Wait & See with CMMC? Lessons Learned by Provisional Assessors, Part 2

Due to the recent change of leadership within CMMC, companies are beginning to reconsider CMMC certification. However, following the recent high-profile breaches and Executive Order 14028, the importance of following CMMC is only increasing.

Join us September 21st at 2 PM ET, as our cybersecurity experts discuss the current state of CMMC, ways organizations should approach a CMMC certification, and more. 

Our panel will discuss:

  • Why a “Wait-and-See” approach to CMMC will hurt you
  • How to get started with a CMMC gap analysis
  • How to create CMMC stickiness in your organization
  • Real-World Examples & More

Ample time will be allotted for live Q&A during the broadcast.

Learn more and register here–>

Session Speakers

Fred Tschirgi

CTO – Broadmoor Consulting – CMMC Level 3 Provisional Assessor

Fred Tschirgi is the co-founder and Chief Technology Officer at the C3PAO, Broadmoor Consulting. With a career starting as a Tactical Network Specialist in the United States Marine Corps, Fred understands the importance of a well-maintained and comprehensive security strategy at the deepest level. For this reason, he has dedicated the last year volunteering for the CMMC-AB Standards Industry Working Group as is a certified CMMC Level 3 Provisional Assessor (PA).

Tim Fawcett

Director of Cybersecurity Consulting – Guernsey, CISSP, CISA, PCIP, AVSE, CMMC Provisional Assessor Levels 1-3

Tim Fawcett is a Managing Consultant and the Director of Cyber Security Consulting at Guernsey. Founded in 1928, Guernsey is a comprehensive professional consulting firm offering architecture, engineering, and consulting services across the globe. The cybersecurity practice assists clients in securing their environments through controls review, risk assessments, penetration testing, digital forensics, and physical security.

Learn more and register here–>

Did you miss part 1 of the series? Watch the recording now. 


*** This is a Security Bloggers Network syndicated blog from Apptega Blog authored by Cyber Insights Team. Read the original post at: