Podcast Episodes
Back to Search
Understanding CMMC 2.0 Controls IA.L2-3.5.2 - Authenticate (or verify) the identities of users, processes, or devices, as a prerequisite to allowing access to organizational systems | Episode 94
Episode 94
In this episode, we bring you an in-depth breakdown of CMMC 2.0 control: IA.L2-3.5.2, highlighting the importance of authenticating (or verifying) th…
1 year, 1 month ago
CMMC Level 2 Self Certification in SPRS | Episode 93
Episode 93
In this episode, we bring you an in-depth breakdown of CMMC Level 2, highlighting the importance of self-certification within the SPRS system.
1 year, 2 months ago
Understanding CMMC 2.0 Controls IA.L2-3.5.1 - Identify system users, processes acting on behalf of users, and devices | Episode 92
Episode 92
In this episode, we bring you an in-depth breakdown of CMM8C 2.0 control: IA.L2-3.5.1, highlighting the importance of identifying system users, proce…
1 year, 2 months ago
Convincing the Boss Why CMMC Level 2 Prep Is Worth It | Episode 91
Episode 91
In this episode, we bring you an in-depth breakdown of the importance of showing you how you can help if your boss is struggling with the price tag o…
1 year, 2 months ago
Meeting CMMC Requirements When Developing Custom Code for Defense Contracts | Episode 90
Episode 90
In this episode, we bring you an in-depth breakdown of the importance of meeting CMMC requirements when developing custom codes for defense contracts.
1 year, 2 months ago
Understanding CMMC 2.0 Controls CM.L2-3.4.9 - Control and monitor user-installed software | Episode 89
Episode 89
In this episode, we bring you an in-depth breakdown of CMM8C 2.0 control: CM.L2-3.4.9, highlighting the importance of controlling and monitoring user…
1 year, 3 months ago
Criminal Penalties Abound in CMMC Self-Attestations and What You Should Know | Episode 88
Episode 88
In this episode, we give you an in-depth breakdown of the intense penalties that come with inaccurate self-attestation. Don't get got - let On Call h…
1 year, 3 months ago
Understanding CMMC 2.0 Controls CM.L2-3.4.8 - Apply deny-by-exception (blacklisting) policy to prevent the use of unauthorized software or deny-all, permit-by-exception (whitelisting) policy to allow the execution of authorized software | Episode 87
Episode 87
In this episode, we bring you an in-depth breakdown of CMMC 2.0 control: CM.L2-3.4.8, highlighting the importance of applying a deny-by-exception (bl…
1 year, 3 months ago
Understanding the New Affirming Official Role for SPRS and CMMC Self Attestation | Episode 86
Episode 86
In this episode, we bring you an in-depth breakdown of the new Affirming Official in SPRS and CMMC self-attestation. Why does it matter, and what exa…
1 year, 3 months ago
Understanding CMMC 2.0 Controls CM.L2-3.4.7 - Restrict, disable, or prevent the use of nonessential programs, functions, ports, protocols, and services | Episode 85
Episode 85
In this episode, we bring you an in-depth breakdown of CMMC 2.0 control: CM.L2-3.4.7, highlighting the importance of restricting, disabling, or preve…
1 year, 3 months ago