DID YOU KNOW?
61% of experts in technology and policy predict a major cyberattack causing widespread harm will occur by 2025, according to a Pew Research Center report.
$445 Billion is lost annually to cybercrime and espionage across the entire world economy, according to the Center for Strategic and International Studies.
46,605 breaches of federal computer networks occurred in 2013 according to the US - Computer Emergency Readiness Team.
Now do we have your attention?
One deadline has already passed. For Department of Defense, GSA and NASA Contractors:
All Department of Defense (DoD), General Services Administration (GSA) and NASA contractors must have met the Federal Acquisition Regulations (FAR) minimum cybersecurity standards as of December 31st, 2017. If you are not compliant, your company is at risk of losing federal contracts.
A second significant deadline is looming. Beginning in the Summer/Fall of 2020, some DoD contract Requests for Proposal (RFIs) will include a required Cybersecurity Maturity Model Certification (CMMC) prior to DoD contract award. This will be a “go/no-go” criteria in the selection process which means that your proposal will be rejected if it does not include the required CMMC level.
If you’re like many manufacturers, you may not know everything that is expected or even how to get started. To make this process easier, Purdue MEP has assembled a team of cybersecurity experts to help ensure you are compliant with the standards described in NIST Special Publication 800-171. Additionally, you could attend one of our cybersecurity workshops to learn the DoD cybersecurity requirements, to be exposed to resources to help you become compliant and to meet local cybersecurity providers.
Learn more about our upcoming Defense Cybersecurity Seminar:
Purdue MEP’s experienced team has designed a comprehensive four-step cybersecurity program. This is intended to help you gauge your current situation, and then tailor a plan specifically for your company’s internal capabilities, budget, and time sensitivity.
Here are the steps in the process:
STEP 1: DISCOVERY – an assessment of your company’s practices related to the new standard. If necessary, a gap analysis will be completed to document the scope to be remediated.
STEP 2: REMEDIATE TO MEET NEW STANDARD – supports all fixes necessary for compliance. Sample work could include updating firewalls, patches, policy development, employee training, physical security, network configuration, etc.
STEP 3: TEST AND VALIDATE – verifies all technology and physical security aspects are working properly.
STEP 4: MONITORING/REPORTING – establishes ongoing monitoring and scanning of the required enterprise network. Creates a working process to log, remediate, and report (as required) cyberattacks.
DON’T RISK BEING UNPREPARED. CALL TO SEE HOW WE CAN HELP.
- Additive Manufacturing
- Collaborative Robotics Assistance
- Defense Manufacturing Assistance Program
- Digital Manufacturing & Design Assessments
- Energy Efficiency & Sustainability
- Faculty Projects
- Food and Beverage
- Innovation Assessment
- Leadership Development
- Lean Office
- Product & Process Technology
- Six Sigma
- Supply Chain
- Technology & Productivity Solutions
- Training Within Industry