Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo

CMMC Compliance Guide Podcasts

show episodes
 
Artwork

1
CMMC Compliance Guide

CMMC Compliance Guide

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
Our experiences inspired the creation of The CMMC Compliance Guide Podcast and its accompanying resources. The podcast began as a way to share what we learned through real-world challenges—like helping that aerospace machine shop—and to provide accessible education for businesses navigating DoD cybersecurity requirements. The CMMC Compliance Guide Podcast breaks down complex topics like NIST 800-171 and CMMC into actionable, easy-to-understand steps. Whether you’re a subcontractor struggling ...
  continue reading
 
Artwork
 
Secure Talk reviews the latest threats, tips, and trends on security, innovation, and compliance. Host Justin Beals interviews leading privacy, security and technology executives to discuss best practices related to IT security, data protection and compliance. Based in Seattle, he previously served as the CTO of NextStep and Koru, which won the 2018 Most Impactful Startup award from Wharton People Analytics. He is the creator of the patented Training, Tracking & Placement System and the auth ...
  continue reading
 
Artwork

1
Breaching the Boardroom

NetGain Technologies, LLC

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
Breaching the Boardroom is a high-level podcast designed to explore the intersection of leadership, growth, and technology. Each episode brings industry leaders, experts, and innovators together for candid conversations on how to navigate the evolving tech landscape while driving business success. We’re on a mission to simplify complex topics like AI, cyber threats, and IT strategy, making them accessible and actionable for executives in mid-market businesses.
  continue reading
 
TestGuild Security Podcast is a weekly podcast hosted by Joe Colantonio, which geeks out on all things security and security testing related. TestGuild Security Podcast covers news found in the security testing space, reviews books about software security and speaks with some of the thought leaders in the security field. We'll aim to interview some of today's most successful and inspiring software engineers thought leaders.
  continue reading
 
Loading …
show series
 
Submit any questions you would like answered on the podcast! In this episode of the CMMC Compliance Guide Podcast, Brooke and Stacey from Justice IT Consulting unpack the biggest updates from the Cyber AB’s October 2025 Town Hall and what they mean for defense contractors preparing for CMMC certification. You’ll learn: Why the government shutdown i…
  continue reading
 
This conversation delves into the Cybersecurity Maturity Model Certification (CMMC), a crucial compliance framework for small to mid-sized businesses engaged with the Department of Defense. Sam Durso, a CMMC expert, explains the significance of CMMC, the differences between Federal Contract Information (FCI) and Controlled Unclassified Information …
  continue reading
 
Bob Kolasky walked the halls where CMMC was built. As founding director of CISA's National Risk Management Center, he watched this policy evolve from concept to pilot program to federal law—surviving three presidential administrations because the need never changed. On November 10, 2025, that policy becomes mandatory reality for every defense contr…
  continue reading
 
Submit any questions you would like answered on the podcast! Get the inside scoop from CS5 East 2025, the largest cybersecurity and compliance event for the Defense Industrial Base. In this episode, Brooke and Stacey from Justice IT Consulting breaks down the biggest CMMC updates, Operation Midnight Hammer, and how AI is reshaping compliance. Learn…
  continue reading
 
In this episode of Breaching the Boardroom, host David Mauro speaks with Stacy Richter, CEO of LiveLingua, about the importance of cultural connection in language learning and the evolution of language education in a multilingual world. Stacey shares her journey from corporate life to entrepreneurship, the challenges of building a business, and the…
  continue reading
 
In this episode of Breaching the Boardroom, host David Mauro and host Ashley Sebastian engage with Kaelyn Query Caldwell, a multifaceted entrepreneur and author. They explore the realities of entrepreneurship, including the challenges of financial risks, lawsuits, and the grit required to succeed. Kaelin shares her journey of building businesses fr…
  continue reading
 
When we think about cybersecurity, images of tech giants and major financial centers come to mind—but what about the towns where most of us actually live? This SecureTalk episode with cybersecurity researcher Lars Kruse explores an often-overlooked question: how do communities of 20,000-100,000 residents protect themselves in an increasingly digita…
  continue reading
 
In this episode of Breaching the Boardroom, host Latina Berryhill engages with Robert Griggs, president and CEO of Trinity, discussing the essence of impactful leadership. They explore foundational principles of leadership, the importance of caring and values, the role of innovation and technology, and the significance of customer-centric approache…
  continue reading
 
Submit any questions you would like answered on the podcast! 🎯 Get your Free SPRS Roadmap Session: https://cmmccomplianceguide.com/free-sprs-roadmap Our experts will review your SPRS score, documentation, and setup to help you hit 110 with a clear action plan at no cost. Prime contractors like Lockheed Martin, Raytheon, and Parker Hannifin are dema…
  continue reading
 
This conversation explores the rapid advancement of AI technology, its benefits, and the significant risks associated with its use, particularly in compliance and cybersecurity. The discussion emphasizes the importance of understanding the differences between generative AI and traditional AI, the necessity of compliance with regulations, and the ar…
  continue reading
 
Submit any questions you would like answered on the podcast! The September 2025 Cyber AB Town Hall dropped big updates for contractors navigating CMMC and NIST 800-171 compliance. In this episode of the CMMC Compliance Guide Podcast, Brooke and Austin break down what the final CMMC rule (Title 48A) means for defense contractors, subcontractors, and…
  continue reading
 
This conversation delves into the critical cybersecurity challenges faced by small businesses, emphasizing the importance of basic security measures and awareness. The discussion highlights the cultural differences in cybersecurity perceptions between the US and the UK, the role of education in fostering cybersecurity awareness, and the emerging th…
  continue reading
 
Submit any questions you would like answered on the podcast! Worried about mishandling Controlled Unclassified Information (CUI)? In this episode of the CMMC Compliance Guide Podcast, Brooke and Stacey break down what CUI really is, why it matters in defense contracting, and the biggest mistakes contractors make when handling it. You’ll also learn …
  continue reading
 
In this episode of Breaching the Boardroom, host David Mauro speaks with John Zielinski, CEO of Universal Polymer, about the intricacies of manufacturing, the impact of tariffs, and the importance of leadership and mentorship in the industry. Zielinski shares insights on navigating challenges in manufacturing, building a positive company culture, a…
  continue reading
 
Discover how strategic foresight is revolutionizing cybersecurity thinking. In this compelling SecureTalk episode, renowned futurist Heather Vescent reveals the 12 invisible paradigms that have shaped our entire approach to cybersecurity - and why breaking them could transform how we defend digital systems. Back in 2017, Vescent applied strategic f…
  continue reading
 
Submit any questions you would like answered on the podcast! The wait is over: the Department of Defense has finalized the CMMC rule, officially making it part of DFARS. That means compliance isn’t “coming soon”, it’s now in your contracts. In this episode of the CMMC Compliance Guide Podcast, Austin and Brooke from Justice IT Consulting break down…
  continue reading
 
In this episode of "Breaching the Boardroom," host David Mauro sits down with Matt Aston, President of GPRS, to explore the fascinating world of underground radar and detection. Matt shares the journey of GPRS from its inception, highlighting the challenges and triumphs of building a company that specializes in visualizing the unseen world beneath …
  continue reading
 
In this episode of Cherry Bekaert’s GovCon podcast, Neal Beggan is joined by cybersecurity professionals Steven Ursillo and Brian Kirk for a comprehensive deep dive into the current state of Cybersecurity Maturity Model Certification (CMMC) compliance. They discuss how 48 CFR will reshape the enforcement of cybersecurity requirements in government …
  continue reading
 
Submit any questions you would like answered on the podcast! Confused about where NIST 800-171 fits into your CMMC 2.0 assessment? You’re not alone. In this episode of the CMMC Compliance Guide, Brooke and Stacey from Justice IT Consulting break it all down in plain English. We cover the foundation of NIST 800-171, how it maps into the CMMC levels,…
  continue reading
 
In this episode of Breaching the Boardroom, host David Mauro and co-host Zack Moscow engage with Kevin McGrew, author of 'The New Rules of Marketing Warfare.' They discuss the intersection of marketing and leadership, emphasizing the importance of frameworks in business strategy. Kevin shares insights on the SMAC framework (Shoot, Move, Adapt, Comm…
  continue reading
 
In a converted hat factory in 1990s Boston, a group of hackers worked through the night to techno beats and Soul Coughing, driven by a simple philosophy: "smarter beats bigger." One of them, Chris Wysopal, would later stand before Congress and deliver a stark warning—a small group of dedicated hackers could bring down the entire internet in 30 minu…
  continue reading
 
In this episode of Breaching the Boardroom, host David Mauro speaks with Ed Chaffin, founder of the Uncommon Leadership Institute, about the principles of effective leadership. They discuss the importance of self-awareness, psychological safety, and communication in fostering employee engagement. Ed shares insights from his experiences and his book…
  continue reading
 
Submit any questions you would like answered on the podcast! Thinking about building an enclave for CMMC compliance? Not so fast. In this episode of the CMMC Compliance Guide Podcast, Austin and Brooke from Justice IT Consulting break down: What an enclave actually is (in plain English) When an enclave makes sense (and saves you money) When it can …
  continue reading
 
90% of Twitter users are represented by only 3% of tweets. When you scroll through your feed and form opinions about what "people are saying" about politics, you're not seeing the voices of nine out of ten users. You're seeing the loudest, most extreme 10% who create 97% of all political content on the platform. In this episode of SecureTalk, host …
  continue reading
 
Submit any questions you would like answered on the podcast! Think you’re ready for your CMMC assessment? In this episode of the CMMC Compliance Guide Podcast, Austin and Brooke break down the difference between being “paper ready” and truly “assessment ready.” From documentation gaps to overlooked technical controls, they share insider tips to hel…
  continue reading
 
In this exclusive webinar, Breaching the Boardroom host David Mauro sits down with industry veteran Mike Stramaglio, President & CEO of Stramaglio Consulting and former President of Hitachi. With decades of leadership in global technology organizations—including Ricoh, Minolta, and Konica Minolta—Michael shares powerful insights on leadership, indu…
  continue reading
 
Submit any questions you would like answered on the podcast! Marking a CMMC control as “Not Applicable” might feel like an easy shortcut but get it wrong, and you could fail your assessment, lose contracts, or even face legal trouble. In this episode of The CMMC Compliance Guide, Brooke and Stacey from Justice IT Consulting break down the real risk…
  continue reading
 
In this engaging conversation, Stephanie Johnson, CEO of Ackland Avenue, shares her inspiring journey from overcoming personal challenges to leading a successful software development company. She emphasizes the importance of mentorship, education, and creating a supportive work environment. Stephanie discusses her transition from COO to CEO, the si…
  continue reading
 
The cybersecurity landscape just shifted permanently, and most organizations aren't ready. While CISOs struggle with alert fatigue from 40+ security tools, a new threat vector is emerging that makes traditional identity management obsolete: AI agents acting autonomously across enterprise systems. Join Secure Talk host Justin Beals for a critical co…
  continue reading
 
Submit any questions you would like answered on the podcast! Schedule your free SPRS Roadmap Session and get a step-by-step plan to close gaps and stay defensible: 👉 https://cmmccomplianceguide.com/free-sprs-roadmap Is CMMC just one of many hats you wear at your company? You’re not alone and you’re not out of luck. In this episode of the CMMC Compl…
  continue reading
 
In this episode of Breaching the Boardroom, host David interviews Hollie Castro, a seasoned business advisory board member with extensive experience in human resources and leadership. Hollie shares insights from her upbringing in a rural environment, her educational journey, and her transition into HR. She discusses the importance of curiosity, cla…
  continue reading
 
The most dangerous threats don't break down the door - they already have the keys. March 23, 2003, Kuwait: Command Sergeant Major Bart Womack was loading ammunition and watching Tiger Woods play golf at 1 AM when a grenade rolled into his tent. What followed was every leader's worst nightmare - discovering that one of your own had been planning to …
  continue reading
 
Submit any questions you would like answered on the podcast! 48 CFR UPDATE: https://www.ecfr.gov/current/title-48/chapter-2/subchapter-A/part-204/subpart-204.75 Missed the June 2024 Cyber AB Town Hall? We’ve got you covered. In this episode of the CMMC Compliance Guide, Brooke and Austin break down the biggest takeaways — including how recent leade…
  continue reading
 
In this conversation, David Mauro interviews Shawn Weldin, a director of IT at a rural hospital, discussing the challenges and advancements in rural healthcare. They explore the unique funding sources for rural hospitals, the evolution of healthcare IT, the critical importance of cybersecurity, and the transformative potential of AI in healthcare d…
  continue reading
 
In this episode of Cherry Bekaert’s GovCon Podcast, Advisory Managing Director Michael Cippel and Senior Audit Manager Sarah Tucker explore the foundational principles and nuanced challenges of joint ventures (JVs) within the government contracting sector. Tune in to learn about: ► Definition and Structure of JVs ► Strategic Benefits of JVs ► Types…
  continue reading
 
Submit any questions you would like answered on the podcast! Are you trying to navigate CMMC and NIST 800-171 with a small team and limited resources? You're not alone. In this episode of the CMMC Compliance Guide, we’re breaking down six of the most common and confusing questions small DoD contractors ask—and giving you clear, practical answers yo…
  continue reading
 
In this episode of Breaching the Boardroom, host David engages with Etene Terrell-Fakorede, CEO of the Rehabilitation Institute of Encompass Health. They discuss the complexities of healthcare leadership, the importance of empathy in patient care, and the challenges of balancing business realities with compassionate care. Etene shares her personal …
  continue reading
 
Machines Running Amok: We've Created More Than We Can Secure Twenty years ago, you could count the servers in your data center. Today, we've unleashed an army of digital entities that's spiraling beyond our control. For every human employee, there are 50-100 machine identities operating in your environment—containers, serverless functions, and auto…
  continue reading
 
In this conversation, David Mauro interviews Amy Cappellanti-Wolf, an experienced Chief Human Resources Officer, discussing her journey in HR, the importance of aligning HR strategy with business goals, and the evolving role of technology, particularly AI, in workforce management. They explore leadership lessons, the significance of passion in work…
  continue reading
 
Open Source vs Commercial: How "Winning Culture" Has Made Us More Vulnerable | Greg Epstein Silicon Valley's shift from collaborative open-source principles to winner-take-all commercial dominance hasn't just changed business models—it's made us fundamentally more vulnerable. When companies prioritize winning everything over building secure, collab…
  continue reading
 
Submit any questions you would like answered on the podcast! Happy 4th of July from the team at CMMC Compliance Guide Podcast! While you're celebrating freedom, hot dogs, and fireworks — don’t forget about safeguarding the data that defends that freedom. 🛡️ In this special edition, we're tackling what really works for CMMC compliance on the shop fl…
  continue reading
 
In this compelling episode of Breaching the Boardroom, David Mauro sits down with Dr. Sergio Sanchez—former surgeon, Apple Genius, Activision IT leader, and now Head of IT at Coleman Health Services. From building computers in a video game startup’s basement to navigating the complexities of healthcare IT, Dr. Sanchez shares the extraordinary twist…
  continue reading
 
When one of the world's largest enterprises deploys AI across 10,000+ developers, the security challenges are unlike anything most organizations have faced. In this episode of SecureTalk, we explore the critical security and strategic considerations for deploying AI tools at enterprise scale with Tobias Yergin, who led AI transformation initiatives…
  continue reading
 
Submit any questions you would like answered on the podcast! 🆓 Need help getting your SPRS score to 110? Schedule your free SPRS Roadmap Session and get a step-by-step plan to close gaps and stay defensible: 👉 https://cmmccomplianceguide.com/free-sprs-roadmap The Department of Defense just issued a critical cybersecurity memo—and it's not just for …
  continue reading
 
In this heartfelt episode of Breaching the Boardroom, host David Mauro welcomes Paul Robinson, President and CEO of Home of the Innocents—a Louisville-based nonprofit serving vulnerable children across Kentucky. Paul shares his unique leadership journey, from overseeing 19 Papa John's franchises across the Gulf Coast to leading a 145-year-old organ…
  continue reading
 
SecureTalk 2025 Security Awareness Training | Complete Compliance Guide Welcome to SecureTalk's comprehensive 2025 Security Awareness Training video! This annually updated training is designed to help organizations meet their security compliance requirements while building a strong security culture. 🎯 What You'll Learn: Social Engineering & AI-Enha…
  continue reading
 
Submit any questions you would like answered on the podcast! Why is CMMC compliance so expensive—especially for small businesses? In this episode of the CMMC Compliance Guide Podcast, Austin and Brooke from Justice IT Consulting break down what really drives up the cost of CMMC and NIST 800-171 compliance, and more importantly—how you can cut costs…
  continue reading
 
In this episode of Breaching the Boardroom, Gretchen Burns, CFO of Prus Construction, shares lessons from three decades in finance across industries. From managing risk in a fifth-generation construction company to leading with trust, clear communication, and process-driven discipline, Gretchen highlights the power of listening—both as a parent and…
  continue reading
 
🌙 THE MIDNIGHT SECURITY GUARDIAN: A CISO'S ORIGIN STORY At 2 AM, most people are dreaming. Satyam Patel is wide awake, sending texts to his security team: "Are we secure? Did we patch that server? Is MFA enabled on that service account?" This isn't insomnia—it's the origin story of how a "big firewall guy" transformed into one of cybersecurity's mo…
  continue reading
 
Loading …
Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play