<?xml version="1.0" encoding="UTF-8" ?>
<?xml-stylesheet href="https://rss.buzzsprout.com/styles.xsl" type="text/xsl"?>
<rss version="2.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:podcast="https://podcastindex.org/namespace/1.0" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:psc="http://podlove.org/simple-chapters" xmlns:atom="http://www.w3.org/2005/Atom">
<channel>
  <atom:link href="https://feeds.buzzsprout.com/2371779.rss" rel="self" type="application/rss+xml" />
  <atom:link href="https://pubsubhubbub.appspot.com/" rel="hub" xmlns="http://www.w3.org/2005/Atom" />
  <title>CMMC News by Jun Cyber</title>

  <lastBuildDate>Thu, 05 Mar 2026 14:41:03 -0500</lastBuildDate>
  <link>https://www.cmmcnews.com</link>
  <language>en-us</language>
  <copyright>© 2026 CMMC News by Jun Cyber</copyright>
  <podcast:locked>yes</podcast:locked>
  <podcast:funding url="https://www.buzzsprout.com/2371779/support">Support this Podcast</podcast:funding>
  <podcast:guid>2e7ca3e2-cde3-5432-aeb4-aca1b943d0d3</podcast:guid>
<podcast:podroll>
    <podcast:remoteItem feedGuid="1a6ca005-a0c9-577e-99df-d1d83e708d6f" feedUrl="https://feeds.buzzsprout.com/398416.rss" />
  </podcast:podroll>
  <itunes:author>Wilson Bautista Jr.</itunes:author>
  <itunes:type>episodic</itunes:type>
  <itunes:explicit>false</itunes:explicit>
  <description><![CDATA[<p>This podcast is dedicated for those who want to stay up to date with the Cybersecurity Maturity Model Certification news.&nbsp; It utilizes Notebook LM to synthesize news articles from Jun Cyber's blog as well as other official CMMC documentation and produces a podcast.<br><br><b>Podcast Description Disclaimer:</b><br>The content presented in <em>CMMC News</em> is generated by AI and is intended for informational and educational purposes only. It should not be taken as official guidance for Cybersecurity Maturity Model Certification (CMMC) compliance. For accurate and tailored advice, we recommend consulting a qualified CMMC consultant or reaching out to Jun Cyber directly. Always rely on certified experts for guidance specific to your organization's needs.</p>]]></description>
  <generator>Buzzsprout (https://www.buzzsprout.com)</generator>
  <itunes:owner>
    <itunes:name>Wilson Bautista Jr.</itunes:name>
  </itunes:owner>
  <image>
     <url>https://storage.buzzsprout.com/qaxjho56altkrl0qizw6dtyin05q?.jpg</url>
     <title>CMMC News by Jun Cyber</title>
     <link></link>
  </image>
  <itunes:image href="https://storage.buzzsprout.com/qaxjho56altkrl0qizw6dtyin05q?.jpg" />
  <itunes:category text="Business">
    <itunes:category text="Management" />
  </itunes:category>
  <itunes:category text="Technology" />
  <itunes:category text="News">
    <itunes:category text="Tech News" />
  </itunes:category>
  <podcast:person role="producer" img="https://storage.buzzsprout.com/ffntysoikx7pjch77grbscjnqjpp">Wilson Bautista Jr.</podcast:person>
  <item>
    <itunes:title>CMMC If You Can’t Prove It, You Don’t Have It.</itunes:title>
    <title>CMMC If You Can’t Prove It, You Don’t Have It.</title>
    <itunes:summary><![CDATA[Send a text CMMC isn’t about paperwork. It’s about proving you can protect Controlled Unclassified Information when it actually matters. This soundbite breaks down a hard truth about CMMC 2.0 that many contractors are still missing—and why treating compliance as a documentation exercise is a strategic mistake. 🎙️ What’s Inside: ✅ The biggest misconception about CMMC Level 2  ✅ Why evidence—not intent—determines your outcome  ✅ How assessors evaluate control effectiveness  ✅ The...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/2371779/open_sms">Send a text</a></p><p>CMMC isn’t about paperwork. It’s about proving you can protect Controlled Unclassified Information when it actually matters.</p><p>This soundbite breaks down a hard truth about CMMC 2.0 that many contractors are still missing—and why treating compliance as a documentation exercise is a strategic mistake.</p><p>🎙️ What’s Inside:</p><p>✅ The biggest misconception about CMMC Level 2<br/> ✅ Why evidence—not intent—determines your outcome<br/> ✅ How assessors evaluate control effectiveness<br/> ✅ The operational gap between policy and execution<br/> ✅ What defense contractors must fix before assessment</p><p>If you’re operating in the Defense Industrial Base, this is not theoretical. The difference between “we have a policy” and “we can prove it works” will determine whether you pass or fail.</p><p>Listen carefully. Then evaluate your program honestly.</p><p>#CMMC #CMMCLevel2 #NIST800171 #DFARS #DefenseContractors #CyberCompliance #GRC #DIB</p> <p><a rel="payment" href="https://www.buzzsprout.com/2371779/support">Support the show</a></p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/2371779/open_sms">Send a text</a></p><p>CMMC isn’t about paperwork. It’s about proving you can protect Controlled Unclassified Information when it actually matters.</p><p>This soundbite breaks down a hard truth about CMMC 2.0 that many contractors are still missing—and why treating compliance as a documentation exercise is a strategic mistake.</p><p>🎙️ What’s Inside:</p><p>✅ The biggest misconception about CMMC Level 2<br/> ✅ Why evidence—not intent—determines your outcome<br/> ✅ How assessors evaluate control effectiveness<br/> ✅ The operational gap between policy and execution<br/> ✅ What defense contractors must fix before assessment</p><p>If you’re operating in the Defense Industrial Base, this is not theoretical. The difference between “we have a policy” and “we can prove it works” will determine whether you pass or fail.</p><p>Listen carefully. Then evaluate your program honestly.</p><p>#CMMC #CMMCLevel2 #NIST800171 #DFARS #DefenseContractors #CyberCompliance #GRC #DIB</p> <p><a rel="payment" href="https://www.buzzsprout.com/2371779/support">Support the show</a></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2371779/episodes/18775710-cmmc-if-you-can-t-prove-it-you-don-t-have-it.mp3" length="13114453" type="audio/mpeg" />
    <itunes:author>Wilson Bautista Jr.</itunes:author>
    <guid isPermaLink="false">Buzzsprout-18775710</guid>
    <pubDate>Thu, 26 Feb 2026 11:00:00 -0500</pubDate>
    <itunes:duration>1090</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>CMMC Level 2 and the Supply Chain Impact</itunes:title>
    <title>CMMC Level 2 and the Supply Chain Impact</title>
    <itunes:summary><![CDATA[Send a text CMMC Level 2 is more than a compliance requirement — it’s a supply chain stress test for the Defense Industrial Base. As enforcement tightens, many small and mid-sized suppliers are struggling to meet Level 2 requirements. The result? Gaps, delays, and fractures across defense supply chains that primes can’t ignore. In this episode, we break down how CMMC Level 2 is reshaping supplier relationships and why compliance readiness now directly affects operational continuity. 🎙️ Key To...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/2371779/open_sms">Send a text</a></p><p>CMMC Level 2 is more than a compliance requirement — it’s a <b>supply chain stress test</b> for the Defense Industrial Base.</p><p>As enforcement tightens, many small and mid-sized suppliers are struggling to meet Level 2 requirements. The result? Gaps, delays, and fractures across defense supply chains that primes can’t ignore.</p><p>In this episode, we break down how CMMC Level 2 is reshaping supplier relationships and why compliance readiness now directly affects operational continuity.</p><p>🎙️ <b>Key Topics Covered:</b></p><ul><li>Why Level 2 creates pressure on smaller suppliers</li><li>How primes are reassessing subcontractor risk</li><li>Where supply chain fractures are already appearing</li><li>The long-term implications for defense contracting</li><li>What organizations can do to stabilize compliance and continuity</li></ul><p>CMMC Level 2 isn’t just a cybersecurity issue — it’s a <b>business and supply chain reality</b>.</p><p>#CMMC #CMMC2 #DefenseSupplyChain #CyberCompliance #DefenseContractors #DoD #CUI #DFARS #RiskManagement #GovCon</p> <p><a rel="payment" href="https://www.buzzsprout.com/2371779/support">Support the show</a></p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/2371779/open_sms">Send a text</a></p><p>CMMC Level 2 is more than a compliance requirement — it’s a <b>supply chain stress test</b> for the Defense Industrial Base.</p><p>As enforcement tightens, many small and mid-sized suppliers are struggling to meet Level 2 requirements. The result? Gaps, delays, and fractures across defense supply chains that primes can’t ignore.</p><p>In this episode, we break down how CMMC Level 2 is reshaping supplier relationships and why compliance readiness now directly affects operational continuity.</p><p>🎙️ <b>Key Topics Covered:</b></p><ul><li>Why Level 2 creates pressure on smaller suppliers</li><li>How primes are reassessing subcontractor risk</li><li>Where supply chain fractures are already appearing</li><li>The long-term implications for defense contracting</li><li>What organizations can do to stabilize compliance and continuity</li></ul><p>CMMC Level 2 isn’t just a cybersecurity issue — it’s a <b>business and supply chain reality</b>.</p><p>#CMMC #CMMC2 #DefenseSupplyChain #CyberCompliance #DefenseContractors #DoD #CUI #DFARS #RiskManagement #GovCon</p> <p><a rel="payment" href="https://www.buzzsprout.com/2371779/support">Support the show</a></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2371779/episodes/18775689-cmmc-level-2-and-the-supply-chain-impact.mp3" length="11576560" type="audio/mpeg" />
    <itunes:author>Wilson Bautista Jr.</itunes:author>
    <guid isPermaLink="false">Buzzsprout-18775689</guid>
    <pubDate>Thu, 19 Feb 2026 11:00:00 -0500</pubDate>
    <itunes:duration>962</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>The Coming CMMC Audit Crunch</itunes:title>
    <title>The Coming CMMC Audit Crunch</title>
    <itunes:summary><![CDATA[Send a text As CMMC enforcement accelerates, a new challenge is emerging — audit capacity. By 2026, the Defense Industrial Base is expected to face a significant CMMC audit bottleneck, with far more contractors needing assessments than the system can quickly support. In this episode, we break down why this bottleneck is coming, what it means for contract timelines, and how contractors can avoid getting stuck in line. 🎙️ Key Topics Covered: Why CMMC audit demand will peak in 2026The limits of ...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/2371779/open_sms">Send a text</a></p><p>As CMMC enforcement accelerates, a new challenge is emerging — <b>audit capacity</b>. By 2026, the Defense Industrial Base is expected to face a significant <b>CMMC audit bottleneck</b>, with far more contractors needing assessments than the system can quickly support.</p><p>In this episode, we break down why this bottleneck is coming, what it means for contract timelines, and how contractors can avoid getting stuck in line.</p><p>🎙️ <b>Key Topics Covered:</b></p><ul><li>Why CMMC audit demand will peak in 2026</li><li>The limits of assessor and C3PAO capacity</li><li>How delays could impact contract eligibility</li><li>Why readiness before enforcement matters more than ever</li><li>Strategies to stay ahead of the audit crunch</li></ul><p>CMMC compliance isn’t just about meeting requirements — it’s about <b>timing</b>. Those who wait may find there’s no room left in the schedule.</p><p>#CMMC #CMMC2 #DefenseContractors #DoD #CyberCompliance #DFARS #CUI #AuditReadiness #GovCon #RiskManagement</p> <p><a rel="payment" href="https://www.buzzsprout.com/2371779/support">Support the show</a></p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/2371779/open_sms">Send a text</a></p><p>As CMMC enforcement accelerates, a new challenge is emerging — <b>audit capacity</b>. By 2026, the Defense Industrial Base is expected to face a significant <b>CMMC audit bottleneck</b>, with far more contractors needing assessments than the system can quickly support.</p><p>In this episode, we break down why this bottleneck is coming, what it means for contract timelines, and how contractors can avoid getting stuck in line.</p><p>🎙️ <b>Key Topics Covered:</b></p><ul><li>Why CMMC audit demand will peak in 2026</li><li>The limits of assessor and C3PAO capacity</li><li>How delays could impact contract eligibility</li><li>Why readiness before enforcement matters more than ever</li><li>Strategies to stay ahead of the audit crunch</li></ul><p>CMMC compliance isn’t just about meeting requirements — it’s about <b>timing</b>. Those who wait may find there’s no room left in the schedule.</p><p>#CMMC #CMMC2 #DefenseContractors #DoD #CyberCompliance #DFARS #CUI #AuditReadiness #GovCon #RiskManagement</p> <p><a rel="payment" href="https://www.buzzsprout.com/2371779/support">Support the show</a></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2371779/episodes/18775683-the-coming-cmmc-audit-crunch.mp3" length="14931912" type="audio/mpeg" />
    <itunes:author>Wilson Bautista Jr.</itunes:author>
    <guid isPermaLink="false">Buzzsprout-18775683</guid>
    <pubDate>Fri, 13 Feb 2026 11:00:00 -0500</pubDate>
    <itunes:duration>1242</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>AI’s Role in Scaling CMMC Assessments</itunes:title>
    <title>AI’s Role in Scaling CMMC Assessments</title>
    <itunes:summary><![CDATA[Send a text CMMC compliance isn’t just a security challenge — it’s a scale problem. With thousands of contractors needing assessments and limited assessor capacity, the system is under strain. In this episode, we explore how AI can help solve the CMMC assessment bottleneck by accelerating readiness, improving evidence mapping, and reducing friction before formal evaluations even begin. 🎙️ What’s Covered: Why the current assessment model doesn’t scale on its ownHow AI supports control mapping ...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/2371779/open_sms">Send a text</a></p><p>CMMC compliance isn’t just a security challenge — it’s a <b>scale problem</b>. With thousands of contractors needing assessments and limited assessor capacity, the system is under strain.</p><p>In this episode, we explore how <b>AI can help solve the CMMC assessment bottleneck</b> by accelerating readiness, improving evidence mapping, and reducing friction before formal evaluations even begin.</p><p>🎙️ <b>What’s Covered:</b></p><ul><li>Why the current assessment model doesn’t scale on its own</li><li>How AI supports control mapping and evidence preparation</li><li>Where automation helps (and where humans still matter)</li><li>How contractors can use AI to get assessment-ready faster</li></ul><p>CMMC isn’t slowing down — and neither can the assessment process. AI may be the key to keeping pace.</p><p>#CMMC #CMMC2 #AI #CyberCompliance #DefenseContractors #DoD #CyberSecurity #AssessmentReadiness #GovCon #RiskManagement</p> <p><a rel="payment" href="https://www.buzzsprout.com/2371779/support">Support the show</a></p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/2371779/open_sms">Send a text</a></p><p>CMMC compliance isn’t just a security challenge — it’s a <b>scale problem</b>. With thousands of contractors needing assessments and limited assessor capacity, the system is under strain.</p><p>In this episode, we explore how <b>AI can help solve the CMMC assessment bottleneck</b> by accelerating readiness, improving evidence mapping, and reducing friction before formal evaluations even begin.</p><p>🎙️ <b>What’s Covered:</b></p><ul><li>Why the current assessment model doesn’t scale on its own</li><li>How AI supports control mapping and evidence preparation</li><li>Where automation helps (and where humans still matter)</li><li>How contractors can use AI to get assessment-ready faster</li></ul><p>CMMC isn’t slowing down — and neither can the assessment process. AI may be the key to keeping pace.</p><p>#CMMC #CMMC2 #AI #CyberCompliance #DefenseContractors #DoD #CyberSecurity #AssessmentReadiness #GovCon #RiskManagement</p> <p><a rel="payment" href="https://www.buzzsprout.com/2371779/support">Support the show</a></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2371779/episodes/18775677-ai-s-role-in-scaling-cmmc-assessments.mp3" length="16116217" type="audio/mpeg" />
    <itunes:author>Wilson Bautista Jr.</itunes:author>
    <guid isPermaLink="false">Buzzsprout-18775677</guid>
    <pubDate>Wed, 04 Feb 2026 11:00:00 -0500</pubDate>
    <itunes:duration>1341</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>The CMMC Waiting Game Is Over</itunes:title>
    <title>The CMMC Waiting Game Is Over</title>
    <itunes:summary><![CDATA[Send a text For years, contractors have waited—on timelines, enforcement, and clarity. That waiting game is over. CMMC enforcement is real, expectations are defined, and the DoD is moving forward. In this episode, we explain why delay is now the biggest risk and what defense contractors must do to move from planning to execution. 🎙️ Key Takeaways:  ✅ Why CMMC delays are no longer a viable strategy  ✅ What’s changed under the Final Rule  ✅ How enforcement reshapes contract eligibility  ✅ The i...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/2371779/open_sms">Send a text</a></p><p>For years, contractors have waited—on timelines, enforcement, and clarity. That waiting game is over.</p><p>CMMC enforcement is real, expectations are defined, and the DoD is moving forward. In this episode, we explain why delay is now the biggest risk and what defense contractors must do to move from planning to execution.</p><p>🎙️ <b>Key Takeaways:</b><br/> ✅ Why CMMC delays are no longer a viable strategy<br/> ✅ What’s changed under the Final Rule<br/> ✅ How enforcement reshapes contract eligibility<br/> ✅ The immediate actions contractors should prioritize</p><p>CMMC is no longer something to prepare for “eventually.” It’s here—and action is required now.</p><p>#CMMC #CMMC2 #DoD #DefenseContractors #CyberCompliance #DFARS #CUI #CyberSecurity #GovCon</p> <p><a rel="payment" href="https://www.buzzsprout.com/2371779/support">Support the show</a></p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/2371779/open_sms">Send a text</a></p><p>For years, contractors have waited—on timelines, enforcement, and clarity. That waiting game is over.</p><p>CMMC enforcement is real, expectations are defined, and the DoD is moving forward. In this episode, we explain why delay is now the biggest risk and what defense contractors must do to move from planning to execution.</p><p>🎙️ <b>Key Takeaways:</b><br/> ✅ Why CMMC delays are no longer a viable strategy<br/> ✅ What’s changed under the Final Rule<br/> ✅ How enforcement reshapes contract eligibility<br/> ✅ The immediate actions contractors should prioritize</p><p>CMMC is no longer something to prepare for “eventually.” It’s here—and action is required now.</p><p>#CMMC #CMMC2 #DoD #DefenseContractors #CyberCompliance #DFARS #CUI #CyberSecurity #GovCon</p> <p><a rel="payment" href="https://www.buzzsprout.com/2371779/support">Support the show</a></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2371779/episodes/18600903-the-cmmc-waiting-game-is-over.mp3" length="11950822" type="audio/mpeg" />
    <itunes:author>Wilson Bautista Jr.</itunes:author>
    <guid isPermaLink="false">Buzzsprout-18600903</guid>
    <pubDate>Sat, 31 Jan 2026 10:00:00 -0500</pubDate>
    <podcast:soundbite startTime="0.0" duration="30.0" />
    <itunes:duration>993</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>CMMC Compliance: The Competitive Reality</itunes:title>
    <title>CMMC Compliance: The Competitive Reality</title>
    <itunes:summary><![CDATA[Send a text CMMC compliance is no longer just about checking a box—it’s about staying competitive. As enforcement advances, contractors who are compliant aren’t just meeting requirements—they’re positioning themselves ahead of the pack. In this episode, we break down how CMMC has shifted from a regulatory hurdle to a market differentiator within the Defense Industrial Base. 🎙️ What’s Covered:  ✅ Why CMMC readiness now influences contract awards  ✅ How primes are evaluating subs through a comp...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/2371779/open_sms">Send a text</a></p><p>CMMC compliance is no longer just about checking a box—it’s about <b>staying competitive</b>.</p><p>As enforcement advances, contractors who are compliant aren’t just meeting requirements—they’re positioning themselves ahead of the pack. In this episode, we break down how CMMC has shifted from a regulatory hurdle to a <b>market differentiator</b> within the Defense Industrial Base.</p><p>🎙️ <b>What’s Covered:</b><br/> ✅ Why CMMC readiness now influences contract awards<br/> ✅ How primes are evaluating subs through a compliance lens<br/> ✅ The real business consequences of delaying action<br/> ✅ What “competitive compliance” looks like moving forward</p><p>In today’s environment, cybersecurity maturity isn’t optional—it’s part of how winners are chosen.</p><p>#CMMC #CMMC2 #CyberCompliance #DefenseContractors #DoD #CUI #CyberSecurity #DFARS #RiskManagement #DefenseIndustry</p> <p><a rel="payment" href="https://www.buzzsprout.com/2371779/support">Support the show</a></p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/2371779/open_sms">Send a text</a></p><p>CMMC compliance is no longer just about checking a box—it’s about <b>staying competitive</b>.</p><p>As enforcement advances, contractors who are compliant aren’t just meeting requirements—they’re positioning themselves ahead of the pack. In this episode, we break down how CMMC has shifted from a regulatory hurdle to a <b>market differentiator</b> within the Defense Industrial Base.</p><p>🎙️ <b>What’s Covered:</b><br/> ✅ Why CMMC readiness now influences contract awards<br/> ✅ How primes are evaluating subs through a compliance lens<br/> ✅ The real business consequences of delaying action<br/> ✅ What “competitive compliance” looks like moving forward</p><p>In today’s environment, cybersecurity maturity isn’t optional—it’s part of how winners are chosen.</p><p>#CMMC #CMMC2 #CyberCompliance #DefenseContractors #DoD #CUI #CyberSecurity #DFARS #RiskManagement #DefenseIndustry</p> <p><a rel="payment" href="https://www.buzzsprout.com/2371779/support">Support the show</a></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2371779/episodes/18411566-cmmc-compliance-the-competitive-reality.mp3" length="11080340" type="audio/mpeg" />
    <itunes:author>Wilson Bautista Jr.</itunes:author>
    <guid isPermaLink="false">Buzzsprout-18411566</guid>
    <pubDate>Thu, 29 Jan 2026 08:00:00 -0500</pubDate>
    <podcast:soundbite startTime="0.0" duration="30.0" />
    <itunes:duration>921</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>CMMC Deadline: What Contractors Must Do Now</itunes:title>
    <title>CMMC Deadline: What Contractors Must Do Now</title>
    <itunes:summary><![CDATA[Send a text  Support the show ]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/2371779/open_sms">Send a text</a></p> <p><a rel="payment" href="https://www.buzzsprout.com/2371779/support">Support the show</a></p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/2371779/open_sms">Send a text</a></p> <p><a rel="payment" href="https://www.buzzsprout.com/2371779/support">Support the show</a></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2371779/episodes/18333086-cmmc-deadline-what-contractors-must-do-now.mp3" length="8396734" type="audio/mpeg" />
    <itunes:author>Wilson Bautista Jr.</itunes:author>
    <guid isPermaLink="false">Buzzsprout-18333086</guid>
    <pubDate>Thu, 29 Jan 2026 08:00:00 -0500</pubDate>
    <podcast:soundbite startTime="0.0" duration="30.0" />
    <itunes:duration>697</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>CMMC Facts Every Contractor Needs</itunes:title>
    <title>CMMC Facts Every Contractor Needs</title>
    <itunes:summary><![CDATA[Send a text There’s a lot of noise around CMMC — shifting dates, mixed messages, and assumptions that can put contractors at risk. This clip cuts through the confusion and lays out what’s actually true about CMMC compliance versus what the industry keeps getting wrong. 🎯 You’ll Learn:  ✅ The real requirements contractors must meet  ✅ Common myths that lead to dangerous delays  ✅ What the Final Rule actually enforces  ✅ Why relying on rumors can cost contract eligibility Clear facts, no guessi...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/2371779/open_sms">Send a text</a></p><p>There’s a lot of noise around CMMC — shifting dates, mixed messages, and assumptions that can put contractors at risk. This clip cuts through the confusion and lays out <b>what’s actually true</b> about CMMC compliance versus what the industry keeps getting wrong.</p><p>🎯 <b>You’ll Learn:</b><br/> ✅ The real requirements contractors must meet<br/> ✅ Common myths that lead to dangerous delays<br/> ✅ What the Final Rule actually enforces<br/> ✅ Why relying on rumors can cost contract eligibility</p><p>Clear facts, no guessing — exactly what contractors need to stay aligned with DoD expectations.</p><p>#CMMC #CMMC2 #Cybersecurity #DFARS #GovCon #DoD #DefenseContractors #Compliance #CUI #CyberReadiness</p> <p><a rel="payment" href="https://www.buzzsprout.com/2371779/support">Support the show</a></p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/2371779/open_sms">Send a text</a></p><p>There’s a lot of noise around CMMC — shifting dates, mixed messages, and assumptions that can put contractors at risk. This clip cuts through the confusion and lays out <b>what’s actually true</b> about CMMC compliance versus what the industry keeps getting wrong.</p><p>🎯 <b>You’ll Learn:</b><br/> ✅ The real requirements contractors must meet<br/> ✅ Common myths that lead to dangerous delays<br/> ✅ What the Final Rule actually enforces<br/> ✅ Why relying on rumors can cost contract eligibility</p><p>Clear facts, no guessing — exactly what contractors need to stay aligned with DoD expectations.</p><p>#CMMC #CMMC2 #Cybersecurity #DFARS #GovCon #DoD #DefenseContractors #Compliance #CUI #CyberReadiness</p> <p><a rel="payment" href="https://www.buzzsprout.com/2371779/support">Support the show</a></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2371779/episodes/18292082-cmmc-facts-every-contractor-needs.mp3" length="9452793" type="audio/mpeg" />
    <itunes:author>Wilson Bautista Jr.</itunes:author>
    <guid isPermaLink="false">Buzzsprout-18292082</guid>
    <pubDate>Thu, 29 Jan 2026 08:00:00 -0500</pubDate>
    <podcast:soundbite startTime="0.0" duration="30.0" />
    <itunes:duration>785</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>CMMC Timelines Explained</itunes:title>
    <title>CMMC Timelines Explained</title>
    <itunes:summary><![CDATA[Send a text CMMC timelines are shifting fast — and the confusion between forecasted dates and actual, enforceable deadlines is creating major risks for defense contractors. In this clip, we break down the real facts behind CMMC rollout dates, the truth about UIDs, and what organizations must track to stay ahead of compliance requirements. 🎯 Key Points Covered:  ✅ The difference between official timelines and industry forecasts  ✅ What UIDs really mean for contractors moving forward  ✅ Why rel...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/2371779/open_sms">Send a text</a></p><p>CMMC timelines are shifting fast — and the confusion between <em>forecasted</em> dates and <em>actual, enforceable</em> deadlines is creating major risks for defense contractors.</p><p>In this clip, we break down the real facts behind CMMC rollout dates, the truth about UIDs, and what organizations must track to stay ahead of compliance requirements.</p><p>🎯 <b>Key Points Covered:</b><br/> ✅ The difference between official timelines and industry forecasts<br/> ✅ What UIDs really mean for contractors moving forward<br/> ✅ Why relying on guesses can put eligibility at risk<br/> ✅ How to align your planning with the Final Rule</p><p>If you’re preparing for CMMC 2.0, understanding the facts—<em>not the rumors</em>—is essential.</p><p>#CMMC #CMMC2 #DoD #DefenseContractors #Cybersecurity #Compliance #DFARS #CUI #CyberReadiness #GovCon</p> <p><a rel="payment" href="https://www.buzzsprout.com/2371779/support">Support the show</a></p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/2371779/open_sms">Send a text</a></p><p>CMMC timelines are shifting fast — and the confusion between <em>forecasted</em> dates and <em>actual, enforceable</em> deadlines is creating major risks for defense contractors.</p><p>In this clip, we break down the real facts behind CMMC rollout dates, the truth about UIDs, and what organizations must track to stay ahead of compliance requirements.</p><p>🎯 <b>Key Points Covered:</b><br/> ✅ The difference between official timelines and industry forecasts<br/> ✅ What UIDs really mean for contractors moving forward<br/> ✅ Why relying on guesses can put eligibility at risk<br/> ✅ How to align your planning with the Final Rule</p><p>If you’re preparing for CMMC 2.0, understanding the facts—<em>not the rumors</em>—is essential.</p><p>#CMMC #CMMC2 #DoD #DefenseContractors #Cybersecurity #Compliance #DFARS #CUI #CyberReadiness #GovCon</p> <p><a rel="payment" href="https://www.buzzsprout.com/2371779/support">Support the show</a></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2371779/episodes/18258194-cmmc-timelines-explained.mp3" length="10781258" type="audio/mpeg" />
    <itunes:author>Wilson Bautista Jr.</itunes:author>
    <guid isPermaLink="false">Buzzsprout-18258194</guid>
    <pubDate>Thu, 29 Jan 2026 08:00:00 -0500</pubDate>
    <podcast:soundbite startTime="0.0" duration="30.0" />
    <itunes:duration>896</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>CMMC Final Rule Is Live - Your Mandatory Compliance Checklist</itunes:title>
    <title>CMMC Final Rule Is Live - Your Mandatory Compliance Checklist</title>
    <itunes:summary><![CDATA[Send a text  Support the show ]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/2371779/open_sms">Send a text</a></p> <p><a rel="payment" href="https://www.buzzsprout.com/2371779/support">Support the show</a></p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/2371779/open_sms">Send a text</a></p> <p><a rel="payment" href="https://www.buzzsprout.com/2371779/support">Support the show</a></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2371779/episodes/18218298-cmmc-final-rule-is-live-your-mandatory-compliance-checklist.mp3" length="9434354" type="audio/mpeg" />
    <itunes:author>Wilson Bautista Jr.</itunes:author>
    <guid isPermaLink="false">Buzzsprout-18218298</guid>
    <pubDate>Thu, 29 Jan 2026 08:00:00 -0500</pubDate>
    <podcast:soundbite startTime="0.0" duration="30.0" />
    <itunes:duration>784</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>CMMC 2.0: The Actions You Must Take Now</itunes:title>
    <title>CMMC 2.0: The Actions You Must Take Now</title>
    <itunes:summary><![CDATA[Send a text  Support the show ]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/2371779/open_sms">Send a text</a></p> <p><a rel="payment" href="https://www.buzzsprout.com/2371779/support">Support the show</a></p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/2371779/open_sms">Send a text</a></p> <p><a rel="payment" href="https://www.buzzsprout.com/2371779/support">Support the show</a></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2371779/episodes/18176732-cmmc-2-0-the-actions-you-must-take-now.mp3" length="11434872" type="audio/mpeg" />
    <itunes:author>Wilson Bautista Jr.</itunes:author>
    <guid isPermaLink="false">Buzzsprout-18176732</guid>
    <pubDate>Thu, 29 Jan 2026 08:00:00 -0500</pubDate>
    <podcast:soundbite startTime="0.0" duration="30.0" />
    <itunes:duration>950</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Your Mandatory Guide to CMMC’s Final Rule</itunes:title>
    <title>Your Mandatory Guide to CMMC’s Final Rule</title>
    <itunes:summary><![CDATA[Send a text CMMC 2.0’s Final Rule isn’t just about meeting security controls—it’s about mandatory documentation and validation. 📋⚙️ In this essential episode, we break down how SPRS affirmations, UID tracking, and DFARS updates come together under the new rule—and what every contractor needs to file to stay eligible for DoD contracts. 🎙️ Here’s what you’ll learn:  ✅ How to properly submit and maintain your SPRS score  ✅ Why UID numbers are now central to compliance tracking  ✅ ...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/2371779/open_sms">Send a text</a></p><p>CMMC 2.0’s <b>Final Rule</b> isn’t just about meeting security controls—it’s about <b>mandatory documentation and validation.</b> 📋⚙️</p><p>In this essential episode, we break down how <b>SPRS affirmations, UID tracking, and DFARS updates</b> come together under the new rule—and what every contractor needs to file to stay eligible for DoD contracts.</p><p>🎙️ Here’s what you’ll learn:<br/> ✅ How to properly submit and maintain your SPRS score<br/> ✅ Why UID numbers are now central to compliance tracking<br/> ✅ What “affirmation of accuracy” really means under CMMC 2.0<br/> ✅ Documentation mistakes that can cost you contract eligibility<br/> ✅ The compliance workflow your team should implement now</p><p>CMMC compliance is no longer optional—it’s auditable, trackable, and enforceable.</p><p>#CMMC #DFARS #SPRS #CyberCompliance #DefenseContractors #CUI #CyberSecurity #CMMC2 #DoD #RiskManagement</p> <p><a rel="payment" href="https://www.buzzsprout.com/2371779/support">Support the show</a></p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/2371779/open_sms">Send a text</a></p><p>CMMC 2.0’s <b>Final Rule</b> isn’t just about meeting security controls—it’s about <b>mandatory documentation and validation.</b> 📋⚙️</p><p>In this essential episode, we break down how <b>SPRS affirmations, UID tracking, and DFARS updates</b> come together under the new rule—and what every contractor needs to file to stay eligible for DoD contracts.</p><p>🎙️ Here’s what you’ll learn:<br/> ✅ How to properly submit and maintain your SPRS score<br/> ✅ Why UID numbers are now central to compliance tracking<br/> ✅ What “affirmation of accuracy” really means under CMMC 2.0<br/> ✅ Documentation mistakes that can cost you contract eligibility<br/> ✅ The compliance workflow your team should implement now</p><p>CMMC compliance is no longer optional—it’s auditable, trackable, and enforceable.</p><p>#CMMC #DFARS #SPRS #CyberCompliance #DefenseContractors #CUI #CyberSecurity #CMMC2 #DoD #RiskManagement</p> <p><a rel="payment" href="https://www.buzzsprout.com/2371779/support">Support the show</a></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2371779/episodes/18056605-your-mandatory-guide-to-cmmc-s-final-rule.mp3" length="13982441" type="audio/mpeg" />
    <itunes:author>Wilson Bautista Jr.</itunes:author>
    <guid isPermaLink="false">Buzzsprout-18056605</guid>
    <pubDate>Thu, 29 Jan 2026 08:00:00 -0500</pubDate>
    <podcast:soundbite startTime="0.0" duration="30.0" />
    <itunes:duration>1163</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>CMMC Paradox: Why Contractors Can’t Wait</itunes:title>
    <title>CMMC Paradox: Why Contractors Can’t Wait</title>
    <itunes:summary><![CDATA[Send a text Even with a government shutdown, the CMMC compliance clock keeps ticking. ⏰🔐 In this episode, we uncover the paradox facing defense contractors: while agencies pause, cybersecurity deadlines don’t. The DoD’s timelines, affirmations, and enforcement plans continue to move forward—leaving unprepared firms at risk when operations resume. 🎙️ Here’s what you’ll learn:  ✅ How the shutdown impacts CMMC implementation (and how it doesn’t)  ✅ Why contractors should use this time ...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/2371779/open_sms">Send a text</a></p><p>Even with a <b>government shutdown</b>, the <b>CMMC compliance clock keeps ticking.</b> ⏰🔐</p><p>In this episode, we uncover the paradox facing defense contractors: while agencies pause, <b>cybersecurity deadlines don’t.</b> The DoD’s timelines, affirmations, and enforcement plans continue to move forward—leaving unprepared firms at risk when operations resume.</p><p>🎙️ Here’s what you’ll learn:<br/> ✅ How the shutdown impacts CMMC implementation (and how it doesn’t)<br/> ✅ Why contractors should use this time to <em>accelerate</em> readiness<br/> ✅ What happens to assessments, SPRS, and DFARS reporting<br/> ✅ The cost of waiting until after the shutdown to act<br/> ✅ How proactive firms are gaining an edge right now</p><p>Government may be on pause—but <b>CMMC is not.</b></p><p>#CMMC #CMMC2 #DoD #CyberCompliance #GovernmentShutdown #DefenseContractors #CUI #CyberSecurity #RiskManagement #DFARS</p> <p><a rel="payment" href="https://www.buzzsprout.com/2371779/support">Support the show</a></p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/2371779/open_sms">Send a text</a></p><p>Even with a <b>government shutdown</b>, the <b>CMMC compliance clock keeps ticking.</b> ⏰🔐</p><p>In this episode, we uncover the paradox facing defense contractors: while agencies pause, <b>cybersecurity deadlines don’t.</b> The DoD’s timelines, affirmations, and enforcement plans continue to move forward—leaving unprepared firms at risk when operations resume.</p><p>🎙️ Here’s what you’ll learn:<br/> ✅ How the shutdown impacts CMMC implementation (and how it doesn’t)<br/> ✅ Why contractors should use this time to <em>accelerate</em> readiness<br/> ✅ What happens to assessments, SPRS, and DFARS reporting<br/> ✅ The cost of waiting until after the shutdown to act<br/> ✅ How proactive firms are gaining an edge right now</p><p>Government may be on pause—but <b>CMMC is not.</b></p><p>#CMMC #CMMC2 #DoD #CyberCompliance #GovernmentShutdown #DefenseContractors #CUI #CyberSecurity #RiskManagement #DFARS</p> <p><a rel="payment" href="https://www.buzzsprout.com/2371779/support">Support the show</a></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2371779/episodes/18096651-cmmc-paradox-why-contractors-can-t-wait.mp3" length="8496098" type="audio/mpeg" />
    <itunes:author>Wilson Bautista Jr.</itunes:author>
    <guid isPermaLink="false">Buzzsprout-18096651</guid>
    <pubDate>Wed, 29 Oct 2025 10:00:00 -0400</pubDate>
    <podcast:soundbite startTime="0.0" duration="30.0" />
    <itunes:duration>706</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Ready or Not: CMMC 2.0 Final Rule is Here</itunes:title>
    <title>Ready or Not: CMMC 2.0 Final Rule is Here</title>
    <itunes:summary><![CDATA[Send a text In this episode, we break down the Department of Defense’s final rule amending the Defense Federal Acquisition Regulation Supplement (DFARS) to integrate the Cybersecurity Maturity Model Certification (CMMC). We’ll cover what these new contractual obligations mean for contractors, including self-assessment reporting in SPRS, continuous compliance affirmations, and the phased rollout of CMMC requirements. Join us as we unpack key definitions, address industry concerns, and highligh...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/2371779/open_sms">Send a text</a></p><p>In this episode, we break down the Department of Defense’s final rule amending the Defense Federal Acquisition Regulation Supplement (DFARS) to integrate the Cybersecurity Maturity Model Certification (CMMC). We’ll cover what these new contractual obligations mean for contractors, including self-assessment reporting in SPRS, continuous compliance affirmations, and the phased rollout of CMMC requirements. Join us as we unpack key definitions, address industry concerns, and highlight how these changes impact the defense industrial base.</p> <p><a rel="payment" href="https://www.buzzsprout.com/2371779/support">Support the show</a></p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/2371779/open_sms">Send a text</a></p><p>In this episode, we break down the Department of Defense’s final rule amending the Defense Federal Acquisition Regulation Supplement (DFARS) to integrate the Cybersecurity Maturity Model Certification (CMMC). We’ll cover what these new contractual obligations mean for contractors, including self-assessment reporting in SPRS, continuous compliance affirmations, and the phased rollout of CMMC requirements. Join us as we unpack key definitions, address industry concerns, and highlight how these changes impact the defense industrial base.</p> <p><a rel="payment" href="https://www.buzzsprout.com/2371779/support">Support the show</a></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2371779/episodes/17820358-ready-or-not-cmmc-2-0-final-rule-is-here.mp3" length="14307822" type="audio/mpeg" />
    <itunes:author>Wilson Bautista Jr.</itunes:author>
    <guid isPermaLink="false">Buzzsprout-17820358</guid>
    <pubDate>Wed, 10 Sep 2025 03:00:00 -0400</pubDate>
    <podcast:soundbite startTime="0.0" duration="30.0" />
    <itunes:duration>1190</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>CMMC 2.0 Unpacked: What Defense Contractors Must Know</itunes:title>
    <title>CMMC 2.0 Unpacked: What Defense Contractors Must Know</title>
    <itunes:summary><![CDATA[Send a text 🚨 CMMC 2.0 Is Rolling Out: Is Your Business Ready? The latest version of the Cybersecurity Maturity Model Certification (CMMC) is reshaping how contractors handle security across the Defense Industrial Base. From new assessment levels to increased scrutiny, the changes are significant—and noncompliance could cost you contracts. Understand what’s changed  🧩 Learn how implementation will impact your operations  🛡️ Get expert insights to stay compliant and competitive &nbsp...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/2371779/open_sms">Send a text</a></p><p>🚨 CMMC 2.0 Is Rolling Out: Is Your Business Ready?</p><p>The latest version of the Cybersecurity Maturity Model Certification (CMMC) is reshaping how contractors handle security across the Defense Industrial Base. From new assessment levels to increased scrutiny, the changes are significant—and noncompliance could cost you contracts.</p><p>Understand what’s changed<br/> 🧩 Learn how implementation will impact your operations<br/> 🛡️ Get expert insights to stay compliant and competitive<br/> 👉 Tune in now to hear the full breakdown in our latest episode.</p><p>#CMMC #CyberSecurity #DFARS #DefenseContracting #Compliance #CMMC2 #CMMCImplementation #JunCyber</p> <p><a rel="payment" href="https://www.buzzsprout.com/2371779/support">Support the show</a></p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/2371779/open_sms">Send a text</a></p><p>🚨 CMMC 2.0 Is Rolling Out: Is Your Business Ready?</p><p>The latest version of the Cybersecurity Maturity Model Certification (CMMC) is reshaping how contractors handle security across the Defense Industrial Base. From new assessment levels to increased scrutiny, the changes are significant—and noncompliance could cost you contracts.</p><p>Understand what’s changed<br/> 🧩 Learn how implementation will impact your operations<br/> 🛡️ Get expert insights to stay compliant and competitive<br/> 👉 Tune in now to hear the full breakdown in our latest episode.</p><p>#CMMC #CyberSecurity #DFARS #DefenseContracting #Compliance #CMMC2 #CMMCImplementation #JunCyber</p> <p><a rel="payment" href="https://www.buzzsprout.com/2371779/support">Support the show</a></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2371779/episodes/17435174-cmmc-2-0-unpacked-what-defense-contractors-must-know.mp3" length="8422459" type="audio/mpeg" />
    <itunes:author>Wilson Bautista Jr.</itunes:author>
    <guid isPermaLink="false">Buzzsprout-17435174</guid>
    <pubDate>Sat, 12 Jul 2025 12:00:00 -0400</pubDate>
    <podcast:soundbite startTime="2.267" duration="30.0" />
    <itunes:duration>699</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Manufacturers &amp; CMMC: What to Know</itunes:title>
    <title>Manufacturers &amp; CMMC: What to Know</title>
    <itunes:summary><![CDATA[Send a text 🚨 N𝗲𝘄 𝗣𝗼𝗱𝗰𝗮𝘀𝘁 𝗘𝗽𝗶𝘀𝗼𝗱𝗲 𝗔𝗹𝗲𝗿𝘁! 🚨 We’re breaking down 𝗖𝗠𝗠𝗖 𝗖𝗲𝗿𝘁𝗶𝗳𝗶𝗰𝗮𝘁𝗶𝗼𝗻 𝗥𝗲𝗮𝗱𝗶𝗻𝗲𝘀𝘀 for manufacturers navigating defense contracts 🛡️🏭 If you’re part of the DoD supply chain, this episode is your essential guide to prepping for CMMC success. 🎙️ What’s Inside: ✅ What manufacturers need to know about CMMC 2.0  ✅ Common pitfalls and how to avoid them  ✅ Steps to get audit-ready without overwhelm  ✅ Insights from industry experts and assessors  ✅ Aligning NIST 800-171 ...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/2371779/open_sms">Send a text</a></p><p>🚨 N𝗲𝘄 𝗣𝗼𝗱𝗰𝗮𝘀𝘁 𝗘𝗽𝗶𝘀𝗼𝗱𝗲 𝗔𝗹𝗲𝗿𝘁! 🚨</p><p>We’re breaking down 𝗖𝗠𝗠𝗖 𝗖𝗲𝗿𝘁𝗶𝗳𝗶𝗰𝗮𝘁𝗶𝗼𝗻 𝗥𝗲𝗮𝗱𝗶𝗻𝗲𝘀𝘀 for manufacturers navigating defense contracts 🛡️🏭</p><p>If you’re part of the DoD supply chain, this episode is your essential guide to prepping for CMMC success.</p><p>🎙️ What’s Inside:</p><p>✅ What manufacturers need to know about CMMC 2.0<br/> ✅ Common pitfalls and how to avoid them<br/> ✅ Steps to get audit-ready without overwhelm<br/> ✅ Insights from industry experts and assessors<br/> ✅ Aligning NIST 800-171 controls with your business</p><p>Don’t get caught off guard—tune in to learn how to protect your contracts, safeguard data, and stay compliant in today’s cybersecurity-first landscape.</p><p>#CMMC #Cybersecurity #DIB #DefenseContracting #NIST800171 #AuditReady #Compliance #GovCon #RiskManagement</p> <p><a rel="payment" href="https://www.buzzsprout.com/2371779/support">Support the show</a></p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/2371779/open_sms">Send a text</a></p><p>🚨 N𝗲𝘄 𝗣𝗼𝗱𝗰𝗮𝘀𝘁 𝗘𝗽𝗶𝘀𝗼𝗱𝗲 𝗔𝗹𝗲𝗿𝘁! 🚨</p><p>We’re breaking down 𝗖𝗠𝗠𝗖 𝗖𝗲𝗿𝘁𝗶𝗳𝗶𝗰𝗮𝘁𝗶𝗼𝗻 𝗥𝗲𝗮𝗱𝗶𝗻𝗲𝘀𝘀 for manufacturers navigating defense contracts 🛡️🏭</p><p>If you’re part of the DoD supply chain, this episode is your essential guide to prepping for CMMC success.</p><p>🎙️ What’s Inside:</p><p>✅ What manufacturers need to know about CMMC 2.0<br/> ✅ Common pitfalls and how to avoid them<br/> ✅ Steps to get audit-ready without overwhelm<br/> ✅ Insights from industry experts and assessors<br/> ✅ Aligning NIST 800-171 controls with your business</p><p>Don’t get caught off guard—tune in to learn how to protect your contracts, safeguard data, and stay compliant in today’s cybersecurity-first landscape.</p><p>#CMMC #Cybersecurity #DIB #DefenseContracting #NIST800171 #AuditReady #Compliance #GovCon #RiskManagement</p> <p><a rel="payment" href="https://www.buzzsprout.com/2371779/support">Support the show</a></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2371779/episodes/17393580-manufacturers-cmmc-what-to-know.mp3" length="7380448" type="audio/mpeg" />
    <itunes:author>Wilson Bautista Jr.</itunes:author>
    <guid isPermaLink="false">Buzzsprout-17393580</guid>
    <pubDate>Sat, 12 Jul 2025 12:00:00 -0400</pubDate>
    <itunes:duration>613</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Standardizing Security: A Deep Dive into DoD CUI Rules</itunes:title>
    <title>Standardizing Security: A Deep Dive into DoD CUI Rules</title>
    <itunes:summary><![CDATA[Send a text In this episode of CMMC News, we break down DoD Instruction 5200.48—the Department of Defense’s rulebook for handling Controlled Unclassified Information (CUI). Hosts take you through what CUI really means, why the DoD created a standardized approach, and what it takes to handle, mark, and share sensitive information properly. Learn why it’s critical for both DoD staff and contractors, what the marking and safeguarding requirements look like in real life, and how agencies and indu...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/2371779/open_sms">Send a text</a></p><p>In this episode of CMMC News, we break down DoD Instruction 5200.48—the Department of Defense’s rulebook for handling Controlled Unclassified Information (CUI). Hosts take you through what CUI really means, why the DoD created a standardized approach, and what it takes to handle, mark, and share sensitive information properly. Learn why it’s critical for both DoD staff and contractors, what the marking and safeguarding requirements look like in real life, and how agencies and industry partners share the responsibility for CUI protection. With insights into NIST 800-171, legacy document handling, day-to-day challenges, and the penalties for missteps, this deep dive gives listeners a practical take on why understanding CUI is essential to compliance and security across the defense ecosystem.</p> <p><a rel="payment" href="https://www.buzzsprout.com/2371779/support">Support the show</a></p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/2371779/open_sms">Send a text</a></p><p>In this episode of CMMC News, we break down DoD Instruction 5200.48—the Department of Defense’s rulebook for handling Controlled Unclassified Information (CUI). Hosts take you through what CUI really means, why the DoD created a standardized approach, and what it takes to handle, mark, and share sensitive information properly. Learn why it’s critical for both DoD staff and contractors, what the marking and safeguarding requirements look like in real life, and how agencies and industry partners share the responsibility for CUI protection. With insights into NIST 800-171, legacy document handling, day-to-day challenges, and the penalties for missteps, this deep dive gives listeners a practical take on why understanding CUI is essential to compliance and security across the defense ecosystem.</p> <p><a rel="payment" href="https://www.buzzsprout.com/2371779/support">Support the show</a></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2371779/episodes/17318941-standardizing-security-a-deep-dive-into-dod-cui-rules.mp3" length="16909644" type="audio/mpeg" />
    <itunes:author>Wilson Bautista Jr.</itunes:author>
    <guid isPermaLink="false">Buzzsprout-17318941</guid>
    <pubDate>Wed, 11 Jun 2025 09:00:00 -0400</pubDate>
    <podcast:soundbite startTime="0.0" duration="30.0" />
    <itunes:duration>1407</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>CMMC 2.0: What Is a C3PAO and What Does It Cost?</itunes:title>
    <title>CMMC 2.0: What Is a C3PAO and What Does It Cost?</title>
    <itunes:summary><![CDATA[Send a text If you're a Department of Defense (DoD) contractor, navigating the world of CMMC 2.0 is essential—and it starts with understanding the role of a C3PAO. In this episode, we break down what a Certified Third-Party Assessor Organization (C3PAO) is, why it matters, and what to expect during a third-party CMMC assessment.  You’ll learn:  What a C3PAO does and how they’re approvedWhy passing a C3PAO assessment is non-negotiable for many contractsWhat the assessment process loo...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/2371779/open_sms">Send a text</a></p><p>If you&apos;re a Department of Defense (DoD) contractor, navigating the world of CMMC 2.0 is essential—and it starts with understanding the role of a C3PAO. In this episode, we break down what a Certified Third-Party Assessor Organization (C3PAO) is, why it matters, and what to expect during a third-party CMMC assessment. </p><p>You’ll learn: </p><ul><li>What a C3PAO does and how they’re approved</li><li>Why passing a C3PAO assessment is non-negotiable for many contracts</li><li>What the assessment process looks like from start to finish</li><li>How much a CMMC assessment might cost</li><li>Tips for finding a trusted C3PAO and preparing effectively</li></ul><p><br/>We also share a behind-the-scenes look at Jün Cyber’s own journey toward becoming a certified C3PAO. Whether you&apos;re starting your compliance journey or getting ready for your official audit, this episode gives you the clarity and confidence to take the next step.<br/> <br/>🛡️ <em>Subscribe for more insights on CMMC, compliance tips, and updates from the defense cybersecurity world.</em><br/> <br/>Learn more at <a href='https://juncyber.com'>juncyber.com</a>.</p> <p><a rel="payment" href="https://www.buzzsprout.com/2371779/support">Support the show</a></p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/2371779/open_sms">Send a text</a></p><p>If you&apos;re a Department of Defense (DoD) contractor, navigating the world of CMMC 2.0 is essential—and it starts with understanding the role of a C3PAO. In this episode, we break down what a Certified Third-Party Assessor Organization (C3PAO) is, why it matters, and what to expect during a third-party CMMC assessment. </p><p>You’ll learn: </p><ul><li>What a C3PAO does and how they’re approved</li><li>Why passing a C3PAO assessment is non-negotiable for many contracts</li><li>What the assessment process looks like from start to finish</li><li>How much a CMMC assessment might cost</li><li>Tips for finding a trusted C3PAO and preparing effectively</li></ul><p><br/>We also share a behind-the-scenes look at Jün Cyber’s own journey toward becoming a certified C3PAO. Whether you&apos;re starting your compliance journey or getting ready for your official audit, this episode gives you the clarity and confidence to take the next step.<br/> <br/>🛡️ <em>Subscribe for more insights on CMMC, compliance tips, and updates from the defense cybersecurity world.</em><br/> <br/>Learn more at <a href='https://juncyber.com'>juncyber.com</a>.</p> <p><a rel="payment" href="https://www.buzzsprout.com/2371779/support">Support the show</a></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2371779/episodes/17306314-cmmc-2-0-what-is-a-c3pao-and-what-does-it-cost.mp3" length="11077221" type="audio/mpeg" />
    <itunes:author>Wilson Bautista Jr.</itunes:author>
    <guid isPermaLink="false">Buzzsprout-17306314</guid>
    <pubDate>Mon, 09 Jun 2025 12:00:00 -0400</pubDate>
    <podcast:soundbite startTime="0.0" duration="30.0" />
    <itunes:duration>921</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Navigating New DOD ODP Mandates in NIST SP 800-171 Revision 3</itunes:title>
    <title>Navigating New DOD ODP Mandates in NIST SP 800-171 Revision 3</title>
    <itunes:summary><![CDATA[Send a text 🚨 Working with the Department of Defense or handling Controlled Unclassified Information (CUI)? Here’s what you need to know about the DOD’s new approach to NIST SP 800-171 Revision 3 ODP values. Just listened to the latest episode of CMMC News, where the hosts did a deep dive into the recent DOD memo standardizing “Organization Defined Parameters” (ODPs) for protecting CUI. If you’re a defense contractor—or work in the DIB—these aren’t just guidelines, they are your new minimums....]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/2371779/open_sms">Send a text</a></p><p>🚨 Working with the Department of Defense or handling Controlled Unclassified Information (CUI)? Here’s what you need to know about the DOD’s new approach to NIST SP 800-171 Revision 3 ODP values.</p><p>Just listened to the latest episode of CMMC News, where the hosts did a deep dive into the recent DOD memo standardizing “Organization Defined Parameters” (ODPs) for protecting CUI. If you’re a defense contractor—or work in the DIB—these aren’t just guidelines, they are your new minimums.</p><p>🔑 <b>3 Key Takeaways:</b></p><ul><li><b>No More Guesswork:</b> The DOD has filled in the “blanks” of NIST 800-171 R3 by setting specific ODP values. These are now the baseline for all contractors—think max inactivity timeouts, access control reviews, and patching deadlines.</li><li><b>Timelines Are Tight:</b> Some key numbers to know:<ul><li>Account inactivity? Disable within 90 days.</li><li>Privileged session logoff? Required at end of work period.</li><li>High-risk vulnerability patching? 30 days max.</li><li>Quarterly updates for password “bad lists” and system inventories.</li></ul></li><li><b>Documentation &amp; Continuous Vigilance:</b> Annual (or more frequent) reviews for policies, logs, training, and agreements are now required. Plus, always justify and document any deviations or risk-based modifications—the DOD wants your decisions traceable.</li></ul><p>The big picture: The DOD is taking out ambiguity. If you handle CUI, you must implement these specific controls—or document strong justification for any flexibility allowed. And these requirements <em>will</em> change as threats evolve, so keep your risk assessments and compliance efforts agile.</p><p>Want the full detail? Highly recommend listening to the episode and reviewing both the NIST SP 800-171 R3 standard and the new DOD ODP memo. Stay compliant, stay secure! 💪<br/><br/>See the original PDF here: https://drive.google.com/file/d/1rtgUmlaCiUKst-mHR7Fsz5O95g46hCra/view</p><p>#cybersecurity #DoD #NIST #CUI #compliance #riskmanagement #defenseindustry</p>  <p><a rel="payment" href="https://www.buzzsprout.com/2371779/support">Support the show</a></p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/2371779/open_sms">Send a text</a></p><p>🚨 Working with the Department of Defense or handling Controlled Unclassified Information (CUI)? Here’s what you need to know about the DOD’s new approach to NIST SP 800-171 Revision 3 ODP values.</p><p>Just listened to the latest episode of CMMC News, where the hosts did a deep dive into the recent DOD memo standardizing “Organization Defined Parameters” (ODPs) for protecting CUI. If you’re a defense contractor—or work in the DIB—these aren’t just guidelines, they are your new minimums.</p><p>🔑 <b>3 Key Takeaways:</b></p><ul><li><b>No More Guesswork:</b> The DOD has filled in the “blanks” of NIST 800-171 R3 by setting specific ODP values. These are now the baseline for all contractors—think max inactivity timeouts, access control reviews, and patching deadlines.</li><li><b>Timelines Are Tight:</b> Some key numbers to know:<ul><li>Account inactivity? Disable within 90 days.</li><li>Privileged session logoff? Required at end of work period.</li><li>High-risk vulnerability patching? 30 days max.</li><li>Quarterly updates for password “bad lists” and system inventories.</li></ul></li><li><b>Documentation &amp; Continuous Vigilance:</b> Annual (or more frequent) reviews for policies, logs, training, and agreements are now required. Plus, always justify and document any deviations or risk-based modifications—the DOD wants your decisions traceable.</li></ul><p>The big picture: The DOD is taking out ambiguity. If you handle CUI, you must implement these specific controls—or document strong justification for any flexibility allowed. And these requirements <em>will</em> change as threats evolve, so keep your risk assessments and compliance efforts agile.</p><p>Want the full detail? Highly recommend listening to the episode and reviewing both the NIST SP 800-171 R3 standard and the new DOD ODP memo. Stay compliant, stay secure! 💪<br/><br/>See the original PDF here: https://drive.google.com/file/d/1rtgUmlaCiUKst-mHR7Fsz5O95g46hCra/view</p><p>#cybersecurity #DoD #NIST #CUI #compliance #riskmanagement #defenseindustry</p>  <p><a rel="payment" href="https://www.buzzsprout.com/2371779/support">Support the show</a></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2371779/episodes/17053428-navigating-new-dod-odp-mandates-in-nist-sp-800-171-revision-3.mp3" length="18457570" type="audio/mpeg" />
    <itunes:author>Wilson Bautista Jr.</itunes:author>
    <guid isPermaLink="false">Buzzsprout-17053428</guid>
    <pubDate>Mon, 05 May 2025 09:00:00 -0400</pubDate>
    <podcast:transcript url="https://www.buzzsprout.com/2371779/17053428/transcript" type="text/html" />
    <podcast:transcript url="https://www.buzzsprout.com/2371779/17053428/transcript.json" type="application/json" />
    <podcast:transcript url="https://www.buzzsprout.com/2371779/17053428/transcript.srt" type="application/x-subrip" />
    <podcast:transcript url="https://www.buzzsprout.com/2371779/17053428/transcript.vtt" type="text/vtt" />
    <podcast:soundbite startTime="0.0" duration="30.0" />
    <itunes:duration>1536</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Navigating DFARS Clause and Cybersecurity Assessments for DOD Contracts</itunes:title>
    <title>Navigating DFARS Clause and Cybersecurity Assessments for DOD Contracts</title>
    <itunes:summary><![CDATA[Send a text 🔍 Want to stay ahead in the world of government contracts and cybersecurity? Dive into our latest CMMC News episode where we explore the NIST SP 800-171 DoD Assessment Requirements. It's all about breaking through the wall of acronyms and jargon to ensure you know exactly what the Department of Defense expects when it comes to protecting sensitive information. Here are 3 key takeaways: Understand Assessment Levels: We break down the three types of cybersecurity assessments — Basic...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/2371779/open_sms">Send a text</a></p><p>🔍 Want to stay ahead in the world of government contracts and cybersecurity? Dive into our latest CMMC News episode where we explore the NIST SP 800-171 DoD Assessment Requirements. It&apos;s all about breaking through the wall of acronyms and jargon to ensure you know exactly what the Department of Defense expects when it comes to protecting sensitive information.</p><p>Here are 3 key takeaways:</p><ul><li><b>Understand Assessment Levels</b>: We break down the three types of cybersecurity assessments — Basic, Medium, and High — and what each level of confidence means for your contract requirements with the DoD.</li><li><b>Supplier Performance Risk System (SPRS)</b>: Learn how all assessment scores are recorded in SPRS, the centralized database that helps the DoD gauge the cybersecurity health of their contractors.</li><li><b>Subcontractor Compliance</b>: Discover how these requirements flow down to subcontractors and what obligations primes have to ensure their partners are compliant.</li></ul><p>Stay informed, secure those contracts, and fortify your cybersecurity posture! 🎧🔒</p><p>#Cybersecurity #DoD #NISTSP800171 #GovernmentContracts #CMMCNews</p> <p><a rel="payment" href="https://www.buzzsprout.com/2371779/support">Support the show</a></p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/2371779/open_sms">Send a text</a></p><p>🔍 Want to stay ahead in the world of government contracts and cybersecurity? Dive into our latest CMMC News episode where we explore the NIST SP 800-171 DoD Assessment Requirements. It&apos;s all about breaking through the wall of acronyms and jargon to ensure you know exactly what the Department of Defense expects when it comes to protecting sensitive information.</p><p>Here are 3 key takeaways:</p><ul><li><b>Understand Assessment Levels</b>: We break down the three types of cybersecurity assessments — Basic, Medium, and High — and what each level of confidence means for your contract requirements with the DoD.</li><li><b>Supplier Performance Risk System (SPRS)</b>: Learn how all assessment scores are recorded in SPRS, the centralized database that helps the DoD gauge the cybersecurity health of their contractors.</li><li><b>Subcontractor Compliance</b>: Discover how these requirements flow down to subcontractors and what obligations primes have to ensure their partners are compliant.</li></ul><p>Stay informed, secure those contracts, and fortify your cybersecurity posture! 🎧🔒</p><p>#Cybersecurity #DoD #NISTSP800171 #GovernmentContracts #CMMCNews</p> <p><a rel="payment" href="https://www.buzzsprout.com/2371779/support">Support the show</a></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2371779/episodes/16845427-navigating-dfars-clause-and-cybersecurity-assessments-for-dod-contracts.mp3" length="11713296" type="audio/mpeg" />
    <itunes:author>Wilson Bautista Jr.</itunes:author>
    <guid isPermaLink="false">Buzzsprout-16845427</guid>
    <pubDate>Wed, 26 Mar 2025 08:00:00 -0400</pubDate>
    <podcast:transcript url="https://www.buzzsprout.com/2371779/16845427/transcript" type="text/html" />
    <podcast:transcript url="https://www.buzzsprout.com/2371779/16845427/transcript.json" type="application/json" />
    <podcast:transcript url="https://www.buzzsprout.com/2371779/16845427/transcript.srt" type="application/x-subrip" />
    <podcast:transcript url="https://www.buzzsprout.com/2371779/16845427/transcript.vtt" type="text/vtt" />
    <podcast:soundbite startTime="0.0" duration="30.0" />
    <itunes:duration>974</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>SPRS and You: Managing DOD Cybersecurity Expectations</itunes:title>
    <title>SPRS and You: Managing DOD Cybersecurity Expectations</title>
    <itunes:summary><![CDATA[Send a text We just dived deep into the Department of Defense's NIST SP 800-171 assessment requirements. This is crucial for any contractor involved with DoD contracts, especially when it comes to cybersecurity. Here are three key takeaways: Assessment Frequency: If you're implementing NIST SP 800-171, make sure you have a recent assessment conducted within the last three years for every covered information system tied to DoD contracts.Assessment Levels: There are three types of DoD assessmen...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/2371779/open_sms">Send a text</a></p><p>We just dived deep into the Department of Defense&apos;s NIST SP 800-171 assessment requirements. This is crucial for any contractor involved with DoD contracts, especially when it comes to cybersecurity. Here are three key takeaways:</p><ul><li><b>Assessment Frequency:</b> If you&apos;re implementing NIST SP 800-171, make sure you have a recent assessment conducted within the last three years for every covered information system tied to DoD contracts.</li><li><b>Assessment Levels:</b> There are three types of DoD assessments - Basic, Medium, and High. Understanding which level applies to you and how to proceed can make or break your eligibility for DoD contracts. The details for each can be found in another key document, the NIST SP 800-171 DoD Assessment Methodology.</li><li><b>Reporting Requirements:</b> Once your assessment is complete, post your summary level scores in the Supplier Performance Risk System (SPRS). This is a mandatory step to demonstrate your commitment to cybersecurity, and remember, time is of the essence – scores need to be posted within 30 days of assessment completion.</li></ul><p>🔗 If you’re involved in defense contracting, keeping up with these requirements is non-negotiable! Tune into our latest episode for the full breakdown and stay ahead in the ever-evolving landscape of cybersecurity standards.<br/><br/>For the official CMMC documentation, click this link: <a href='https://dodcio.defense.gov/cmmc/Resources-Documentation/'>https://dodcio.defense.gov/cmmc/Resources-Documentation/</a></p><p>#DefenseContracting #Cybersecurity #NISTSP800171 #DOD #CMMCNews #PodcastHighlights</p> <p><a rel="payment" href="https://www.buzzsprout.com/2371779/support">Support the show</a></p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/2371779/open_sms">Send a text</a></p><p>We just dived deep into the Department of Defense&apos;s NIST SP 800-171 assessment requirements. This is crucial for any contractor involved with DoD contracts, especially when it comes to cybersecurity. Here are three key takeaways:</p><ul><li><b>Assessment Frequency:</b> If you&apos;re implementing NIST SP 800-171, make sure you have a recent assessment conducted within the last three years for every covered information system tied to DoD contracts.</li><li><b>Assessment Levels:</b> There are three types of DoD assessments - Basic, Medium, and High. Understanding which level applies to you and how to proceed can make or break your eligibility for DoD contracts. The details for each can be found in another key document, the NIST SP 800-171 DoD Assessment Methodology.</li><li><b>Reporting Requirements:</b> Once your assessment is complete, post your summary level scores in the Supplier Performance Risk System (SPRS). This is a mandatory step to demonstrate your commitment to cybersecurity, and remember, time is of the essence – scores need to be posted within 30 days of assessment completion.</li></ul><p>🔗 If you’re involved in defense contracting, keeping up with these requirements is non-negotiable! Tune into our latest episode for the full breakdown and stay ahead in the ever-evolving landscape of cybersecurity standards.<br/><br/>For the official CMMC documentation, click this link: <a href='https://dodcio.defense.gov/cmmc/Resources-Documentation/'>https://dodcio.defense.gov/cmmc/Resources-Documentation/</a></p><p>#DefenseContracting #Cybersecurity #NISTSP800171 #DOD #CMMCNews #PodcastHighlights</p> <p><a rel="payment" href="https://www.buzzsprout.com/2371779/support">Support the show</a></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2371779/episodes/16845368-sprs-and-you-managing-dod-cybersecurity-expectations.mp3" length="8390171" type="audio/mpeg" />
    <itunes:author>Wilson Bautista Jr.</itunes:author>
    <guid isPermaLink="false">Buzzsprout-16845368</guid>
    <pubDate>Wed, 26 Mar 2025 08:00:00 -0400</pubDate>
    <podcast:transcript url="https://www.buzzsprout.com/2371779/16845368/transcript" type="text/html" />
    <podcast:transcript url="https://www.buzzsprout.com/2371779/16845368/transcript.json" type="application/json" />
    <podcast:transcript url="https://www.buzzsprout.com/2371779/16845368/transcript.srt" type="application/x-subrip" />
    <podcast:transcript url="https://www.buzzsprout.com/2371779/16845368/transcript.vtt" type="text/vtt" />
    <podcast:soundbite startTime="0.0" duration="30.0" />
    <itunes:duration>697</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>The Essentials of Cyber Incident Reporting for Defense Contractors</itunes:title>
    <title>The Essentials of Cyber Incident Reporting for Defense Contractors</title>
    <itunes:summary><![CDATA[Send a text Hello LinkedIn community! 🌐 As we delve deeper into the cybersecurity requirements for Department of Defense (DOD) contracts, understanding DFARS Clause 252.204-7012 is crucial. It outlines safeguarding covered defense information (CDI) and protocols for cyber incident reporting. Here are three key takeaways for businesses and contractors engaging with the DOD: Understanding CDI: It’s essential to recognize what constitutes covered defense information. CDI includes sensitive techn...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/2371779/open_sms">Send a text</a></p><p>Hello LinkedIn community! 🌐 As we delve deeper into the cybersecurity requirements for Department of Defense (DOD) contracts, understanding DFARS Clause 252.204-7012 is crucial. It outlines safeguarding covered defense information (CDI) and protocols for cyber incident reporting. Here are three key takeaways for businesses and contractors engaging with the DOD:</p><ul><li><b>Understanding CDI</b>: It’s essential to recognize what constitutes covered defense information. CDI includes sensitive technical data, like military blueprints and designs, and any information listed in the controlled unclassified information (CUI) registry. Whether provided by the DOD or generated during contract work, this data requires strict protection.</li><li><b>Timely Reporting</b>: In the event of a cyber incident, the clock is ticking. Incidents must be reported within 72 hours to the DOD. This rapid reporting helps mitigate potential damages and underscores the importance of having efficient processes in place to identify and report any compromises.</li><li><b>Subcontractor Responsibilities</b>: Prime contractors must ensure that subcontractors comply with the same cybersecurity requirements. This includes using standardized controls outlined in NIST SP 800-171 and ensuring that all reporting protocols are followed. If deviations are necessary, these must be formally requested and approved.</li></ul><p>In a world where cybersecurity is critical, adopting such stringent measures not only protects sensitive information but also reinforces the security of the defense industrial base. Let&apos;s leverage these practices to enhance data security across various sectors.<br/><br/>For the official CMMC documentation, click this link: <a href='https://dodcio.defense.gov/cmmc/Resources-Documentation/'>https://dodcio.defense.gov/cmmc/Resources-Documentation/</a></p><p>#CyberSecurity #DOD #DefenseContracts #DataProtection #Compliance #DFARS #CyberIncidentResponse</p> <p><a rel="payment" href="https://www.buzzsprout.com/2371779/support">Support the show</a></p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/2371779/open_sms">Send a text</a></p><p>Hello LinkedIn community! 🌐 As we delve deeper into the cybersecurity requirements for Department of Defense (DOD) contracts, understanding DFARS Clause 252.204-7012 is crucial. It outlines safeguarding covered defense information (CDI) and protocols for cyber incident reporting. Here are three key takeaways for businesses and contractors engaging with the DOD:</p><ul><li><b>Understanding CDI</b>: It’s essential to recognize what constitutes covered defense information. CDI includes sensitive technical data, like military blueprints and designs, and any information listed in the controlled unclassified information (CUI) registry. Whether provided by the DOD or generated during contract work, this data requires strict protection.</li><li><b>Timely Reporting</b>: In the event of a cyber incident, the clock is ticking. Incidents must be reported within 72 hours to the DOD. This rapid reporting helps mitigate potential damages and underscores the importance of having efficient processes in place to identify and report any compromises.</li><li><b>Subcontractor Responsibilities</b>: Prime contractors must ensure that subcontractors comply with the same cybersecurity requirements. This includes using standardized controls outlined in NIST SP 800-171 and ensuring that all reporting protocols are followed. If deviations are necessary, these must be formally requested and approved.</li></ul><p>In a world where cybersecurity is critical, adopting such stringent measures not only protects sensitive information but also reinforces the security of the defense industrial base. Let&apos;s leverage these practices to enhance data security across various sectors.<br/><br/>For the official CMMC documentation, click this link: <a href='https://dodcio.defense.gov/cmmc/Resources-Documentation/'>https://dodcio.defense.gov/cmmc/Resources-Documentation/</a></p><p>#CyberSecurity #DOD #DefenseContracts #DataProtection #Compliance #DFARS #CyberIncidentResponse</p> <p><a rel="payment" href="https://www.buzzsprout.com/2371779/support">Support the show</a></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2371779/episodes/16845107-the-essentials-of-cyber-incident-reporting-for-defense-contractors.mp3" length="16465482" type="audio/mpeg" />
    <itunes:author>Wilson Bautista Jr.</itunes:author>
    <guid isPermaLink="false">Buzzsprout-16845107</guid>
    <pubDate>Wed, 26 Mar 2025 08:00:00 -0400</pubDate>
    <podcast:transcript url="https://www.buzzsprout.com/2371779/16845107/transcript" type="text/html" />
    <podcast:transcript url="https://www.buzzsprout.com/2371779/16845107/transcript.json" type="application/json" />
    <podcast:transcript url="https://www.buzzsprout.com/2371779/16845107/transcript.srt" type="application/x-subrip" />
    <podcast:transcript url="https://www.buzzsprout.com/2371779/16845107/transcript.vtt" type="text/vtt" />
    <podcast:soundbite startTime="0.0" duration="30.0" />
    <itunes:duration>1370</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Understanding How ESPs Fit into Your CMMC Assessment Puzzle</itunes:title>
    <title>Understanding How ESPs Fit into Your CMMC Assessment Puzzle</title>
    <itunes:summary><![CDATA[Send a text 🌟 Just listened to another insightful episode of the CMMC News podcast, where the hosts take a deep dive into the complexities of CMMC, focusing on ESPs, SPAs, and VDIs. Here's what stood out to me: 🔍 Key Takeaways: Scoping ESPs in CMMC: The involvement of External Service Providers in the CMMC assessment depends largely on their interaction with Controlled Unclassified Information (CUI) and whether they are a Cloud Service Provider. Non-cloud ESPs processing CUI make the whole se...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/2371779/open_sms">Send a text</a></p><p>🌟 Just listened to another insightful episode of the CMMC News podcast, where the hosts take a deep dive into the complexities of CMMC, focusing on ESPs, SPAs, and VDIs. Here&apos;s what stood out to me:</p><p>🔍 <b>Key Takeaways:</b></p><ul><li><b>Scoping ESPs in CMMC:</b> The involvement of External Service Providers in the CMMC assessment depends largely on their interaction with Controlled Unclassified Information (CUI) and whether they are a Cloud Service Provider. Non-cloud ESPs processing CUI make the whole service part of your CMMC scope.</li><li><b>VDI Configurations Simplifying Scope:</b> A properly configured Virtual Desktop Infrastructure can simplify CMMC scope by ensuring that local endpoint devices remain out of scope. This requires strict configurations to prevent local processing or storage of CUI.</li><li><b>CRMAs vs. Specialized Assets:</b> Understanding the difference between Contractor Risk Managed Assets (CRMAs) and specialized assets is crucial. While CRMAs can share networks with CUI processing assets without handling CUI, specialized assets often can&apos;t meet all security requirements due to their nature.</li></ul><p>🎧 If you&apos;re navigating the CMMC landscape, definitely give this episode a listen for more practical insights!<br/><br/>For the official CMMC documentation, click this link: <a href='https://dodcio.defense.gov/cmmc/Resources-Documentation/'>https://dodcio.defense.gov/cmmc/Resources-Documentation/</a></p><p>#CMMC #CyberSecurity #DevSecLead #VDI #ESPs #Compliance</p>  <p><a rel="payment" href="https://www.buzzsprout.com/2371779/support">Support the show</a></p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/2371779/open_sms">Send a text</a></p><p>🌟 Just listened to another insightful episode of the CMMC News podcast, where the hosts take a deep dive into the complexities of CMMC, focusing on ESPs, SPAs, and VDIs. Here&apos;s what stood out to me:</p><p>🔍 <b>Key Takeaways:</b></p><ul><li><b>Scoping ESPs in CMMC:</b> The involvement of External Service Providers in the CMMC assessment depends largely on their interaction with Controlled Unclassified Information (CUI) and whether they are a Cloud Service Provider. Non-cloud ESPs processing CUI make the whole service part of your CMMC scope.</li><li><b>VDI Configurations Simplifying Scope:</b> A properly configured Virtual Desktop Infrastructure can simplify CMMC scope by ensuring that local endpoint devices remain out of scope. This requires strict configurations to prevent local processing or storage of CUI.</li><li><b>CRMAs vs. Specialized Assets:</b> Understanding the difference between Contractor Risk Managed Assets (CRMAs) and specialized assets is crucial. While CRMAs can share networks with CUI processing assets without handling CUI, specialized assets often can&apos;t meet all security requirements due to their nature.</li></ul><p>🎧 If you&apos;re navigating the CMMC landscape, definitely give this episode a listen for more practical insights!<br/><br/>For the official CMMC documentation, click this link: <a href='https://dodcio.defense.gov/cmmc/Resources-Documentation/'>https://dodcio.defense.gov/cmmc/Resources-Documentation/</a></p><p>#CMMC #CyberSecurity #DevSecLead #VDI #ESPs #Compliance</p>  <p><a rel="payment" href="https://www.buzzsprout.com/2371779/support">Support the show</a></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2371779/episodes/16805841-understanding-how-esps-fit-into-your-cmmc-assessment-puzzle.mp3" length="21958079" type="audio/mpeg" />
    <itunes:author>Wilson Bautista Jr.</itunes:author>
    <guid isPermaLink="false">Buzzsprout-16805841</guid>
    <pubDate>Mon, 17 Mar 2025 09:00:00 -0400</pubDate>
    <podcast:transcript url="https://www.buzzsprout.com/2371779/16805841/transcript" type="text/html" />
    <podcast:transcript url="https://www.buzzsprout.com/2371779/16805841/transcript.json" type="application/json" />
    <podcast:transcript url="https://www.buzzsprout.com/2371779/16805841/transcript.srt" type="application/x-subrip" />
    <podcast:transcript url="https://www.buzzsprout.com/2371779/16805841/transcript.vtt" type="text/vtt" />
    <podcast:soundbite startTime="0.0" duration="30.0" />
    <itunes:duration>1827</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Secure Your Defense Contracts: Navigating CMMC Levels with NIST Publications</itunes:title>
    <title>Secure Your Defense Contracts: Navigating CMMC Levels with NIST Publications</title>
    <itunes:summary><![CDATA[Send a text 🚀 Exciting Insights from Our Latest Deep Dive on the CMMC News Podcast! 🎧 In our newest episode, we unpack the intricacies of the Cybersecurity Maturity Model Certification (CMMC) and its alignment with NIST standards, essential for those engaged with Department of Defense contracts. Dive into the details with us as we explore practical implications and strategic alignments. 🔹 Key Takeaways: CMMC Levels Explained: Understand how the different levels of CMMC build upon each other, ...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/2371779/open_sms">Send a text</a></p><p>🚀 Exciting Insights from Our Latest Deep Dive on the CMMC News Podcast! 🎧</p><p>In our newest episode, we unpack the intricacies of the Cybersecurity Maturity Model Certification (CMMC) and its alignment with NIST standards, essential for those engaged with Department of Defense contracts. Dive into the details with us as we explore practical implications and strategic alignments.</p><p>🔹 <b>Key Takeaways:</b></p><ul><li><b>CMMC Levels Explained</b>: Understand how the different levels of CMMC build upon each other, starting from the foundational Level 1 to the more advanced Level 3 that incorporates elements like NIST SP 800-171 and 800-172.</li><li><b>Scoring System Nuances</b>: Learn about the in-depth scoring methodology for NIST SP 800-171 Rev 2, highlighting the critical components and areas of partial credit, essential for MFA and FIPS compliance.</li><li><b>Preparing for the Transition</b>: The shift to NIST SP 800-171 Rev 3 is on the horizon. Organizations need to stay compliant with Rev 2 while preparing for Rev 3, focusing on gap analysis and updating system security plans.</li></ul><p>Tune into the episode for a detailed exploration and ensure your security protocols are robust and compliant. Stay ahead in the defense industrial base with actionable insights and strategies! 🎙️🔍<br/><br/>For the official CMMC documentation, click this link: <a href='https://dodcio.defense.gov/cmmc/Resources-Documentation/'>https://dodcio.defense.gov/cmmc/Resources-Documentation/</a></p><p>#CMMC #Cybersecurity #NISTStandards #DODContracts #DevSecLeadPodcast</p> <p><a rel="payment" href="https://www.buzzsprout.com/2371779/support">Support the show</a></p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/2371779/open_sms">Send a text</a></p><p>🚀 Exciting Insights from Our Latest Deep Dive on the CMMC News Podcast! 🎧</p><p>In our newest episode, we unpack the intricacies of the Cybersecurity Maturity Model Certification (CMMC) and its alignment with NIST standards, essential for those engaged with Department of Defense contracts. Dive into the details with us as we explore practical implications and strategic alignments.</p><p>🔹 <b>Key Takeaways:</b></p><ul><li><b>CMMC Levels Explained</b>: Understand how the different levels of CMMC build upon each other, starting from the foundational Level 1 to the more advanced Level 3 that incorporates elements like NIST SP 800-171 and 800-172.</li><li><b>Scoring System Nuances</b>: Learn about the in-depth scoring methodology for NIST SP 800-171 Rev 2, highlighting the critical components and areas of partial credit, essential for MFA and FIPS compliance.</li><li><b>Preparing for the Transition</b>: The shift to NIST SP 800-171 Rev 3 is on the horizon. Organizations need to stay compliant with Rev 2 while preparing for Rev 3, focusing on gap analysis and updating system security plans.</li></ul><p>Tune into the episode for a detailed exploration and ensure your security protocols are robust and compliant. Stay ahead in the defense industrial base with actionable insights and strategies! 🎙️🔍<br/><br/>For the official CMMC documentation, click this link: <a href='https://dodcio.defense.gov/cmmc/Resources-Documentation/'>https://dodcio.defense.gov/cmmc/Resources-Documentation/</a></p><p>#CMMC #Cybersecurity #NISTStandards #DODContracts #DevSecLeadPodcast</p> <p><a rel="payment" href="https://www.buzzsprout.com/2371779/support">Support the show</a></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2371779/episodes/16805830-secure-your-defense-contracts-navigating-cmmc-levels-with-nist-publications.mp3" length="9786724" type="audio/mpeg" />
    <itunes:author>Wilson Bautista Jr.</itunes:author>
    <guid isPermaLink="false">Buzzsprout-16805830</guid>
    <pubDate>Mon, 17 Mar 2025 09:00:00 -0400</pubDate>
    <podcast:transcript url="https://www.buzzsprout.com/2371779/16805830/transcript" type="text/html" />
    <podcast:transcript url="https://www.buzzsprout.com/2371779/16805830/transcript.json" type="application/json" />
    <podcast:transcript url="https://www.buzzsprout.com/2371779/16805830/transcript.srt" type="application/x-subrip" />
    <podcast:transcript url="https://www.buzzsprout.com/2371779/16805830/transcript.vtt" type="text/vtt" />
    <podcast:soundbite startTime="0.0" duration="30.0" />
    <itunes:duration>813</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Breaking Down CMMC ESPs and Inherited Controls: What DOD Contractors Need to Know</itunes:title>
    <title>Breaking Down CMMC ESPs and Inherited Controls: What DOD Contractors Need to Know</title>
    <itunes:summary><![CDATA[Send a text 🚀 New Episode Alert: Navigating CMMC Compliance with ESPs and Inherited Controls 🚀 In our latest episode of CMMC News, we dive deep into the complexities of CMMC compliance and how to effectively manage the relationship with your External Service Providers (ESPs). This episode is packed with insights that are crucial for any DOD contractor aiming to unravel the intricacies of inheriting security controls while maintaining full compliance responsibility. Here's a sneak peek at thre...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/2371779/open_sms">Send a text</a></p><p>🚀 New Episode Alert: Navigating CMMC Compliance with ESPs and Inherited Controls 🚀</p><p>In our latest episode of CMMC News, we dive deep into the complexities of CMMC compliance and how to effectively manage the relationship with your External Service Providers (ESPs). This episode is packed with insights that are crucial for any DOD contractor aiming to unravel the intricacies of inheriting security controls while maintaining full compliance responsibility. Here&apos;s a sneak peek at three key takeaways:</p><p>🔹 <b>Own Your Responsibility</b>: Just because your ESP is CMMC certified doesn’t mean you’re off the hook. You&apos;re accountable for validating, documenting, and proving those inherited controls work in your environment.</p><p>🔹 <b>Clear Role Divisions</b>: Understand the spectrum of responsibilities—fully inherited, partially inherited, and those non-delegable controls that are 100% on you, like user authorization and data classification.</p><p>🔹 <b>Audit Readiness is Key</b>: Meticulous documentation is your best friend. Make sure your controls are thoroughly documented in your SSP, supported by concrete evidence to ace that CMMC assessment.</p><p>For the official CMMC documentation, click this link: <a href='https://dodcio.defense.gov/cmmc/Resources-Documentation/'>https://dodcio.defense.gov/cmmc/Resources-Documentation/</a></p><p>#CMMC #Cybersecurity #DODCompliance #ESPs #SecurityControls #AuditReady</p> <p><a rel="payment" href="https://www.buzzsprout.com/2371779/support">Support the show</a></p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/2371779/open_sms">Send a text</a></p><p>🚀 New Episode Alert: Navigating CMMC Compliance with ESPs and Inherited Controls 🚀</p><p>In our latest episode of CMMC News, we dive deep into the complexities of CMMC compliance and how to effectively manage the relationship with your External Service Providers (ESPs). This episode is packed with insights that are crucial for any DOD contractor aiming to unravel the intricacies of inheriting security controls while maintaining full compliance responsibility. Here&apos;s a sneak peek at three key takeaways:</p><p>🔹 <b>Own Your Responsibility</b>: Just because your ESP is CMMC certified doesn’t mean you’re off the hook. You&apos;re accountable for validating, documenting, and proving those inherited controls work in your environment.</p><p>🔹 <b>Clear Role Divisions</b>: Understand the spectrum of responsibilities—fully inherited, partially inherited, and those non-delegable controls that are 100% on you, like user authorization and data classification.</p><p>🔹 <b>Audit Readiness is Key</b>: Meticulous documentation is your best friend. Make sure your controls are thoroughly documented in your SSP, supported by concrete evidence to ace that CMMC assessment.</p><p>For the official CMMC documentation, click this link: <a href='https://dodcio.defense.gov/cmmc/Resources-Documentation/'>https://dodcio.defense.gov/cmmc/Resources-Documentation/</a></p><p>#CMMC #Cybersecurity #DODCompliance #ESPs #SecurityControls #AuditReady</p> <p><a rel="payment" href="https://www.buzzsprout.com/2371779/support">Support the show</a></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2371779/episodes/16805818-breaking-down-cmmc-esps-and-inherited-controls-what-dod-contractors-need-to-know.mp3" length="11920833" type="audio/mpeg" />
    <itunes:author>Wilson Bautista Jr.</itunes:author>
    <guid isPermaLink="false">Buzzsprout-16805818</guid>
    <pubDate>Mon, 17 Mar 2025 09:00:00 -0400</pubDate>
    <podcast:transcript url="https://www.buzzsprout.com/2371779/16805818/transcript" type="text/html" />
    <podcast:transcript url="https://www.buzzsprout.com/2371779/16805818/transcript.json" type="application/json" />
    <podcast:transcript url="https://www.buzzsprout.com/2371779/16805818/transcript.srt" type="application/x-subrip" />
    <podcast:transcript url="https://www.buzzsprout.com/2371779/16805818/transcript.vtt" type="text/vtt" />
    <podcast:soundbite startTime="0.0" duration="30.0" />
    <itunes:duration>991</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Choosing a CMMC Consultant: Certification, Experience, and Fit</itunes:title>
    <title>Choosing a CMMC Consultant: Certification, Experience, and Fit</title>
    <itunes:summary><![CDATA[Send a text In this episode of CMMC News, host Wilson Bautista Jr. breaks down the crucial factors to consider when choosing a CMMC consultant. He outlines five essential criteria: ensuring proper CMMC certification, verifying real audit experience, evaluating communication skills, determining consultation needs (assessment vs. implementation), and assessing cultural fit with your organization. Whether you're starting your CMMC journey or preparing for an audit, this episode provides valuable...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/2371779/open_sms">Send a text</a></p><p>In this episode of CMMC News, host Wilson Bautista Jr. breaks down the crucial factors to consider when choosing a CMMC consultant. He outlines five essential criteria: ensuring proper CMMC certification, verifying real audit experience, evaluating communication skills, determining consultation needs (assessment vs. implementation), and assessing cultural fit with your organization. Whether you&apos;re starting your CMMC journey or preparing for an audit, this episode provides valuable insights to help you avoid costly mistakes and find the right consultant to guide your compliance efforts. Learn how to identify red flags, verify credentials, and make an informed decision that will support your organization&apos;s path to CMMC compliance.</p> <p><a rel="payment" href="https://www.buzzsprout.com/2371779/support">Support the show</a></p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/2371779/open_sms">Send a text</a></p><p>In this episode of CMMC News, host Wilson Bautista Jr. breaks down the crucial factors to consider when choosing a CMMC consultant. He outlines five essential criteria: ensuring proper CMMC certification, verifying real audit experience, evaluating communication skills, determining consultation needs (assessment vs. implementation), and assessing cultural fit with your organization. Whether you&apos;re starting your CMMC journey or preparing for an audit, this episode provides valuable insights to help you avoid costly mistakes and find the right consultant to guide your compliance efforts. Learn how to identify red flags, verify credentials, and make an informed decision that will support your organization&apos;s path to CMMC compliance.</p> <p><a rel="payment" href="https://www.buzzsprout.com/2371779/support">Support the show</a></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2371779/episodes/16538513-choosing-a-cmmc-consultant-certification-experience-and-fit.mp3" length="7817794" type="audio/mpeg" />
    <itunes:author>Wilson Bautista Jr.</itunes:author>
    <guid isPermaLink="false">Buzzsprout-16538513</guid>
    <pubDate>Fri, 31 Jan 2025 08:00:00 -0500</pubDate>
    <podcast:transcript url="https://www.buzzsprout.com/2371779/16538513/transcript" type="text/html" />
    <podcast:transcript url="https://www.buzzsprout.com/2371779/16538513/transcript.json" type="application/json" />
    <podcast:transcript url="https://www.buzzsprout.com/2371779/16538513/transcript.srt" type="application/x-subrip" />
    <podcast:transcript url="https://www.buzzsprout.com/2371779/16538513/transcript.vtt" type="text/vtt" />
    <podcast:soundbite startTime="17.103" duration="30.0" />
    <itunes:duration>649</itunes:duration>
    <itunes:keywords>CMMC compliance, cybersecurity, business resilience, CMMC consultant, certified CMMC professional, certified CMMC assessor, registered practitioner, CMMC ecosystem, Department of Defense, audit experience, compliance journey, technical compliance, communi</itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Navigating CMMC Compliance: Selecting the Best C3PAO</itunes:title>
    <title>Navigating CMMC Compliance: Selecting the Best C3PAO</title>
    <itunes:summary><![CDATA[Send a text Welcome to another episode of CMMC News! Today, we're simplifying the complexities of cybersecurity compliance, specifically diving into how to choose the right Certified Third Party Assessment Organization (C3PAO) to guide your organization to CMMC compliance. I'm your host, Wilson Bautista Jr., and in this episode, we'll break down the key considerations to make the right choice. From examining a C3PAO's experience with federal compliance frameworks like NIST 80171 and FedRAMP t...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/2371779/open_sms">Send a text</a></p><p>Welcome to another episode of CMMC News! Today, we&apos;re simplifying the complexities of cybersecurity compliance, specifically diving into how to choose the right Certified Third Party Assessment Organization (C3PAO) to guide your organization to CMMC compliance. I&apos;m your host, Wilson Bautista Jr., and in this episode, we&apos;ll break down the key considerations to make the right choice. From examining a C3PAO&apos;s experience with federal compliance frameworks like NIST 80171 and FedRAMP to assessing their industry expertise, reputation, and communication skills, we&apos;ll cover it all. Plus, we&apos;ll discuss the importance of verifying accreditation and balancing cost versus value. Tune in as we navigate the steps to ensure you&apos;re not just compliant but well-prepared for long-term security. Let&apos;s get started!</p> <p><a rel="payment" href="https://www.buzzsprout.com/2371779/support">Support the show</a></p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/2371779/open_sms">Send a text</a></p><p>Welcome to another episode of CMMC News! Today, we&apos;re simplifying the complexities of cybersecurity compliance, specifically diving into how to choose the right Certified Third Party Assessment Organization (C3PAO) to guide your organization to CMMC compliance. I&apos;m your host, Wilson Bautista Jr., and in this episode, we&apos;ll break down the key considerations to make the right choice. From examining a C3PAO&apos;s experience with federal compliance frameworks like NIST 80171 and FedRAMP to assessing their industry expertise, reputation, and communication skills, we&apos;ll cover it all. Plus, we&apos;ll discuss the importance of verifying accreditation and balancing cost versus value. Tune in as we navigate the steps to ensure you&apos;re not just compliant but well-prepared for long-term security. Let&apos;s get started!</p> <p><a rel="payment" href="https://www.buzzsprout.com/2371779/support">Support the show</a></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2371779/episodes/16476496-navigating-cmmc-compliance-selecting-the-best-c3pao.mp3" length="4582719" type="audio/mpeg" />
    <itunes:author></itunes:author>
    <guid isPermaLink="false">Buzzsprout-16476496</guid>
    <pubDate>Tue, 21 Jan 2025 10:00:00 -0500</pubDate>
    <podcast:transcript url="https://www.buzzsprout.com/2371779/16476496/transcript" type="text/html" />
    <podcast:transcript url="https://www.buzzsprout.com/2371779/16476496/transcript.json" type="application/json" />
    <podcast:transcript url="https://www.buzzsprout.com/2371779/16476496/transcript.srt" type="application/x-subrip" />
    <podcast:transcript url="https://www.buzzsprout.com/2371779/16476496/transcript.vtt" type="text/vtt" />
    <podcast:soundbite startTime="0.0" duration="30.0" />
    <itunes:duration>379</itunes:duration>
    <itunes:keywords>CMMC, cybersecurity compliance, defense contractors, CMMC compliance, certified third party assessment organization, C3PAO, NIST 80171, FedRAMP, SOC 2, ISO 2701, cybersecurity program, industry expertise, manufacturing, health care, SaaS product, gap asse</itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Audit of the DoD’s Process for Authorizing Third Party Organizations to Perform Cybersecurity Maturity Model Certification 2.0 Assessments (Report No. DODIG-2025-056)</itunes:title>
    <title>Audit of the DoD’s Process for Authorizing Third Party Organizations to Perform Cybersecurity Maturity Model Certification 2.0 Assessments (Report No. DODIG-2025-056)</title>
    <itunes:summary><![CDATA[Send a text A Department of Defense Inspector General audit (DODIG-2025-056) revealed that the Department of Defense (DoD) inadequately implemented its process for authorizing third-party organizations to conduct Cybersecurity Maturity Model Certification (CMMC) 2.0 assessments. The audit found that the DoD failed to ensure all required steps were completed before authorizing these organizations, increasing the risk of awarding contracts to companies lacking sufficient cybersecurity controls....]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/2371779/open_sms">Send a text</a></p><p>A Department of Defense Inspector General audit (DODIG-2025-056) revealed that the Department of Defense (DoD) inadequately implemented its process for authorizing third-party organizations to conduct Cybersecurity Maturity Model Certification (CMMC) 2.0 assessments. The audit found that the DoD failed to ensure all required steps were completed before authorizing these organizations, increasing the risk of awarding contracts to companies lacking sufficient cybersecurity controls. Two hotline allegations were substantiated. Ten recommendations were issued to improve the authorization process, focusing on implementing quality assurance measures to guarantee compliance. The DoD OIG will continue monitoring the DoD&apos;s implementation of these recommendations.<br/><br/>Ref: <a href='https://www.dodig.mil/In-the-Spotlight/Article/4028197/press-release-audit-of-the-dods-process-for-authorizing-third-party-organizatio/'>https://www.dodig.mil/In-the-Spotlight/Article/4028197/press-release-audit-of-the-dods-process-for-authorizing-third-party-organizatio/</a></p> <p><a rel="payment" href="https://www.buzzsprout.com/2371779/support">Support the show</a></p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/2371779/open_sms">Send a text</a></p><p>A Department of Defense Inspector General audit (DODIG-2025-056) revealed that the Department of Defense (DoD) inadequately implemented its process for authorizing third-party organizations to conduct Cybersecurity Maturity Model Certification (CMMC) 2.0 assessments. The audit found that the DoD failed to ensure all required steps were completed before authorizing these organizations, increasing the risk of awarding contracts to companies lacking sufficient cybersecurity controls. Two hotline allegations were substantiated. Ten recommendations were issued to improve the authorization process, focusing on implementing quality assurance measures to guarantee compliance. The DoD OIG will continue monitoring the DoD&apos;s implementation of these recommendations.<br/><br/>Ref: <a href='https://www.dodig.mil/In-the-Spotlight/Article/4028197/press-release-audit-of-the-dods-process-for-authorizing-third-party-organizatio/'>https://www.dodig.mil/In-the-Spotlight/Article/4028197/press-release-audit-of-the-dods-process-for-authorizing-third-party-organizatio/</a></p> <p><a rel="payment" href="https://www.buzzsprout.com/2371779/support">Support the show</a></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2371779/episodes/16419634-audit-of-the-dod-s-process-for-authorizing-third-party-organizations-to-perform-cybersecurity-maturity-model-certification-2-0-assessments-report-no-dodig-2025-056.mp3" length="15737004" type="audio/mpeg" />
    <itunes:author></itunes:author>
    <guid isPermaLink="false">Buzzsprout-16419634</guid>
    <pubDate>Tue, 14 Jan 2025 10:00:00 -0500</pubDate>
    <podcast:transcript url="https://www.buzzsprout.com/2371779/16419634/transcript" type="text/html" />
    <podcast:transcript url="https://www.buzzsprout.com/2371779/16419634/transcript.json" type="application/json" />
    <podcast:transcript url="https://www.buzzsprout.com/2371779/16419634/transcript.srt" type="application/x-subrip" />
    <podcast:transcript url="https://www.buzzsprout.com/2371779/16419634/transcript.vtt" type="text/vtt" />
    <podcast:soundbite startTime="0.0" duration="30.0" />
    <itunes:duration>1309</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>FEDRAMP Moderate Equivalency for Cloud Service Providers</itunes:title>
    <title>FEDRAMP Moderate Equivalency for Cloud Service Providers</title>
    <itunes:summary><![CDATA[Send a text This memorandum from the Department of Defense outlines requirements for cloud service providers (CSPs) seeking FEDRAMP Moderate equivalency. It details the necessary assessments and documentation, including security plans and testing procedures, that CSPs must meet. The memorandum emphasizes the importance of compliance with specified Defense Federal Acquisition Regulations Supplement clauses. Finally, it clarifies the roles and responsibilities of the contractor, CSP, and assess...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/2371779/open_sms">Send a text</a></p><p>This memorandum from the Department of Defense outlines <b>requirements for cloud service providers (CSPs)</b> seeking <b>FEDRAMP Moderate equivalency</b>. It details the <b>necessary assessments and documentation</b>, including security plans and testing procedures, that CSPs must meet. The memorandum emphasizes the <b>importance of compliance</b> with specified Defense Federal Acquisition Regulations Supplement clauses. Finally, it clarifies the <b>roles and responsibilities</b> of the contractor, CSP, and assessing organizations. The document aims to <b>ensure the security of covered defense information</b> processed by these cloud services.<br/><br/>Ref: https://dodcio.defense.gov/Portals/0/Documents/Library/FEDRAMP-EquivalencyCloudServiceProviders.pdf</p> <p><a rel="payment" href="https://www.buzzsprout.com/2371779/support">Support the show</a></p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/2371779/open_sms">Send a text</a></p><p>This memorandum from the Department of Defense outlines <b>requirements for cloud service providers (CSPs)</b> seeking <b>FEDRAMP Moderate equivalency</b>. It details the <b>necessary assessments and documentation</b>, including security plans and testing procedures, that CSPs must meet. The memorandum emphasizes the <b>importance of compliance</b> with specified Defense Federal Acquisition Regulations Supplement clauses. Finally, it clarifies the <b>roles and responsibilities</b> of the contractor, CSP, and assessing organizations. The document aims to <b>ensure the security of covered defense information</b> processed by these cloud services.<br/><br/>Ref: https://dodcio.defense.gov/Portals/0/Documents/Library/FEDRAMP-EquivalencyCloudServiceProviders.pdf</p> <p><a rel="payment" href="https://www.buzzsprout.com/2371779/support">Support the show</a></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2371779/episodes/16398070-fedramp-moderate-equivalency-for-cloud-service-providers.mp3" length="12086433" type="audio/mpeg" />
    <itunes:author></itunes:author>
    <guid isPermaLink="false">Buzzsprout-16398070</guid>
    <pubDate>Tue, 07 Jan 2025 14:00:00 -0500</pubDate>
    <podcast:transcript url="https://www.buzzsprout.com/2371779/16398070/transcript" type="text/html" />
    <podcast:transcript url="https://www.buzzsprout.com/2371779/16398070/transcript.json" type="application/json" />
    <podcast:transcript url="https://www.buzzsprout.com/2371779/16398070/transcript.srt" type="application/x-subrip" />
    <podcast:transcript url="https://www.buzzsprout.com/2371779/16398070/transcript.vtt" type="text/vtt" />
    <podcast:soundbite startTime="0.0" duration="30.0" />
    <itunes:duration>1005</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Congressional Review Act Targets CMMC Rollback</itunes:title>
    <title>Congressional Review Act Targets CMMC Rollback</title>
    <itunes:summary><![CDATA[Send a text Representative Gary Palmer introduced a resolution to overturn a Pentagon rule establishing the Cybersecurity Maturity Model Certification (CMMC) program. This Congressional Review Act resolution aims to allow Congress a vote on significant regulatory actions. The Department of Defense completed the necessary steps to implement the CMMC rule, which adds third-party assessments to existing cybersecurity standards for contractors. While some stakeholders support CMMC for improving c...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/2371779/open_sms">Send a text</a></p><p><b>Representative Gary Palmer</b> introduced a resolution to overturn a Pentagon rule establishing the Cybersecurity Maturity Model Certification (CMMC) program. This Congressional Review Act resolution aims to allow Congress a vote on significant regulatory actions. <b>The Department of Defense</b> completed the necessary steps to implement the CMMC rule, which adds third-party assessments to existing cybersecurity standards for contractors. <b>While some stakeholders</b> support CMMC for improving cybersecurity and enabling more efficient compliance, the resolution&apos;s success is uncertain due to limited legislative support. The resolution&apos;s goal is to ensure Congressional oversight of major rules impacting the public, not necessarily to oppose CMMC itself. <b>Opponents</b> warn that halting CMMC could jeopardize the defense industrial base&apos;s efforts toward cybersecurity compliance.<br/><br/>Ref: https://insidedefense.com/insider/lawmaker-introduces-resolution-roll-back-cmmc-program-final-rule</p> <p><a rel="payment" href="https://www.buzzsprout.com/2371779/support">Support the show</a></p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/2371779/open_sms">Send a text</a></p><p><b>Representative Gary Palmer</b> introduced a resolution to overturn a Pentagon rule establishing the Cybersecurity Maturity Model Certification (CMMC) program. This Congressional Review Act resolution aims to allow Congress a vote on significant regulatory actions. <b>The Department of Defense</b> completed the necessary steps to implement the CMMC rule, which adds third-party assessments to existing cybersecurity standards for contractors. <b>While some stakeholders</b> support CMMC for improving cybersecurity and enabling more efficient compliance, the resolution&apos;s success is uncertain due to limited legislative support. The resolution&apos;s goal is to ensure Congressional oversight of major rules impacting the public, not necessarily to oppose CMMC itself. <b>Opponents</b> warn that halting CMMC could jeopardize the defense industrial base&apos;s efforts toward cybersecurity compliance.<br/><br/>Ref: https://insidedefense.com/insider/lawmaker-introduces-resolution-roll-back-cmmc-program-final-rule</p> <p><a rel="payment" href="https://www.buzzsprout.com/2371779/support">Support the show</a></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2371779/episodes/16398016-congressional-review-act-targets-cmmc-rollback.mp3" length="10132295" type="audio/mpeg" />
    <itunes:author>Wilson Bautista Jr.</itunes:author>
    <guid isPermaLink="false">Buzzsprout-16398016</guid>
    <pubDate>Tue, 07 Jan 2025 14:00:00 -0500</pubDate>
    <podcast:transcript url="https://www.buzzsprout.com/2371779/16398016/transcript" type="text/html" />
    <podcast:transcript url="https://www.buzzsprout.com/2371779/16398016/transcript.json" type="application/json" />
    <podcast:transcript url="https://www.buzzsprout.com/2371779/16398016/transcript.srt" type="application/x-subrip" />
    <podcast:transcript url="https://www.buzzsprout.com/2371779/16398016/transcript.vtt" type="text/vtt" />
    <podcast:soundbite startTime="1.914" duration="30.0" />
    <itunes:duration>842</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Defining the Scope: A Guide to Level 3 CMMC Assessments</itunes:title>
    <title>Defining the Scope: A Guide to Level 3 CMMC Assessments</title>
    <itunes:summary><![CDATA[Send a text In this episode of CMMC News, we dive into the guidance for defining the scope of a Level 3 Cybersecurity Maturity Model Certification (CMMC) assessment. We discuss the asset categories—CUI Assets, Security Protection Assets, Specialized Assets, and Out-of-Scope Assets—and their specific requirements. Learn how to categorize and document assets in an inventory and network diagram, and understand the role of External Service Providers (ESPs) and Cloud Service Providers (CSPs) in th...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/2371779/open_sms">Send a text</a></p><p>In this episode of <em>CMMC News</em>, we dive into the guidance for defining the scope of a Level 3 Cybersecurity Maturity Model Certification (CMMC) assessment. We discuss the asset categories—CUI Assets, Security Protection Assets, Specialized Assets, and Out-of-Scope Assets—and their specific requirements. Learn how to categorize and document assets in an inventory and network diagram, and understand the role of External Service Providers (ESPs) and Cloud Service Providers (CSPs) in the assessment scope. We also highlight the critical prerequisite of completing a Level 2 assessment, with all POA&amp;M items resolved, before undertaking Level 3 certification.</p><p>Preparing for a Level 3 CMMC assessment? Jun Cyber offers expert support to ensure you meet every requirement with confidence. Contact us today and let us help you succeed!<br/><br/>Ref: <a href='https://dodcio.defense.gov/Portals/0/Documents/CMMC/ScopingGuideL3v2.pdf'>CMMC Level 3 Scoping Guidance</a><br/><br/>Website: www.juncyber.com<br/>Email: info@juncyber.com</p>  <p><a rel="payment" href="https://www.buzzsprout.com/2371779/support">Support the show</a></p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/2371779/open_sms">Send a text</a></p><p>In this episode of <em>CMMC News</em>, we dive into the guidance for defining the scope of a Level 3 Cybersecurity Maturity Model Certification (CMMC) assessment. We discuss the asset categories—CUI Assets, Security Protection Assets, Specialized Assets, and Out-of-Scope Assets—and their specific requirements. Learn how to categorize and document assets in an inventory and network diagram, and understand the role of External Service Providers (ESPs) and Cloud Service Providers (CSPs) in the assessment scope. We also highlight the critical prerequisite of completing a Level 2 assessment, with all POA&amp;M items resolved, before undertaking Level 3 certification.</p><p>Preparing for a Level 3 CMMC assessment? Jun Cyber offers expert support to ensure you meet every requirement with confidence. Contact us today and let us help you succeed!<br/><br/>Ref: <a href='https://dodcio.defense.gov/Portals/0/Documents/CMMC/ScopingGuideL3v2.pdf'>CMMC Level 3 Scoping Guidance</a><br/><br/>Website: www.juncyber.com<br/>Email: info@juncyber.com</p>  <p><a rel="payment" href="https://www.buzzsprout.com/2371779/support">Support the show</a></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2371779/episodes/16363420-defining-the-scope-a-guide-to-level-3-cmmc-assessments.mp3" length="20178052" type="audio/mpeg" />
    <itunes:author></itunes:author>
    <guid isPermaLink="false">Buzzsprout-16363420</guid>
    <pubDate>Tue, 31 Dec 2024 15:00:00 -0500</pubDate>
    <podcast:soundbite startTime="0.0" duration="30.0" />
    <itunes:duration>1679</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>CMMC Level 2 Assessment Guide: Comprehensive Compliance Insights</itunes:title>
    <title>CMMC Level 2 Assessment Guide: Comprehensive Compliance Insights</title>
    <itunes:summary><![CDATA[Send a text In this episode of CMMC News, we explore the Cybersecurity Maturity Model Certification (CMMC) Assessment Guide for Level 2, Version 2.13. This comprehensive guide provides instructions for conducting both self-assessments and certification assessments, detailing security requirements across key domains like access control, awareness and training, audit and accountability, and configuration management. We break down the assessment criteria, methodologies, and compliance objectives...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/2371779/open_sms">Send a text</a></p><p>In this episode of <em>CMMC News</em>, we explore the Cybersecurity Maturity Model Certification (CMMC) Assessment Guide for Level 2, Version 2.13. This comprehensive guide provides instructions for conducting both self-assessments and certification assessments, detailing security requirements across key domains like access control, awareness and training, audit and accountability, and configuration management. We break down the assessment criteria, methodologies, and compliance objectives, offering practical examples for achieving alignment with CMMC standards. Additionally, we discuss how to use the included appendix of acronyms and abbreviations to navigate the document effectively.</p><p>Need expert guidance on your Level 2 CMMC assessment? Jun Cyber’s team is ready to help you achieve compliance with confidence. Contact us today to get started!<br/><br/>Ref: <a href='https://dodcio.defense.gov/Portals/0/Documents/CMMC/AssessmentGuideL2v2.pdf'>CMMC Level 2 Assessment Guide</a><br/><br/>Website: www.juncyber.com<br/>Email: info@juncyber.com</p>  <p><a rel="payment" href="https://www.buzzsprout.com/2371779/support">Support the show</a></p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/2371779/open_sms">Send a text</a></p><p>In this episode of <em>CMMC News</em>, we explore the Cybersecurity Maturity Model Certification (CMMC) Assessment Guide for Level 2, Version 2.13. This comprehensive guide provides instructions for conducting both self-assessments and certification assessments, detailing security requirements across key domains like access control, awareness and training, audit and accountability, and configuration management. We break down the assessment criteria, methodologies, and compliance objectives, offering practical examples for achieving alignment with CMMC standards. Additionally, we discuss how to use the included appendix of acronyms and abbreviations to navigate the document effectively.</p><p>Need expert guidance on your Level 2 CMMC assessment? Jun Cyber’s team is ready to help you achieve compliance with confidence. Contact us today to get started!<br/><br/>Ref: <a href='https://dodcio.defense.gov/Portals/0/Documents/CMMC/AssessmentGuideL2v2.pdf'>CMMC Level 2 Assessment Guide</a><br/><br/>Website: www.juncyber.com<br/>Email: info@juncyber.com</p>  <p><a rel="payment" href="https://www.buzzsprout.com/2371779/support">Support the show</a></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2371779/episodes/16363397-cmmc-level-2-assessment-guide-comprehensive-compliance-insights.mp3" length="21161423" type="audio/mpeg" />
    <itunes:author></itunes:author>
    <guid isPermaLink="false">Buzzsprout-16363397</guid>
    <pubDate>Tue, 31 Dec 2024 15:00:00 -0500</pubDate>
    <itunes:duration>1761</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Level 1 CMMC Assessment Guide: A Step-by-Step Overview</itunes:title>
    <title>Level 1 CMMC Assessment Guide: A Step-by-Step Overview</title>
    <itunes:summary><![CDATA[Send a text In this episode of CMMC News, we unpack the Level 1 Cybersecurity Maturity Model Certification (CMMC) Assessment Guide, designed to help organizations self-assess their compliance with 15 basic cybersecurity requirements for protecting Federal Contract Information (FCI). We cover key aspects of the guide, including how to define the scope, clarify custom terms, apply assessment criteria and methodologies like examining, interviewing, and testing, and document findings as MET, NOT ...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/2371779/open_sms">Send a text</a></p><p>In this episode of <em>CMMC News</em>, we unpack the Level 1 Cybersecurity Maturity Model Certification (CMMC) Assessment Guide, designed to help organizations self-assess their compliance with 15 basic cybersecurity requirements for protecting Federal Contract Information (FCI). We cover key aspects of the guide, including how to define the scope, clarify custom terms, apply assessment criteria and methodologies like examining, interviewing, and testing, and document findings as MET, NOT MET, or NOT APPLICABLE. Detailed guidance for each requirement is discussed, along with tips on using the appendix of acronyms and abbreviations effectively. Whether you&apos;re an organization or a professional supporting CMMC efforts, this episode has valuable insights for you.</p><p>Need assistance with your CMMC self-assessment? Jun Cyber is here to help you navigate the process and ensure compliance with confidence. Contact us today to get started!<br/><br/>Ref: <a href='https://dodcio.defense.gov/Portals/0/Documents/CMMC/AssessmentGuideL1v2.pdf'>CMMC Level 1 Self-Assessment Guide</a><br/><br/>Website: www.juncyber.com<br/>Email: info@juncyber.com</p> <p><a rel="payment" href="https://www.buzzsprout.com/2371779/support">Support the show</a></p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/2371779/open_sms">Send a text</a></p><p>In this episode of <em>CMMC News</em>, we unpack the Level 1 Cybersecurity Maturity Model Certification (CMMC) Assessment Guide, designed to help organizations self-assess their compliance with 15 basic cybersecurity requirements for protecting Federal Contract Information (FCI). We cover key aspects of the guide, including how to define the scope, clarify custom terms, apply assessment criteria and methodologies like examining, interviewing, and testing, and document findings as MET, NOT MET, or NOT APPLICABLE. Detailed guidance for each requirement is discussed, along with tips on using the appendix of acronyms and abbreviations effectively. Whether you&apos;re an organization or a professional supporting CMMC efforts, this episode has valuable insights for you.</p><p>Need assistance with your CMMC self-assessment? Jun Cyber is here to help you navigate the process and ensure compliance with confidence. Contact us today to get started!<br/><br/>Ref: <a href='https://dodcio.defense.gov/Portals/0/Documents/CMMC/AssessmentGuideL1v2.pdf'>CMMC Level 1 Self-Assessment Guide</a><br/><br/>Website: www.juncyber.com<br/>Email: info@juncyber.com</p> <p><a rel="payment" href="https://www.buzzsprout.com/2371779/support">Support the show</a></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2371779/episodes/16363316-level-1-cmmc-assessment-guide-a-step-by-step-overview.mp3" length="16645841" type="audio/mpeg" />
    <itunes:author></itunes:author>
    <guid isPermaLink="false">Buzzsprout-16363316</guid>
    <pubDate>Tue, 31 Dec 2024 15:00:00 -0500</pubDate>
    <itunes:duration>1385</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Overview of the CMMC: A Framework for Cybersecurity Excellence</itunes:title>
    <title>Overview of the CMMC: A Framework for Cybersecurity Excellence</title>
    <itunes:summary><![CDATA[Send a text In this episode of CMMC News, we provide an in-depth overview of the Cybersecurity Maturity Model Certification (CMMC), the Department of Defense’s framework for enhancing the cybersecurity posture of contractors and subcontractors. We explore the three maturity levels and their requirements, which are derived from FAR 52.204-21, NIST SP 800-171 Rev 2, and NIST SP 800-172. Listen as we break down the 14 security domains and the specific mandates for protecting Federal Contract Inf...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/2371779/open_sms">Send a text</a></p><p>In this episode of <em>CMMC News</em>, we provide an in-depth overview of the Cybersecurity Maturity Model Certification (CMMC), the Department of Defense’s framework for enhancing the cybersecurity posture of contractors and subcontractors. We explore the three maturity levels and their requirements, which are derived from FAR 52.204-21, NIST SP 800-171 Rev 2, and NIST SP 800-172. Listen as we break down the 14 security domains and the specific mandates for protecting Federal Contract Information (FCI) and Controlled Unclassified Information (CUI). We’ll also touch on additional resources available to guide you through CMMC compliance.</p><p>Ready to strengthen your cybersecurity and meet CMMC requirements? Jun Cyber offers expert services to help you navigate compliance with confidence. Contact us today to get started!<br/><br/>Ref: <a href='https://dodcio.defense.gov/Portals/0/Documents/CMMC/ModelOverviewv2.pdf'>https://dodcio.defense.gov/Portals/0/Documents/CMMC/ModelOverviewv2.pdf</a><br/><br/>Website: www.juncyber.com<br/>Email: info@juncyber.com</p>  <p><a rel="payment" href="https://www.buzzsprout.com/2371779/support">Support the show</a></p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/2371779/open_sms">Send a text</a></p><p>In this episode of <em>CMMC News</em>, we provide an in-depth overview of the Cybersecurity Maturity Model Certification (CMMC), the Department of Defense’s framework for enhancing the cybersecurity posture of contractors and subcontractors. We explore the three maturity levels and their requirements, which are derived from FAR 52.204-21, NIST SP 800-171 Rev 2, and NIST SP 800-172. Listen as we break down the 14 security domains and the specific mandates for protecting Federal Contract Information (FCI) and Controlled Unclassified Information (CUI). We’ll also touch on additional resources available to guide you through CMMC compliance.</p><p>Ready to strengthen your cybersecurity and meet CMMC requirements? Jun Cyber offers expert services to help you navigate compliance with confidence. Contact us today to get started!<br/><br/>Ref: <a href='https://dodcio.defense.gov/Portals/0/Documents/CMMC/ModelOverviewv2.pdf'>https://dodcio.defense.gov/Portals/0/Documents/CMMC/ModelOverviewv2.pdf</a><br/><br/>Website: www.juncyber.com<br/>Email: info@juncyber.com</p>  <p><a rel="payment" href="https://www.buzzsprout.com/2371779/support">Support the show</a></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2371779/episodes/16363293-overview-of-the-cmmc-a-framework-for-cybersecurity-excellence.mp3" length="29390931" type="audio/mpeg" />
    <itunes:author></itunes:author>
    <guid isPermaLink="false">Buzzsprout-16363293</guid>
    <pubDate>Tue, 31 Dec 2024 15:00:00 -0500</pubDate>
    <podcast:soundbite startTime="4.0" duration="30.0" />
    <itunes:duration>2447</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Level 1 CMMC Scoping Guidance: A Practical Guide to Compliance</itunes:title>
    <title>Level 1 CMMC Scoping Guidance: A Practical Guide to Compliance</title>
    <itunes:summary><![CDATA[Send a text In this episode of CMMC News, we explore the key guidance for conducting a Level 1 Cybersecurity Maturity Model Certification (CMMC) self-assessment. We discuss how to define the scope, including which assets—such as those processing, storing, or transmitting Federal Contract Information (FCI)—are included, and which, like IoT devices and Government Furnished Equipment, are excluded. Learn why no formal documentation is required for Level 1 and how to evaluate people, technology, ...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/2371779/open_sms">Send a text</a></p><p>In this episode of <em>CMMC News</em>, we explore the key guidance for conducting a Level 1 Cybersecurity Maturity Model Certification (CMMC) self-assessment. We discuss how to define the scope, including which assets—such as those processing, storing, or transmitting Federal Contract Information (FCI)—are included, and which, like IoT devices and Government Furnished Equipment, are excluded. Learn why no formal documentation is required for Level 1 and how to evaluate people, technology, and facilities involved in handling FCI. We also clarify the conditions for reassessments and the role of annual affirmations in maintaining compliance.</p><p>Need help with your CMMC self-assessment? Jun Cyber is here to guide you every step of the way. Contact us today for expert support in achieving and maintaining compliance with confidence!<br/><br/>Ref: <a href='https://dodcio.defense.gov/Portals/0/Documents/CMMC/ScopingGuideL1v2.pdf'>https://dodcio.defense.gov/Portals/0/Documents/CMMC/ScopingGuideL1v2.pdf</a><br/><br/>Website: www.juncyber.com<br/>Email: info@juncyber.com</p>  <p><a rel="payment" href="https://www.buzzsprout.com/2371779/support">Support the show</a></p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/2371779/open_sms">Send a text</a></p><p>In this episode of <em>CMMC News</em>, we explore the key guidance for conducting a Level 1 Cybersecurity Maturity Model Certification (CMMC) self-assessment. We discuss how to define the scope, including which assets—such as those processing, storing, or transmitting Federal Contract Information (FCI)—are included, and which, like IoT devices and Government Furnished Equipment, are excluded. Learn why no formal documentation is required for Level 1 and how to evaluate people, technology, and facilities involved in handling FCI. We also clarify the conditions for reassessments and the role of annual affirmations in maintaining compliance.</p><p>Need help with your CMMC self-assessment? Jun Cyber is here to guide you every step of the way. Contact us today for expert support in achieving and maintaining compliance with confidence!<br/><br/>Ref: <a href='https://dodcio.defense.gov/Portals/0/Documents/CMMC/ScopingGuideL1v2.pdf'>https://dodcio.defense.gov/Portals/0/Documents/CMMC/ScopingGuideL1v2.pdf</a><br/><br/>Website: www.juncyber.com<br/>Email: info@juncyber.com</p>  <p><a rel="payment" href="https://www.buzzsprout.com/2371779/support">Support the show</a></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2371779/episodes/16363251-level-1-cmmc-scoping-guidance-a-practical-guide-to-compliance.mp3" length="19487856" type="audio/mpeg" />
    <itunes:author>Wilson Bautista Jr.</itunes:author>
    <guid isPermaLink="false">Buzzsprout-16363251</guid>
    <pubDate>Tue, 31 Dec 2024 14:00:00 -0500</pubDate>
    <podcast:soundbite startTime="0.0" duration="30.0" />
    <itunes:duration>1622</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Defining the Scope: A Guide to Level 2 CMMC Assessment</itunes:title>
    <title>Defining the Scope: A Guide to Level 2 CMMC Assessment</title>
    <itunes:summary><![CDATA[Send a text In this episode of CMMC News, we break down the essential guidance on defining the scope of a Level 2 Cybersecurity Maturity Model Certification (CMMC) assessment. We explore the key asset categories—CUI Assets, Security Protection Assets, Contractor Risk Managed Assets, and Specialized Assets—and provide insights into categorizing and documenting them effectively. Learn about the assessment requirements for each category, the critical role of System Security Plans (SSPs) and netw...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/2371779/open_sms">Send a text</a></p><p>In this episode of <em>CMMC News</em>, we break down the essential guidance on defining the scope of a Level 2 Cybersecurity Maturity Model Certification (CMMC) assessment. We explore the key asset categories—CUI Assets, Security Protection Assets, Contractor Risk Managed Assets, and Specialized Assets—and provide insights into categorizing and documenting them effectively. Learn about the assessment requirements for each category, the critical role of System Security Plans (SSPs) and network diagrams, and what you need to know about working with External Service Providers (ESPs). We also touch on handling classified and unclassified information to ensure compliance.</p><p>Need help navigating the complexities of your CMMC assessment? Contact Jun Cyber today for expert guidance and support tailored to your organization. Don&apos;t leave compliance to chance—let us help you succeed!<br/><br/>Email: cmmc@juncyber.com<br/>Website: www.juncyber.com<br/><br/>Ref: <a href='https://dodcio.defense.gov/Portals/0/Documents/CMMC/ScopingGuideL2v2.pdf'>CMMC Level 2 Scoping Guidance</a></p> <p><a rel="payment" href="https://www.buzzsprout.com/2371779/support">Support the show</a></p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/2371779/open_sms">Send a text</a></p><p>In this episode of <em>CMMC News</em>, we break down the essential guidance on defining the scope of a Level 2 Cybersecurity Maturity Model Certification (CMMC) assessment. We explore the key asset categories—CUI Assets, Security Protection Assets, Contractor Risk Managed Assets, and Specialized Assets—and provide insights into categorizing and documenting them effectively. Learn about the assessment requirements for each category, the critical role of System Security Plans (SSPs) and network diagrams, and what you need to know about working with External Service Providers (ESPs). We also touch on handling classified and unclassified information to ensure compliance.</p><p>Need help navigating the complexities of your CMMC assessment? Contact Jun Cyber today for expert guidance and support tailored to your organization. Don&apos;t leave compliance to chance—let us help you succeed!<br/><br/>Email: cmmc@juncyber.com<br/>Website: www.juncyber.com<br/><br/>Ref: <a href='https://dodcio.defense.gov/Portals/0/Documents/CMMC/ScopingGuideL2v2.pdf'>CMMC Level 2 Scoping Guidance</a></p> <p><a rel="payment" href="https://www.buzzsprout.com/2371779/support">Support the show</a></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2371779/episodes/16363177-defining-the-scope-a-guide-to-level-2-cmmc-assessment.mp3" length="14881008" type="audio/mpeg" />
    <itunes:author></itunes:author>
    <guid isPermaLink="false">Buzzsprout-16363177</guid>
    <pubDate>Tue, 31 Dec 2024 14:00:00 -0500</pubDate>
    <podcast:soundbite startTime="0.0" duration="30.0" />
    <itunes:duration>1238</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>CMMC Tax Credit for Small Defense Contractors</itunes:title>
    <title>CMMC Tax Credit for Small Defense Contractors</title>
    <itunes:summary><![CDATA[Send a text In this episode of CMMC News, we explore the proposed CMMC Tax Credit and its potential to provide financial relief for small defense contractors navigating the complexities of Cybersecurity Maturity Model Certification (CMMC) compliance. Discover how this tax credit could offset costs like technology upgrades, staff training, and third-party assessments, helping small businesses stay competitive in the defense supply chain. Tune in to learn why this proposal could be a game-chang...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/2371779/open_sms">Send a text</a></p><p>In this episode of <em>CMMC News</em>, we explore the proposed CMMC Tax Credit and its potential to provide financial relief for small defense contractors navigating the complexities of Cybersecurity Maturity Model Certification (CMMC) compliance. Discover how this tax credit could offset costs like technology upgrades, staff training, and third-party assessments, helping small businesses stay competitive in the defense supply chain. Tune in to learn why this proposal could be a game-changer for contractors working to protect sensitive information and secure DoD contracts.<br/><br/>Website: www.juncyber.com<br/>Email: info@juncyber.com<br/><br/>Ref: <a href='https://www.juncyber.com/cmmc-tax-credit-a-lifeline-for-small-defense-contractors/'>https://www.juncyber.com/cmmc-tax-credit-a-lifeline-for-small-defense-contractors/</a></p> <p><a rel="payment" href="https://www.buzzsprout.com/2371779/support">Support the show</a></p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/2371779/open_sms">Send a text</a></p><p>In this episode of <em>CMMC News</em>, we explore the proposed CMMC Tax Credit and its potential to provide financial relief for small defense contractors navigating the complexities of Cybersecurity Maturity Model Certification (CMMC) compliance. Discover how this tax credit could offset costs like technology upgrades, staff training, and third-party assessments, helping small businesses stay competitive in the defense supply chain. Tune in to learn why this proposal could be a game-changer for contractors working to protect sensitive information and secure DoD contracts.<br/><br/>Website: www.juncyber.com<br/>Email: info@juncyber.com<br/><br/>Ref: <a href='https://www.juncyber.com/cmmc-tax-credit-a-lifeline-for-small-defense-contractors/'>https://www.juncyber.com/cmmc-tax-credit-a-lifeline-for-small-defense-contractors/</a></p> <p><a rel="payment" href="https://www.buzzsprout.com/2371779/support">Support the show</a></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2371779/episodes/16363100-cmmc-tax-credit-for-small-defense-contractors.mp3" length="13511442" type="audio/mpeg" />
    <itunes:author></itunes:author>
    <guid isPermaLink="false">Buzzsprout-16363100</guid>
    <pubDate>Tue, 31 Dec 2024 14:00:00 -0500</pubDate>
    <podcast:soundbite startTime="0.0" duration="30.0" />
    <itunes:duration>1124</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Final CMMC Program Rule Unveiled by DOD</itunes:title>
    <title>Final CMMC Program Rule Unveiled by DOD</title>
    <itunes:summary><![CDATA[Send a text Certainly! Here’s a polished description for your podcast episode: 🎙️ Episode Title: Demystifying the CMMC Final Rule: What It Means for Defense Contractors In this episode of CMMC News, we delve into the recently unveiled CMMC Final Rule by the Department of Defense. Join our AI hosts as they unpack the critical updates, explain what’s new in the compliance landscape, and provide actionable insights for defense contractors navigating these changes. Whether you’re a small business...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/2371779/open_sms">Send a text</a></p><p>Certainly! Here’s a polished description for your podcast episode:</p><p>🎙️ <b>Episode Title: Demystifying the CMMC Final Rule: What It Means for Defense Contractors</b></p><p>In this episode of CMMC News, we delve into the recently unveiled CMMC Final Rule by the Department of Defense. Join our AI hosts as they unpack the critical updates, explain what’s new in the compliance landscape, and provide actionable insights for defense contractors navigating these changes.</p><p>Whether you’re a small business in the defense supply chain or a compliance professional looking to stay ahead, this episode offers practical advice, expert commentary, and strategies to align your organization with the latest cybersecurity standards.</p><p>💡 <b>What you’ll learn</b>:</p><ul><li>Key changes in the 2024 CMMC Final Rule</li><li>How these updates impact contractors of all sizes</li><li>Steps you can take today to prepare for certification</li></ul><p>Don’t miss this engaging conversation that cuts through the jargon and delivers clarity on what the CMMC means for you.<br/><br/>Website: www.juncyber.com<br/>Email: info@juncyber.com<br/><br/>Reference: <a href='https://www.juncyber.com/final-cmmc-program-rule-unveiled-by-dod/'>https://www.juncyber.com/final-cmmc-program-rule-unveiled-by-dod/</a></p> <p><a rel="payment" href="https://www.buzzsprout.com/2371779/support">Support the show</a></p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/2371779/open_sms">Send a text</a></p><p>Certainly! Here’s a polished description for your podcast episode:</p><p>🎙️ <b>Episode Title: Demystifying the CMMC Final Rule: What It Means for Defense Contractors</b></p><p>In this episode of CMMC News, we delve into the recently unveiled CMMC Final Rule by the Department of Defense. Join our AI hosts as they unpack the critical updates, explain what’s new in the compliance landscape, and provide actionable insights for defense contractors navigating these changes.</p><p>Whether you’re a small business in the defense supply chain or a compliance professional looking to stay ahead, this episode offers practical advice, expert commentary, and strategies to align your organization with the latest cybersecurity standards.</p><p>💡 <b>What you’ll learn</b>:</p><ul><li>Key changes in the 2024 CMMC Final Rule</li><li>How these updates impact contractors of all sizes</li><li>Steps you can take today to prepare for certification</li></ul><p>Don’t miss this engaging conversation that cuts through the jargon and delivers clarity on what the CMMC means for you.<br/><br/>Website: www.juncyber.com<br/>Email: info@juncyber.com<br/><br/>Reference: <a href='https://www.juncyber.com/final-cmmc-program-rule-unveiled-by-dod/'>https://www.juncyber.com/final-cmmc-program-rule-unveiled-by-dod/</a></p> <p><a rel="payment" href="https://www.buzzsprout.com/2371779/support">Support the show</a></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2371779/episodes/16363061-final-cmmc-program-rule-unveiled-by-dod.mp3" length="12108392" type="audio/mpeg" />
    <itunes:author>Wilson Bautista Jr.</itunes:author>
    <guid isPermaLink="false">Buzzsprout-16363061</guid>
    <pubDate>Tue, 31 Dec 2024 14:00:00 -0500</pubDate>
    <podcast:soundbite startTime="0.0" duration="30.0" />
    <itunes:duration>1007</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>1</itunes:season>
    <itunes:episode>1</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
</channel>
</rss>
