Skip to main content



Learn more and register for our 20 Cyber Topics in 20 Weeks - Series!



61% of experts in technology and policy predict a major cyberattack causing widespread harm will occur by 2025, according to a Pew Research Center report.

$445 Billion is lost annually to cybercrime and espionage across the entire world economy, according to the Center for Strategic and International Studies.

46,605 breaches of federal computer networks occurred in 2013 according to the US - Computer Emergency Readiness Team.

Now do we have your attention?

One deadline has already passed. For Department of Defense, GSA and NASA Contractors:

All Department of Defense (DoD), General Services Administration (GSA) and NASA contractors must have met the Federal Acquisition Regulations (FAR) minimum cybersecurity standards as of December 31st, 2017. If you are not compliant, your company is at risk of losing federal contracts.

A second significant deadline is looming. Beginning in the Summer/Fall of 2020, some DoD contract Requests for Proposal (RFIs) will include a required Cybersecurity Maturity Model Certification (CMMC) prior to DoD contract award. This will be a “go/no-go” criteria in the selection process which means that your proposal will be rejected if it does not include the required CMMC level.

If you’re like many manufacturers, you may not know everything that is expected or even how to get started. To make this process easier, Purdue MEP has assembled a team of cybersecurity experts to help ensure you are compliant with the standards described in NIST Special Publication 800-171.  Additionally, you could attend one of our cybersecurity workshops to learn the DoD cybersecurity requirements, to be exposed to resources to help you become compliant and to meet local cybersecurity providers. 

In fact, we are currently hosting an extended series of free cybersecurity webinars. You can register here.


Purdue MEP’s experienced team has designed a comprehensive four-step cybersecurity program. This is intended to help you gauge your current situation, and then tailor a plan specifically for your company’s internal capabilities, budget, and time sensitivity.

Here are the steps in the process:

STEP 1: DISCOVERY – an assessment of your company’s practices related to the new standard. If necessary, a gap analysis will be completed to document the scope to be remediated.

STEP 2: REMEDIATE TO MEET NEW STANDARD – supports all fixes necessary for compliance. Sample work could include updating firewalls, patches, policy development, employee training, physical security, network configuration, etc.

STEP 3: TEST AND VALIDATE – verifies all technology and physical security aspects are working properly.

STEP 4: MONITORING/REPORTING – establishes ongoing monitoring and scanning of the required enterprise network. Creates a working process to log, remediate, and report (as required) cyberattacks.





Gene Jones
Gene Jones
Senior Services Manager - Cybersecurity and Defense

Contact Us




Return to main content

Purdue Manufacturing Extension Partnership, 8626 E. 116th Street, Suite 200, Fishers, IN 46038-2815, (317) 275-6810

© 2019 Purdue University | An equal access/equal opportunity university | Copyright Complaints | Maintained by Manufacturing Extension Partnership

Trouble with this page? Disability-related accessibility issue? Please contact Manufacturing Extension Partnership at