For manufacturing companies in the DoD supply chain, now is the time to implement current cybersecurity requirements and to prepare for Cybersecurity Maturity Model Certification assessments.
California Manufacturing Technology Consulting – “CMTC” — is the Manufacturing Extension Partnership for California and Polaris MEP’s sister-Center in the MEP National Network. CMTC has developed a “Protection Level Topology” Cybersecurity Reference Architecture Model which can help with protecting Controlled Unclassified Information and other sensitive data.
Please join Ernie Edmonds, a CMTC “Cybersherpa,” for a comprehensive overview of the Model, followed by Q&A on Architecture and Firewall Optimization.
This 3-hour virtual workshop is open to small and medium-sized manufacturers and their IT service partners.
In order to ensure Polaris MEP and CMTC can offer this program for free and justify continued U.S. Department of Commerce funding for these services, participants may be asked to provide impact data and assessment through an impartial third-party survey firm, 6-12 months after the workshop.
WHO SHOULD ATTEND
This program is open to all manufacturing companies and their IT services partners. It may be particularly useful to companies with contracts or business within the Department of Defense Supply Chain.
- IT leads, Systems Administrators
- Owners, Managers, Engineers, Purchasing
- Managed Services Providers, IT Consultants to manufacturers in the Defense Supply Chain
PRESENTERS
Ernie Edmonds, Senior Managing Consultant, California Manufacturing Technology Consulting® (CMTC)
Ernie has more than28 years of professional practice and leadership in the Information Assurance field and he holds numerous certifications including Microsoft Certified Systems Administrator/Engineer (MCSA/MCSE), Certified Ethical Hacker (CEH), and Certified Information Systems Security Professional (CISSP), ForeScout certified, and many others. Ernie has successfully led some of the largest infrastructure and cloud datacenter deployments in the world as technical & product leads and has also worked with small to medium size companies who find themselves with the same security threats as larger entities, but without the resources that would help guarantee their success in stopping potential adversaries.