- Understand the three fundamental elements of compliance.
WEBINAR
The CMMC 2.0 Compliance Playbook
What to do, how to do it, and by when.Recorded | Anytime | Your Desk! |
CyberSheath CEO
CMMC simplified with CyberSheath's proven compliance playbook. CyberSheath has been meeting the challenge of the evolving DoD cybersecurity requirements for our clients for over a decade. The completion of hundreds of assessments and implementations for Prime and Sub-contractors, combined with a history of successful government-led audits, enables us to answer the two questions every business asks about CMMC. How much will it cost, and how long will it take to be compliant? Attend this webinar to accelerate your compliance journey by understanding what to do, how to do it, and when.
Join us on our upcoming webinar to learn how you can strategically address CMMC by building on the three fundamental elements of compliance, prioritizing control implementation, and developing an achievable timeline for your business.
During this Webinar, You'll Learn:
-
Prioritize control implementation for maximum impact.
- Develop an achievable, cost-conscious timeline for compliance.
Speakers:
CyberSheath CEO
Mr. Noonan is a respected cybersecurity expert having testified before the House Armed Services Committee (HASC) Subcommittee on Emerging Threats and Capabilities and served on the Council on Cyber Security expert panel to review and update the Critical Security Controls.
Prior to founding CyberSheath, Eric was the Global Chief Information Security Officer for BAE Systems plc, based in London. Concurrently Eric served as Vice President and General Manager of North American IT operations, overseeing engineering, architecture, and IT operations support for approximately 39,000 employees.
CyberSheath VP of Compliance
Mr. Lang has over ten years of experience in cybersecurity, business resilience, and information technology from various roles in industries such as defense, healthcare, and retail.
He has expertise in CMMC compliance, security program development and assessment, and has extensive experience in strategically planning security and business continuity programs based upon internationally recognized standards of practice from NIST, ISO, FISMA, and the PCI-SSC.