Artwork

内容由Michigan Business Network提供。所有播客内容(包括剧集、图形和播客描述)均由 Michigan Business Network 或其播客平台合作伙伴直接上传和提供。如果您认为有人在未经您许可的情况下使用您的受版权保护的作品,您可以按照此处概述的流程进行操作https://zh.player.fm/legal
Player FM -播客应用
使用Player FM应用程序离线!

Faces of Manufacturing | Episode 17 - Dewpoint

35:50
 
分享
 

Manage episode 461663038 series 1164381
内容由Michigan Business Network提供。所有播客内容(包括剧集、图形和播客描述)均由 Michigan Business Network 或其播客平台合作伙伴直接上传和提供。如果您认为有人在未经您许可的情况下使用您的受版权保护的作品,您可以按照此处概述的流程进行操作https://zh.player.fm/legal
Faces of Manufacturing is a new show to Michigan Business Network. Cindy Kangas, Executive Director, CAMC, Capital Area Manufacturing Council, Lansing, Michigan, co-hosts with Joy Wagner, HR Manager of Granger Waste Services, also Lansing. Cindy and Joy strive to share the corporate culture, personal stories, and unique personalities of those making a living in manufacturing today, in Michigan. With that in mind, this month they connected with several members of Dewpoint. Cindy and Joy share that for this interview they sat down for Episode 17 of Faces of Manufacturing on MI Business Network with Dewpoint's Don Cornish, CISO/ Security Architect Ernesto Cuevas, CIO, Chief Innovation Officer Bob Bartholomew, President & CEO Questions from Don: Intro - Backgrounds of Don / Ernesto Intro as to what CMMC is and who is impacted Steps in the CMMC journey - Timing Flow down clause from Prime contractor to sub-contractors.. this is necessary to understand/ What needs to be done - When it needs to be done - Who can help? MEDC program Dive Deeper into the Department of Defense (DoD), or they act as subs to companies that do work for DoD. Now that the final ruling has been filed, it is real and companies will need to understand what they may need to do, how they may or may not be impacted, etc.. Vulnerability program versus a Penetration test, what are they and why are they different... About CMMC and Its Role in DoD Contracts What exactly is the Cybersecurity Maturity Model Certification (CMMC) and why was it introduced? How does CMMC impact companies seeking Department of Defense (DoD) contracts? Can you explain the different levels of CMMC certification? What are the key requirements for businesses to obtain CMMC certification? How does CMMC differ from other cybersecurity frameworks such as NIST or ISO 27001? What are the consequences for contractors if they don’t meet CMMC requirements? How do DoD contractors prepare for a CMMC audit? What is the timeline for CMMC certification becoming mandatory for all DoD contracts? How does CMMC address the protection of Controlled Unclassified Information (CUI)? What types of companies need CMMC certification? Does it apply to all businesses in the DoD supply chain? How does the CMMC model affect small and medium-sized enterprises (SMEs) that want to work with the DoD? What is the process for a company to get assessed for CMMC certification? What are some common mistakes companies make when preparing for CMMC certification? How can companies stay up to date with changes in the CMMC framework and DoD requirements? What role do third-party assessment organizations (C3PAOs) play in the CMMC certification process? What are the costs involved in obtaining and maintaining CMMC certification? Can a company with a low CMMC level still participate in certain DoD contracts? Are there any exceptions or exemptions to CMMC requirements for certain types of contracts or businesses? What happens if a company’s CMMC certification expires? How will CMMC impact the competitive landscape for DoD contractors? About the Importance of a Local Internet Security Team Why is having a local internet security team so important for businesses, especially those working with the DoD? What benefits does a local cybersecurity team bring over outsourcing security to a remote or third-party vendor? How does a local security team ensure that the specific needs of a business are met in terms of cybersecurity? Can a local security team respond more quickly to a cybersecurity incident than a remote team? What are some advantages of a local security team being familiar with local regulatory and compliance standards? How does a local internet security team integrate with a company’s overall IT strategy? What role does a local security team play in training employees to follow cybersecurity best practices? How do local security teams build a culture of security within a company? (among several others)....
  continue reading

7254集单集

Artwork
icon分享
 
Manage episode 461663038 series 1164381
内容由Michigan Business Network提供。所有播客内容(包括剧集、图形和播客描述)均由 Michigan Business Network 或其播客平台合作伙伴直接上传和提供。如果您认为有人在未经您许可的情况下使用您的受版权保护的作品,您可以按照此处概述的流程进行操作https://zh.player.fm/legal
Faces of Manufacturing is a new show to Michigan Business Network. Cindy Kangas, Executive Director, CAMC, Capital Area Manufacturing Council, Lansing, Michigan, co-hosts with Joy Wagner, HR Manager of Granger Waste Services, also Lansing. Cindy and Joy strive to share the corporate culture, personal stories, and unique personalities of those making a living in manufacturing today, in Michigan. With that in mind, this month they connected with several members of Dewpoint. Cindy and Joy share that for this interview they sat down for Episode 17 of Faces of Manufacturing on MI Business Network with Dewpoint's Don Cornish, CISO/ Security Architect Ernesto Cuevas, CIO, Chief Innovation Officer Bob Bartholomew, President & CEO Questions from Don: Intro - Backgrounds of Don / Ernesto Intro as to what CMMC is and who is impacted Steps in the CMMC journey - Timing Flow down clause from Prime contractor to sub-contractors.. this is necessary to understand/ What needs to be done - When it needs to be done - Who can help? MEDC program Dive Deeper into the Department of Defense (DoD), or they act as subs to companies that do work for DoD. Now that the final ruling has been filed, it is real and companies will need to understand what they may need to do, how they may or may not be impacted, etc.. Vulnerability program versus a Penetration test, what are they and why are they different... About CMMC and Its Role in DoD Contracts What exactly is the Cybersecurity Maturity Model Certification (CMMC) and why was it introduced? How does CMMC impact companies seeking Department of Defense (DoD) contracts? Can you explain the different levels of CMMC certification? What are the key requirements for businesses to obtain CMMC certification? How does CMMC differ from other cybersecurity frameworks such as NIST or ISO 27001? What are the consequences for contractors if they don’t meet CMMC requirements? How do DoD contractors prepare for a CMMC audit? What is the timeline for CMMC certification becoming mandatory for all DoD contracts? How does CMMC address the protection of Controlled Unclassified Information (CUI)? What types of companies need CMMC certification? Does it apply to all businesses in the DoD supply chain? How does the CMMC model affect small and medium-sized enterprises (SMEs) that want to work with the DoD? What is the process for a company to get assessed for CMMC certification? What are some common mistakes companies make when preparing for CMMC certification? How can companies stay up to date with changes in the CMMC framework and DoD requirements? What role do third-party assessment organizations (C3PAOs) play in the CMMC certification process? What are the costs involved in obtaining and maintaining CMMC certification? Can a company with a low CMMC level still participate in certain DoD contracts? Are there any exceptions or exemptions to CMMC requirements for certain types of contracts or businesses? What happens if a company’s CMMC certification expires? How will CMMC impact the competitive landscape for DoD contractors? About the Importance of a Local Internet Security Team Why is having a local internet security team so important for businesses, especially those working with the DoD? What benefits does a local cybersecurity team bring over outsourcing security to a remote or third-party vendor? How does a local security team ensure that the specific needs of a business are met in terms of cybersecurity? Can a local security team respond more quickly to a cybersecurity incident than a remote team? What are some advantages of a local security team being familiar with local regulatory and compliance standards? How does a local internet security team integrate with a company’s overall IT strategy? What role does a local security team play in training employees to follow cybersecurity best practices? How do local security teams build a culture of security within a company? (among several others)....
  continue reading

7254集单集

所有剧集

×
 
Loading …

欢迎使用Player FM

Player FM正在网上搜索高质量的播客,以便您现在享受。它是最好的播客应用程序,适用于安卓、iPhone和网络。注册以跨设备同步订阅。

 

快速参考指南

边探索边听这个节目
播放