Cybersecurity Maturity Model Certification 2.0 (CMMC 2.0) Resources

WE ARE A CMMC REGISTERED PROVIDER ORGANIZATION (RPO) WITH THE EXPERIENCE AND SKILLS TO HELP YOUR ORGANIZATION ACHIEVE CMMC COMPLIANCE AND BETTER UNDERSTAND THE GAPS IN YOUR PROCESSES, CAPABILITIES, AND PRACTICES ACROSS THE 17 CMMC DOMAINS. STAY UP TO DATE WITH OUR CMMC COMPLIANCE RESOURCES BELOW.

Resources

Are you processing controlled unclassified information for Department of Defense clients and required to meet Defense Federal Acquisition Regulation Supplement requirements? Pondurance is here to help you achieve CMMC 2.0 compliance and better understand the gaps in your processes, capabilities, and practices.

Featured Posts


Novel Threat Tactics, Notable Vulnerabilities, and Current Trends for February 2024

Every month, the Pondurance team hosts a webinar to keep clients current on the state of cybersecurity. In February, the team discussed notable vulnerabilities and trends, took a deep dive into domain controller synchronization (DCSync) attacks, reviewed threat hunting trends, and offered security operations center (SOC) engineering insights. Notable Vulnerabilities and Trends The Vulnerability Management


Read More »

shutterstock imagery


Threat Intelligence, Notable Vulnerabilities, and Current Trends for January 2024

Every month, the Pondurance team hosts a webinar to keep clients current on the state of cybersecurity. In January, the team discussed threat intelligence, notable vulnerabilities and trends, threat hunting trends, and the cyber threat landscape. Threat intelligence review To begin the webinar, the Senior Manager of Incident Response discussed the most prevalent threats for


Read More »

December SOC webinar blog


Novel Threat Tactics, Notable Vulnerabilities, Current Trends, and Data Leaks

Every month, the Pondurance team hosts a webinar to keep clients current on the state of cybersecurity. In December, the team discussed novel tactics, notable vulnerabilities, current trends, and data leaks. Novel Tactics To kick off the webinar, the Director of Incident Response discussed several novel tactics recently used by threat actors including: Supply chain


Read More »