Video není dostupné.
Omlouváme se.

100: DoD Contractor Cybersecurity requirements - Adam Austin

Sdílet
Vložit
  • čas přidán 7. 08. 2024
  • 💎🙌🚀 30% off Government Contracting Course for businesses wanting more sales and small business contracts 🚀🚀 govconeric.com/join Up to $500 FREE videos included with this offer
    Book Recommendations:
    📖Launch your Government Contracting business: govconeric.com/launchbook
    📖Suggested Reading: govconeric.com/books
    🏎️Find Deals in Government Contracting: govconeric.com/deals
    📈 Join our email list: govconeric.com/email
    ☎️ Capability Statement Templates: govconeric.com/templates
    🛍️Cameras, Gear, Books govconeric.com/gear
    👻Cyber/IT contracts opportunities govconeric.com/cyber
    📷Eric on Instagram & Twitter @ ecoffie
    💎 Find out what activities should you be doing over the next 360 Action Plan govconeric.com/360
    🦆 14 Government contracting organizations to consider joining govconeric.com/partners
    Programs
    🙌SAM Registration + Government Contracting basics course govconeric.com/sam
    🌎Government Contracting beyond SAM govconeric.com/aftersam
    📈Becoming a Government Contracting Giant Course : govconeric.com/mastery
    🗣Contact me: 🗣
    Text me for questions: 786-261-0448
    Call our office for help: 786-477-0477
    Email questions: service@govcongiants.com
    For immediate assistance: clarity.fm/ericcoffie
    / ecoffie
    #mariamartinez #govconalumni #makingagiant
    DOD Contractor Cybersecurity Requirements:
    1. RESTRICTIONS OF CLASSIFIED INFORMATION
    “All information generated by or for a contract that you would not publish to the general public, it can’t be on your website… on LinkedIn. You can’t be taking pictures of it and putting it on Instagram, Facebook. None of that.”
    2. THE LIFE CYCLE DETERMINATION OF INFORMATION
    We call this the life cycle determination. It helps determine the scope and the footprint of your IT system that has to be protected.
    3. MSP AND MSSP
    Managed Service Providers (MSPs) ensure that your IT systems are operational. Managed Security Service Providers (MSSPs) perform monitoring and maintain security operations analysis and security operations centers.
    4. TARGET AT LEAST ONE LEVEL OF CCMC CERTIFICATION
    This includes lawn maintenance crews that mow the grass of the Pentagon or the waste management crews that have contracts to empty dumpsters at Idaho National Labs.
    For Full Article Read: govcongiants.com/mastermind-m...
    📜 Video Chapters
    00:00:00 Start
    00:01:39 Today's topic: DoD Contractor Cybersecurity Requirements
    00:03:05 Let us know the city and industry you are in
    00:06:32 Who you are and what do you do? | Totem Technologies & Haight Bey &
    Associates
    00:11:00 DoD Contractor Cybersecurity Requirements
    00:15:44 How do we determine what's controlled and classified information-CUI?
    00:19:39 Three-phase methodology for compliance
    00:23:05 Who's gonna the implementation?
    00:25:24 MSP
    00:27:02 What is the objective of the workshop?
    00:28:18 Do you recommend a particular network or system?
    00:32:02 Must we be certified before pursuing an opportunity?
    00:34:41 Rewarming the session
    00:35:43 How about CompTia Security +ce?
    00:36:08 How long does this actually take?
    00:37:29 Life-cycle determination
    00:42:21 Where can we get the information on the monthly cohorts?
    00:44:20 Risk Assessment Template
    00:46:56 Real costs for a small business to become compliant with the CMMC
    00:51:03 Using cloud services | Safe Site
    00:54:02 Separation of duties
    00:55:19 What's about this e-book?
    00:56:54 If you are an MSP or MSSP that utilizes contractors overseas, are there
    restrictions on where these contractors reside/operate?
    00:59:34 How much to secure 5 computers for a smaller office instead of 20?
    01:02:22 What's the policy statement?
    01:04:38 Are you willing to partner with newbies to enable growth?
    01:05:19 Can you go through the layout of CMMC 1, 2, and 3 for everyone
    01:07:02 How many sessions are in the workshop?
    01:08:05 It seems complex but we've built a methodology and a roadmap
    01:09:27 How do I choose an MSP?
    01:12:12 Do insurance policies cover them?
    01:12:52 Can PCI DSS certification help with the cyber security government?
    01:13:30 Why do you think businesses don't have backups and encryption, which
    helps big time with ransomware
    01:15:24 Connect on LinkedIn
    01:16:58 Can you restate what is not allowed on the website?
    01:18:31 Are there any workload products for CMMC like there was for Hippa?
    01:19:49 Wrapping Up

Komentáře • 9

  • @EricCoffie
    @EricCoffie  Před 3 lety +2

    Click for all downloadable goodies in today's lesson. www.dropbox.com/scl/fi/vqm2n2rnqvnaojku7lqzt/Totem-Links.docx?dl=0&rlkey=z9ji5rjr8wu5nm3kf3nb42o31

  • @Mel-qp4vq
    @Mel-qp4vq Před 3 lety +3

    I appreciate you man , people have no idea how valuable this information is .

  • @Aqueenlee
    @Aqueenlee Před 2 lety +1

    This session was awesome! This is not my arena but I learned a lot, very interesting.

  • @markdailey8526
    @markdailey8526 Před 3 lety +1

    Typically servers will need EDR solutions. Architecture, Engineers, and production support for the build out process implementation and management. MSP'S and MSSPS

  • @Damo_LowEnd_or_NoEnd
    @Damo_LowEnd_or_NoEnd Před 7 měsíci +1

    I sub to your channel u are golden.

  • @top5-vid814
    @top5-vid814 Před 3 lety +1

    Thanks again as always