NSA's No-Cost Cybersecurity Services for Defense Contractors | CMMC

Поделиться
HTML-код
  • Опубликовано: 28 авг 2024
  • Join us for an insightful interview with Bailey Beckley, Chief DIB Defense at NSA, as she discusses the no-cost cybersecurity services offered to the Defense Industrial Base (DIB).
    Learn how the NSA Cybersecurity Collaboration Center (CCC) partners with industry, interagency, and international entities to enhance cybersecurity for the DIB. Discover the range of services available, including Protective Domain Name Services (DNS), Attack Surface Management, and Threat Intelligence Collaboration, all designed to help DoD contractors protect against cyber threats.
    If your organization has an active DoD contract, don't miss this opportunity to learn how to enroll in NSA's DIB Cybersecurity services. Stay ahead of the adversary and secure your network with NSA's cybersecurity expertise.
    Chapters
    00:00
    Introduction and the Threats Faced by Defense Contractors
    02:01
    Getting Started in Government Service and the Mission of the Cybersecurity Collaboration Center
    04:17
    The Three Cybersecurity Services Offered to the Defense Industrial Base
    06:40
    The Intake Process and Onboarding for the Services
    08:12
    Why the Defense Industrial Base and Supporting Other Federal Contractors
    10:24
    The Challenges Faced by Defense Contractors and the Importance of Collaboration
    13:39
    The Decision-Making Process for the Three Services Offered
    16:06
    Pilot Services and the Evaluation Process
    20:13
    The Relationship Between NSA Services and CMMC Compliance
    22:23
    Supporting Companies in Remediation and Providing Evidence for CMMC Assessments
    24:43
    Enrollment Process and SLA for the Services
    Join the CMMC Proof LinkedIn Group: / 14363176
    Visit www.aspirecyber.com
    Follow Derrich on LinkedIn: / derrichphillips
    27:36
    Raising Awareness of the Services and Reaching the Defense Community
    29:58
    Unique Challenges and Threats Faced by Research Universities
    33:50
    Deep Dive into Protective DNS and Attack Surface Management
    40:00
    Asset Inventory and Inheritance of Risk
    41:20
    Final Thoughts and Encouragement to Take Action

Комментарии •