This launchpad is your one-stop shop for all the links.
Here are the resources you need for SUCCESS in the program.
Start Here
Watch this quick video that walks you through the Keys to Success for this program.
Click here to schedule your Introductory Call today to kick-start your CMMC Journey.
Download the Quick Start Guide to get started on your CMMC Journey.
Achieve Cybersecurity Maturity with these 4 steps:

Scope Matters.
Identify your Contracts.
Inventory Your assets.
Bring the Team together.
Secure Architecture.
The Journey Begins.

Start Simple.
Use our 6-step Playbook and templates & tools to
Implement the controls.
Document. Everything.
Prove your compliance.

Rinse and Repeat.
Follow the P&P.
Log your activities.
Audit your systems and Review with Executives.
It's that Simple.

Know your Subs.
Are they compliant?
Talk early and often.
Refer them and you will
Get credit on you next Month's subscription.

Plan your project.
Track your progress.
Identify risks and issues.

COMPLIANCE ENGINEER
You have 8 tech calls included.
Engineers will consult with you on how to apply the controls and technology in your environment.

WEEKLY COACHING
Weekly group coaching calls Q&A
Join for the latest industry updates
We will discuss best practices and
answer your questions. Recorded.
Complete Module 1 & 2 First

FCI Essentials
Inventory Contracts, People, Devices, Software, Locations.
FutureFeed Training & Links..

Finalize the Scope and design a secure architecture for CMMC Level 1
Foundation basics.

Let's Secure the facility
Manage badge access & keys.
Log and escort the visitors.

Public Posting
Review content prior to posting.
Marketing and sales materials? Review it all.

Relentless patching.
Anti-Virus up-to-date.
Real-time System Scanning

Firewall
Manage traffic at the firewall.
Block unauthorized access.
Manage external connections.

Access Security
Establish Role based access for all.
Formalized onboarding process.
Follow the processes exactly.

Approved shredding.
Log activities.

CUI Essentials
Inventory Contracts, People, Devices, Software, Locations.
FutureFeed Training & Links..

Implement Change Management and Change Approval Board.

Tools
Let's get some foundational tools implemented to support the project.

Training
Implement Security Awareness Training and Training Logs

Relentless patching.
Anti-Virus up-to-date.
Real-time System Scanning

Physical Security
Manage traffic at the firewall.
Block unauthorized access.
Manage external connections.

Public Posting
Review all posts prior to posting.
Log your audits.

Anti-Virus up-to-date.
Real-time System Scanning

MFA
Implement MFA for ALL external facing access and administrators.


Firewall
Manage traffic at the firewall.
Block unauthorized access.
Manage external connections.

System Scanning.

Applications
Establish Role based access for all and authorize users.


Access Security
Establish Role based access for all.
Assign roles and responsibilities.

Separation of Privilege
Admin Audits

Personnel Security
Formalized onboarding process, background checks, and training
.

Approved shredding. Mark CUI.

Vulnerabilities
Vulnerability scanning. Remediation. Risk assessment.


Network Security
Secure, segmented, encrypted network configurations.


Event Logs
Collect Logs and monitor activity.

