Share CMMC Proof
Share to email
Share to Facebook
Share to X
By Derrich Phillips
The podcast currently has 22 episodes available.
In this insightful conversation, cybersecurity coach and instructor Kenneth Ellington provides and overview how SIEM and SOAR technology to meet CMMC requirements, specifically for small businesses.
He shares practical advice on leveraging SIEM technology, emphasizing the importance of baseline understanding and tuning to avoid unexpected costs related to logging. Kenneth also offers tips on navigating license costs, data ingestion, and documentation to optimize cybersecurity efforts.
Kenneth highlights the importance of hiring staff with honesty, integrity, and technical competence to manage SIEM solutions effectively. He also discusses the growing role of AI in threat hunting and the value of continuous learning and personal growth in the field.
For businesses looking to strengthen their cybersecurity, Kenneth shares best practices, alternative solutions for log tracking, and the benefits of fractional SOC management services.
Connect with us at www.aspirecyber.com
Visit https://kenneth-ellington-s-school.teachable.com/p/home to learn more about Kenneth Ellington
In this compelling episode, we explore the recent whistleblower lawsuit filed by the United States Department of Justice against Georgia Tech and Georgia Tech Research Corporation. This case, which alleges significant cybersecurity breaches, has sent shockwaves through the defense contracting and academic communities.
Key Takeaways:
Join us as Will Drake, Senior Security Analyst at Indiana University, dives into the intricate world of cybersecurity in academia. In this enlightening conversation, Will shares the successful strategies and challenges of the "Secure My Research" initiative, aimed at implementing cybersecurity best practices in research environments.
What You'll Discover:
Join Derrich Phillips in an engaging discussion with Daniel Eliot, the lead for small business engagement at NIST, on the latest episode of CMMC Proof podcast. They explore the updated NIST Cybersecurity Framework and its Small Business Quick Start Guide, focusing on practical insights and challenges faced by small businesses in implementing cybersecurity measures.
Highlights include Daniel's role at NIST, key changes in the cybersecurity framework, and strategies for small businesses to adopt a risk-based approach. Discover actionable steps across the framework's functions: identify, protect, detect, respond, and recover, tailored for improving cybersecurity resilience.
Key Takeaways:
Join us for an exclusive insider's perspective as Reneé Brooker, former Civil Frauds Assistant Director at the United States Department of Justice, shares her insights into False Claims Act (FCA) investigations. With her extensive experience supervising all FCA cases in 94 United States District Courts and overseeing billions of dollars in recoveries, she offers a unique understanding of holding companies accountable for their conduct. Don't miss this rare opportunity to gain valuable insights from a seasoned legal expert in the field.
In this conversation, Jim Dempsey discusses his book 'Cybersecurity Law Fundamentals' and the current state of cybersecurity and privacy laws in the United States. He highlights the patchwork of laws and regulations that exist, the need for a comprehensive cybersecurity law, and the importance of asset inventory and risk assessment for companies.
Jim also discusses the role of whistleblowers in addressing cyber fraud and the potential impact of the False Claims Act on improving cybersecurity compliance. The current state of cybersecurity and privacy laws in the United States is a patchwork of regulations and standards, with no comprehensive cybersecurity law in place. Companies need to prioritize asset inventory and risk assessment as part of their cybersecurity practices.
Whistleblowers play a crucial role in addressing cyber fraud, and the False Claims Act provides incentives for individuals to come forward and report non-compliance. There is a need for more enforcement and accountability in cybersecurity and privacy practices, with a focus on reasonable requirements and third-party assessments.
The intersection of the False Claims Act and the implementation of the Cybersecurity Maturity Model Certification (CMMC) could lead to improved compliance and accountability in government contracts.
Link to purchase Jim's book- Cybersecurity Law Fundamentals (2024) https://iapp.org/resources/article/cybersecurity-law-fundamentals/
Visit www.aspirecyber.com to learn more about how to Get CMMC Compliant ASAP.
Join us on the latest episode of the CMMC Proof podcast as we delve into the fascinating world of cybersecurity education with our special guest, Spiros Bamiatzis, Department Chair of Cybersecurity, and NSA Grant Program Director at Ivy Tech. In this episode, Spiros shares his expertise on the critical role of professors in mentoring and guiding students in cybersecurity education. We explore the rapidly evolving landscape of emerging technologies and discuss how AI is both aiding cyber professionals and posing challenges as cybercriminals leverage its power. Spiros also highlights the importance of certifications in the cybersecurity field and how they add value to professionals' skill sets. Additionally, we delve into the pivotal role cybersecurity plays in thwarting terrorist attacks and safeguarding national security. Don't miss this enlightening conversation packed with valuable insights and practical advice from a seasoned cybersecurity educator. Subscribe to the CMMC Proof podcast to stay updated on the latest episodes and expert discussions in the world of cybersecurity compliance.
Join us for an insightful episode of the CMMC Proof podcast as we sit down with Wendy Epley, an experienced regulatory compliance expert with a passion for export controls and cybersecurity. With over a decade dedicated to the field, Wendy bridges the gap between export controls and cybersecurity, a vital intersection in today's regulatory landscape.
As the Principal Analyst at the University of Arizona's Information Security Office, Wendy leads initiatives in Information Security in Contracting and Federated Cyber Risk Management. Her expertise helps various university units navigate federal regulations and compliance frameworks such as CMMC and NIST publications.
In this episode, Wendy shares her wealth of knowledge, offering practical insights into managing security posture, risk tolerance, and contractual obligations within the academic and research sector. Discover how Wendy's unique approach emphasizes balance, flexibility, and shared responsibility, empowering organizations to achieve their mission while staying compliant.
Don't miss this engaging conversation where Wendy discusses her experiences, challenges, and the innovative solutions used at the University of Arizona. Tune in to gain invaluable perspectives on regulatory compliance and cybersecurity in academia, and learn how Wendy's expertise can benefit your organization's compliance journey. Subscribe now and stay updated on the latest episodes of the CMMC Proof podcast!
In this episode of the CMMC Proof Podcast, attorney Julie Bracker joins us to discuss her unsealed whistleblower cases involving False Claims Act (FCA) claims for cybersecurity noncompliance against Penn State and Georgia Tech.
Julie outlines the history and purpose of the False Claims Act, the role of whistleblowers in exposing fraud, waste, and abuse, and the recent focus on cybersecurity in False Claims Act cases.
She shares insights into the Georgia Tech case and her experience working with the Department of Justice. Since 2006, Julie Bracker has focused her practice exclusively on representing whistleblowers around the country in False Claims Act litigation. In 2015, with her partner Jason Marcus, she founded Bracker & Marcus LLC.
Visit http://www.fcacounsel.com/ to if you would like to contact attorney Julie Bracker.
Join the CMMC Proof LinkedIn Group: https://www.linkedin.com/groups/14363176/
Visit www.aspirecyber.com Follow Derrich on LinkedIn: https://www.linkedin.com/in/derrichphillips/
In this episode of the CMMC Proof Podcast, Dr. Erik Deumens explores the unique challenges research universities face in securing high-performance computers to comply with the Cybersecurity Maturity Model Certification (CMMC).
Dr. Deumens discusses practical strategies and best practices for ensuring CMMC compliance, offering a comprehensive guide for organizations working with high-performance computing systems. Don't miss this expert advice on safeguarding your high-performance computers and meeting CMMC requirements.
Join the CMMC Proof LinkedIn Group: https://www.linkedin.com/groups/14363176/
Visit www.aspirecyber.com
Follow Derrich on LinkedIn: https://www.linkedin.com/in/derrichphillips/
The podcast currently has 22 episodes available.