Executive Order 13556 signed by President Obama in 2010, directing all Federal agencies to safeguard their Controlled Unclassified Information (CUI) and establishing a unified policy for all agencies to follow for data sharing and transparency. DFARS Clause 252.204-7012 requires contractors / sub-contractors to:
Provide adequate security to safeguard covered defense information that resides on or is transiting through a contractor’s internal information system or network
Report cyber incidents that affect a covered contractor information system or the covered defense information residing therein, or that affect the contractor’s ability to perform requirements designated as operationally critical support
Submit malicious software discovered and isolated in connection with a reported cyber incident to the DoD Cyber Crime Center
Submit media (if requested) and additional information to support a damage assessment
Flow down the clause in subcontracts for operationally critical support, or for which subcontract performance will involve covered defense information.
Since December of 2017, Department of Defense (DoD)Contactors were required to assess and document thier compliance in accordance with NIST 800-171 to self attest thier compliance with the DFARS Clause. DoD contractors are now required to comply using a maturity model in accordance with CMMC Levels 1 through 5. CMMC dictates how contractors and sub-contractors doing business with Federal agencies should manage and control CUI.
Details the security requirements to protect confidentiality of Federal Contract Information, CDI, or CUI on non-Federal information systems.
Security requirements are organized into 14 control families
Each family contains the requirements related to the general security topic of the family, and contain a total of 110 individual controls/ requirements.
Why Do We Need CMMC
Billions of Dollars Stolen
Safety of Our Service Members Relying on Technology DoD Purchased
Damage to Our Economy
Damages to Our Companies from Insider Threats
What Are The Challenges
Cost of implementation
Interpretation of The Requirements
What Solutions Are Needed
What Is and Is Not Compliant
How to Remain Price Competitive
CMMC present many challenges to DoD contractors Let Us Help
Working with Hyper Vigilance provides you with a simple, affordable, and scalable set of solutions to comply quickly. Our solutions and team of experts will take you from non-compliant to CMMC compliant quickly and keep you that way.
Cybersecurity logging, intrusion detection, event analysis, and incident response is required daily by CMMC. We will deploy, collect, review, and respond to threats in real-time to meet compliance and to ensure intruders are stopped to avoid a security breach
We are here for you and will work along side you whether thats providing support for an audit or to ensure the daily, weekly, monthly, and annual compliance activities are completed and documented
Managed IT Services
Do you need support to remotely manage you’re IT assets. We will ensure your IT assets are protected, updated, and compliant with CMMC without disrupting the end-user productivity.
How It Works
CMMC LEVEL 1
SOLUTIONS & SERVICES
CMMC Compliance Assessment
Policy Development Support
CMMC Security Implementation Guides
Managed IPS & Firewall
CMMC LEVEL 2
CMMC LEVEL 1 PLUS
Log Monitoring & Analysis
Vulnerabitly Scans & Analysis
Security Awareness Program
Systems Security Plan
CMMC LEVEL 3
CMMC Level 2 Plus
Intrusion Detection & Response
Advance Threat Prevention
Mobile Security Management
Application & Device Control
Data Loss Prevention
THE FOUNDERS OF HYPER VIGILANCE
We are disabled combat veterans with a passion to serve our customers, our nation, and the Defense Industrial Base to ensure the safety of the world and security of your business.
CEO – Founder
Served in the US Marines, Intelligence Agencies, and Private sector preventing, detecting, and deterring attacks. John is a passionate cybersecurity expert that loves what he does, which is protecting you and your business.
COO – Founder
Over 15 years of experience serving in the US Army and the Defense Department building, securing, and managing complex IT Enterprise systems around the world. Giancarlo has a passion of finding cost effective and cutting solutions to make business more secure without breaking the bank.