Search for tag: "cmmc"

Adaptive Acquisition Framework DoD Instruction 5000.90 Cybersecurity for Acquisition Decision Authorities and Program Managers 3.8.221

DoDI 5000.90 was signed into law on December 31, 2020. This instruction states that cybersecurity is a foundational requirement in the Defense Acquisition System (DAS) and must encompass platforms,…

From  Emmett Simmons 0 likes 180 plays 0  

CMMC and Implementation of Interim DFARS rule 2019-D041 1.27.21

Join Ms. Katie Arrington, Chief Information Security Officer for OSD A&S, Mr. John Tenaglia Principal Director, Defense Pricing and Contracting and Lt Gen David Bassett, Director, Defense…

From  Emmett Simmons 1 likes 342 plays 0  

DFARS 252.204-7012 CMMC Overview 12.15.20

Section 1648 of the NDAA for FY 2020 (Pub. L. 116-92) required that the Department of Defense (DoD) develop a consistent, comprehensive framework to enhance the cybersecurity of the United…

From  Emmett Simmons 0 likes 343 plays 0  

The Cybersecurity Maturity Model Certification Selecting the CMMC level to Protect FCI and CUI 10.13.20

Selecting the CMMC level (I, III, and III+) to Protect Federal Contract Information (FCI) and Controlled Unclassified Information (CUI). Due to the proliferation of intellectual property that has…

From  Emmett Simmons 0 likes 89 plays 0  

Think Differently with the Honorable Ellen Lord USD 10.6.20

Join us for the first FY21 episode of "Think Differently" webcast series for a discussion between DAU President, Mr. Jim Woolsey, and Under Secretary of Defense for Acquisition and…

From  Emmett Simmons 0 likes 244 plays 0  

The Cybersecurity Maturity Model Certification Request for Information Proposal 9.22.20

This webcast session will focus on the Request for Information/Proposal (RFI/RFP) contract strategy that acquisition workforce professionals may consider to implement the CMMC process. This will also…

From  Emmett Simmons 0 likes 144 plays 0  

Cybersecurity Maturity Model Certification Migration from NIST SP 800-171 to the new CMMC process 8.25.20

Due to the proliferation of intellectual property that has resulted in the loss of trillions of dollars, the Department of Defense (DoD) and Federal Agencies is focusing its attention concerning the…

From  Emmett Simmons 0 likes 260 plays 0  

Cybersecurity Maturity Model Certification DoD Assessment Methodology Tool Implementation NIST 800-171 v1.1_8.11.20

Due to the proliferation of intellectual property that has resulted in the loss of trillions of dollars, the Department of Defense (DoD) and Federal Agencies is focusing its attention concerning the…

From  Emmett Simmons 0 likes 176 plays 0  

The Cybersecurity Maturity Model Certification - Request for Information - Proposal Contract Strategy Considerations to Implement the CMMC 6.23.20

Due to the proliferation of intellectual property that has resulted in the loss of trillions of dollars, the Department of Defense (DoD) and Federal Agencies is focusing its attention concerning the…

From  Emmett Simmons 0 likes 282 plays 0  

CMMC: Selecting the CMMC Levels 6.3.20

​Description of Presentation:The Cybersecurity Maturity Model Certification - Overview and Latest DevelopmentsDue to the proliferation of intellectual property that has resulted in the loss of…

From  Emmett Simmons 0 likes 245 plays 0  

CMMC: Latest Developments Question and Answer 5.19.20

Due to the proliferation of intellectual property that has resulted in the loss of trillions of dollars, the Department of Defense (DoD) and Federal Agencies is focusing its attention concerning the…

From  Emmett Simmons 0 likes 247 plays 0  

CMMC: Certification 5.13.20

The Cybersecurity Maturity Model Certification - Overview and Latest Developments"Due to the proliferation of intellectual property that has resulted in the loss of trillions of dollars, the…

From  Emmett Simmons 0 likes 386 plays 1  

Think Differently: Cybersecurity and the Adaptive Acquisition Framework_Event 2.5.20

DAU and NavalX hosted a discussion exploring three angles on why and how we can think differently about cybersecurity risk Feb. 5, 2020. The presentations shown during this event are available under…

From  Marina Theodotou 0 likes 584 plays 0