CMMC case study: Inside a CMMC assessment
In order to bid on Department of Defense (DoD) contracts, hundreds of thousands of organizations will need to be assessed for their Cybersecurity Maturity Model Certification (CMMC) Level. But how exactly does that process work?
Join Leighton Johnson, Infosec instructor and CTO at ISFMT, and Stacy High-Brinkley, VP of Compliance Solutions and Service at CASK Government Services, to get an inside look at how CMMC assessments are conducted, including:
- Steps to getting assessed — from start to finish
- Expectations from CMMC Certified Assessors (CCA) and CMMC-AB
- What happens if you don’t meet the process and control requirements
- CMMC questions from live viewers
All registrants get a free copy of our CMMC ebook.
-
Guest speaker
Leighton Johnson
Infosec instructor and CTO at ISFMT
-
Guest speaker
Stacy High-Brinkley
VP of Compliance Solutions and Service at CASK Government Service
Fill out the form to watch now.
Watch now
In order to bid on Department of Defense (DoD) contracts, hundreds of thousands of organizations will need to be assessed for their Cybersecurity Maturity Model Certification (CMMC) Level. But how exactly does that process work?
Join Leighton Johnson, Infosec instructor and CTO at ISFMT, and Stacy High-Brinkley, VP of Compliance Solutions and Service at CASK Government Services, to get an inside look at how CMMC assessments are conducted, including:
- Steps to getting assessed — from start to finish
- Expectations from CMMC Certified Assessors (CCA) and CMMC-AB
- What happens if you don’t meet the process and control requirements
- CMMC questions from live viewers
All registrants get a free copy of our CMMC ebook.
Fill out the form to watch now.
Hmm. Something’s not right. Please review your contact information or email us for support at info@infosecinstitute.com.