SlideShare a Scribd company logo
WEBINAR SERIES. Part 3 7 April 2021 10:30 AM EST
Hosted by CATALYST CONNECTION
Max Aulakh
Founder & CEO
CORPORATE CYBER PROGRAM
Who’s driving this webinar?
Max Aulakh
Founder & CEO
About our Speaker
C-SUITE DEFENSE & ASSURANCE LEADER
S
P
E
C
I
A
L
G
U
E
S
T
As a Data Security and Compliance Leader, he delivers DoD-tested security strategies and
compliance that safeguard mission-critical IT operations. Having trained and excelled in The
United States Air Force, he maintained and tested the InfoSec and ComSec functions of network
hardware, software, and IT infrastructure for global networks — both classified and unclassified.
He drove the Information Assurance (IA) programs for the U.S. Department of Defense (DoD).
Facilitated by
Connie Palucka
Vice President, Consulting at Catalyst Connection
Connie joined Catalyst Connection in 2005 and brings over 25 years
of global sales, business development, and product development
experience to her role as the Managing Director of Regional
Initiatives. She leads a team that secures and executes grants
initiatives to support manufacturers and build the region’s
vibrancy. She also works with regional academic institutions,
economic development organizations and regional manufacturers
to build new capabilities and help make Southwestern Pennsylvania
a model for the nation.
• Webinar 1: Laying the Foundation – The Need for Cybersecurity in U.S.
Manufacturing
• Webinar 2: DFARS & CMMC Overview
• Webinar 3: Corporate Program Setup
• Webinar 4: Real Company Examples
• Webinar 5: CMMC Breakdown
• Session 6: Risk Mitigation
6-Part Webinar Series: CYBER RESILIENCY FOR DEFENSE
CONTRACTORS
Business Case for Cybersecurity
Cybersecurity specific DFAR Rules,
CMMC Basic Levels
Controlled Unclassified Information
(CUI), Data Classification and
Information Protection Scheme
What we covered so far
1
2
3
Session 3: Corporate Program Setup
1. Setting up your compliance program at the corporate level.
2. Conducting Rapid - Low Fidelity Assessment for generating SPRS Scores.
3.Developing a completed SSP (System Security Plan).
4.How and why to create a POA&M (Plan of Actions & Milestones).
Corporate Security Program
Corporate Security Program Development
Driving to a Common Understanding
Business
Language: Existing
Business Model
Knowledge Gap:
Software & Technology
Alignment
Common Understanding
of Business Model
Common Understanding
of Technology
Common Understanding
of Risks & Rewards of
Technology
Technology Risk
Partners
Language: Servers, IP
Addresses, Routers
(Technology)
Knowledge Gap:
Customer’s Needs &
Business Model
Corporate Security Program
• Developing alignment starts with
understanding of your business and
external influences.
○ Primes and how they may behave
• DFARs is part of the over all federal
legislation scheme
• Internal policies require alignment with
total expectations of the business
○ Cyber Security requires early top
management input
• Start with a board resolution to setup a
corporate security program.
• Setup a basic governing committee on key
decision and “grey” area decisions
○ Helps in developing consensus &
direction.
SPRS System Overview
Supplier Performance Risk System & Reports
• Cyber Score Submission Required
• Scores are based on NIST 800-171 Assessment
• SPRS Data is used for Source Selection
• Accessible By:
o Government Personnel with Need to Know
o Contractors (your own data only)
• Not Releasable Under Freedom of Information Act (FOIA)
Product Data Reporting and Evaluation
Program (PDREP)
automated
manual
Air Force Contracting
Database Information System
(J018)
- EDA
- WAWF
- MOCAS
- USN/USMC
- USAF
- Army
- DCMA
- DLA
- GIDEP
- USAF
- NAVAIR
- USMC Aviation
Joint Discrepancy Reporting System
(JDRS)
Contractor Performance Assessment
Reporting System (CPARS)
- PPIRS-RC
- FAPIIS
Other (ad hoc)
- DLA
Contract Data
- Award, Delivery, Pricing
Quality Data
- PQDRs, GIDEP, MIRs, Bulletins, SDRs
- Surveys, Lab Reports
Material Data
- NSNs, application and safety criticality
Contract Data
- Award, Delivery
Quality Data
- PQDRs
DCMA Supplier Risk System (SRS)
Supplier Risk Data
- Corrective Action Requests (CARs)
- Corrective Action Plans (CAPs)
- Program Assessment Reports (PARs)
Bureau of Labor
Statistics
Contract Data
- Award, Delivery
System for Award Mgt
(SAM)
DLA
- eProcurement
- EBS
- eProcurement
- EBS
Price Risk Data
- PPI (inflation)
Company Data
- CAGE codes
- Exclusion/debarment
- DUNS & MPIN
Item Risk Data
- DMSMS
Supplier Risk Data
- performance ratings, testimonials
SPRS
Supplier Performance Risk System Data Flow
DLA
SPRS Scoring Methodology
NIST Point System Methodology
110 NIST 800-171 Controls are weighted and are subtracted from the starting score of 110
A perfect score is 110
A negative score is possible
● Controls are worth 5 points, some 3, and some 1.
● There are 42 controls worth 5 points each, which include:
○ The 17 basic safeguards required of all Federal contractors’ IT systems, as outlined in the FAR Clause 52.204-21, and
○ Other controls that “would allow for exploitation of the network and its information.”
● There are 14 controls worth 3 points each, which if not implemented “have a specific and confined effect on the security of the
network and its data”
● The remaining 54 controls are worth 1 point.
● Two of the controls, 3.5.3 (multi-factor authentication) and 3.13.11 (FIPS-validated cryptography), are worth either 5 or 3 points,
depending on the level on non-compliance
● If the organization does not have an SSP, no score is possible - negative 110. A score can be generated without an SSP but 110
points are deducted from the start.
Model & Structure
SPRS Scores & Domains
SSP Development & POA&Ms
System Security Plan
Formal document that provides an overview of the security requirements
for an information system and describes the security controls in place or
planned for meeting those requirements.
info@Ignyteplatform.com for template requests
System Security Plan Components
Plan or System Name
Identifier
CMMC Level (System Categorization)
System Owner
Other Contacts (IT Management, Audit Firm, etc..)
Assignment of Security Responsibilities
Information Type (CUI Data)
General Description/System Purpose
System Environment
System Interconnections
Laws, Regulations and Policies Impacting Systems
Control Section
Minimum Security Controls
• Control Name, ID
• Control Owner
• Control Response
• Current Status
info@Ignyteplatform.com for template requests
Plan of Action & Milestones (POA&M)
A document that identifies tasks needing to be accomplished. It details
resources required to accomplish the elements of the plan, any milestones
in meeting the tasks, and scheduled completion dates for the milestones.
info@Ignyteplatform.com for template requests
Plan of Actions & Milestones Components
POAM ID
Related Control(s)
Weakness Name
Weakness Description
Weakness Source Detection
Asset Identification
Point of Contact
Resources Required
Remediation Plan
Scheduled Completion Date
Planned Milestones
Vendor Dependencies
Current Status
Risk Rating
Comments
info@Ignyteplatform.com for template requests
Summary
• Corporate Security Program - Start with business leadership first
• SPRS Assessment - Conduct a rapid assessment (low fidelity) update your
scores often or during major changes
• SSPs & POA&Ms - Two primary planning documents, formal documentation that
is expected to be provided to auditors for purpose of certification.
Summary
Questions?
Thank you!
Point of Contact
Connie Palucka
Vice President, Consulting
Max Aulakh, MBA, CISSP, PMP
Founder & CEO
Point of Contact
info@ignyteplatform.com cpalucka@catalystconnection.org

More Related Content

PPTX
DFARS & CMMC Overview
PPTX
How I Woke Up from the CMMC Compliance Nightmare
PDF
CMMC 2.0 I L1 & L2 Scoping Guidance Explained
PPTX
PDF
Securing the Supply Chain
PPTX
CMMC DFARS/NIST SP 800-171
PPTX
MCGlobalTech CMMC Managed Compliance Service
PDF
Gpc case study_eng_0221
DFARS & CMMC Overview
How I Woke Up from the CMMC Compliance Nightmare
CMMC 2.0 I L1 & L2 Scoping Guidance Explained
Securing the Supply Chain
CMMC DFARS/NIST SP 800-171
MCGlobalTech CMMC Managed Compliance Service
Gpc case study_eng_0221

What's hot (20)

PDF
The CMMC Has Arrived. Are You Ready?
PPTX
Laying the Foundation: The Need for Cybersecurity in U.S. Manufacturing
PDF
Cybersecurity Maturity Model Certification
PDF
MCGlobalTech Managed Security Compliance Program
PPT
Educause+V4
PDF
CMMC case study: Inside a CMMC assessment
PPTX
CMMC Certification
PPTX
A framework for an organization to use in determining if it needs a ciso
PDF
Nist.sp.800 37r2
PPTX
SIEM in NIST Cyber Security Framework
PDF
Huntsville GovCon Growth Summit 2020 - Summit 7 - Cybersecurity Maturity Mode...
PPTX
Robert Nichols: Cybersecurity for Government Contractors
PPT
Security Management Practices
PPTX
CMMC rollout: How CMMC will impact your organization
PDF
Evolution of Security Management
PPTX
Continuous Compliance Monitoring
PDF
Job aid framework-for-improving-critical-infrastructure-cybersecurity-core-jwd
PPTX
Cybersecurity Metrics: Reporting to BoD
PPTX
Project Forecasting from the Perspective of an EVMA and EIA-748
PPTX
Government Webinar: Preparing for CMMC Compliance Roundtable
The CMMC Has Arrived. Are You Ready?
Laying the Foundation: The Need for Cybersecurity in U.S. Manufacturing
Cybersecurity Maturity Model Certification
MCGlobalTech Managed Security Compliance Program
Educause+V4
CMMC case study: Inside a CMMC assessment
CMMC Certification
A framework for an organization to use in determining if it needs a ciso
Nist.sp.800 37r2
SIEM in NIST Cyber Security Framework
Huntsville GovCon Growth Summit 2020 - Summit 7 - Cybersecurity Maturity Mode...
Robert Nichols: Cybersecurity for Government Contractors
Security Management Practices
CMMC rollout: How CMMC will impact your organization
Evolution of Security Management
Continuous Compliance Monitoring
Job aid framework-for-improving-critical-infrastructure-cybersecurity-core-jwd
Cybersecurity Metrics: Reporting to BoD
Project Forecasting from the Perspective of an EVMA and EIA-748
Government Webinar: Preparing for CMMC Compliance Roundtable
Ad

Similar to Corporate Cyber Program (20)

PPTX
Aicpa tech+panel presentation t6 managing risks and security 2014 v3
PDF
Eng Solutions - Capability Statement-Latest
PPSX
Does audit make us more secure
PDF
Security_360_Marketing_Package
PPT
Information Security Program & PCI Compliance Planning for your Business
PPTX
MY-Copy of Corp IT Strategy FY24-25 - V1.pptx
PPT
Info Security & PCI(original)
DOCX
CV of Mohan M
PPTX
ISS CAPSTONE TEAM
PPT
Proteus OCM Company Profile
DOCX
S Rod Simpson Resume
PDF
SAP Security & Compliance Audits. Find your vulnerabilities before you get hu...
DOC
JAMiller_Pro
PDF
Cyber review-guide
PPTX
IBM Relay 2015: Securing the Future
 
PDF
Trackment
PDF
PTX12_Presentation_George Delikouras AIA
DOCX
DOCX
Joe Green Resume_2017 v5
Aicpa tech+panel presentation t6 managing risks and security 2014 v3
Eng Solutions - Capability Statement-Latest
Does audit make us more secure
Security_360_Marketing_Package
Information Security Program & PCI Compliance Planning for your Business
MY-Copy of Corp IT Strategy FY24-25 - V1.pptx
Info Security & PCI(original)
CV of Mohan M
ISS CAPSTONE TEAM
Proteus OCM Company Profile
S Rod Simpson Resume
SAP Security & Compliance Audits. Find your vulnerabilities before you get hu...
JAMiller_Pro
Cyber review-guide
IBM Relay 2015: Securing the Future
 
Trackment
PTX12_Presentation_George Delikouras AIA
Joe Green Resume_2017 v5
Ad

More from Ignyte Assurance Platform (13)

PDF
Ignyte/CDW LA Aerospace and Defense Event Recap Flyer.pdf
PPTX
CMMC Day 2024 _ Ignyte _ Declassification.pptx
PPTX
How CMMC Auditors Recommend You Defend Your Organization - Completed March, 2...
PDF
Ignyte - US Sovereign Cloud Computing
PPTX
CMMC 2.0 Explained: Impact for SMBs
PDF
NIST_Ignyte_OSCALWorkshop_2022.pdf
PDF
How the DoD’s Cyber Security Maturity Model (CMMC) will impact your business ...
PPTX
CMMC 2.0 | What the changes mean for organizations in the DIB
PDF
CMMC 2.0 I L1 & L2 Assessment Guidance
PPTX
Midway Swiss Case Study: Journey towards CMMC Compliance with Ignyte
PDF
Fortifying Cyber Defense: How to Act Now to Protect Global Supply Chains
PPTX
Full Cybersecurity Regulations Overview for DoD Prime and Subcontractors
PDF
Ignyte assurance platform NIST RMF datasheet.
Ignyte/CDW LA Aerospace and Defense Event Recap Flyer.pdf
CMMC Day 2024 _ Ignyte _ Declassification.pptx
How CMMC Auditors Recommend You Defend Your Organization - Completed March, 2...
Ignyte - US Sovereign Cloud Computing
CMMC 2.0 Explained: Impact for SMBs
NIST_Ignyte_OSCALWorkshop_2022.pdf
How the DoD’s Cyber Security Maturity Model (CMMC) will impact your business ...
CMMC 2.0 | What the changes mean for organizations in the DIB
CMMC 2.0 I L1 & L2 Assessment Guidance
Midway Swiss Case Study: Journey towards CMMC Compliance with Ignyte
Fortifying Cyber Defense: How to Act Now to Protect Global Supply Chains
Full Cybersecurity Regulations Overview for DoD Prime and Subcontractors
Ignyte assurance platform NIST RMF datasheet.

Recently uploaded (20)

PDF
Softaken Excel to vCard Converter Software.pdf
PDF
Which alternative to Crystal Reports is best for small or large businesses.pdf
PDF
Odoo Companies in India – Driving Business Transformation.pdf
PPTX
CHAPTER 2 - PM Management and IT Context
PPTX
history of c programming in notes for students .pptx
PDF
Design an Analysis of Algorithms II-SECS-1021-03
PDF
Flood Susceptibility Mapping Using Image-Based 2D-CNN Deep Learnin. Overview ...
PDF
Claude Code: Everyone is a 10x Developer - A Comprehensive AI-Powered CLI Tool
PPTX
Agentic AI Use Case- Contract Lifecycle Management (CLM).pptx
PPTX
VVF-Customer-Presentation2025-Ver1.9.pptx
PDF
Upgrade and Innovation Strategies for SAP ERP Customers
PDF
Addressing The Cult of Project Management Tools-Why Disconnected Work is Hold...
PPTX
ai tools demonstartion for schools and inter college
PDF
Raksha Bandhan Grocery Pricing Trends in India 2025.pdf
PDF
Why TechBuilder is the Future of Pickup and Delivery App Development (1).pdf
PPTX
Introduction to Artificial Intelligence
PPTX
CHAPTER 12 - CYBER SECURITY AND FUTURE SKILLS (1) (1).pptx
PDF
Digital Strategies for Manufacturing Companies
PDF
PTS Company Brochure 2025 (1).pdf.......
PPTX
Agentic AI : A Practical Guide. Undersating, Implementing and Scaling Autono...
Softaken Excel to vCard Converter Software.pdf
Which alternative to Crystal Reports is best for small or large businesses.pdf
Odoo Companies in India – Driving Business Transformation.pdf
CHAPTER 2 - PM Management and IT Context
history of c programming in notes for students .pptx
Design an Analysis of Algorithms II-SECS-1021-03
Flood Susceptibility Mapping Using Image-Based 2D-CNN Deep Learnin. Overview ...
Claude Code: Everyone is a 10x Developer - A Comprehensive AI-Powered CLI Tool
Agentic AI Use Case- Contract Lifecycle Management (CLM).pptx
VVF-Customer-Presentation2025-Ver1.9.pptx
Upgrade and Innovation Strategies for SAP ERP Customers
Addressing The Cult of Project Management Tools-Why Disconnected Work is Hold...
ai tools demonstartion for schools and inter college
Raksha Bandhan Grocery Pricing Trends in India 2025.pdf
Why TechBuilder is the Future of Pickup and Delivery App Development (1).pdf
Introduction to Artificial Intelligence
CHAPTER 12 - CYBER SECURITY AND FUTURE SKILLS (1) (1).pptx
Digital Strategies for Manufacturing Companies
PTS Company Brochure 2025 (1).pdf.......
Agentic AI : A Practical Guide. Undersating, Implementing and Scaling Autono...

Corporate Cyber Program

  • 1. WEBINAR SERIES. Part 3 7 April 2021 10:30 AM EST Hosted by CATALYST CONNECTION Max Aulakh Founder & CEO CORPORATE CYBER PROGRAM
  • 2. Who’s driving this webinar? Max Aulakh Founder & CEO About our Speaker C-SUITE DEFENSE & ASSURANCE LEADER S P E C I A L G U E S T As a Data Security and Compliance Leader, he delivers DoD-tested security strategies and compliance that safeguard mission-critical IT operations. Having trained and excelled in The United States Air Force, he maintained and tested the InfoSec and ComSec functions of network hardware, software, and IT infrastructure for global networks — both classified and unclassified. He drove the Information Assurance (IA) programs for the U.S. Department of Defense (DoD). Facilitated by Connie Palucka Vice President, Consulting at Catalyst Connection Connie joined Catalyst Connection in 2005 and brings over 25 years of global sales, business development, and product development experience to her role as the Managing Director of Regional Initiatives. She leads a team that secures and executes grants initiatives to support manufacturers and build the region’s vibrancy. She also works with regional academic institutions, economic development organizations and regional manufacturers to build new capabilities and help make Southwestern Pennsylvania a model for the nation.
  • 3. • Webinar 1: Laying the Foundation – The Need for Cybersecurity in U.S. Manufacturing • Webinar 2: DFARS & CMMC Overview • Webinar 3: Corporate Program Setup • Webinar 4: Real Company Examples • Webinar 5: CMMC Breakdown • Session 6: Risk Mitigation 6-Part Webinar Series: CYBER RESILIENCY FOR DEFENSE CONTRACTORS
  • 4. Business Case for Cybersecurity Cybersecurity specific DFAR Rules, CMMC Basic Levels Controlled Unclassified Information (CUI), Data Classification and Information Protection Scheme What we covered so far 1 2 3
  • 5. Session 3: Corporate Program Setup 1. Setting up your compliance program at the corporate level. 2. Conducting Rapid - Low Fidelity Assessment for generating SPRS Scores. 3.Developing a completed SSP (System Security Plan). 4.How and why to create a POA&M (Plan of Actions & Milestones).
  • 7. Corporate Security Program Development Driving to a Common Understanding Business Language: Existing Business Model Knowledge Gap: Software & Technology Alignment Common Understanding of Business Model Common Understanding of Technology Common Understanding of Risks & Rewards of Technology Technology Risk Partners Language: Servers, IP Addresses, Routers (Technology) Knowledge Gap: Customer’s Needs & Business Model
  • 8. Corporate Security Program • Developing alignment starts with understanding of your business and external influences. ○ Primes and how they may behave • DFARs is part of the over all federal legislation scheme • Internal policies require alignment with total expectations of the business ○ Cyber Security requires early top management input • Start with a board resolution to setup a corporate security program. • Setup a basic governing committee on key decision and “grey” area decisions ○ Helps in developing consensus & direction.
  • 10. Supplier Performance Risk System & Reports • Cyber Score Submission Required • Scores are based on NIST 800-171 Assessment • SPRS Data is used for Source Selection • Accessible By: o Government Personnel with Need to Know o Contractors (your own data only) • Not Releasable Under Freedom of Information Act (FOIA)
  • 11. Product Data Reporting and Evaluation Program (PDREP) automated manual Air Force Contracting Database Information System (J018) - EDA - WAWF - MOCAS - USN/USMC - USAF - Army - DCMA - DLA - GIDEP - USAF - NAVAIR - USMC Aviation Joint Discrepancy Reporting System (JDRS) Contractor Performance Assessment Reporting System (CPARS) - PPIRS-RC - FAPIIS Other (ad hoc) - DLA Contract Data - Award, Delivery, Pricing Quality Data - PQDRs, GIDEP, MIRs, Bulletins, SDRs - Surveys, Lab Reports Material Data - NSNs, application and safety criticality Contract Data - Award, Delivery Quality Data - PQDRs DCMA Supplier Risk System (SRS) Supplier Risk Data - Corrective Action Requests (CARs) - Corrective Action Plans (CAPs) - Program Assessment Reports (PARs) Bureau of Labor Statistics Contract Data - Award, Delivery System for Award Mgt (SAM) DLA - eProcurement - EBS - eProcurement - EBS Price Risk Data - PPI (inflation) Company Data - CAGE codes - Exclusion/debarment - DUNS & MPIN Item Risk Data - DMSMS Supplier Risk Data - performance ratings, testimonials SPRS Supplier Performance Risk System Data Flow DLA
  • 13. NIST Point System Methodology 110 NIST 800-171 Controls are weighted and are subtracted from the starting score of 110 A perfect score is 110 A negative score is possible ● Controls are worth 5 points, some 3, and some 1. ● There are 42 controls worth 5 points each, which include: ○ The 17 basic safeguards required of all Federal contractors’ IT systems, as outlined in the FAR Clause 52.204-21, and ○ Other controls that “would allow for exploitation of the network and its information.” ● There are 14 controls worth 3 points each, which if not implemented “have a specific and confined effect on the security of the network and its data” ● The remaining 54 controls are worth 1 point. ● Two of the controls, 3.5.3 (multi-factor authentication) and 3.13.11 (FIPS-validated cryptography), are worth either 5 or 3 points, depending on the level on non-compliance ● If the organization does not have an SSP, no score is possible - negative 110. A score can be generated without an SSP but 110 points are deducted from the start.
  • 15. SPRS Scores & Domains
  • 17. System Security Plan Formal document that provides an overview of the security requirements for an information system and describes the security controls in place or planned for meeting those requirements. info@Ignyteplatform.com for template requests
  • 18. System Security Plan Components Plan or System Name Identifier CMMC Level (System Categorization) System Owner Other Contacts (IT Management, Audit Firm, etc..) Assignment of Security Responsibilities Information Type (CUI Data) General Description/System Purpose System Environment System Interconnections Laws, Regulations and Policies Impacting Systems Control Section Minimum Security Controls • Control Name, ID • Control Owner • Control Response • Current Status info@Ignyteplatform.com for template requests
  • 19. Plan of Action & Milestones (POA&M) A document that identifies tasks needing to be accomplished. It details resources required to accomplish the elements of the plan, any milestones in meeting the tasks, and scheduled completion dates for the milestones. info@Ignyteplatform.com for template requests
  • 20. Plan of Actions & Milestones Components POAM ID Related Control(s) Weakness Name Weakness Description Weakness Source Detection Asset Identification Point of Contact Resources Required Remediation Plan Scheduled Completion Date Planned Milestones Vendor Dependencies Current Status Risk Rating Comments info@Ignyteplatform.com for template requests
  • 21. Summary • Corporate Security Program - Start with business leadership first • SPRS Assessment - Conduct a rapid assessment (low fidelity) update your scores often or during major changes • SSPs & POA&Ms - Two primary planning documents, formal documentation that is expected to be provided to auditors for purpose of certification.
  • 23. Questions? Thank you! Point of Contact Connie Palucka Vice President, Consulting Max Aulakh, MBA, CISSP, PMP Founder & CEO Point of Contact info@ignyteplatform.com cpalucka@catalystconnection.org