BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//NCMBC - ECPv6.15.20//NONSGML v1.0//EN
CALSCALE:GREGORIAN
METHOD:PUBLISH
X-WR-CALNAME:NCMBC
X-ORIGINAL-URL:https://www.ncmbc.us
X-WR-CALDESC:Events for NCMBC
REFRESH-INTERVAL;VALUE=DURATION:PT1H
X-Robots-Tag:noindex
X-PUBLISHED-TTL:PT1H
BEGIN:VTIMEZONE
TZID:America/New_York
BEGIN:DAYLIGHT
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
TZNAME:EDT
DTSTART:20230312T070000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
TZNAME:EST
DTSTART:20231105T060000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
TZNAME:EDT
DTSTART:20240310T070000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
TZNAME:EST
DTSTART:20241103T060000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
TZNAME:EDT
DTSTART:20250309T070000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
TZNAME:EST
DTSTART:20251102T060000
END:STANDARD
END:VTIMEZONE
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20241203T080000
DTEND;TZID=America/New_York:20241203T170000
DTSTAMP:20260428T130850
CREATED:20240826T163106Z
LAST-MODIFIED:20241202T170911Z
UID:3912-1733212800-1733245200@www.ncmbc.us
SUMMARY:CMMC Implementation: Your Path to Cybersecurity Compliance
DESCRIPTION:Join the North Carolina Military Business Center and North Carolina State University for a “CMMC Implementation Workshop: Your Path to Cybersecurity Compliance” on December 3 in Raleigh\, North Carolina. \nCMMC Day is designed to prepare NC defense contractors for their Cybersecurity Maturity Model Certification assessments by providing them with the latest information about CMMC 2.0 and the associated DFARS clauses\, and how to implement them. The goal of the event is for defense contractors and their IT/cyber staff and/or IT managed service providers to gain a thorough understanding of the requirements in CMMC and have a plan to get started or continue with their cybersecurity program. By the end of the day\, attendees should know what the next steps are and what resources are available to help them develop their cybersecurity programs. \nDecember 3\, 2024 North Carolina State University – McKimmon Conference Center1101 Gorman StreetRaleigh\, North Carolina 27606Parking is available in lot D. Campus Map. \nAgenda \n8:30 – 9:00: Check-in9:00 – 9:10: Welcome Remarks9:10 – 9:50: Overview of CMMC Model\, DFARS Clauses\, NIST SP 800-171 r2\, Controlled Unclassified Information\, Civil Cyber Fraud Initiative\, etc.9:50 – 10:00: Break10:00– 12:00: Break-out sessions: Leadership Track and Technical Track 12:00 – 12:30: Lunch 12:30 – 1:00: “Ask Us Anything” Panel 1:00 – 1:15: Break1:15 – 3:30: Break-out sessions: Leadership Track and Technical Track  3:30 – 3:45: Break3:45 – 4:00: Tie It All Together 4:15 – 4:45:  “Ask Us Anything Panel” \nLeadership Track. Will include a high-level overview of what is being discussed in the technical track\, with the goal being to reduce the friction between leadership and technical professionals. We will also discuss the topics below. \n\nCybersecurity Overview\nHow to build a culture of cybersecurity/tone at the top\nThings to do now: DoD CUI training\, Medium Assurance Certificate\, awareness training\nCyber risks\nCMMC Scope\nCompliance documentation\nQuestions to ask your MSP/MSSP/Consultant\nShare responsibility matrices for “inherited” cybersecurity controls\nWhat cybersecurity information to include in service level agreements\nSupply chain risk management\nCMMC implementation strategies\nCost of implementation\n\nTechnical Track \n\nAsset and data inventories\nNetwork diagrams\nData flow diagrams\nPhysical security \nCMMC Scope\nSystem Security Plan\nHow to perform a gap assessment\nHow to put a score in the Supplier Performance Risk System\nNIST controls – where to start\n\nWho Should Attend:  Defense contractors- Leadership and those responsible for implementing CMMC AND their Managed Service/Security Providers (MSP/MSSP) or consultants. The new CMMC rule requires MSP/MSSPs to be CMMC Level 2 certified if they store\, process\, or transmit controlled unclassified information (CUI) on behalf of their defense contractor clients. MSP/MSSPs that provide security protection for their clients will be considered in-scope to their client’s CMMC assessment. The content of the workshop will be geared toward preparing attendees for a CMMC Level 2 assessment\, however contractors preparing for CMMC Level 1 will benefit from attending. \nWhy attend: The CMMC Program rule is final and was published in the Federal Register on October 15th\, with an effective date of Dec. 14th. CMMC third party assessments can begin\, but the DoD will not put CMMC in contracts until the Defense Federal Acquisition Regulation Supplement (DFARS) has been changed to include a CMMC clause. We expect the DFARS clause rule to be final by the end of the second quarter in 2025 with an effective date in the late summer or early fall of 2025. If you wait until the new DFARS rule is final\, you will be behind. It takes most contractors 18 – 24 months to develop a secure\, compliant cybersecurity program. \nRegistration. Registration is open!Early Bird Registration (prior to November 10\, 2024): $115/personRegistration (on or after November 10\, 2024): $130/personRegistration includes access to the full program\, materials and catering throughout the day. \n\n\n\nONLINE REGISTRATION IS CLOSED. WALK-IN REGISTRATION IS WELCOME.\n\n\n\nSpeakers:  \n\n\n\n\nLaura Rodgers: Laura is the Director of Cybersecurity Practice in the Secure Computing Institute at NC State University and the Director of the North Carolina Partnership for Cybersecurity Excellence (NC-PaCE). Laura has been working with defense contractors in North Carolina for several years and teachers a DoD Cybersecurity Compliance course. She was a defense contractor for over 20 years with Lockheed Martin and General Dynamics IT\, and held positions in business operations\, business development\, governance\, risk\, compliance\, and policy.\n\n\n\nLori Jackson: Lori is the founder and President of White Raven Security\, a certified WOSB cybersecurity consulting company in Charlotte\, NC. She has over 20 years of technical and management experience in cybersecurity compliance\, cyber engineering\, and corporate governance\, and she is committed to supporting defense contractors with CMMC compliance and security. Lori is a Certified Information Systems Security Professional (CISSP). She holds the Certified CMMC Professional (CCP) and Certified CMMC Assessor (CCA) certifications and is a Registered Practitioner (RP) in the CMMC ecosystem.\n\n\n\nMyriam Batista: Myriam is the Chief Information and Compliance officer at Reef Systems\, which is headquartered in Cary\, North Carolina. She works with companies to understand their security posture and help them comply with Federal Government requirements and commercial frameworks such as NIST SP 800-171\, NIST SP 800-53\, ISO 27001\, and CMMC. Myriam has over 20 years of experience leading the implementation of cybersecurity and technology solutions in support of commercial customers\, educational institutions\, and government agencies\, as well as expertise in conducting independent assessments and audits. Myriam’s credentials include Project Management Professional (PMP)\, Certified CMMC Assessor\, CMMC Provisional Instructor\, ISO Lead Auditor and Cloud Security Alliance CCSK Authorized Instructor.\n\n\n\nLawrence Cruciana\, founder and president of Corporate Information Technologies (CorpInfoTech)\, brings over 20 years of expertise in IT and cybersecurity\, with a focus on risk management for regulated businesses and supply chains. A recognized leader in implementing cybersecurity frameworks like NIST CSF and CIS Controls\, he specializes in risk mitigation for mid-sized and governmental organizations\, especially through MSPs and third-party vendors. Lawrence is an active speaker and commentator\, addressing key cybersecurity topics\, including supply chain vulnerabilities\, the impacts of U.S. cybersecurity policies\, and the need for accessible risk management for small and medium businesses.\nJon Sternstein: Jon is the founder and CEO of Stern Security\, a cyber security company headquartered in Raleigh\, NC. He is a co-author of the Cisco Press course titled “Security Penetration Testing (The Art of Hacking) LiveLessons”. Jon holds many security certifications including GIAC Penetration Tester and Certified Information Systems Security Professional (CISSP). Jon has been a featured cybersecurity expert on ABC News\, WRAL News\, ISSA Journal\, PenTest Magazine\, North Carolina Dental Gazette\, and Business North Carolina Magazine.\n\n\n\nRad Rouzky: Rad is the founder and President of Reef Systems\, providing solutions to customers nationwide in cybersecurity\, information technology\, healthcare and administration/program management. He provides security architecture and implementation guidance to customers needing to enhance their cyber posture and comply with government and commercial security standards such as NIST SP 800-171\, ISO 27001 and Cybersecurity Maturity Model Certification (CMMC). Rad holds CISSP and HCISPP certifications from (ISC)²\, is a CMMC Registered Practitioner (RP)\, and earned Bachelor’s and Master’s degrees in Electrical Engineering.\n\n\n\nCraig Williams: Craig is the President of the Cyber Synergy Consulting Group and is a seasoned Cybersecurity consultant\, drawing on his over 20 years of Network Engineer and Application Architect Information Technology experience\, combined with two decades of teaching basic and advanced IT courses. He was employed by Cisco for 19 years as a technical and Java developer for Advanced Services IT. Craig holds a Bachelor’s degree in Computer Engineering from NC State University as well as numerous industry-led certification courses\, including Certified Information Systems Security Professional (CISSP)\, Cisco Certified Network Associate (CCNA)\, and CompTIA Security+.
URL:https://www.ncmbc.us/event/cmmc-implementation-your-path-to-cybersecurity-compliance-2/
LOCATION:NC
CATEGORIES:Homepage Events
ATTACH;FMTTYPE=image/jpeg:https://www.ncmbc.us/wp-content/uploads/vecteezy_digital-cyberspace-with-digital-data-network-connections_1971012-scaled.jpg
END:VEVENT
END:VCALENDAR