Cybersecurity Public Speaker & Thought Leader; Author of Several Cyber/Infosec Books; CMMC CCP, CCA, PI; General Counsel; Electrical & Computer Engineer; Systems Admin./Dev.; Educator; Expert Witness; Company Co-founder
For those wanting to wait for #CMMC to be perfect before it is adopted, remember that: a) it will never be perfect from everyone’s perspective; and, b) our adversaries are happy that you’re continuing to kick the cyber implementation can down the road. It’s time to get off the cybersecurity sidelines, before your business, or even our nation, is permantely sidelined. #cyber #cyberab #dod #cmmc2 #nist #nist800171
Penetration Tester and Ethical Hacker | Risk Identification and Management Professional | Defensive Security Engineer | Governance and Compliance Analyst
"Most of the targets were defense contractors, according to the indictment. The men allegedly managed to compromise a management account at a U.S. defense company and then create fake accounts within the company. They are accused of using the fake profiles to target other companies with spearphishing scams, or phishing attacks focused on scamming individuals or small groups."
James Goepel Perfectly stated!
Staring on 2016.,, hmmm. I wonder what their success would have been if all 110 controls were applied???