BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//ChamberMaster//Event Calendar 2.0//EN
METHOD:PUBLISH
X-PUBLISHED-TTL:P3D
REFRESH-INTERVAL:P3D
CALSCALE:GREGORIAN
BEGIN:VEVENT
DTSTART:20210210T150000Z
DTEND:20210210T160000Z
X-MICROSOFT-CDO-ALLDAYEVENT:FALSE
SUMMARY:"Tips From The Experts" Series: "NIST 800-171 & CMMC Overview: What are they and why are they important for DoD contracts - and\, potentially\, all government contracts?"
DESCRIPTION:"NIST 800-171 & CMMC Overview:\n\nWhat are they and why are they important for DoD contracts -\n\nand\, potentially\, all government contracts?"\nFor the small - to middle-sized companies who are members of the 300\,000+ Defense Industrial Base (DIB)\, contract requirements related to Cybersecurity have been easy to pay lip service to\; now\, however\, with the release of the Cybersecurity Maturity Model Certification (CMMC) standard\, companies are being required to meet the requirements or lose out on future contracting opportunities. \n\n\n\nJoin us to find the answer to - What is the CMMC and how is it related to NIST Special Publication 800-171?\n\n\n\nThis presentation will help you to not only understand why these requirements are important to the DIB\, but also how to prepare for the changes that will inevitably affect the DoD\, but also potentially the future of federal government contracting in general.\n\n\n\n \nDuring this webinar we will cover the following:\n\n\n	Why CMMC Came About\n	How we got to CMMC\n	What is NIST SP (Special Publication) 800-171\n	How NIST SP 800-171 became CMMC\n	Types of Data to Protect (FCI and CUI)\n	How NIST SP 800-171 and CMMC are related\n	The Levels of CMMC\n	The CMMC Ecosystem and the Players within it\n	Next Steps: The Interim Rule (Three Contract Clauses to look for and what they mean)\n	Preparing for CMMC ? How to prepare for and submit to SPRS\n	Questions\n	Who Viqtory Cyber is (and how we can help)\n\n\nMeet the Presenters:\n\n\n\n\n\nJan DeMartini has over 25 years of experience providing audit\, IT security and risk management solutions and program development to companies in the defense\, finance\, and manufacturing industries using NIST\, ISO\, PCI DSS and FFIEC CAT security frameworks.  She has spent the past several years performing DFARS\, NIST 800-171 and security maturity compliance assessments and program development.\n\nJan is a retired Colonel in the US Army and served as the Inspector General of the Defense Logistics Agency as the Director of both Audit and Investigations\, and as the Chief\, Enterprise Solutions\, Information Operations.  She also served as the Deputy Chief of Staff for Information Management for the Northeastern US with USARC.\n\n \n\n\n\nPaul Kriebel has extensive experience in Cybersecurity and management consulting having successfully founded two consultancies and having worked for two (2) Big Four firms. His broad Cyber risk management experience spans the commercial and federal government sectors.\n\nPrior to joining Viqtory Cyber\, Mr. Kriebel was the Chief Information Security Officer (CISO) at a health care provider. While there\, he used the NIST Cybersecurity framework to formalize the Cybersecurity program and its governance and operational practices as well as achieve interim HITRUST certification.\n\n Mr. Kriebel is a Certified Information Systems Security Professional (CISSP) and a Certified Information Security Manager (CISM) among other certifications.
X-ALT-DESC;FMTTYPE=text/html:<div font-size:="" style="color: rgb(51\, 51\, 51)\; text-align: center\;" text-align:="" trebuchet=""><span style="font-size:24px\;"><span style="color:#008000\;"><span style="font-family:tahoma\;"><span style="background:white\;">&quot\;NIST 800-171 &amp\; CMMC Overview:<br />\nWhat are they and why are they important for DoD contracts -<br />\nand\, potentially\, all government contracts?&quot\;</span></span></span></span></div>\n<span style="font-size:14px\;"><strong><span style="font-family:arial\,sans-serif\;">For the small&nbsp\;</span></strong><span style="font-family:arial\,sans-serif\;">- to middle-sized companies who are members of the 300\,000+ Defense Industrial Base (DIB)\, contract requirements related to Cybersecurity have been easy to pay lip service to\; now\, however\, with the release of the Cybersecurity Maturity Model Certification (CMMC) standard\, companies are being required to meet the requirements or lose out on future contracting opportunities.&nbsp\;<br />\n<br />\nJoin us to find the answer to - W</span></span><span style="font-family:arial\,sans-serif\;"><span style="font-size:14px\;">hat is the CMMC and how is it related to NIST Special Publication 800-171?</span><br />\n<br />\n<span style="font-size:14px\;">This presentation will help you to not only understand why these requirements are important to the DIB\, but also how to prepare for the changes that will inevitably affect the DoD\, but also potentially the future of federal government contracting in general.</span></span><br />\n<br />\n&nbsp\;\n<div><span style="font-size:14px\;"><span style="font-family:tahoma\;">During this webinar we will cover the following:</span></span></div>\n\n<ul>\n	<li><span style="color:#008000\;"><span style="font-size:14px\;"><span style="font-family:tahoma\;">Why CMMC Came About</span></span></span></li>\n	<li><span style="color:#008000\;"><span style="font-size:14px\;"><span style="font-family:tahoma\;">How we got to CMMC</span></span></span></li>\n	<li><span style="color:#008000\;"><span style="font-size:14px\;"><span style="font-family:tahoma\;">What is NIST SP (Special Publication) 800-171</span></span></span></li>\n	<li><span style="color:#008000\;"><span style="font-size:14px\;"><span style="font-family:tahoma\;">How NIST SP 800-171 became CMMC</span></span></span></li>\n	<li><span style="color:#008000\;"><span style="font-size:14px\;"><span style="font-family:tahoma\;">Types of Data to Protect (FCI and CUI)</span></span></span></li>\n	<li><span style="color:#008000\;"><span style="font-size:14px\;"><span style="font-family:tahoma\;">How NIST SP 800-171 and CMMC are related</span></span></span></li>\n	<li><span style="color:#008000\;"><span style="font-size:14px\;"><span style="font-family:tahoma\;">The Levels of CMMC</span></span></span></li>\n	<li><span style="color:#008000\;"><span style="font-size:14px\;"><span style="font-family:tahoma\;">The CMMC Ecosystem and the Players within it</span></span></span></li>\n	<li><span style="color:#008000\;"><span style="font-size:14px\;"><span style="font-family:tahoma\;">Next Steps: The Interim Rule (Three Contract Clauses to look for and what they mean)</span></span></span></li>\n	<li><span style="color:#008000\;"><span style="font-size:14px\;"><span style="font-family:tahoma\;">Preparing for CMMC ? How to prepare for and submit to SPRS</span></span></span></li>\n	<li><span style="color:#008000\;"><span style="font-size:14px\;"><span style="font-family:tahoma\;">Questions</span></span></span></li>\n	<li><span style="color:#008000\;"><span style="font-size:14px\;"><span style="font-family:tahoma\;">Who Viqtory Cyber is (and how we can help)</span></span></span></li>\n</ul>\n\n<div style="text-align: center\;"><span style="font-size:16px\;"><span style="color:#000000\;"><em><span style="font-family:tahoma\;">Meet the Presenters:<br />\n<img alt="" height="67" src="https://chambermaster.blob.core.windows.net/userfiles/UserFiles/chambers/2803/Image/ViqtoryCyber_logo.jpg" style="width: 168px\; height: 67px\;" width="168" /><br />\n<img alt="" height="142" src="https://chambermaster.blob.core.windows.net/userfiles/UserFiles/chambers/2803/Image/JanDeMartini_headshot.png" style="width: 120px\; height: 142px\;" width="120" /></span></em></span></span></div>\n\n<div><span style="font-family:arial\;"><span style="font-size:12px\;"><strong>Jan DeMartini</strong> has over 25 years of experience providing audit\, IT security and risk management solutions and program development to companies in the defense\, finance\, and manufacturing industries using NIST\, ISO\, PCI DSS and FFIEC CAT security frameworks.&nbsp\; She has spent the past several years performing DFARS\, NIST 800-171 and security maturity compliance assessments and program development.<br />\nJan is a retired Colonel in the US Army and served as the Inspector General of the Defense Logistics Agency as the Director of both Audit and Investigations\, and as the Chief\, Enterprise Solutions\, Information Operations.&nbsp\; She also served as the Deputy Chief of Staff for Information Management for the Northeastern US with USARC.</span></span><br />\n&nbsp\;</div>\n\n<div style="text-align: center\;"><img alt="" height="120" src="https://chambermaster.blob.core.windows.net/userfiles/UserFiles/chambers/2803/Image/PaulKriebel_headshot.jpg" style="width: 120px\; height: 120px\;" width="120" /></div>\n\n<div><span style="font-size:12px\;"><span style="font-family:arial\;"><strong>Paul Kriebel</strong> has extensive experience in Cybersecurity and management consulting having successfully founded two consultancies and having worked for two (2) Big Four firms. His broad Cyber risk management experience spans the commercial and federal government sectors.<br />\nPrior to joining Viqtory Cyber\, Mr. Kriebel was the Chief Information Security Officer (CISO) at a health care provider. While there\, he used the NIST Cybersecurity framework to formalize the Cybersecurity program and its governance and operational practices as well as achieve interim HITRUST certification.<br />\n&nbsp\;Mr. Kriebel is a Certified Information Systems Security Professional (CISSP) and a Certified Information Security Manager (CISM) among other certifications.&nbsp\;</span></span></div>\n
LOCATION:This will be a ZOOM Webinar. The link will be sent to registrants the morning of the event.
UID:e.2803.7213
SEQUENCE:3
DTSTAMP:20260416T044211Z
URL:https://www.paacc.com/events/details/tips-from-the-experts-series-nist-800-171-cmmc-overview-what-are-they-and-why-are-they-important-for-dod-contracts-and-potentially-all-government-contracts-7213
END:VEVENT

END:VCALENDAR
