents security incidents from being hidden
→ The Atomic Habits approach to cybersecurity implementation
→ Why most compliance programs fail and how to build ones that work

Timestamps:
00:00 - Ken's background and OnTechnology Partners mission
04:04 - CMMC reality: Law passed, January 2026 mandatory
08:31 - The $150K minimum cost breakdown
12:19 - MSP liability trap: Managing DOD data unknowingly
15:53 - Why MSPs are prime targets for cyber attacks
18:14 - The psychology of cybersecurity: Beyond "stupid users"
21:06 - Cyber friction: When security hinders productivity
24:03 - Psychological safety: Creating safe spaces for incident reporting
27:29 - Ken's 90-second passion pitch and book promotion

Resources Mentioned:
"Relax: A Guide to True Cybersecurity" by Ken Fanger
OnTechnology Partners: ontechnologypartners.com
NIST Cybersecurity Framework
Atomic Habits methodology for security implementation
State grant programs (Ohio APEX, NIMS, STS training)

Ken's Revolutionary Concepts:
Cyber Friction: Security measures so inconvenient they get circumvented (like 5-minute computer timeouts forcing teachers to share passwords)
Psychological Safety: Making people feel safe to report security incidents without fear of punishment or being called "stupid"
Human-Centered Security: Designing security systems around human behavior instead of fighting against it
The Three A's: Aware (prevention), Address (during attack), Arise (recovery)

Connect with Ken Fanger:
LinkedIn: [Profile Link]
OnTechnology Partners: [Website]
Book: "Relax: A Guide to True Cybersecurity"
Speaking: AI and cybersecurity presentations nationwide

Комментарии

Информация по комментариям в разработке

Похожие видео

  • О нас
  • Контакты
  • Отказ от ответственности - Disclaimer
  • Условия использования сайта - TOS
  • Политика конфиденциальности

video2dn Copyright © 2023 - 2025

Контакты для правообладателей [email protected]