Data Privacy Detective
with Joe Dehner

CMMC 2.0 Explained for
Small Businesses

Joe Dehner of the Data Privacy Detective and the founders of SMPL-C, Srikant Rachakonda and Jody Stoehr discuss the significant development with U.S. Defense Department’s mandate for contractors and subcontractors to upgrade their cybersecurity practices through CMMC version 2.0.

Listen On Your Favorite App

The SafeHouse Initiative Podcast
with Jeff Edwards

CMMC 2.0 Insights: Breaking Down the 5 W’s for Small Businesses

In this episode of The SafeHouse Initiative podcast, Jeff Edwards sits down with Jody Stoehr, Co-founder of SMPL-C, to unpack the critical details of Cybersecurity Maturity Model Certification (CMMC). Jody creatively explains in layman terms the who, what, when, where, and why of CMMC,highlighting its importance for defense contractors

Listen On Your Favorite App

Talk To An Expert Today!

Select the following items where you anticipate the need for advisory guidance (check all that apply).
Scoping Exercise
Discovery entails evaluating and documenting an organization's cybersecurity posture to establish a baseline approach for achieving CMMC compliance.
Gap Analysis
Gap Analysis evaluates the differences between an organization's cybersecurity posture against the desired certification level requirements, identifying necessary improvements and actions to achieve CMMC compliance.
Assessment Prep
After implementing the required security controls, Assessment Prep involves creating relevant documentation to prove ongoing CMMC compliance with the regulatory requirements in anticipation of self-attestation or certification.
Full Advisory
Full-service Advisory offers individualized support, guiding organizations through discovery, gap analysis, and assessment preparation for end-to-end support with CMMC readiness.
CMMC Maintenance
Maintaining CMMC compliance after obtaining certification or self-attestation involves continuously monitoring, updating, and improving cybersecurity measures to adhere to evolving regulations and ensure the ongoing protection of sensitive information.