Episodios

  • Standardizing Security: A Deep Dive into DoD CUI Rules
    Jun 11 2025

    Send us a text

    In this episode of CMMC News, we break down DoD Instruction 5200.48—the Department of Defense’s rulebook for handling Controlled Unclassified Information (CUI). Hosts take you through what CUI really means, why the DoD created a standardized approach, and what it takes to handle, mark, and share sensitive information properly. Learn why it’s critical for both DoD staff and contractors, what the marking and safeguarding requirements look like in real life, and how agencies and industry partners share the responsibility for CUI protection. With insights into NIST 800-171, legacy document handling, day-to-day challenges, and the penalties for missteps, this deep dive gives listeners a practical take on why understanding CUI is essential to compliance and security across the defense ecosystem.

    Support the show

    Más Menos
    23 m
  • CMMC 2.0: What Is a C3PAO and What Does It Cost?
    Jun 9 2025

    Send us a text

    If you're a Department of Defense (DoD) contractor, navigating the world of CMMC 2.0 is essential—and it starts with understanding the role of a C3PAO. In this episode, we break down what a Certified Third-Party Assessor Organization (C3PAO) is, why it matters, and what to expect during a third-party CMMC assessment.

    You’ll learn:

    • What a C3PAO does and how they’re approved
    • Why passing a C3PAO assessment is non-negotiable for many contracts
    • What the assessment process looks like from start to finish
    • How much a CMMC assessment might cost
    • Tips for finding a trusted C3PAO and preparing effectively


    We also share a behind-the-scenes look at Jün Cyber’s own journey toward becoming a certified C3PAO. Whether you're starting your compliance journey or getting ready for your official audit, this episode gives you the clarity and confidence to take the next step.

    🛡️ Subscribe for more insights on CMMC, compliance tips, and updates from the defense cybersecurity world.

    Learn more at juncyber.com.

    Support the show

    Más Menos
    15 m
  • Navigating New DOD ODP Mandates in NIST SP 800-171 Revision 3
    May 5 2025

    Send us a text

    🚨 Working with the Department of Defense or handling Controlled Unclassified Information (CUI)? Here’s what you need to know about the DOD’s new approach to NIST SP 800-171 Revision 3 ODP values.

    Just listened to the latest episode of CMMC News, where the hosts did a deep dive into the recent DOD memo standardizing “Organization Defined Parameters” (ODPs) for protecting CUI. If you’re a defense contractor—or work in the DIB—these aren’t just guidelines, they are your new minimums.

    🔑 3 Key Takeaways:

    • No More Guesswork: The DOD has filled in the “blanks” of NIST 800-171 R3 by setting specific ODP values. These are now the baseline for all contractors—think max inactivity timeouts, access control reviews, and patching deadlines.
    • Timelines Are Tight: Some key numbers to know:
      • Account inactivity? Disable within 90 days.
      • Privileged session logoff? Required at end of work period.
      • High-risk vulnerability patching? 30 days max.
      • Quarterly updates for password “bad lists” and system inventories.
    • Documentation & Continuous Vigilance: Annual (or more frequent) reviews for policies, logs, training, and agreements are now required. Plus, always justify and document any deviations or risk-based modifications—the DOD wants your decisions traceable.

    The big picture: The DOD is taking out ambiguity. If you handle CUI, you must implement these specific controls—or document strong justification for any flexibility allowed. And these requirements will change as threats evolve, so keep your risk assessments and compliance efforts agile.

    Want the full detail? Highly recommend listening to the episode and reviewing both the NIST SP 800-171 R3 standard and the new DOD ODP memo. Stay compliant, stay secure! 💪

    See the original PDF here: https://drive.google.com/file/d/1rtgUmlaCiUKst-mHR7Fsz5O95g46hCra/view

    #cybersecurity #DoD #NIST #CUI #compliance #riskmanagement #defenseindustry

    Support the show

    Más Menos
    26 m
  • Navigating DFARS Clause and Cybersecurity Assessments for DOD Contracts
    Mar 26 2025

    Send us a text

    🔍 Want to stay ahead in the world of government contracts and cybersecurity? Dive into our latest CMMC News episode where we explore the NIST SP 800-171 DoD Assessment Requirements. It's all about breaking through the wall of acronyms and jargon to ensure you know exactly what the Department of Defense expects when it comes to protecting sensitive information.

    Here are 3 key takeaways:

    • Understand Assessment Levels: We break down the three types of cybersecurity assessments — Basic, Medium, and High — and what each level of confidence means for your contract requirements with the DoD.
    • Supplier Performance Risk System (SPRS): Learn how all assessment scores are recorded in SPRS, the centralized database that helps the DoD gauge the cybersecurity health of their contractors.
    • Subcontractor Compliance: Discover how these requirements flow down to subcontractors and what obligations primes have to ensure their partners are compliant.

    Stay informed, secure those contracts, and fortify your cybersecurity posture! 🎧🔒

    #Cybersecurity #DoD #NISTSP800171 #GovernmentContracts #CMMCNews

    Support the show

    Más Menos
    16 m
  • SPRS and You: Managing DOD Cybersecurity Expectations
    Mar 26 2025

    Send us a text

    We just dived deep into the Department of Defense's NIST SP 800-171 assessment requirements. This is crucial for any contractor involved with DoD contracts, especially when it comes to cybersecurity. Here are three key takeaways:

    • Assessment Frequency: If you're implementing NIST SP 800-171, make sure you have a recent assessment conducted within the last three years for every covered information system tied to DoD contracts.
    • Assessment Levels: There are three types of DoD assessments - Basic, Medium, and High. Understanding which level applies to you and how to proceed can make or break your eligibility for DoD contracts. The details for each can be found in another key document, the NIST SP 800-171 DoD Assessment Methodology.
    • Reporting Requirements: Once your assessment is complete, post your summary level scores in the Supplier Performance Risk System (SPRS). This is a mandatory step to demonstrate your commitment to cybersecurity, and remember, time is of the essence – scores need to be posted within 30 days of assessment completion.

    🔗 If you’re involved in defense contracting, keeping up with these requirements is non-negotiable! Tune into our latest episode for the full breakdown and stay ahead in the ever-evolving landscape of cybersecurity standards.

    For the official CMMC documentation, click this link: https://dodcio.defense.gov/cmmc/Resources-Documentation/

    #DefenseContracting #Cybersecurity #NISTSP800171 #DOD #CMMCNews #PodcastHighlights

    Support the show

    Más Menos
    12 m
  • The Essentials of Cyber Incident Reporting for Defense Contractors
    Mar 26 2025

    Send us a text

    Hello LinkedIn community! 🌐 As we delve deeper into the cybersecurity requirements for Department of Defense (DOD) contracts, understanding DFARS Clause 252.204-7012 is crucial. It outlines safeguarding covered defense information (CDI) and protocols for cyber incident reporting. Here are three key takeaways for businesses and contractors engaging with the DOD:

    • Understanding CDI: It’s essential to recognize what constitutes covered defense information. CDI includes sensitive technical data, like military blueprints and designs, and any information listed in the controlled unclassified information (CUI) registry. Whether provided by the DOD or generated during contract work, this data requires strict protection.
    • Timely Reporting: In the event of a cyber incident, the clock is ticking. Incidents must be reported within 72 hours to the DOD. This rapid reporting helps mitigate potential damages and underscores the importance of having efficient processes in place to identify and report any compromises.
    • Subcontractor Responsibilities: Prime contractors must ensure that subcontractors comply with the same cybersecurity requirements. This includes using standardized controls outlined in NIST SP 800-171 and ensuring that all reporting protocols are followed. If deviations are necessary, these must be formally requested and approved.

    In a world where cybersecurity is critical, adopting such stringent measures not only protects sensitive information but also reinforces the security of the defense industrial base. Let's leverage these practices to enhance data security across various sectors.

    For the official CMMC documentation, click this link: https://dodcio.defense.gov/cmmc/Resources-Documentation/

    #CyberSecurity #DOD #DefenseContracts #DataProtection #Compliance #DFARS #CyberIncidentResponse

    Support the show

    Más Menos
    23 m
  • Understanding How ESPs Fit into Your CMMC Assessment Puzzle
    Mar 17 2025

    Send us a text

    🌟 Just listened to another insightful episode of the CMMC News podcast, where the hosts take a deep dive into the complexities of CMMC, focusing on ESPs, SPAs, and VDIs. Here's what stood out to me:

    🔍 Key Takeaways:

    • Scoping ESPs in CMMC: The involvement of External Service Providers in the CMMC assessment depends largely on their interaction with Controlled Unclassified Information (CUI) and whether they are a Cloud Service Provider. Non-cloud ESPs processing CUI make the whole service part of your CMMC scope.
    • VDI Configurations Simplifying Scope: A properly configured Virtual Desktop Infrastructure can simplify CMMC scope by ensuring that local endpoint devices remain out of scope. This requires strict configurations to prevent local processing or storage of CUI.
    • CRMAs vs. Specialized Assets: Understanding the difference between Contractor Risk Managed Assets (CRMAs) and specialized assets is crucial. While CRMAs can share networks with CUI processing assets without handling CUI, specialized assets often can't meet all security requirements due to their nature.

    🎧 If you're navigating the CMMC landscape, definitely give this episode a listen for more practical insights!

    For the official CMMC documentation, click this link: https://dodcio.defense.gov/cmmc/Resources-Documentation/

    #CMMC #CyberSecurity #DevSecLead #VDI #ESPs #Compliance

    Support the show

    Más Menos
    30 m
  • Secure Your Defense Contracts: Navigating CMMC Levels with NIST Publications
    Mar 17 2025

    Send us a text

    🚀 Exciting Insights from Our Latest Deep Dive on the CMMC News Podcast! 🎧

    In our newest episode, we unpack the intricacies of the Cybersecurity Maturity Model Certification (CMMC) and its alignment with NIST standards, essential for those engaged with Department of Defense contracts. Dive into the details with us as we explore practical implications and strategic alignments.

    🔹 Key Takeaways:

    • CMMC Levels Explained: Understand how the different levels of CMMC build upon each other, starting from the foundational Level 1 to the more advanced Level 3 that incorporates elements like NIST SP 800-171 and 800-172.
    • Scoring System Nuances: Learn about the in-depth scoring methodology for NIST SP 800-171 Rev 2, highlighting the critical components and areas of partial credit, essential for MFA and FIPS compliance.
    • Preparing for the Transition: The shift to NIST SP 800-171 Rev 3 is on the horizon. Organizations need to stay compliant with Rev 2 while preparing for Rev 3, focusing on gap analysis and updating system security plans.

    Tune into the episode for a detailed exploration and ensure your security protocols are robust and compliant. Stay ahead in the defense industrial base with actionable insights and strategies! 🎙️🔍

    For the official CMMC documentation, click this link: https://dodcio.defense.gov/cmmc/Resources-Documentation/

    #CMMC #Cybersecurity #NISTStandards #DODContracts #DevSecLeadPodcast

    Support the show

    Más Menos
    14 m