FCW Workshop: CMMC 2.0 What’s Changed and What’s Next - Agenda
Register    ➤

Agenda

Times are subject to change.

8:30 AM EDT

Thursday, July 28

Opening Remarks

Welcome

Event Host: Anne Armstrong, VP, Strategic Alliances, GovExec 360

Description

Welcome and Opening Remarks by Anne Armstrong, VP, Strategic Alliances, GovExec 360

8:35 AM EDT

Thursday, July 28

Opening Session

Continuously Monitoring & Securing Cyber

Kareem A. Sykes, Program Manager, Project Spectrum

Melinda Woods, Director of Industry, Innovation & Analysis, Eccalon

Description

Project Spectrum is a comprehensive, cost-effective platform that provides companies, institutions, and organizations with cybersecurity information, resources, tools, and training. The U.S. Department of Defense (DoD) recognizes Project Spectrum as a premier resource for the tools and training needed to increase cybersecurity awareness and maintain compliance in accordance with DoD contracting requirements.

On Demand

9:05 AM EDT

Thursday, July 28

Technology Insights

Don’t Let CMMC Limit You - Compliance is not the destination, it’s part of the journey

Travis Rosiek, VP of Public and Private Partnerships, IronNet Cybersecurity

Description

Hear from IronNet’s Travis Rosiek who will share his unique understanding of the cybersecurity challenges facing organizations today and his call to action for taking a proactive approach to protecting your network.

You will learn:
— Why CMMC is a Cyber security call to action
— Why is there a sense of urgency surrounding CMMC today
— What are the consequences of ignoring CMMC requirements
— Why a proactive approach is better than reactive
— How collective defense is an important component of cybersecurity and CMMC

Sponsored By: IronNet

On Demand

9:25 AM EDT

Thursday, July 28

Government Session

Government Session: DOD

Diane Knight, Cybersecurity Maturity Model Certification (CMMC) Program, Department of Defense

Session Opening Remarks: Doug Hopkins, Senior Director, DoD/IC, Gigamon

Description

Ms. Knight will discuss her role in DOD CMMC Program Management Office, which supports all facets of the CMMC Program, including the development of CMMC 2.0 and its implementation plan for the Department. 

Sponsored by: Gigamon

On Demand

9:50 AM EDT

Thursday, July 28

Technology Insights

New Mandatory CUI Identification and Marking Requirements for CMMC 2.0

Bill Kalogeros, Director, Federal and Defense, archTIS

Description

Government, defense and defense industry base (DIB) must meet the demands of both the DoD and the critical infrastructure players and map to critical controls laid out in CMMC 2.0, NIST 800-171, and NIST 800-53 to adequately protect Controlled Unclassified Information (CUI) and Federal Contract Information (FCI). Many agencies and DIBs are struggling with how to implement required information security controls and marking requirements to data in their Microsoft stack.

We will discuss the challenges of implementing the mandated best practices for the handling of CUI and FCI to meet these guidelines and how to tackle them using data-centric zero trust security techniques.

You will learn:
— New CMMC 2.0 mandatory CUI marking requirements
— Challenges of tagging, marking and securing CUI and FCI
— How to dynamically identify, tag, mark and protect CUI and FCI in Microsoft 365 and SharePoint On-premises

Sponsored By: archTIS

On Demand

10:10 AM EDT

Thursday, July 28

Coffee Break

Coffee Break

Description

A chance to stretch your legs and refill your coffee!

10:15 AM EDT

Thursday, July 28

Government Session

NIST SP 800-171/172 and CMMC

Victoria Yan Pillitteri, Manager, Security Engineering and Risk Management Group, Computer Security Division, Information Technology Laboratory, National Institute of Standards and Technology

Description

Almost everyone agrees on the importance of protecting sensitive but unclassified information. But not everyone agrees on the same approach to solve the problem. Agencies are provided with many directives and deadlines about how to protect their systems and the data within them. NIST is a source of some of the most important.

On Demand

10:40 AM EDT

Thursday, July 28

Technology Insights

I Have a Self-Assessed SPRS Score…Now What?

Robert Hill, CEO, Cyturus Technologies, Inc.

Description

Establishing a self-assessed SPRS score is just the first step.  How does an organization apply quantification to that score?  How do you decide the remediation required to improve that score?  How do you articulate the work effort and out-of-band budget requirements to Leadership as well as timelines necessary for those required remediation activities.  In this session we will be discussing the necessity of integrating a system to assist in managing these complex variables as your organization undertakes the activities beyond establishing the required point in time score and prepares for Certification.

Sponsored By: Cyturus

On Demand

11:00 AM EDT

Thursday, July 28

Government Session

Government Session: CyberAB

Matt Travis, CEO, CyberAB

Description

Hear from CyberAB CEO at the CMMC Workshop

On Demand

11:25 AM EDT

Thursday, July 28

Technology Insights

Threats and Adversaries to the Defender Industrial Base (DIB): A Defender's Perspective

Saif Rahman, CEO and Co-Founder, Quzara

Description

More than 200,000 companies provide supplies, parts, and manufacturing for DOD's weapon systems. The defense industrial base has been pummeled with new cybersecurity vulnerabilities year on year. We are under attack in every way, every day. This critical industry faces persistent, increasing threats of sophisticated intellectual property theft, economic espionage, cybercrime, and other forms of attacks.  The result is that foreign actors are stealing large amounts of sensitive data, trade secrets, and intellectual property every day from DIB firms. This severely erodes not only the DIB, but it could potentially harm future U.S. military operations as Industry experts have noted. We walk through Incident Response requirements that exist now, and other emerging mandates. We also perform an overview of Modern threats and Security operations.

Operational viewpoint of a Modern SOC building frameworks from content to services to react to modern threats. We will highlight handling threats through the lens of a SOC.  We will have the following core focus areas.

— The state of the union on Modern threats
— The overview the Government Incident Response requirements
— An overview of the Ransomware Ecosystem and Nation State
— Why is this problem way beyond and more critical than a compliance issue?
— Why do these people care about the DIB anyways?
— Anatomy of a Hack
— Building scale and capacity to hunt and search for modern threats.

Sponsored By: Quzara

On Demand

11:45 AM EDT

Thursday, July 28

Government Session

Government Session: U.S. Air Force

Kelley Kiernan, CISM, Chief Technology Officer, DAF SBIR/STTR Program Office, U.S. Air Force

Description

Kelley Kiernan, from the office of the US Air Force and US Space Force Chief Information Security Officer, will talk about the Blue Cyber initiative providing cybersecurity and information protection outreach to  Air Force/Space Force Small Business and Academic Institution contractors.  Come listen to Kelley talk about all the resources available in the small business cybersecurity ecosystem.

On Demand

12:10 PM EDT

Thursday, July 28

Closing

Event Closing Remarks

Alex Whitworth, Sales Director, Carahsoft

Description

Hear from Alex Whitworth, Carahsoft as he rounds out the CMMC Workshop.

Sponsored By: Carahsoft

12:15 PM EDT

Thursday, July 28

Closing

Thank you

Description

Thanks for joining us!