CMMC Proof
35 episodes
Is This 19-Year-Old the World's Youngest CCA? (The Ultimate CMMC Career Roadmap)
How to Get CMMC Compliant Self Assessment in 24 Hours: NtelSec CUI Vault Demo
How to Start Your CMMC Career with No Experience (CCP, CCA, LCCA, CCI)
Think you need to be a cybersecurity guru to enter the CMMC ecosystem? Think again. With over 200,000 companies needing support and Phase 1 in full effect, the Department of Defense supply chain needs reinforcements—and they aren't just looking for IT experts. They need project managers, veterans, former law enforcement, and ambitious professionals with a heart for service. In this episode of the CMMC Proof podcast, Derrich Phillips (Lead CCA) breaks down the ground truth on how to start your CMMC career journey with zero prior experience. Whether you are a recent grad, a career changer, or a veteran transitioning to the private sector, there is a place for you in the CMMC "Big Tent." In this episode of the CMMC Proof podcast, Derrich Phillips (Founder of Aspire Cyber and Lead CCA) breaks down the "Ground Truth" of the individual certification ecosystem. We are deep diving into YOUR CMMC career pathway Whether you are a recent grad, a career changer, or a veteran transitioning to the private sector, there is a place for you in the CMMC "Big Tent." 🚀 WHAT YOU'LL LEARN IN THIS EPISODE: The 4 Professional Pathways: A deep dive into the roles of CCP, CCA, Lead CCA, and CCI. The ISACA Transition: What the new CAICO means for your global professional credibility. The Tier 3 Requirement: Why trust and integrity are the foundation of these individual credentials. Beyond the "Guru": Why your unique background in law enforcement, military service, or project management is exactly what the Defense Industrial Base (DIB) needs. Join the Reinforcements: Design Your Roadmap 🔥 DESIGN YOUR CAREER ROADMAP: Stop guessing and start executing. We help you bridge the "Experience Paradox" with hands-on training and practitioner-led study sessions. 👉 Schedule your free roadmap consultation: https://calendly.com/mjordan-aspirecyber/15min ABOUT ASPIRE CYBER: We are an Approved Training Provider (ATP) specializing in CMMC readiness. With a 100% first-time pass rate for our clients as of April 2026, we bring real-world "Ground Truth" expertise into every classroom. Visit www.aspirecyber.com/training Watch on YouTube- https://youtu.be/a3_jdKRQ_n8

From Help Desk to CMMC Certified Assessor (CCA): A 25-Year Career Blueprint
We often hear that the cybersecurity talent gap is a "shortage of people." The truth? It is a shortage of professionals who can bridge the gap between technical theory and assessment-ready rigor. I recently sat down with Rene Ferrier, CCA, to discuss his journey from 25 years in IT and RMF (Risk Management Framework) to becoming a newly minted CMMC Certified Assessor. What makes Rene's story unique isn't just his tenure—it's his tactical approach to the learning curve. During a two-hour daily commute, Rene used Generative AI (ChatGPT and Gemini) to turn his car into a classroom, breaking down complex NIST 800-171 controls into "molecular" concepts he could master while on the road. Key highlights from our conversation: The RMF Transition: Why 25 years of experience is an asset, but "scoping discipline" and "evidence rigor" require a complete mindset shift. The AI Tutor: How to use modern tools to simulate high-level compliance dialogues and prepare for the CCA exam. The Cloud Frontier: Why specializing in GCC High is the next major career multiplier for assessors. Breaking the "Exclusive" Barrier: How we are making CMMC training attainable for the next generation of the workforce. Rene's journey proves that the "Experience Paradox" is solvable if you are willing to use new tools to master old fundamentals. As he says, "Don't get stagnant. Right now, the sky is the limit." Ready to launch your CMMC career? Schedule a free consultation today- https://cmmccopilot.aspirecyber.com/booking

How a Small Business Achieved CMMC Level 2 Certification in Record Time and at Low Cost
This is a powerful CMMC success story that proves compliance doesn't have to take 12-18 months or break your budget. Join your host, Derrich Phillips, as he interviews Josh Hedeby, CPA, Director of Finance at Intertec Engineering, about their journey to CMMC Level 2 certification. Josh shares the shock of receiving quotes for traditional solutions (like Microsoft GCC High MSPs) that exceeded $250,000 for just the first year. Discover the disruptive, fully managed solution that turned their 12-18 month project into a rapid success, giving them a crucial competitive advantage now that the final CMMC rule is published. In this video, you will learn: - The Cost Trap: Why traditional solutions were a non-starter and how quotes reached six figures for a small business. - The Game-Changing Solution: How the CMMC Space solution by ATX Defense provided a 100% managed, affordable alternative. - Rapid Compliance: Intertec went from signing up to being assessment-ready within 30 to 45 days, avoiding a grueling 12-18 month timeline. - Inheritance is Key: How inheriting the policies and documentation allowed Intertec to skip the pain of writing an 80-page System Security Plan (SSP). Ready to accelerate your CMMC readiness? Aspire Cyber is committed to helping small businesses find affordable CMMC solutions. ➡️ Contact us to start your compliance journey: www.aspirecyber.com

How a Small Business Saved Over $100k getting CMMC Level 2 Certified
Is CMMC Level 2 certification a nightmare of confusing requirements and sky-high costs? Not anymore. In this CMMC Proof podcast, Derrich Phillips sits down with the leadership team of Quadyster—Hari Banda, CBL Rao, and Biju Ninan—to share their incredible journey from feeling overwhelmed by traditional CMMC solutions to achieving their certification in record time and for a fraction of the expected cost. This is a powerful case study for any small business struggling with CMMC. Quadyster openly discusses the challenges they faced, the fears around extensive documentation and high costs, and how a strategic partnership network delivered a groundbreaking, affordable solution. Ready to accelerate your CMMC readiness? Aspire Cyber is on a mission to save small businesses $1 million by December 31, 2025, by helping them to identify affordable CMMC solutions. ➡️ Contact us to start your compliance journey- www.aspirecyber.com

Get CMMC Assessment Ready in a Week for Under $1,500 | ATX Defense Space Powered by Google
Join Derrich Phillips on the CMMC Proof Podcast as he sits down with Zach Walker, co-founder of ATX Defense. Discover how their revolutionary CMMC solution is helping small defense contractors avoid the CMMC expensive nightmare.

Google Workspace & CMMC Compliance: Secure, Scalable Solutions for Defense Contractors
In this engaging episode of the CMMC Proof Podcast, host Derrich Phillips sits down with Jeff Brown, Google US Public Sector Workspace Lead, to explore how Google Workspace is transforming CMMC compliance for defense contractors. Discover how Google Assured Controls and U.S.-based data centers empower organizations to meet CMMC Level 2 requirements with ease and confidence. What We Cover in This Episode: - Google Workspace for Defense: Tailored solutions for the defense industrial base (DIB) Whether you're a prime contractor, subcontractor, or IT lead, this conversation offers valuable insights to streamline your compliance process. Watch now to learn how Google Workspace can make your CMMC journey more secure, scalable, and cost-effective. 🔔 Subscribe for the latest updates and expert tips on CMMC compliance and more! Visit the Google Workspace landing page-https://workspace.google.com/learning/content/cybersecurity-maturity-model-certification?e=48754805 🌐 Visit www.cmmcproof.com for additional resources and expert insights.

Inside the CMMC Assessment Handbook with Its Author, Doug Landoll
In this episode of the CMMC Proof Podcast, host Derrich Phillips sits down with Doug Landoll, CEO of Lantego and the author of the bestselling CMMC Assessment Handbook. Doug shares his journey into cybersecurity, offering a unique perspective on the importance of collaboration within the cybersecurity community. What you'll learn in this episode: Doug's experience as an author, focusing on CMMC and its impact on organizations. Insights into the CMMC assessment process, its challenges, and how it compares to frameworks like SOC 2 or ISO 27001. The future of CMMC compliance and why proactive preparation is essential for organizations. The value of CISSP training and clear success definitions in building a fulfilling cybersecurity career. Why consulting should center on empowering organizations for better assessments. Whether you're a defense contractor preparing for CMMC compliance, a cybersecurity professional seeking expert advice, or someone exploring a career in the field, this episode is packed with actionable insights and inspiration. Subscribe for the latest CMMC updates and insights. Visit www.cmmcproof.com

Building a Security-First Culture: Lessons from Kruze Consulting | SOC 2 Compliance
Join Derrich Phillips, Lead Certified CMMC Assessor (CCA), as he interviews Tatiana Marin, Director, Information Security at Kruze Consulting. In this episode, Tatiana shares her unique journey into cybersecurity, her strategies for building a strong security culture, and valuable insights on navigating SOC 2 compliance. Key Topics Covered: Transitioning from operations management to cybersecurity leadership Practical tips for managing SOC 2 audits and selecting the right tools The importance of leadership support and fostering a security-first mindset Leveraging external partners to enhance cybersecurity for small businesses Balancing rapid growth with robust security in a remote work environment Takeaways: Tatiana highlights the critical role of collaboration, effective communication, and leadership buy-in in creating a resilient cybersecurity posture. Her insights offer actionable advice for companies of all sizes. Whether you're tackling SOC 2 compliance or looking to improve your cybersecurity practices, this episode is packed with practical guidance and inspiration. Visit www.cmmcproof.com
CMMC for Manufacturers: Turning Compliance Into a Competitive Edge
In this episode of the CMMC Proof Podcast, host Derrich Phillips interviews Melissa Burant, a supply chain project manager at Iowa State University CIRAS, to uncover the compliance challenges defense contractors face under the Cybersecurity Maturity Model Certification (CMMC). Melissa shares insights into bridging the gap between federal requirements and current compliance practices, emphasizing the importance of simplifying complex regulations and providing actionable steps for small and medium-sized manufacturers. She sheds light on the shortcomings of the current CMMC ecosystem, such as the lack of resources mapping back to federal requirements and the overwhelming information contractors must navigate. The conversation dives into: The effectiveness of virtual boot camps in empowering companies to implement cybersecurity practices. How false claims and noncompliance cases impact small businesses. The importance of connecting cybersecurity efforts to revenue. Collaborative strategies to support manufacturers in the cybersecurity industry. Building targeted resources and simplifying the compliance journey for contractors. Melissa's practical advice and passion for helping small businesses make this episode a must-watch for anyone navigating the complexities of CMMC compliance. Subscribe Visit www.cmmcproof.com

Beyond Compliance: Designing Resilient Cybersecurity for Higher Education
Join Emilyann Fogarty, CISO at NYSERNet, as she explores the unique cybersecurity challenges in higher education—from targeted attacks and compliance pressures to limited budgets. Emilyann shares her approach to building scalable security programs focused on risk management and aligned with institutional goals. Highlighting the importance of soft skills, effective communication, and relationship-building, she offers practical insights on asking the right questions and fostering trust within an organization. Ready to accelerate your own compliance journey? Start your 7-day trial of CMMC Proof: Compliance Acceleration System at www.cmmcproof.com.

How UCF's Knight Shield is Revolutionizing Cybersecurity Compliance
In this episode of the CMMC Proof Podcast, host Derrich Phillips sits down with Tammie McClellan, Deputy CISO at the University of Central Florida (UCF). With over 31 years of experience at UCF, Tammie dives into the challenges of CMMC compliance in the higher education and research space. She shares valuable insights on the Knight Shield initiative, which aims to streamline the compliance process while protecting Controlled Unclassified Information (CUI). The conversation covers the evolving landscape of cybersecurity regulations, including NIST and the potential impact of future policies like NSPM-33. Tammie emphasizes the importance of collaboration between cybersecurity professionals and researchers to achieve seamless compliance. She also highlights the critical role of program managers and the need for continuous learning and mentorship in the field. Don't miss Tammie's valuable insights on how R1 research universities like UCF are navigating the evolving world of cybersecurity compliance.

Satisfying CMMC Requirements with SIEM & SOAR Technology
In this insightful conversation, cybersecurity coach and instructor Kenneth Ellington provides and overview how SIEM and SOAR technology to meet CMMC requirements, specifically for small businesses. He shares practical advice on leveraging SIEM technology, emphasizing the importance of baseline understanding and tuning to avoid unexpected costs related to logging. Kenneth also offers tips on navigating license costs, data ingestion, and documentation to optimize cybersecurity efforts. Kenneth highlights the importance of hiring staff with honesty, integrity, and technical competence to manage SIEM solutions effectively. He also discusses the growing role of AI in threat hunting and the value of continuous learning and personal growth in the field. For businesses looking to strengthen their cybersecurity, Kenneth shares best practices, alternative solutions for log tracking, and the benefits of fractional SOC management services. Connect with us at www.aspirecyber.com Visit https://kenneth-ellington-s-school.teachable.com/p/home to learn more about Kenneth Ellington

Inside the United States v. Georgia Tech Case: A Deep Dive into the DOJ's Cybersecurity Allegations
In this compelling episode, we explore the recent whistleblower lawsuit filed by the United States Department of Justice against Georgia Tech and Georgia Tech Research Corporation. This case, which alleges significant cybersecurity breaches, has sent shockwaves through the defense contracting and academic communities. Key Takeaways: Specific Contracts and Violations: We break down the particular contracts involved and the critical cybersecurity lapses, including failure to implement a System Security Plan (SSP) and the use of a false cybersecurity score. Egregious Violations: The case highlights the most serious violations—such as operating without anti-virus protection, submitting a fictitious SPRS score, and creating a false SSP based on a non-existent campus IT system. Intentional Misconduct: We delve into how Georgia Tech and GTRC knowingly violated federal cybersecurity requirements, particularly in handling Controlled Unclassified Information (CUI). Evidence and Documentation: Explore the evidence presented, including incriminating emails, text messages, and sworn testimonies that reveal a pattern of non-compliance and false claims. Impact on the Government: Learn about the damage done to the U.S. government, including millions of dollars paid for services that did not meet contractual obligations due to these cybersecurity failings. This episode is a must-watch for anyone involved in government contracting, cybersecurity, or compliance. We provide insights into how these violations were uncovered, the legal implications, and what this means for the future of cybersecurity in federally funded research. 🔔 Don't forget to subscribe stay updated with our latest episodes on cybersecurity, legal developments, and more! Useful Links: DOJ Filing- https://www.justice.gov/opa/pr/united-states-files-suit-against-georgia-institute-technology-and-georgia-tech-research

Secure My Research: Revolutionizing Cybersecurity in Academia
Join us as Will Drake, Senior Security Analyst at Indiana University, dives into the intricate world of cybersecurity in academia. In this enlightening conversation, Will shares the successful strategies and challenges of the "Secure My Research" initiative, aimed at implementing cybersecurity best practices in research environments. What You'll Discover: Streamlined Solutions: Learn how Indiana University is providing end-to-end secure solutions to support researchers. Advocacy in Action: Explore how advocacy helps overcome barriers and secure research data, with practical examples from the program. Empathy in Cybersecurity: Understand the critical role of interpersonal skills and empathy in crafting security measures that respect and enhance research workflows. Salesforce CRM in Cybersecurity: Insights on leveraging Salesforce CRM for effective documentation and stakeholder management. Professional Insights: Will also discusses his personal journey in cybersecurity, touching on overcoming imposter syndrome and the importance of unique strengths. Tune in to gain a comprehensive understanding of how cybersecurity can coexist seamlessly with academic research, fostering innovation while ensuring security. Secure My Research: https://cacr.iu.edu/projects/SecureMyResearch/index.html

Inside the NIST Small Business Quick Start Guide
Join Derrich Phillips in an engaging discussion with Daniel Eliot, the lead for small business engagement at NIST, on the latest episode of CMMC Proof podcast. They explore the updated NIST Cybersecurity Framework and its Small Business Quick Start Guide, focusing on practical insights and challenges faced by small businesses in implementing cybersecurity measures. Highlights include Daniel's role at NIST, key changes in the cybersecurity framework, and strategies for small businesses to adopt a risk-based approach. Discover actionable steps across the framework's functions: identify, protect, detect, respond, and recover, tailored for improving cybersecurity resilience. Key Takeaways: Insights into adapting cybersecurity behaviors and practices for organizational growth. The significance of prioritization in cybersecurity efforts, addressing critical vulnerabilities. NIST's community-driven approach to framework development, with valuable input and resources. Practical tools such as implementation examples, quick start guides, and community profiles to aid businesses in their cybersecurity journey.

The Inside Scoop: A Former DOJ Attorney's Behind-the-Scenes of False Claims Act Investigations
Join us for an exclusive insider's perspective as Reneé Brooker, former Civil Frauds Assistant Director at the United States Department of Justice, shares her insights into False Claims Act (FCA) investigations. With her extensive experience supervising all FCA cases in 94 United States District Courts and overseeing billions of dollars in recoveries, she offers a unique understanding of holding companies accountable for their conduct. Don't miss this rare opportunity to gain valuable insights from a seasoned legal expert in the field.

Decoding Cybersecurity Law: Expert Insights with Jim Dempsey
In this conversation, Jim Dempsey discusses his book 'Cybersecurity Law Fundamentals' and the current state of cybersecurity and privacy laws in the United States. He highlights the patchwork of laws and regulations that exist, the need for a comprehensive cybersecurity law, and the importance of asset inventory and risk assessment for companies. Jim also discusses the role of whistleblowers in addressing cyber fraud and the potential impact of the False Claims Act on improving cybersecurity compliance. The current state of cybersecurity and privacy laws in the United States is a patchwork of regulations and standards, with no comprehensive cybersecurity law in place. Companies need to prioritize asset inventory and risk assessment as part of their cybersecurity practices. Whistleblowers play a crucial role in addressing cyber fraud, and the False Claims Act provides incentives for individuals to come forward and report non-compliance. There is a need for more enforcement and accountability in cybersecurity and privacy practices, with a focus on reasonable requirements and third-party assessments. The intersection of the False Claims Act and the implementation of the Cybersecurity Maturity Model Certification (CMMC) could lead to improved compliance and accountability in government contracts. Link to purchase Jim's book- Cybersecurity Law Fundamentals (2024) https://iapp.org/resources/article/cybersecurity-law-fundamentals/ Visit www.aspirecyber.com to learn more about how to Get CMMC Compliant ASAP.

Mentoring Cyber Warriors Beyond the Classroom
Join us on the latest episode of the CMMC Proof podcast as we delve into the fascinating world of cybersecurity education with our special guest, Spiros Bamiatzis, Department Chair of Cybersecurity, and NSA Grant Program Director at Ivy Tech. In this episode, Spiros shares his expertise on the critical role of professors in mentoring and guiding students in cybersecurity education. We explore the rapidly evolving landscape of emerging technologies and discuss how AI is both aiding cyber professionals and posing challenges as cybercriminals leverage its power. Spiros also highlights the importance of certifications in the cybersecurity field and how they add value to professionals' skill sets. Additionally, we delve into the pivotal role cybersecurity plays in thwarting terrorist attacks and safeguarding national security. Don't miss this enlightening conversation packed with valuable insights and practical advice from a seasoned cybersecurity educator. Subscribe to the CMMC Proof podcast to stay updated on the latest episodes and expert discussions in the world of cybersecurity compliance.

Accelerating CMMC Compliance: Research Universities on the Fast Track
Join us for an insightful episode of the CMMC Proof podcast as we sit down with Wendy Epley, an experienced regulatory compliance expert with a passion for export controls and cybersecurity. With over a decade dedicated to the field, Wendy bridges the gap between export controls and cybersecurity, a vital intersection in today's regulatory landscape. As the Principal Analyst at the University of Arizona's Information Security Office, Wendy leads initiatives in Information Security in Contracting and Federated Cyber Risk Management. Her expertise helps various university units navigate federal regulations and compliance frameworks such as CMMC and NIST publications. In this episode, Wendy shares her wealth of knowledge, offering practical insights into managing security posture, risk tolerance, and contractual obligations within the academic and research sector. Discover how Wendy's unique approach emphasizes balance, flexibility, and shared responsibility, empowering organizations to achieve their mission while staying compliant. Don't miss this engaging conversation where Wendy discusses her experiences, challenges, and the innovative solutions used at the University of Arizona. Tune in to gain invaluable perspectives on regulatory compliance and cybersecurity in academia, and learn how Wendy's expertise can benefit your organization's compliance journey. Subscribe now and stay updated on the latest episodes of the CMMC Proof podcast!

Cybersecurity False Claims Act Cases Unsealed
In this episode of the CMMC Proof Podcast, attorney Julie Bracker joins us to discuss her unsealed whistleblower cases involving False Claims Act (FCA) claims for cybersecurity noncompliance against Penn State and Georgia Tech. Julie outlines the history and purpose of the False Claims Act, the role of whistleblowers in exposing fraud, waste, and abuse, and the recent focus on cybersecurity in False Claims Act cases. She shares insights into the Georgia Tech case and her experience working with the Department of Justice. Since 2006, Julie Bracker has focused her practice exclusively on representing whistleblowers around the country in False Claims Act litigation. In 2015, with her partner Jason Marcus, she founded Bracker & Marcus LLC. Visit http://www.fcacounsel.com/ to if you would like to contact attorney Julie Bracker. Join the CMMC Proof LinkedIn Group: https://www.linkedin.com/groups/14363176/ Visit www.aspirecyber.com Follow Derrich on LinkedIn: https://www.linkedin.com/in/derrichphillips/

Securing Super Computers at R1 Research Universities: CMMC Best Practices
In this episode of the CMMC Proof Podcast, Dr. Erik Deumens explores the unique challenges research universities face in securing high-performance computers to comply with the Cybersecurity Maturity Model Certification (CMMC). Dr. Deumens discusses practical strategies and best practices for ensuring CMMC compliance, offering a comprehensive guide for organizations working with high-performance computing systems. Don't miss this expert advice on safeguarding your high-performance computers and meeting CMMC requirements. Join the CMMC Proof LinkedIn Group: https://www.linkedin.com/groups/14363176/ Visit www.aspirecyber.com Follow Derrich on LinkedIn: https://www.linkedin.com/in/derrichphillips/

NSA's No-Cost Cybersecurity Services for Defense Contractors | CMMC
Join us for an insightful interview with Bailey Beckley, Chief DIB Defense at NSA, as she discusses the no-cost cybersecurity services offered to the Defense Industrial Base (DIB). Learn how the NSA Cybersecurity Collaboration Center (CCC) partners with industry, interagency, and international entities to enhance cybersecurity for the DIB. Discover the range of services available, including Protective Domain Name Services (DNS), Attack Surface Management, and Threat Intelligence Collaboration, all designed to help DoD contractors protect against cyber threats. If your organization has an active DoD contract, don't miss this opportunity to learn how to enroll in NSA's DIB Cybersecurity services. Stay ahead of the adversary and secure your network with NSA's cybersecurity expertise.
Insider's Guide to CMMC Rulemaking and Federal Contracting
In this episode of the CMMC Proof Podcast, we dive into the world of CMMC rulemaking and federal contracting with Shauna Weatherly, President and Founder of FedSubK. With over 35 years of federal procurement experience, Shauna brings a wealth of knowledge to the table. We discuss the latest developments in CMMC rulemaking, insights into federal contracting, and practical advice for businesses navigating the federal procurement landscape. Join us for an enlightening conversation that sheds light on key aspects of CMMC and federal contracting.

Whistleblowers Allege Cybersecurity Noncompliance at Georgia Tech
In this episode, we delve into the False Claims Act (FCA) allegations against Georgia Institute of Technology (Georgia Tech) and its research corporation, Georgia Tech Research Corporation (GTRC), for cybersecurity noncompliance. We also compare this case to the FCA action against The Pennsylvania State University (Penn State) and highlight the increasing scrutiny universities face for federal grant compliance. Additionally, we explore the implications for universities and government contractors and the need for robust cybersecurity compliance programs. Stay tuned to learn more about these important issues!

Simplifying Cybersecurity Compliance: Translating Tech Talk | CMMC | NIST
In this episode of the CMMC Proof Podcast, we dive into the world of cybersecurity compliance with Jay Gallman, Risk Advisor at Duke University. Jay sheds light on the challenges of translating technical cybersecurity requirements into plain English, making compliance more accessible for everyone. From deciphering complex jargon to simplifying technical concepts, Jay discusses practical strategies for bridging the gap between technical teams and non-technical stakeholders. Join us as we explore how effective communication can streamline cybersecurity compliance and enhance overall security posture. Jay discusses Duke's journey in preparing for a CMMC Level 2 assessment, highlighting lessons learned and best practices. He also shares valuable experiences from his work with various universities through Educause and the Regulated Research Community of Practice (RRCoP). 🔔 Subscribe for the lastest cybersecurity compliance news Visit www.aspirecyber.com 🔗 Connect with Jay Gallman on LinkedIn: / jay-gallman
Securing Your Digital Assets: Leveraging CISA's Free Cybersecurity Services
Join us as Jim Hofleen, CISA's Regional Cybersecurity Advisor for Iowa, shares invaluable insights into leveraging cybersecurity resources. With over 30 years of experience, Jim provides expert guidance on bolstering your organization's cyber defenses. Whether you're a small business or a large multinational organization, CISA offers free cybersecurity services and resources tailored to your needs. In this interview, we delve into practical strategies, tips, and resources offered by CISA to enhance your cybersecurity posture. Don't miss out on this opportunity to fortify your digital resilience with Jim's expertise and CISA's support. Visit https://www.cisa.gov/ to learn more Checkout www.aspirecyber.com

CMMC and R1 Research Universities: Challenges and Solutions
Explore the World of CMMC Compliance in Research Universities 🏫 Join us in this engaging episode of the CMMC Proof Podcast as we delve deep into the unique challenges and strategies surrounding CMMC compliance in R1 Research Universities. Our special guest, Laura Raderman, Team Lead, Policy and Compliance Coordinator at Carnegie Mellon University, Certified CMMC Assessor (CCA) with over 20 years of information security experience, shares her invaluable insights and lessons learned. In this episode, we discuss: - The specific challenges that Research Universities face in achieving CMMC compliance. - Laura's thoughts on the CMMC Proposed Rule and its implications for the higher education sector. - How universities navigate the complex landscape of multiple security frameworks, including PCI and CMMC. - The importance of having decision-makers at the table when crafting CMMC compliance strategies. - Laura's role in Educause and RRCOP, and their mission to enhance cybersecurity in higher education. - Lessons learned and culture change in the journey towards CMMC compliance. Whether you're part of the higher education community or interested in CMMC compliance, this episode offers valuable insights and expertise that you won't want to miss. Hit that 'Play' button and join the conversation today! 🔗 Explore more CMMC insights and resources on our website: www.aspirecyber.com Don't forget to like, subscribe, and share this podcast to stay updated on the latest in cybersecurity and CMMC compliance."
CMMC Compliance Pitfalls: How to Avoid Costly Mistakes
🎙️ In this episode of the CMMC Proof Podcast, we sit down with Jacob Hill, the Founder of GRC Academy, who brings his real-world experience to the forefront. Jacob's journey through NIST SP 800-171 and ISO 27001 compliance for his defense contractor employer is nothing short of a masterclass in conquering the compliance maze. He shares first-hand experiences, lessons learned, and practical insights that will empower organizations of all sizes to navigate the complex world of cybersecurity regulations. But there's more! Jacob also unveils the impressive array of CMMC resources offered by the GRC Academy, both free and premium. Whether you're a cybersecurity professional, a business owner, or an organization striving for compliance excellence, you won't want to miss this goldmine of knowledge. Tune in now to discover how to fortify your compliance strategy and explore the wealth of resources at your fingertips with GRC Academy!
Navigating the Cyber Maze: Compliance Strategies for Research Universities
Welcome to our latest episode of the Cybersecurity Insights Podcast, where we delve into the complex world of cybersecurity compliance in academia. In this enlightening episode, we are honored to host Dr. Michael Dwyer, the esteemed IT Director at BNAC, who brings a wealth of knowledge and experience in navigating the intricate landscape of cybersecurity within research universities. Join us as Dr. Dwyer shares his expert insights on the challenges and strategies involved in ensuring compliance in an ever-evolving cyber environment. We cover a range of critical topics, including: The Current State of Cybersecurity in Academia: Understanding the unique cybersecurity challenges faced by research universities. Developing a Robust Compliance Framework: Dr. Dwyer discusses the essential components of a successful compliance strategy tailored for academic institutions. Overcoming Common Compliance Hurdles: Practical advice on how universities can effectively address and overcome common obstacles in maintaining cybersecurity compliance. Future Trends and Predictions: Insights into the future of cybersecurity in higher education and how institutions can stay ahead of emerging threats. Whether you're an IT professional in academia, a cybersecurity enthusiast, or just keen on understanding the complexities of cyber compliance in the educational sector, this episode is packed with valuable information. 🔗 Don't forget to subscribe to our channel for more insightful conversations with industry leaders. If you find this episode useful, please like, share, and comment to join the conversation. We value your input and look forward to bringing you more engaging content!
CMMC 2.0 Proposed Rule Decoded: What Defense Contractors Need to Know!
The DoD cybersecurity compliance landscape is shifting, and it's crucial for defense contractors and subcontractors to stay informed. Our latest podcast breaks down the complexities of the CMMC 2.0 Proposed Rule, ensuring you're prepared for the changes ahead.
Leveraging Reinforcements to Conquer Cybersecurity Compliance
In this episode, Instructional Dean Kimberly Hubbard from Lone Star College discusses the challenges and unique aspects of cybersecurity education in higher education. She highlights the role of Lone Star College in providing relevant programs and experiences for students, as well as the compliance challenges faced by educational institutions. Dean Hubbard emphasizes the importance of authenticity, transparency, and preparedness in gaining buy-in from senior leadership and stakeholders. She also discusses the role of students and industry partners in helping with compliance challenges and the need for continuous learning in the rapidly changing field of cybersecurity.
S1 Ep 2Defending Against Cyber Attacks with Laser Precision
In this episode of the CMMC Proof Podcast, join us as we delve into the world of cyber defense with CIO Joseph Gunnells from D'Youville University. Gain insights into real-life incident response activities and discover how D'Youville University defends against cyberattacks with laser precision. Don't miss this informative discussion on safeguarding higher education institutions from cyber threats.
S1 Ep 1Conquering the CMMC Battlefield in Higher Education
Welcome to the debut episode of the CMMC Proof Podcast! Join us as host Derrich Phillips, a Certified CMMC Assessor and Provisional Instructor, provides an insightful introduction to the world of CMMC compliance in higher education. In this episode, Derrich shares his CMMC credentials, providing context to his extensive expertise in the field. He also takes you behind the scenes, sharing the backstory of how CMMC Proof came into existence and the driving force behind its mission. Our mission at CMMC Proof is to navigate the complex terrain of the Cybersecurity Maturity Model Certification (CMMC) and its impact on research universities. We are dedicated to addressing the unique challenges faced by academic institutions when it comes to CMMC compliance. This podcast is your go-to source for actionable intelligence and strategies to bolster your institution's cybersecurity posture. Join us for elite conversations with CMMC leaders from prestigious research universities as they decode the encrypted messages of best practices and lessons learned. Discover how academia is deploying cutting-edge technology, including AI, to fortify its CMMC defenses. At CMMC Proof, we believe that compliance can be transformed from a battlefield into a training ground for CMMC excellence in academia. Our goal is to equip university leaders and IT professionals with the intelligence and ammunition needed to turn CMMC challenges into opportunities for victory and innovation. Subscribe now and embark on a journey toward a future where CMMC compliance becomes your university's shield and spear in the digital age. Stay tuned for mission-critical insights and a wealth of knowledge to strengthen your institution's CMMC defenses.