On Demand Webinar
Is there a CMMC compliance audit in your company’s future?
Join Robert Smith, Audit and IT Compliance Services Manager, as he demonstrates why a strong cybersecurity foundation is key to achieving CMMC compliance. He’ll give an overview of the CMMC structure, what it means, and provide actionable steps for maintaining compliance and making your organization more secure.
About the Presenter
Robert Smith
Manager, Audit and Compliance Services
On Demand Webinar
With the sudden spread of COVID-19, countless businesses around the world have, overnight, become work-from-home operations. Our on-demand webinar focuses on the many challenges, threats and solutions that exist for securing your remote workforce.
About the Presenter
Delano Collins
Vice President of Cybersecurity
John Finch
Vice President of CX Product Marketing
RingCentral
Akshay Srivastava
Chief Customer Officer
RingCentral
On Demand Webinar
This on-demand webinar covers the basic differences between NIST 800-171 and CMMC regulatory requirements.
If your company is working with federal data or planning to enter a contract with the Department of Defense, your systems need to be able to process and secure Controlled Unclassified Information (CUI). In order to do this safely, you need to be compliant with NIST 800-171 code or CMMC certified. But what’s the difference?
In this webinar, Corsica Technologies’ own Mark Hoffman, Manager of Audit & IT Compliance services, guides us through NIST 800-171 and CMMC compliance requirements, the difference between the two, and how to determine your compliance focus as a company.
This webinar is the first installment of a four-part series designed to educate our clients on NIST 800-171 and CMMC compliance requirements, as well as the key factors in determining which certification to prioritize for your business needs.
On Demand Webinar
The Interim Rule was issued by the DoD to amend the Defense Federal Acquisition Regulation Supplement (DFARS) that states that companies must implement a DoD Assessment Methodology and Cybersecurity Maturity Model Certification framework in order to do business with the federal government. The DFARS regulations ensure that companies meet the cybersecurity and IT compliance requirements needed to protect unclassified information within the DoD supply chain.
On Demand Webinar
Once you understand the differences between NIST 800-171 and CMMC and the implementation of the Interim Rule, it’s time to determine which certification is best-suited to your company’s needs in the short term and long term.
Although the CMMC has similar IT compliance requirements to the NIST 800-171, it requires contractors to be certified by official assessment organizations called CMMC 3rd Party Assessment Organizations (C2PAOs). Spoiler alert – for now, most contractors achieve the necessary level of compliance to work with the DoD with a NIST 800-171 certification. But that doesn’t mean you shouldn’t start preparing for CMMC compliance right away.
On Demand Webinar
Here’s what you’ll learn:
- How to conduct a cybersecurity risk assessment for your organization
- How to use the results of the risk assessment to implement change
- What you should look for in a provider to streamline your cybersecurity.
Top managers recognize cyber risk assessment and mitigation as an essential topic on their agendas. Many executives, however, are far removed from the day-to-day challenges of monitoring, detecting, and responding to evolving cyber risks, making it difficult to guide their organization towards cyber maturity.
On Demand Webinar
With an increasing number of IT executives concerned about the impact and legal ramifications posed by the threats of advanced malware, Endpoint Detection & Response solutions have quickly become essential for businesses looking to manage cybersecurity risk.
About the Presenter:
Delano Collins
Chief Information Officer
John Finch
Vice President of CX Product Marketing
RingCentral
Akshay Srivastava
Chief Customer Officer
RingCentral
On Demand Webinar
Experts are warning that the Russian invasion of Ukraine poses an unprecedented cyber risk even for U.S. and Western organizations—and businesses need to be ready.
If you’re wondering how you can safeguard your organization from advanced persistent threat actors (APTs), Corsica Technologies is here to help.