...

On Demand Webinar

Is there a CMMC compliance audit in your company’s future?

Join Robert Smith, Audit and IT Compliance Services Manager, as he demonstrates why a strong cybersecurity foundation is key to achieving CMMC compliance. He’ll give an overview of the CMMC structure, what it means, and provide actionable steps for maintaining compliance and making your organization more secure.

About the Presenter

Robert Smith

Manager, Audit and Compliance Services

On Demand Webinar

With the sudden spread of COVID-19, countless businesses around the world have, overnight, become work-from-home operations. Our on-demand webinar focuses on the many challenges, threats and solutions that exist for securing your remote workforce.

About the Presenter

Delano Collins

Vice President of Cybersecurity

John Finch

Vice President of CX Product Marketing

RingCentral

Akshay Srivastava

Chief Customer Officer

RingCentral

On Demand Webinar

This on-demand webinar covers the basic differences between NIST 800-171 and CMMC regulatory requirements.

If your company is working with federal data or planning to enter a contract with the Department of Defense, your systems need to be able to process and secure Controlled Unclassified Information (CUI). In order to do this safely, you need to be compliant with NIST 800-171 code or CMMC certified. But what’s the difference?

In this webinar, Corsica Technologies’ own Mark Hoffman, Manager of Audit & IT Compliance services, guides us through NIST 800-171 and CMMC compliance requirements, the difference between the two, and how to determine your compliance focus as a company.

This webinar is the first installment of a four-part series designed to educate our clients on NIST 800-171 and CMMC compliance requirements, as well as the key factors in determining which certification to prioritize for your business needs.

On Demand Webinar

The Interim Rule was issued by the DoD to amend the Defense Federal Acquisition Regulation Supplement (DFARS) that states that companies must implement a DoD Assessment Methodology and Cybersecurity Maturity Model Certification framework in order to do business with the federal government. The DFARS regulations ensure that companies meet the cybersecurity and IT compliance requirements needed to protect unclassified information within the DoD supply chain.

On Demand Webinar

Once you understand the differences between NIST 800-171 and CMMC and the implementation of the Interim Rule, it’s time to determine which certification is best-suited to your company’s needs in the short term and long term.

Although the CMMC has similar IT compliance requirements to the NIST 800-171, it requires contractors to be certified by official assessment organizations called CMMC 3rd Party Assessment Organizations (C2PAOs). Spoiler alert – for now, most contractors achieve the necessary level of compliance to work with the DoD with a NIST 800-171 certification. But that doesn’t mean you shouldn’t start preparing for CMMC compliance right away.

On Demand Webinar

Here’s what you’ll learn:

Top managers recognize cyber risk assessment and mitigation as an essential topic on their agendas. Many executives, however, are far removed from the day-to-day challenges of monitoring, detecting, and responding to evolving cyber risks, making it difficult to guide their organization towards cyber maturity.

On Demand Webinar

With an increasing number of IT executives concerned about the impact and legal ramifications posed by the threats of advanced malware, Endpoint Detection & Response solutions have quickly become essential for businesses looking to manage cybersecurity risk.

About the Presenter:

Delano Collins

Chief Information Officer

John Finch

Vice President of CX Product Marketing

RingCentral

Akshay Srivastava

Chief Customer Officer

RingCentral

On Demand Webinar

Experts are warning that the Russian invasion of Ukraine poses an unprecedented cyber risk even for U.S. and Western organizations—and businesses need to be ready.

If you’re wondering how you can safeguard your organization from advanced persistent threat actors (APTs), Corsica Technologies is here to help.