CMMC public
[search 0]
Mai Mult
Download the App!
show episodes
 
Artwork

1
CMMC Compliance Guide

CMMC Compliance Guide

Unsubscribe
Unsubscribe
Zilnic+
 
Our experiences inspired the creation of The CMMC Compliance Guide Podcast and its accompanying resources. The podcast began as a way to share what we learned through real-world challenges—like helping that aerospace machine shop—and to provide accessible education for businesses navigating DoD cybersecurity requirements. The CMMC Compliance Guide Podcast breaks down complex topics like NIST 800-171 and CMMC into actionable, easy-to-understand steps. Whether you’re a subcontractor struggling ...
  continue reading
 
https://petronellatech.com and our sponsor at https://compliancearmor.com present Cybersecurity and Compliance with Craig Petronella Podcast. Learn the latest on the CMMC 2.0, DFARS, NIST, HIPAA, GDPR, ISO27001 and more. Learn about the most current IT security threats in ransomware, phishing, business email compromise, cybercrime tactics, cyberheist schemes, and social engineering scams, as well as tips and tricks from leading professionals to help you prevent hackers from penetrating your ...
  continue reading
 
Loading …
show series
 
ATX Defense generated the content and narration for this episode using Google's NotebookLM and this description using Gemini Advanced. The speakers are Artificial Intelligence. The source material for this episode is a modified version of ATX Defense’s System Security Plan that removes operational details but retains key takeaways. This SSP success…
  continue reading
 
Submit any questions you would like answered on the podcast! In this thought-provoking episode of the CMMC Compliance Guide Podcast, Brooke and Austin Justice tackle a question that’s top of mind for many small and medium-sized businesses in the defense supply chain: Is CMMC a necessary defense in a digital war, or an unreasonable burden on SMBs? K…
  continue reading
 
ATX Defense generated the content and narration for this episode using Google's NotebookLM and this description using Gemini Advanced. The speakers are Artificial Intelligence. The source material for this episode is an ATX Defense whitepaper about secure CMMC enclaves for subcontractors. CMMC compliance is a major hurdle for subcontractors in the …
  continue reading
 
Submit any questions you would like answered on the podcast! In this in-depth discussion, Austin and Brooke Justice from Justice IT Consulting break down the critical updates and challenges associated with the new 48 CFR proposed rule for CMMC 2.0 compliance. Learn about the key differences from previous regulations, the most significant hurdles Do…
  continue reading
 
Submit any questions you would like answered on the podcast! Are you a DoD contractor navigating the complexities of the 32 CFR Rule? In this video, we break down the key aspects of the 32 CFR Rule, explaining how it impacts defense contractors and the steps you need to take to stay compliant. Whether you're new to the defense industry or need a re…
  continue reading
 
Submit any questions you would like answered on the podcast! In this special episode, we take you behind the scenes to explore the origin story of the CMMC Compliance Guide Podcast. Join hosts, Austin and Brooke Justice as they share how the podcast began, its mission to help defense contractors navigate the complexities of CMMC compliance, and wha…
  continue reading
 
Submit any questions you would like answered on the podcast! In this episode, Brooke and Austin Justice dive into the latest CyberAB townhall update, sharing key insights for defense contractors. Stay informed on the latest CMMC developments, compliance changes, and how they could impact your business. Whether you're navigating CMMC 2.0 or simply t…
  continue reading
 
Submit any questions you would like answered on the podcast! In this special episode of the CMMC Compliance Guide Podcast, hosts Brooke and Austin Justice are joined by Chris Silvers, one of less than 100 individuals officially certified as both a Certified CMMC Provisional Assessor and Instructor. With over 25 years of cybersecurity experience, Ch…
  continue reading
 
Submit any questions you would like answered on the podcast! In this episode, Brooke and Austin Justice dive into the latest CyberAB townhall update, sharing key insights for defense contractors. Stay informed on the latest CMMC developments, compliance changes, and how they could impact your business. Whether you're navigating CMMC 2.0 or simply t…
  continue reading
 
ATX Defense generated the content and narration for this episode using Google's NotebookLM and this description using Gemini Advanced. The speakers are Artificial Intelligence. The source materials for this episode are: Department of Homeland Security Review of the Summer 2023 Microsoft Exchange Online Intrusion and Google Workspace: A More Secure …
  continue reading
 
ATX Defense generated the content and narration for this episode using Google's NotebookLM and this description using Gemini Advanced. The speakers are Artificial Intelligence. The only source material is ATX Defense's Google Workspace CMMC Level 2 Implementation Guide located at https://cmmcguide.atxdefense.com Join us as we take a deep dive into …
  continue reading
 
The content for this episode was generated using Google's NotebookLM and voiced by artificial intelligence. The only source material is the CMMC Final Rule. This episode is an essential introduction to the CMMC Final Rule for small businesses. We cover everything from self-assessments and POA&Ms to the role of C3PAOs. Get practical advice on implem…
  continue reading
 
Lunch and Learn Presentation Hosted by Craig Petronella. Video Available at https://youtu.be/OIuxhkb-Njk - Imagine a world where your family's online interactions are as secure as fort Knox, yet as open as a summer's day in the park. That's the reality we're aiming for in this gripping discussion on digital safety. In this episode, we illuminate th…
  continue reading
 
Unlock the mysteries of cybersecurity and learn to navigate the complexities of compliance with expert insights from Bala Ramaya, CEO of ISSquared. This episode takes you on a journey through the evolving world of managed service providers, shedding light on how IA Squared transformed itself into a cybersecurity force. Bala not only shares the comp…
  continue reading
 
Unlock the secrets to ironclad API security with Jeremy Snyder of Firetail as we navigate the often treacherous terrain of digital safety. Peering into the murky depths of API exploitation, Jeremy brings clarity to how Firetail's cutting-edge tools not only bolster developers' efforts in constructing impenetrable APIs but also stand guard, thwartin…
  continue reading
 
Prepare to navigate the turbulent skies of cybersecurity with Sige Brody, CTO of Optinine, as we unpack the pressing dangers and defenses within the aviation sector. Discover how Optinine's managed cloud computing services are revolutionizing the way airlines protect their most valuable assets, with a focus on robust disaster recovery and business …
  continue reading
 
Imagine discovering that the very foundations of your financial security have been compromised by one of the most infamous crypto-heists in history. That's the chilling tale we unravel from the 2016 Bitfinex breach, with a staggering $4.5 billion at stake. We join forces with cybersecurity experts and dive into the cutting-edge blockchain forensics…
  continue reading
 
Join Blake Rea and Craig Petronella as we unwrap the latest tech and cybersecurity developments faster than you can tear through holiday gift wrapping. From the FBI's tactical strike against the Black Cat ransomware group to the Xfinity data breach leaving millions on edge, we cover it all. We also weigh the consequences of vengeful IT maneuvers in…
  continue reading
 
What if you could protect your cryptocurrency from hackers with just a few simple security measures? That's what we're diving into today in our exploration of the fascinating yet terrifying world of SIM Swaps and cryptocurrency security. We'll shed light on a real-life cautionary tale of a victim who lost his cryptocurrency to these cunning cyber c…
  continue reading
 
Do you think you're up-to-date with cybersecurity and compliance? This episode will uncover some surprising facts that you may not be aware of. Firstly, we'll be unravelling the complex challenges that healthcare organizations face, especially when dealing with outdated medical equipment. We'll look at a real-life case where a hospital was hacked, …
  continue reading
 
Are you prepared for the digital dangers lurking in your computer, or the profound impacts of artificial intelligence on our lives? This episode arms you with knowledge of the latest cybersecurity threats, from North Korean state-linked nation group hacking Mac computers, to phishing scams and vulnerabilities in class action lawsuits. We also delve…
  continue reading
 
Hold onto your security blankets folks! Are we ever secure enough in this digital age? Get a grip on the pulse-raising lawsuit from the SEC against SolarWinds and the unexpected ban from the Canadian government on WeChat and Kaspersky. We harness the power of hindsight, looking back at how this enormous breach happened and what could have been done…
  continue reading
 
Are you prepared to navigate the rocky terrain of today's cybersecurity landscape? This episode is your compass, guiding you through the treacherous twists and turns of tech threats, from the OKTA breach to the leaking of NSA classified data to Russia and the sneaky Microsoft bug within Active Directory and Azure. We don't tiptoe around the controv…
  continue reading
 
What if you had a front-row seat to one of the most riveting stories in cybersecurity today? Join us as we unravel the story of the Chinese state-sponsored Advanced Persistent Threat, BlackTech, and their exploitation of the Cisco Zero Day CVE 2023-20109. We dissect their strategy of modifying router firmware on Cisco routers, maintaining a stealth…
  continue reading
 
Do you know how to protect your device from the Xenomorph Banking Trojan? Join us as we dive into the murky waters of Android security threats with our enlightening guest, Blake Rea. We unmask the frightening reality of this new Trojan, aimed solely at Android users. With a chilling focus on over 35 financial institutions and some crypto wallets, t…
  continue reading
 
MGM Cyber Attack, Personal and Business Cybersecurity Tips and Tricks. According to Okta, Hackers who breached MGM and Caesars also hit 3 other firms. Learn cybersecurity tips and tricks you can use to security harden yourselves and your business. Support the show - Call 877-468-2721 or visit https://petronellatech.com Please visit YouTube and Link…
  continue reading
 
How To Choose A Cybersecurity Provider. Learn tips on what to ask for and what to look for. Penetration Tests vs. Vulnerability Scans, Pricing, Zero Trust Technology and The Latest Takeaways from the recent FTX Crypto Exchange Hack. Support the show - Call 877-468-2721 or visit https://petronellatech.com Please visit YouTube and LinkedIn and be sur…
  continue reading
 
What will happen to my Ethereum after Ethereum's Merge? Blockchain Solutions and use cases - Zero Trust Solutions - PTG-Podcast-September-7-2022 Visit https://ComplianceArmor.com for the latest in Cybersecurity and Training. NO INVESTMENT ADVICE The Content is for informational purposes only, you should not construe any such information or other ma…
  continue reading
 
With everything going on on the internet, navigating the digital waters of the internet with your children can be a real challenge. You want to may sure they are safe and that they don't get hacked, but how? In this episode, we give you practical tips and tricks to help keep your kids (and their devices) safe from hackers! Hosts: Craig, Erin, and B…
  continue reading
 
Hackers have no shame. Any opportunity they think they can exploit will be exploited. That includes a global pandemic that has taken the lives of millions of people around the world. The death and destruction are of no consequence to these bad actors and with millions of workers working remotely, hackers have a field day. Did your business go remot…
  continue reading
 
***In order to get the breaking cyber news to you guys FAST we are posting these right after the live broadcast! If you prefer your news more filtered, keep an eye out for the edited posting tomorrow!*** With everything going on on the internet, navigating the digital waters of the internet with your children can be a real challenge. You want to ma…
  continue reading
 
In this episode, we talk about what a day in the life of a cybersecurity firm looks like, and what kind of mindset it takes to be successful in this industry. Are you thinking of making a switch? Do you know a young person who is looking for career advice? Listen in, and find out if it's right for you! Hosts: Blake and Erin Support the show - Call …
  continue reading
 
***In order to get the breaking cyber news to you guys FAST we are posting these right after the live broadcast! If you prefer your news more filtered, keep an eye out for the edited posting tomorrow!*** Hackers have no shame. Any opportunity they think they can exploit will be exploited. That includes a global pandemic that has taken the lives of …
  continue reading
 
Sometimes it seems as if America is ALWAYS the target of cybersecurity attacks. And that's because it kinda is! But what remakes the US such an attractive target? It's a complicated answer with multiple reasons - some that aren't too surprising, and others that may be harder to spot. But one thing is for sure: We in the US, collectively, need to ta…
  continue reading
 
We've all seen the news and read the headlines - Hackers aren't going anywhere anytime soon! In fact, quite the opposite is true... So what can YOU do to keep your company's name out of the papers? Listen in and find out! Hosts: Erin and Blake Support the show - Call 877-468-2721 or visit https://petronellatech.com Please visit YouTube and LinkedIn…
  continue reading
 
***In order to get the breaking cyber news to you guys FAST we are posting these right after the live broadcast! If you prefer your news more filtered, keep an eye out for the edited posting tomorrow!*** With the rash of cyberscams and a huge portion of the workforce going remote, there has been a lot of talk about implementing a "Zero-Trust Framew…
  continue reading
 
Today we welcome Craig back! Not only do we get to hear about Compliance regulations you're probably subject to but unaware of, but we also get to hear Craig's harrowing tail of 'Gator wrestling in the murky waters of North Carolina! Link: Craig Reels in a Gator in Arapahoe, NC! Host: Craig Co-Hosts: BJ, Blake, and Erin Support the show - Call 877-…
  continue reading
 
Hackers aren't going anywhere, any time soon, so a lot of companies are (wisely!) looking into cyberinsurance. However, not all companies know what they need to do to get cyberinsurance, or they try to use it as a replacement for ACTUAL cybersecurity. On today's podcast, we discuss the right (and wrong) ways to get cyberinsurance for your business.…
  continue reading
 
With the great shift in 2020 from working in offices to working from home, a lot of regular IT maintenance duties have fallen through the cracks. In this episode, Dwight from PTG has practical tips and tricks to help us (non-IT) work-from-home employees keep our hardware and devices from completely falling apart! Link: How to take good care of your…
  continue reading
 
We told you the top cybersecurity myths that you need to forget immediately; now we are going to let you in on the shocking reality that is the cyber realm. From insidious Russian viruses to the vast amount of simple human error, nothing is what it seems in the digital age! Link: Top 50 Cybersecurity Statistics, Figures and Facts Hosts: Blake, Dwig…
  continue reading
 
***In order to get the breaking cyber news to you guys FAST we are posting these right after the live broadcast! If you prefer your news more filtered, keep an eye out for the edited posting tomorrow!*** Today we welcome Craig back! Not only do we get to hear about Compliance regulations you're probably subject to but unaware of, but we also get to…
  continue reading
 
We have seen and heard it all! On today's podcast, we discuss the most common cybersecurity myths and misconceptions that are out there. You won't want to miss this! Links: 10 cybersecurity myths you need to stop believing Hosts: Blake, Dwight, & Erin Support the show - Call 877-468-2721 or visit https://petronellatech.com Please visit YouTube and …
  continue reading
 
On today's podcast, the PTG talks with their newest tech, Dwight, about not only his past experiences but also what he has learned along away. With over 30 years of IT/Cybersecurity/MSP experience (which includes working with PTG over a decade ago), we know he will add a lot of value to the team... We are thrilled to welcome him back! Hosts: BJ, Bl…
  continue reading
 
Today the PTG team talks about what PTG's Blake and Russia's Putin apparently have in common: an obsession with watches! We know this because Putin "confiscated" rare watches in response to Switzerland condemning Russia's invasion of Ukraine and Blake explains why watches are still so sought after, even with smartphones and smartwatches being as pr…
  continue reading
 
In today's episode, we discuss the psychological impact of hackers not having to see their victims face-to-face, as well as the impact solar flares can have on digital devices, and the importance of a steady flow of power to avoid frying your devices. Link: https://cybernews.com/cyber-war/russian-aviation-authority-switches-to-paper-after-losing-65…
  continue reading
 
In today's podcast, PreVeil's compliance manager, Noël Vestal, discusses how using Zero-Trust end-to-end encryption helps fight the Zero-Day attacks that are all the rage today, and why having trusted vendors is crucial when implementing compliance standards, especially when a government contract is on the line. Compliance takes hard work - even wi…
  continue reading
 
***In order to get the breaking cyber news to you guys FAST we are posting these right after the live broadcast! If you prefer your news more filtered, keep an eye out for the edited posting tomorrow!*** In today's podcast, PreVeil's compliance manager, Noël Vestal, discusses how using Zero-Trust end-to-end encryption helps fight the Zero-Day attac…
  continue reading
 
A number of Morgan Stanley clients fell victim to a Vishing scam. "What is a vishing scam?" you ask… Great question! But if Morgan Stanley wasn't breached (this time), how exactly did the hackers know who to target? Join the PTG team, along with Jamel from Gatekeeper, as we explore these questions and discuss what actions you can take to keep yours…
  continue reading
 
***In order to get the breaking cyber news to you guys FAST we are posting these right after the broadcast! If you prefer your news more filtered, keep an eye out for the edited posting tomorrow!*** In today's episode, we discuss the psychological impact of hackers not having to see their victims face-to-face, as well as the impact solar flares can…
  continue reading
 
If you are a massive crypto exchange and tens of thousands of accounts are hacked, is it the tens of thousands of users' fault, or is it possible that maybe the company's cyber hygiene isn't passing the "sniff" test? Join the PTG team as they discuss the hacks and explore what exactly is going on. Links: https://www.reuters.com/business/finance/coi…
  continue reading
 
Loading …

Ghid rapid de referință