Categories: ArticlesCybersecurity

The Keys to CMMC Compliance-#2

The Keys to CMMC Compliance-#2

Second CMMC series webinar answered questions about CUI.

In case you missed this event, the recording is available here.
ATS and OCD-Tech hosted our second live webinar focused on all things CMMC. The first webinar in February focused on introducing the CMMC to Defense contractors and today’s webinar was all about CUI. CUI stands for Controlled Unclassified Information. Understanding what it is, and if you handle it, is the very first step in your CMMC journey. If your company handles, or may need to handle, CUI then you will need to obtain the CMMC maturity level 3. If you do not handle CUI, then you only need to obtain a CMMC maturity level 1 certification. If you handle CUI you will also need to understand where that information resides in your network-because everywhere that CUI resides is considered in-scope for your CMMC assessment. Even if you don’t handle CUI, wherever federal contract information (FCI) resides is also in scope for the CMMC maturity level 1. Getting a handle on your data, determining if it’s CUI (or not), and determining where that information flows are the most important first steps in preparing for the CMMC. In today’s webinar on CUI, we introduced the concept of the CUI Life Cycle (CUI Life Cycle (dodcui.com)). Authorized holders of CUI have requirements at each stage in the CUI life cycle. The CUI Life Cycle is a framework by which to consider the information you’re handling and where it fits within the information life cycle to help determine the applicable requirements that apply to your information currently. From creation through destruction, there are requirements for handling CUI at every stage which also has implications for the information systems and physical spaces that touch CUI.

Our next webinar in our series will focus on misunderstandings about CMMC. Register here for “Myth-busting CMMC Compliance” April 7 at 1 p.m.

Once again, click here to download the slides from the presentation. Click here for the recording of the webinar.
ATS Team

Recent Posts

ATS Explores the Future of VR/AR with Peter Smulovics

American Technology Services (ATS) stands at the forefront of integrating and advancing emerging technologies in…

2 weeks ago

Defending Against Social Engineering Through Penetration Testing

Social engineering remains a top cybersecurity threat, exploiting human vulnerabilities rather than technical loopholes to…

2 weeks ago

ATS Acquires Cyber Defense International (CDI)

In a noteworthy move to strengthen our cybersecurity network, American Technology Services (ATS) is proud…

1 month ago

Enhancing Healthcare Cybersecurity: Mastering HIPAA Compliance

Enhancing Healthcare Cybersecurity: Mastering HIPAA Compliance Mastering HIPAA Compliance for Enhanced Healthcare CybersecurityThe Health Insurance…

2 months ago

Navigating the Future with NIST Cybersecurity Framework 2.0: An In-Depth Guide​

Navigating the Future with NIST Cybersecurity Framework 2.0: An In-Depth Guide Navigating the Future with…

2 months ago

Understanding the Impact: ScreenConnect’s Latest Vulnerability Insights

Recent discoveries have highlighted critical vulnerabilities within ScreenConnect, a cornerstone for remote desktop and IT…

2 months ago

This website uses cookies.