Need to get your CMMC documentation in order but don’t know where to start? Join our CMMC Documentation Webinar series to learn the basics, ask questions, and get started!
Save Your Spot!
Webinar Starts in
00
Days
:
00
Hrs
:
00
Mins
:
00
Secs
What You'll Learn
During the first session in our documentation series of webinars, we will explore the fundamental documentation you will need as a level 2 CMMC Defense Industrial Base Contractor (DIB) seeking to satisfy the CMMC 2.0 practice requirements. This session will include demonstrations and discussions addressing documentation areas including the:
Risk Management Plan
Incident Response Plan
CUI Data Flow Diagram
Network Diagram
CUI Inventory
and of course – System Security Plan
About the Presenter
Sese Bennett
CEO - Provincia Government Solutions
Prior to joining Provincia Government Solutions, Sese led the State of Tennessee’s information security effort as the Chief Information Security Officer. In this role, he was actively involved in identifying, measuring, remediating and reducing the State’s business and technical risk across 45,000 users and all State agencies.
Earlier in his career, Sese designed and implemented enterprise wide security controls for both systems and infrastructure while serving as a Senior Security Architect for Time Warner Cable Corporation and Blue Cross Blue Shield of North Carolina. He has also held senior consulting roles for Sally Beauty Supply, Nieman Marcus, Lockheed Martin, and Johns Hopkins University.
Sese is a CMMC Provisional Assessor, CMMC Certified Assessor, and leads assessments with Provincia Government Solutions, a Certified Third Party Assessment Organization (C3PAO).
Provincia Government Solutions - Cookie Disclaimer
We use cookies to optimize our website and our service.
Functional cookies
Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
a:2:{s:4:
The technical storage or access that is used exclusively for statistical purposes.The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
a:2:{s:4:
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.