Overwhelmed by CMMC? It doesn't have to be an expensive nightmare. Learn about assessments, timelines, and practical steps to achieve compliance without the jargon.
…
continue reading
![Artwork](/static/images/128pixel.png)
1
System Security Plan Advanced Concepts and Best Practices (Part 3)
5:52
5:52
Play later
Play later
Lists
Like
Liked
5:52ATX Defense generated the content and narration for this episode using Google's NotebookLM and this description using Gemini Advanced. The speakers are Artificial Intelligence. The source material for this episode is a modified version of ATX Defense’s System Security Plan that removes operational details but retains key takeaways. This SSP success…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Unpacking the Nuances and Challenges of an Assessment-Winning SSP (Part 2)
9:23
9:23
Play later
Play later
Lists
Like
Liked
9:23ATX Defense generated the content and narration for this episode using Google's NotebookLM and this description using Gemini Advanced. The speakers are Artificial Intelligence. The source material for this episode is a modified version of ATX Defense’s System Security Plan that removes operational details but retains key takeaways. This SSP success…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Dissecting a System Security Plan That Passed with Flying Colors (Part 1)
9:25
9:25
Play later
Play later
Lists
Like
Liked
9:25ATX Defense generated the content and narration for this episode using Google's NotebookLM and this description using Gemini Advanced. The speakers are Artificial Intelligence. The source material for this episode is a modified version of ATX Defense’s System Security Plan that removes operational details but retains key takeaways. This SSP success…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
CMMC Enclaves: A Subcontractor's Path to Compliance
15:30
15:30
Play later
Play later
Lists
Like
Liked
15:30ATX Defense generated the content and narration for this episode using Google's NotebookLM and this description using Gemini Advanced. The speakers are Artificial Intelligence. The source material for this episode is an ATX Defense whitepaper about secure CMMC enclaves for subcontractors. CMMC compliance is a major hurdle for subcontractors in the …
…
continue reading
![Artwork](/static/images/128pixel.png)
1
The Great Cloud Heist: Navigating Microsoft's Security Storm and the Case for Google Workspace
20:41
20:41
Play later
Play later
Lists
Like
Liked
20:41ATX Defense generated the content and narration for this episode using Google's NotebookLM and this description using Gemini Advanced. The speakers are Artificial Intelligence. The source materials for this episode are: Department of Homeland Security Review of the Summer 2023 Microsoft Exchange Online Intrusion and Google Workspace: A More Secure …
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Google Workspace for CMMC Level 2 Compliance
21:07
21:07
Play later
Play later
Lists
Like
Liked
21:07ATX Defense generated the content and narration for this episode using Google's NotebookLM and this description using Gemini Advanced. The speakers are Artificial Intelligence. The only source material is ATX Defense's Google Workspace CMMC Level 2 Implementation Guide located at https://cmmcguide.atxdefense.com Join us as we take a deep dive into …
…
continue reading
![Artwork](/static/images/128pixel.png)
1
The CMMC Final Rule: What Small Businesses Need to Know
13:08
13:08
Play later
Play later
Lists
Like
Liked
13:08The content for this episode was generated using Google's NotebookLM and voiced by artificial intelligence. The only source material is the CMMC Final Rule. This episode is an essential introduction to the CMMC Final Rule for small businesses. We cover everything from self-assessments and POA&Ms to the role of C3PAOs. Get practical advice on implem…
…
continue reading