- 1
- ...
- 11
32 CFR, 48 CFR, and CMMC Compliance Requirements and Timeline. Key Points on 32 CFR, 48 CFR, and CMMC Compliance Regulatory Overview Two primary regulations: 32 CFR and 48 CFR.- 32 CFR: New rule establishing...
The Big Picture, What 32 CFR Part 170 Means for You. In this video, John Hill, CEO of TechSage Solutions, breaks down the critical changes brought by the final CMMC rule (32 CFR Part 170), officially published in...
Are you prepared for your next security assessment? In this video, John Hill, CEO of TechSage Solutions, breaks down what every defense contractor needs to know under the new cybersecurity compliance...
I'm diving into one of the most critical — yet often misunderstood — documents you'll need to pass your CMMC Level 2 assessment: your System Security Plan (SSP). The SSP isn't just paperwork. It's...
In this episode of Thoughts from the Deck, John Hill lays out what he calls the "blueprint" for your CMMC Level 2 compliance: the System Security Plan (SSP). Your SSP is no longer just a compliance...
Many DoD contractors still believe they won't be required to comply with the Cybersecurity Maturity Model Certification (CMMC), but that's no longer the case. Since Q4 of 2024, CFR 32 Part 170 has been finalized...
Hi, I'm John Hill, CEO of TechSage Solutions, coming to you from our Strategic Planning deck. Today, we're diving into a crucial challenge for organizations preparing for CMMC Level 2 compliance—what to do...
I've got a special announcement for you about an awesome virtual event coming up this week. And that really brightens up my day. I'm super excited to be hosting Small Business Tech Day San Antonio on November 16th...
As this year is winding to a close with less than two months to go and the Christmas holiday season is really starting to get started. There are several cybersecurity threats that we have to continue to be aware of...
Read the rest of his inspiring story on how TechSage Solutions became the business it is today.
The Compliance Formula simplifies complex compliance challenges, equipping businesses to achieve CMMC certification and protect against costly cyber threats. Written by top IT leaders, this book is essential for organizations seeking to win Department of Defense contracts, enhance security, and avoid the financial and legal risks of non-compliance.