SlideShare a Scribd company logo
1 of 15
LIVE WEBINAR 11 Aug 2021 12 PM EST
Max Aulakh
President & CEO
Ignyte Assurance Platform
Midway Swiss Case Study:
Journey towards CMMC
Compliance with Ignyte
Jayme Rahz
CEO
Midway Swiss Turn, Inc.
Presented to you by:
Copyright © 2021 Ignyte Assurance Platform and MAGNET I Ohio MEP. All rights reserved.
Topics to Cover Today
● About Midway Swiss
● Impact of COVID on Midway Swiss
● Why CMMC?
● CMMC Journey & Challenges
● How can SMBs cut costs on CMMC compliance?
● Conclusion
Copyright © 2021 Ignyte Assurance Platform and MAGNET I Ohio MEP. All rights reserved.
A not-for-profit consulting firm comprised of manufacturing experts who roll up our sleeves to transform
smart ideas into top and bottom line company growth, resulting in good jobs for our cities and counties
MAGNET’s aim is to add value and
create economic impact so that:
Jobs are being created
The value of companies is increasing
New products are being manufactured
MAGNET I Manufacturing Advocacy and Growth Network
3
Copyright © 2021 Ignyte Assurance Platform and MAGNET I Ohio MEP. All rights reserved.
Meet Our Speakers
Max Aulakh
President & CEO at Ignyte Assurance Platform
As a Data Security and Compliance Leader, he delivers DoD-tested security strategies and
compliance that safeguard mission-critical IT operations. Having trained and excelled in The
United States Air Force, he maintained and tested the InfoSec and ComSec functions of
network hardware, software, and IT infrastructure for global networks — both classified and
unclassified.
After leaving the USAF, Max drove the Information Assurance (IA) programs for the U.S.
Department of Defense (DoD). Max has founded Ignyte Assurance Platform, a leading
cybersecurity company powered by transformative GRC software engine, in 2012, and its
newest educational subsidiary, Ignyte Institute, to help accelerate CMMC adaptation among
DoD prime and subcontractors.
Jayme is a graduate of the Environmental Health and Safety program at the University of Akron. She spent
several years consulting in the manufacturing industry on a range of issues from EPA and OSHA compliance to
employee health and safety trainings and ISO implementation. She brought her knowledge from working with a
wide range of industries to Midway and helped develop and grow the business through adding technology such
as ERP systems, marketing and sales, cutting edge machine technology and effective leadership to help the
company implement the newest technologies in their Swiss Turning job shop.
As CEO, Jayme focuses on business strategy, and working together with her husband, a Navy veteran, they took
their business to the next level. Midway Swiss Turn Inc. is a family-owned and operated company based in
Wooster, OH. It employs roughly 10-15 employees with a combined experience of over 50 years in the
machining trade. It currently proudly houses 6 Swiss turning machines in a 10,000 square foot facility. Now,
expanding into more government contracts that represent the majority of their revenue stream, their choice to
invest in CMMC compliance was obvious.
Jayme Rahz
CEO at Midway Swiss Turn, Inc.
Copyright © 2021 Ignyte Assurance Platform and MAGNET I Ohio MEP. All rights reserved.
Midway Swiss Turn, Inc. Overview
• Founded in 1977
• Family owned, Veteran owned & Ohio-based business
• 15+ Machines & Equipment
• 10,000 sq feet facility
Key Capabilities:
➔ Custom Swiss Turning Services
➔ Rapid prototyping & Short Run Parts Fabrication
➔ CNC Screw & Swiss Turned Parts Machining
➔ Supplier Partnership
Key Markets:
Defense Industrial Base, Healthcare, Plumbing/HVAC,
Automotive/Power transmission, Electrical, Hydraulics, Engine
Components, Oil & Gas, AG-Con, Firearms, Medical
5
Ignyte Overview
● Founded in 2012 | 45 Employees | National Clients
○ Defense | Financial Services | Healthcare
● We provide Tech-Enabled Digital Risk & Technology services Small-Medium Business and
their leadership teams and enable them to significantly improve organizational performance &
efficiencies.
● Our business model is purpose built for SMBs & complex environments and is uniquely
positioned to deliver a differentiated value proposition to our clients that is driven by:
○ Proprietary Cyber Risk & Technology Automation Software
○ Our experienced and unbiased business leaders and subject matter experts
○ Our thought leadership and industry leading best practices approach and tools
Ignyte Assurance Platform
Independent Risk Management
Technology Review
Top Secret Facility
Clearance
Available Supplier Training
Copyright © 2021 Ignyte Assurance Platform and MAGNET I Ohio MEP. All rights reserved.
Program Resources
Resources are aligned with various stages of managing the CMMC program for supply chain
Program Metrics &
Management
SSP & POA&M
Deliverables
Guided Assessment
Training
Program Deliverables
• DoD Training Website - https://securityhub.usalearning.gov/content/story.html
• Ignyte Institute Practitioner Level & Top Management Training - https://www.ignyteinstitute.org/
• CMMC System Security Plan Development - https://www.dfars-nist-800-171.com/
Copyright © 2021 Ignyte Assurance Platform and MAGNET I Ohio MEP. All rights reserved.
Next Steps & Questions?
Thank you
Point of Contact
Joe Vinciquerra
Growth & Innovation Advisor
Justus Scott
CMMC Awareness Advisor
Point of Contact
justus@ignyteplatform.com jvinciquerra@manufacturingsuccess.org
9
BACKUP SLIDES
Copyright © 2021 Ignyte Assurance Platform and MAGNET I Ohio MEP. All rights reserved.
4
2
1
3
CMMC | Supplier Risk Program
DFARS 252.204 7012:
Safeguarding Covered Defense
Information and Cyber Incident Reporting
DFARS 252.204 7020:
NIST SP 800 171 DoD Assessment
Requirements
DFARS 252.204 7019:
Notice of NIST SP 800 171 DoD
Assessment Requirements
DFARS 252.204 7021:
Cybersecurity Maturity Model
Certification Requirements
Copyright © 2021 Ignyte Assurance Platform and MAGNET I Ohio MEP. All rights reserved.
DHS CISA: 16 Critical Sectors of US Economy
Chemical Commercial Facilities Communications Critical Manufacturing
Dams Defense Industrial Base Energy
Financial Services Food and Agriculture Healthcare and
Public Health
Information Technology
Nuclear Reactors,
Materials, and Waste
Transportation Systems
Water and Wastewater
Systems
Emergency Services
Government Facilities
Copyright © 2021 Ignyte Assurance Platform and MAGNET I Ohio MEP. All rights reserved.
Supply-Side Risk Management
Supply-Side Risks
Capacity Limitation
Technology Incompatibility
Supply Disruptions
Currency Fluctuations
Disasters
Production
Transportation
Telecommunication
Skills
Quality
Intellectual
Property
Political
Economical
Regulatory
Lead Time
Credit
Exchange Rate
Natural
Terrorist Attacks
Environmental
Constraints
Copyright © 2021 Ignyte Assurance Platform and MAGNET I Ohio MEP. All rights reserved.
Supplier Visibility Is Critical to Enterprise Architecture
Supplier Risk Management Program
• Organizations are shifting from Tier-1 to
managing subcontractors on a contract.
• Leveraging CMMC as the supplier cyber risk
program is become the new norm
• Key is to determine inherent risk of any given
suppliers
o Analytics & Automation Support
Copyright © 2021 Ignyte Assurance Platform and MAGNET I Ohio MEP. All rights reserved.
SMB PATH TO CYBER COMPLIANCE
Strategy
Start with a strategy and
a clear understanding of
where you want to go
Partner
with your Tier 2 and beyond suppliers
throughout your ecosystem
Leverage
shared standards
like CMMC

More Related Content

What's hot

G05.2013 gartner top security trends
G05.2013 gartner top security trendsG05.2013 gartner top security trends
G05.2013 gartner top security trendsSatya Harish
 
Webinar: Adaptive Security
Webinar: Adaptive SecurityWebinar: Adaptive Security
Webinar: Adaptive SecurityBlueliv
 
How to Build a Successful Cybersecurity Program?
How to Build a Successful Cybersecurity Program?How to Build a Successful Cybersecurity Program?
How to Build a Successful Cybersecurity Program?PECB
 
Total Digital Security Introduction 4.2
Total Digital Security Introduction 4.2Total Digital Security Introduction 4.2
Total Digital Security Introduction 4.2Brad Deflin
 
general_resume_12 1 linked in
general_resume_12 1 linked ingeneral_resume_12 1 linked in
general_resume_12 1 linked inJohn Masiliunas
 
Cyber Security Transformation - A New Approach for 2015 & Beyond - Daryl Pereira
Cyber Security Transformation - A New Approach for 2015 & Beyond - Daryl PereiraCyber Security Transformation - A New Approach for 2015 & Beyond - Daryl Pereira
Cyber Security Transformation - A New Approach for 2015 & Beyond - Daryl PereiraKnowledge Group
 
Cyber Security For Organization Proposal Powerpoint Presentation Slides
Cyber Security For Organization Proposal Powerpoint Presentation SlidesCyber Security For Organization Proposal Powerpoint Presentation Slides
Cyber Security For Organization Proposal Powerpoint Presentation SlidesSlideTeam
 
Jervis Hui - No Tradeoffs: Cloud Security & Privacy Don't Need To Be At Odds
Jervis Hui - No Tradeoffs: Cloud Security & Privacy Don't Need To Be At OddsJervis Hui - No Tradeoffs: Cloud Security & Privacy Don't Need To Be At Odds
Jervis Hui - No Tradeoffs: Cloud Security & Privacy Don't Need To Be At Oddscentralohioissa
 
Ofer Maor - Security Automation in the SDLC - Real World Cases
Ofer Maor - Security Automation in the SDLC - Real World CasesOfer Maor - Security Automation in the SDLC - Real World Cases
Ofer Maor - Security Automation in the SDLC - Real World Casescentralohioissa
 
Managing Multiple Assessments Using Zero Trust Principles
Managing Multiple Assessments Using Zero Trust PrinciplesManaging Multiple Assessments Using Zero Trust Principles
Managing Multiple Assessments Using Zero Trust PrinciplesControlCase
 
MCGlobalTech Consulting Service Presentation
MCGlobalTech Consulting Service PresentationMCGlobalTech Consulting Service Presentation
MCGlobalTech Consulting Service PresentationWilliam McBorrough
 
Advanced Persistent Threat - Evaluating Effective Responses
Advanced Persistent Threat - Evaluating Effective ResponsesAdvanced Persistent Threat - Evaluating Effective Responses
Advanced Persistent Threat - Evaluating Effective ResponsesNetIQ
 
Protecting Vital Data With NIST Framework - Patrick Kerpan's Secure260 presen...
Protecting Vital Data With NIST Framework - Patrick Kerpan's Secure260 presen...Protecting Vital Data With NIST Framework - Patrick Kerpan's Secure260 presen...
Protecting Vital Data With NIST Framework - Patrick Kerpan's Secure260 presen...Cohesive Networks
 
Security Modelling in ArchiMate
Security Modelling in ArchiMateSecurity Modelling in ArchiMate
Security Modelling in ArchiMatePECB
 
Cybersercurity Resource Allocation & Efficacy Index: 2020 - 2021 Trends
Cybersercurity Resource Allocation & Efficacy Index: 2020 - 2021 TrendsCybersercurity Resource Allocation & Efficacy Index: 2020 - 2021 Trends
Cybersercurity Resource Allocation & Efficacy Index: 2020 - 2021 TrendsIvanti
 
Aligning to the NIST Cybersecurity Framework in the AWS
Aligning to the NIST Cybersecurity Framework in the AWSAligning to the NIST Cybersecurity Framework in the AWS
Aligning to the NIST Cybersecurity Framework in the AWSAmazon Web Services
 
From Cybersecurity to Cyber Resilience
From Cybersecurity to Cyber ResilienceFrom Cybersecurity to Cyber Resilience
From Cybersecurity to Cyber Resilienceaccenture
 
CSA Atlanta Q1'2016 Chapter Meeting
CSA Atlanta Q1'2016 Chapter MeetingCSA Atlanta Q1'2016 Chapter Meeting
CSA Atlanta Q1'2016 Chapter MeetingPhil Agcaoili
 

What's hot (20)

G05.2013 gartner top security trends
G05.2013 gartner top security trendsG05.2013 gartner top security trends
G05.2013 gartner top security trends
 
Webinar: Adaptive Security
Webinar: Adaptive SecurityWebinar: Adaptive Security
Webinar: Adaptive Security
 
How to Build a Successful Cybersecurity Program?
How to Build a Successful Cybersecurity Program?How to Build a Successful Cybersecurity Program?
How to Build a Successful Cybersecurity Program?
 
Total Digital Security Introduction 4.2
Total Digital Security Introduction 4.2Total Digital Security Introduction 4.2
Total Digital Security Introduction 4.2
 
general_resume_12 1 linked in
general_resume_12 1 linked ingeneral_resume_12 1 linked in
general_resume_12 1 linked in
 
Cyber Security Transformation - A New Approach for 2015 & Beyond - Daryl Pereira
Cyber Security Transformation - A New Approach for 2015 & Beyond - Daryl PereiraCyber Security Transformation - A New Approach for 2015 & Beyond - Daryl Pereira
Cyber Security Transformation - A New Approach for 2015 & Beyond - Daryl Pereira
 
Cyber Security For Organization Proposal Powerpoint Presentation Slides
Cyber Security For Organization Proposal Powerpoint Presentation SlidesCyber Security For Organization Proposal Powerpoint Presentation Slides
Cyber Security For Organization Proposal Powerpoint Presentation Slides
 
Jervis Hui - No Tradeoffs: Cloud Security & Privacy Don't Need To Be At Odds
Jervis Hui - No Tradeoffs: Cloud Security & Privacy Don't Need To Be At OddsJervis Hui - No Tradeoffs: Cloud Security & Privacy Don't Need To Be At Odds
Jervis Hui - No Tradeoffs: Cloud Security & Privacy Don't Need To Be At Odds
 
Ofer Maor - Security Automation in the SDLC - Real World Cases
Ofer Maor - Security Automation in the SDLC - Real World CasesOfer Maor - Security Automation in the SDLC - Real World Cases
Ofer Maor - Security Automation in the SDLC - Real World Cases
 
Managing Multiple Assessments Using Zero Trust Principles
Managing Multiple Assessments Using Zero Trust PrinciplesManaging Multiple Assessments Using Zero Trust Principles
Managing Multiple Assessments Using Zero Trust Principles
 
MCGlobalTech Consulting Service Presentation
MCGlobalTech Consulting Service PresentationMCGlobalTech Consulting Service Presentation
MCGlobalTech Consulting Service Presentation
 
Advanced Persistent Threat - Evaluating Effective Responses
Advanced Persistent Threat - Evaluating Effective ResponsesAdvanced Persistent Threat - Evaluating Effective Responses
Advanced Persistent Threat - Evaluating Effective Responses
 
Protecting Vital Data With NIST Framework - Patrick Kerpan's Secure260 presen...
Protecting Vital Data With NIST Framework - Patrick Kerpan's Secure260 presen...Protecting Vital Data With NIST Framework - Patrick Kerpan's Secure260 presen...
Protecting Vital Data With NIST Framework - Patrick Kerpan's Secure260 presen...
 
Security Modelling in ArchiMate
Security Modelling in ArchiMateSecurity Modelling in ArchiMate
Security Modelling in ArchiMate
 
COBIT
COBITCOBIT
COBIT
 
Cybersercurity Resource Allocation & Efficacy Index: 2020 - 2021 Trends
Cybersercurity Resource Allocation & Efficacy Index: 2020 - 2021 TrendsCybersercurity Resource Allocation & Efficacy Index: 2020 - 2021 Trends
Cybersercurity Resource Allocation & Efficacy Index: 2020 - 2021 Trends
 
Aligning to the NIST Cybersecurity Framework in the AWS
Aligning to the NIST Cybersecurity Framework in the AWSAligning to the NIST Cybersecurity Framework in the AWS
Aligning to the NIST Cybersecurity Framework in the AWS
 
From Cybersecurity to Cyber Resilience
From Cybersecurity to Cyber ResilienceFrom Cybersecurity to Cyber Resilience
From Cybersecurity to Cyber Resilience
 
Security - A Digital Transformation Enabler
Security - A Digital Transformation EnablerSecurity - A Digital Transformation Enabler
Security - A Digital Transformation Enabler
 
CSA Atlanta Q1'2016 Chapter Meeting
CSA Atlanta Q1'2016 Chapter MeetingCSA Atlanta Q1'2016 Chapter Meeting
CSA Atlanta Q1'2016 Chapter Meeting
 

Similar to Midway Swiss Case Study: Journey towards CMMC Compliance with Ignyte

NCB PROFILE - with vocational training
NCB PROFILE - with vocational trainingNCB PROFILE - with vocational training
NCB PROFILE - with vocational trainingrsadekar
 
MMV Webinar 3. Cybersecurity Perspectives. March 2018
MMV Webinar 3. Cybersecurity Perspectives. March 2018MMV Webinar 3. Cybersecurity Perspectives. March 2018
MMV Webinar 3. Cybersecurity Perspectives. March 2018Match-Maker Ventures
 
Sun son-uk-ltd investor-pitch-deck-07-22-2015
Sun son-uk-ltd investor-pitch-deck-07-22-2015Sun son-uk-ltd investor-pitch-deck-07-22-2015
Sun son-uk-ltd investor-pitch-deck-07-22-2015Josh Dathe
 
JCI SA - Integration Systems Specialist - Apr 2016
JCI SA - Integration Systems Specialist - Apr 2016 JCI SA - Integration Systems Specialist - Apr 2016
JCI SA - Integration Systems Specialist - Apr 2016 Kristopher de Bastos
 
symc_annual2000
symc_annual2000symc_annual2000
symc_annual2000finance40
 
The 10 Best End-to-End Insurance Software Solution Providers.pdf
The 10 Best End-to-End Insurance Software Solution Providers.pdfThe 10 Best End-to-End Insurance Software Solution Providers.pdf
The 10 Best End-to-End Insurance Software Solution Providers.pdfInsightsSuccess4
 
Evolution of cyber threats and the development of new security architecture
Evolution of cyber threats and the development of new security architectureEvolution of cyber threats and the development of new security architecture
Evolution of cyber threats and the development of new security architectureEY
 
Webinar: InsurTech Israel: Leading D&A on the Global Stage
Webinar: InsurTech Israel: Leading D&A on the Global StageWebinar: InsurTech Israel: Leading D&A on the Global Stage
Webinar: InsurTech Israel: Leading D&A on the Global StageThe Digital Insurer
 
iSecureCyber (Long Pitch Deck)
iSecureCyber (Long Pitch Deck)iSecureCyber (Long Pitch Deck)
iSecureCyber (Long Pitch Deck)Prabir Saha
 
Validus investor pitch deck 03212014 rjc updates
Validus investor pitch deck 03212014 rjc updatesValidus investor pitch deck 03212014 rjc updates
Validus investor pitch deck 03212014 rjc updatesRick Catalano
 
Mike Donoghue - NXD Ltd
Mike Donoghue - NXD LtdMike Donoghue - NXD Ltd
Mike Donoghue - NXD LtdNXD Ltd
 
WM press release VIP Tower - 122017
WM press release VIP Tower - 122017WM press release VIP Tower - 122017
WM press release VIP Tower - 122017Joel Gil
 
Outsourcing for Profit: Make investment work
Outsourcing for Profit: Make investment workOutsourcing for Profit: Make investment work
Outsourcing for Profit: Make investment workIndusNetMarketing
 
CyberTexas Job Fair August 20, 2019 San Antonio
CyberTexas Job Fair August 20, 2019 San AntonioCyberTexas Job Fair August 20, 2019 San Antonio
CyberTexas Job Fair August 20, 2019 San AntonioClearedJobs.Net
 
Symantec 2008AnnualReport_Proxy_10-K
Symantec  2008AnnualReport_Proxy_10-KSymantec  2008AnnualReport_Proxy_10-K
Symantec 2008AnnualReport_Proxy_10-Kfinance40
 
Webinar: Accelerating digital transformation practical insights
Webinar: Accelerating digital transformation practical insightsWebinar: Accelerating digital transformation practical insights
Webinar: Accelerating digital transformation practical insightsThe Digital Insurer
 
Scaling up Hyperautomation with Process Intelligence
Scaling up Hyperautomation with Process IntelligenceScaling up Hyperautomation with Process Intelligence
Scaling up Hyperautomation with Process IntelligenceMindfields Global
 

Similar to Midway Swiss Case Study: Journey towards CMMC Compliance with Ignyte (20)

NCB PROFILE - with vocational training
NCB PROFILE - with vocational trainingNCB PROFILE - with vocational training
NCB PROFILE - with vocational training
 
MMV Webinar 3. Cybersecurity Perspectives. March 2018
MMV Webinar 3. Cybersecurity Perspectives. March 2018MMV Webinar 3. Cybersecurity Perspectives. March 2018
MMV Webinar 3. Cybersecurity Perspectives. March 2018
 
Sun son-uk-ltd investor-pitch-deck-07-22-2015
Sun son-uk-ltd investor-pitch-deck-07-22-2015Sun son-uk-ltd investor-pitch-deck-07-22-2015
Sun son-uk-ltd investor-pitch-deck-07-22-2015
 
JCI SA - Integration Systems Specialist - Apr 2016
JCI SA - Integration Systems Specialist - Apr 2016 JCI SA - Integration Systems Specialist - Apr 2016
JCI SA - Integration Systems Specialist - Apr 2016
 
Securing the Supply Chain
Securing the Supply ChainSecuring the Supply Chain
Securing the Supply Chain
 
symc_annual2000
symc_annual2000symc_annual2000
symc_annual2000
 
The 10 Best End-to-End Insurance Software Solution Providers.pdf
The 10 Best End-to-End Insurance Software Solution Providers.pdfThe 10 Best End-to-End Insurance Software Solution Providers.pdf
The 10 Best End-to-End Insurance Software Solution Providers.pdf
 
Evolution of cyber threats and the development of new security architecture
Evolution of cyber threats and the development of new security architectureEvolution of cyber threats and the development of new security architecture
Evolution of cyber threats and the development of new security architecture
 
Webinar: InsurTech Israel: Leading D&A on the Global Stage
Webinar: InsurTech Israel: Leading D&A on the Global StageWebinar: InsurTech Israel: Leading D&A on the Global Stage
Webinar: InsurTech Israel: Leading D&A on the Global Stage
 
iSecureCyber (Long Pitch Deck)
iSecureCyber (Long Pitch Deck)iSecureCyber (Long Pitch Deck)
iSecureCyber (Long Pitch Deck)
 
Amesite nvestor Deck Spring 2021
Amesite nvestor Deck Spring 2021 Amesite nvestor Deck Spring 2021
Amesite nvestor Deck Spring 2021
 
Validus investor pitch deck 03212014 rjc updates
Validus investor pitch deck 03212014 rjc updatesValidus investor pitch deck 03212014 rjc updates
Validus investor pitch deck 03212014 rjc updates
 
Mike Donoghue - NXD Ltd
Mike Donoghue - NXD LtdMike Donoghue - NXD Ltd
Mike Donoghue - NXD Ltd
 
WM press release VIP Tower - 122017
WM press release VIP Tower - 122017WM press release VIP Tower - 122017
WM press release VIP Tower - 122017
 
Outsourcing for Profit: Make investment work
Outsourcing for Profit: Make investment workOutsourcing for Profit: Make investment work
Outsourcing for Profit: Make investment work
 
CGI Final
CGI FinalCGI Final
CGI Final
 
CyberTexas Job Fair August 20, 2019 San Antonio
CyberTexas Job Fair August 20, 2019 San AntonioCyberTexas Job Fair August 20, 2019 San Antonio
CyberTexas Job Fair August 20, 2019 San Antonio
 
Symantec 2008AnnualReport_Proxy_10-K
Symantec  2008AnnualReport_Proxy_10-KSymantec  2008AnnualReport_Proxy_10-K
Symantec 2008AnnualReport_Proxy_10-K
 
Webinar: Accelerating digital transformation practical insights
Webinar: Accelerating digital transformation practical insightsWebinar: Accelerating digital transformation practical insights
Webinar: Accelerating digital transformation practical insights
 
Scaling up Hyperautomation with Process Intelligence
Scaling up Hyperautomation with Process IntelligenceScaling up Hyperautomation with Process Intelligence
Scaling up Hyperautomation with Process Intelligence
 

More from Ignyte Assurance Platform

How CMMC Auditors Recommend You Defend Your Organization - Completed March, 2...
How CMMC Auditors Recommend You Defend Your Organization - Completed March, 2...How CMMC Auditors Recommend You Defend Your Organization - Completed March, 2...
How CMMC Auditors Recommend You Defend Your Organization - Completed March, 2...Ignyte Assurance Platform
 
How the DoD’s Cyber Security Maturity Model (CMMC) will impact your business ...
How the DoD’s Cyber Security Maturity Model (CMMC) will impact your business ...How the DoD’s Cyber Security Maturity Model (CMMC) will impact your business ...
How the DoD’s Cyber Security Maturity Model (CMMC) will impact your business ...Ignyte Assurance Platform
 
CMMC 2.0 | What the changes mean for organizations in the DIB
CMMC 2.0 | What the changes mean for organizations in the DIBCMMC 2.0 | What the changes mean for organizations in the DIB
CMMC 2.0 | What the changes mean for organizations in the DIBIgnyte Assurance Platform
 
CMMC 2.0 I L1 & L2 Scoping Guidance Explained
CMMC 2.0 I L1 & L2 Scoping Guidance ExplainedCMMC 2.0 I L1 & L2 Scoping Guidance Explained
CMMC 2.0 I L1 & L2 Scoping Guidance ExplainedIgnyte Assurance Platform
 
Laying the Foundation: The Need for Cybersecurity in U.S. Manufacturing
Laying the Foundation:  The Need for  Cybersecurity in  U.S. ManufacturingLaying the Foundation:  The Need for  Cybersecurity in  U.S. Manufacturing
Laying the Foundation: The Need for Cybersecurity in U.S. ManufacturingIgnyte Assurance Platform
 
Full Cybersecurity Regulations Overview for DoD Prime and Subcontractors
Full Cybersecurity Regulations Overview for DoD Prime and SubcontractorsFull Cybersecurity Regulations Overview for DoD Prime and Subcontractors
Full Cybersecurity Regulations Overview for DoD Prime and SubcontractorsIgnyte Assurance Platform
 
How I Woke Up from the CMMC Compliance Nightmare
How I Woke Up from the CMMC Compliance NightmareHow I Woke Up from the CMMC Compliance Nightmare
How I Woke Up from the CMMC Compliance NightmareIgnyte Assurance Platform
 
Ignyte assurance platform NIST RMF datasheet.
Ignyte assurance platform NIST RMF datasheet.Ignyte assurance platform NIST RMF datasheet.
Ignyte assurance platform NIST RMF datasheet.Ignyte Assurance Platform
 

More from Ignyte Assurance Platform (16)

How CMMC Auditors Recommend You Defend Your Organization - Completed March, 2...
How CMMC Auditors Recommend You Defend Your Organization - Completed March, 2...How CMMC Auditors Recommend You Defend Your Organization - Completed March, 2...
How CMMC Auditors Recommend You Defend Your Organization - Completed March, 2...
 
Ignyte - US Sovereign Cloud Computing
Ignyte - US Sovereign Cloud ComputingIgnyte - US Sovereign Cloud Computing
Ignyte - US Sovereign Cloud Computing
 
CMMC 2.0 Explained: Impact for SMBs
CMMC 2.0 Explained:  Impact for SMBsCMMC 2.0 Explained:  Impact for SMBs
CMMC 2.0 Explained: Impact for SMBs
 
NIST_Ignyte_OSCALWorkshop_2022.pdf
NIST_Ignyte_OSCALWorkshop_2022.pdfNIST_Ignyte_OSCALWorkshop_2022.pdf
NIST_Ignyte_OSCALWorkshop_2022.pdf
 
How the DoD’s Cyber Security Maturity Model (CMMC) will impact your business ...
How the DoD’s Cyber Security Maturity Model (CMMC) will impact your business ...How the DoD’s Cyber Security Maturity Model (CMMC) will impact your business ...
How the DoD’s Cyber Security Maturity Model (CMMC) will impact your business ...
 
CMMC 2.0 | What the changes mean for organizations in the DIB
CMMC 2.0 | What the changes mean for organizations in the DIBCMMC 2.0 | What the changes mean for organizations in the DIB
CMMC 2.0 | What the changes mean for organizations in the DIB
 
CMMC 2.0 I L1 & L2 Assessment Guidance
CMMC 2.0 I L1 & L2 Assessment GuidanceCMMC 2.0 I L1 & L2 Assessment Guidance
CMMC 2.0 I L1 & L2 Assessment Guidance
 
CMMC 2.0 I L1 & L2 Scoping Guidance Explained
CMMC 2.0 I L1 & L2 Scoping Guidance ExplainedCMMC 2.0 I L1 & L2 Scoping Guidance Explained
CMMC 2.0 I L1 & L2 Scoping Guidance Explained
 
CMMC Breakdown
CMMC BreakdownCMMC Breakdown
CMMC Breakdown
 
Corporate Cyber Program
Corporate Cyber ProgramCorporate Cyber Program
Corporate Cyber Program
 
DFARS & CMMC Overview
DFARS & CMMC Overview DFARS & CMMC Overview
DFARS & CMMC Overview
 
Laying the Foundation: The Need for Cybersecurity in U.S. Manufacturing
Laying the Foundation:  The Need for  Cybersecurity in  U.S. ManufacturingLaying the Foundation:  The Need for  Cybersecurity in  U.S. Manufacturing
Laying the Foundation: The Need for Cybersecurity in U.S. Manufacturing
 
Full Cybersecurity Regulations Overview for DoD Prime and Subcontractors
Full Cybersecurity Regulations Overview for DoD Prime and SubcontractorsFull Cybersecurity Regulations Overview for DoD Prime and Subcontractors
Full Cybersecurity Regulations Overview for DoD Prime and Subcontractors
 
How I Woke Up from the CMMC Compliance Nightmare
How I Woke Up from the CMMC Compliance NightmareHow I Woke Up from the CMMC Compliance Nightmare
How I Woke Up from the CMMC Compliance Nightmare
 
CMMC DFARS/NIST SP 800-171
CMMC DFARS/NIST SP 800-171 CMMC DFARS/NIST SP 800-171
CMMC DFARS/NIST SP 800-171
 
Ignyte assurance platform NIST RMF datasheet.
Ignyte assurance platform NIST RMF datasheet.Ignyte assurance platform NIST RMF datasheet.
Ignyte assurance platform NIST RMF datasheet.
 

Recently uploaded

Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...MyIntelliSource, Inc.
 
Unit 1.1 Excite Part 1, class 9, cbse...
Unit 1.1 Excite Part 1, class 9, cbse...Unit 1.1 Excite Part 1, class 9, cbse...
Unit 1.1 Excite Part 1, class 9, cbse...aditisharan08
 
XpertSolvers: Your Partner in Building Innovative Software Solutions
XpertSolvers: Your Partner in Building Innovative Software SolutionsXpertSolvers: Your Partner in Building Innovative Software Solutions
XpertSolvers: Your Partner in Building Innovative Software SolutionsMehedi Hasan Shohan
 
Call Girls in Naraina Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Naraina Delhi 💯Call Us 🔝8264348440🔝Call Girls in Naraina Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Naraina Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...gurkirankumar98700
 
chapter--4-software-project-planning.ppt
chapter--4-software-project-planning.pptchapter--4-software-project-planning.ppt
chapter--4-software-project-planning.pptkotipi9215
 
why an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdfwhy an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdfjoe51371421
 
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEBATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEOrtus Solutions, Corp
 
EY_Graph Database Powered Sustainability
EY_Graph Database Powered SustainabilityEY_Graph Database Powered Sustainability
EY_Graph Database Powered SustainabilityNeo4j
 
cybersecurity notes for mca students for learning
cybersecurity notes for mca students for learningcybersecurity notes for mca students for learning
cybersecurity notes for mca students for learningVitsRangannavar
 
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...kellynguyen01
 
HR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comHR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comFatema Valibhai
 
What is Binary Language? Computer Number Systems
What is Binary Language?  Computer Number SystemsWhat is Binary Language?  Computer Number Systems
What is Binary Language? Computer Number SystemsJheuzeDellosa
 
Project Based Learning (A.I).pptx detail explanation
Project Based Learning (A.I).pptx detail explanationProject Based Learning (A.I).pptx detail explanation
Project Based Learning (A.I).pptx detail explanationkaushalgiri8080
 
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...soniya singh
 
Salesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantSalesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantAxelRicardoTrocheRiq
 
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfLearn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfkalichargn70th171
 
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer DataAdobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer DataBradBedford3
 
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio, Inc.
 

Recently uploaded (20)

Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
 
Unit 1.1 Excite Part 1, class 9, cbse...
Unit 1.1 Excite Part 1, class 9, cbse...Unit 1.1 Excite Part 1, class 9, cbse...
Unit 1.1 Excite Part 1, class 9, cbse...
 
XpertSolvers: Your Partner in Building Innovative Software Solutions
XpertSolvers: Your Partner in Building Innovative Software SolutionsXpertSolvers: Your Partner in Building Innovative Software Solutions
XpertSolvers: Your Partner in Building Innovative Software Solutions
 
Call Girls in Naraina Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Naraina Delhi 💯Call Us 🔝8264348440🔝Call Girls in Naraina Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Naraina Delhi 💯Call Us 🔝8264348440🔝
 
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
 
chapter--4-software-project-planning.ppt
chapter--4-software-project-planning.pptchapter--4-software-project-planning.ppt
chapter--4-software-project-planning.ppt
 
why an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdfwhy an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdf
 
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEBATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
 
Call Girls In Mukherjee Nagar 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...
Call Girls In Mukherjee Nagar 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...Call Girls In Mukherjee Nagar 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...
Call Girls In Mukherjee Nagar 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...
 
EY_Graph Database Powered Sustainability
EY_Graph Database Powered SustainabilityEY_Graph Database Powered Sustainability
EY_Graph Database Powered Sustainability
 
cybersecurity notes for mca students for learning
cybersecurity notes for mca students for learningcybersecurity notes for mca students for learning
cybersecurity notes for mca students for learning
 
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
 
HR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comHR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.com
 
What is Binary Language? Computer Number Systems
What is Binary Language?  Computer Number SystemsWhat is Binary Language?  Computer Number Systems
What is Binary Language? Computer Number Systems
 
Project Based Learning (A.I).pptx detail explanation
Project Based Learning (A.I).pptx detail explanationProject Based Learning (A.I).pptx detail explanation
Project Based Learning (A.I).pptx detail explanation
 
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
 
Salesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantSalesforce Certified Field Service Consultant
Salesforce Certified Field Service Consultant
 
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfLearn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
 
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer DataAdobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
 
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
 

Midway Swiss Case Study: Journey towards CMMC Compliance with Ignyte

  • 1. LIVE WEBINAR 11 Aug 2021 12 PM EST Max Aulakh President & CEO Ignyte Assurance Platform Midway Swiss Case Study: Journey towards CMMC Compliance with Ignyte Jayme Rahz CEO Midway Swiss Turn, Inc. Presented to you by:
  • 2. Copyright © 2021 Ignyte Assurance Platform and MAGNET I Ohio MEP. All rights reserved. Topics to Cover Today ● About Midway Swiss ● Impact of COVID on Midway Swiss ● Why CMMC? ● CMMC Journey & Challenges ● How can SMBs cut costs on CMMC compliance? ● Conclusion
  • 3. Copyright © 2021 Ignyte Assurance Platform and MAGNET I Ohio MEP. All rights reserved. A not-for-profit consulting firm comprised of manufacturing experts who roll up our sleeves to transform smart ideas into top and bottom line company growth, resulting in good jobs for our cities and counties MAGNET’s aim is to add value and create economic impact so that: Jobs are being created The value of companies is increasing New products are being manufactured MAGNET I Manufacturing Advocacy and Growth Network 3
  • 4. Copyright © 2021 Ignyte Assurance Platform and MAGNET I Ohio MEP. All rights reserved. Meet Our Speakers Max Aulakh President & CEO at Ignyte Assurance Platform As a Data Security and Compliance Leader, he delivers DoD-tested security strategies and compliance that safeguard mission-critical IT operations. Having trained and excelled in The United States Air Force, he maintained and tested the InfoSec and ComSec functions of network hardware, software, and IT infrastructure for global networks — both classified and unclassified. After leaving the USAF, Max drove the Information Assurance (IA) programs for the U.S. Department of Defense (DoD). Max has founded Ignyte Assurance Platform, a leading cybersecurity company powered by transformative GRC software engine, in 2012, and its newest educational subsidiary, Ignyte Institute, to help accelerate CMMC adaptation among DoD prime and subcontractors. Jayme is a graduate of the Environmental Health and Safety program at the University of Akron. She spent several years consulting in the manufacturing industry on a range of issues from EPA and OSHA compliance to employee health and safety trainings and ISO implementation. She brought her knowledge from working with a wide range of industries to Midway and helped develop and grow the business through adding technology such as ERP systems, marketing and sales, cutting edge machine technology and effective leadership to help the company implement the newest technologies in their Swiss Turning job shop. As CEO, Jayme focuses on business strategy, and working together with her husband, a Navy veteran, they took their business to the next level. Midway Swiss Turn Inc. is a family-owned and operated company based in Wooster, OH. It employs roughly 10-15 employees with a combined experience of over 50 years in the machining trade. It currently proudly houses 6 Swiss turning machines in a 10,000 square foot facility. Now, expanding into more government contracts that represent the majority of their revenue stream, their choice to invest in CMMC compliance was obvious. Jayme Rahz CEO at Midway Swiss Turn, Inc.
  • 5. Copyright © 2021 Ignyte Assurance Platform and MAGNET I Ohio MEP. All rights reserved. Midway Swiss Turn, Inc. Overview • Founded in 1977 • Family owned, Veteran owned & Ohio-based business • 15+ Machines & Equipment • 10,000 sq feet facility Key Capabilities: ➔ Custom Swiss Turning Services ➔ Rapid prototyping & Short Run Parts Fabrication ➔ CNC Screw & Swiss Turned Parts Machining ➔ Supplier Partnership Key Markets: Defense Industrial Base, Healthcare, Plumbing/HVAC, Automotive/Power transmission, Electrical, Hydraulics, Engine Components, Oil & Gas, AG-Con, Firearms, Medical 5
  • 6. Ignyte Overview ● Founded in 2012 | 45 Employees | National Clients ○ Defense | Financial Services | Healthcare ● We provide Tech-Enabled Digital Risk & Technology services Small-Medium Business and their leadership teams and enable them to significantly improve organizational performance & efficiencies. ● Our business model is purpose built for SMBs & complex environments and is uniquely positioned to deliver a differentiated value proposition to our clients that is driven by: ○ Proprietary Cyber Risk & Technology Automation Software ○ Our experienced and unbiased business leaders and subject matter experts ○ Our thought leadership and industry leading best practices approach and tools Ignyte Assurance Platform Independent Risk Management Technology Review Top Secret Facility Clearance
  • 8. Copyright © 2021 Ignyte Assurance Platform and MAGNET I Ohio MEP. All rights reserved. Program Resources Resources are aligned with various stages of managing the CMMC program for supply chain Program Metrics & Management SSP & POA&M Deliverables Guided Assessment Training Program Deliverables • DoD Training Website - https://securityhub.usalearning.gov/content/story.html • Ignyte Institute Practitioner Level & Top Management Training - https://www.ignyteinstitute.org/ • CMMC System Security Plan Development - https://www.dfars-nist-800-171.com/
  • 9. Copyright © 2021 Ignyte Assurance Platform and MAGNET I Ohio MEP. All rights reserved. Next Steps & Questions? Thank you Point of Contact Joe Vinciquerra Growth & Innovation Advisor Justus Scott CMMC Awareness Advisor Point of Contact justus@ignyteplatform.com jvinciquerra@manufacturingsuccess.org 9
  • 11. Copyright © 2021 Ignyte Assurance Platform and MAGNET I Ohio MEP. All rights reserved. 4 2 1 3 CMMC | Supplier Risk Program DFARS 252.204 7012: Safeguarding Covered Defense Information and Cyber Incident Reporting DFARS 252.204 7020: NIST SP 800 171 DoD Assessment Requirements DFARS 252.204 7019: Notice of NIST SP 800 171 DoD Assessment Requirements DFARS 252.204 7021: Cybersecurity Maturity Model Certification Requirements
  • 12. Copyright © 2021 Ignyte Assurance Platform and MAGNET I Ohio MEP. All rights reserved. DHS CISA: 16 Critical Sectors of US Economy Chemical Commercial Facilities Communications Critical Manufacturing Dams Defense Industrial Base Energy Financial Services Food and Agriculture Healthcare and Public Health Information Technology Nuclear Reactors, Materials, and Waste Transportation Systems Water and Wastewater Systems Emergency Services Government Facilities
  • 13. Copyright © 2021 Ignyte Assurance Platform and MAGNET I Ohio MEP. All rights reserved. Supply-Side Risk Management Supply-Side Risks Capacity Limitation Technology Incompatibility Supply Disruptions Currency Fluctuations Disasters Production Transportation Telecommunication Skills Quality Intellectual Property Political Economical Regulatory Lead Time Credit Exchange Rate Natural Terrorist Attacks Environmental Constraints
  • 14. Copyright © 2021 Ignyte Assurance Platform and MAGNET I Ohio MEP. All rights reserved. Supplier Visibility Is Critical to Enterprise Architecture Supplier Risk Management Program • Organizations are shifting from Tier-1 to managing subcontractors on a contract. • Leveraging CMMC as the supplier cyber risk program is become the new norm • Key is to determine inherent risk of any given suppliers o Analytics & Automation Support
  • 15. Copyright © 2021 Ignyte Assurance Platform and MAGNET I Ohio MEP. All rights reserved. SMB PATH TO CYBER COMPLIANCE Strategy Start with a strategy and a clear understanding of where you want to go Partner with your Tier 2 and beyond suppliers throughout your ecosystem Leverage shared standards like CMMC