How Did We Get Here

Executive Order 13556 signed by President Obama in 2010, directing all Federal agencies to safeguard their Controlled Unclassified Information (CUI) and establishing a unified policy for all agencies to follow for data sharing and transparency. ​DFARS Clause 252.204-7012 requires contractors / sub-contractors to:

  • Provide adequate security to safeguard covered defense information that resides on or is transiting through a contractor’s internal information system or network
  • Report cyber incidents that affect a covered contractor information system or the covered defense information residing therein, or that affect the contractor’s ability to perform requirements designated as operationally critical support​
  • Submit malicious software discovered and isolated in connection with a reported cyber incident to the DoD Cyber Crime Center​
  • Submit media (if requested) and additional information to support a damage assessment​
  • Flow down the clause in subcontracts for operationally critical support, or for which subcontract performance will involve covered defense information.​

Since December of 2017, Department of Defense (DoD)Contactors were required to assess and document thier compliance in accordance with NIST 800-171 to self attest thier compliance with the DFARS Clause. DoD contractors are now required to comply using a maturity model in accordance with CMMC Levels 1 through 5. CMMC dictates how contractors and sub-contractors doing business with Federal agencies should manage and control CUI.

  • Details the security requirements to protect confidentiality of Federal Contract Information, CDI, or CUI on non-Federal information systems.​
  • Security requirements are organized into 14 control families​
  • Each family contains the requirements related to the general security topic of the family, and contain a total of 110 individual controls/ requirements.​

Why Do We Need CMMC

  • Billions of Dollars Stolen
  • Safety of Our Service Members Relying on Technology DoD Purchased
  • Damage to Our Economy
  • Damages to Our Companies from Insider Threats

What Are The Challenges

  • Cost of implementation
  • Interpretation of The Requirements
  • What Solutions Are Needed
  • What Is and Is Not Compliant
  • How to Remain Price Competitive

CMMC present many challenges to DoD contractors Let Us Help

Working with Hyper Vigilance provides you with a simple, affordable, and scalable set of solutions to comply quickly. Our solutions and team of experts will take you from non-compliant to CMMC compliant quickly and keep you that way.

Threat Protection

Cybersecurity logging, intrusion detection, event analysis, and incident response is required daily by CMMC. We will deploy, collect, review, and respond to threats in real-time to meet compliance and to ensure intruders are stopped to avoid a security breach

Compliance Management

We are here for you and will work along side you whether thats providing support for an audit or to ensure the daily, weekly, monthly, and annual compliance activities are completed and documented

Managed IT Services

Do you need support to remotely manage you’re IT assets. We will ensure your IT assets are protected, updated, and compliant with CMMC without disrupting the end-user productivity.

How It Works

Play Video




    • CMMC Compliance Assessment
    • Policy Development Support
    • CMMC Security Implementation Guides
    • Managed IPS & Firewall
    • Endpoint Protection



    • Log Monitoring & Analysis
    • Vulnerabitly Scans & Analysis
    • Compliance Management
    • Security Awareness Program
    • Systems Security Plan


CMMC Level 2 Plus

    • Intrusion Detection & Response
    • Forensic Analysis
    • Advance Threat Prevention
    • Mobile Security Management
    • Application & Device Control
    • Data Loss Prevention


We are disabled combat veterans with a passion to serve our customers, our nation, and the Defense Industrial Base to ensure the safety of the world and security of your business.

John Harrison

CEO – Founder

Served in the US Marines, Intelligence Agencies, and Private sector preventing, detecting, and deterring attacks. John is a passionate cybersecurity expert that loves what he does, which is protecting you and your business.


COO – Founder​

Over 15 years of experience serving in the US Army and the Defense Department building, securing, and managing complex IT Enterprise systems around the world. Giancarlo has a passion of finding cost effective and cutting solutions to make business more secure without  breaking the bank.


Our Blog

To Insource or Outsource NIST 800-171 and CMMC Compliance

June 18, 2021 uncategorized 0

When it comes to security, it’s understandable that many businesses want to prevent as many cooks in the kitchen...

read more

CMMC Timeline

June 15, 2021 uncategorized 0

The Cybersecurity Maturity Model Certification (CMMC) is a new regulation being rolled out by the US Department of Defense...

read more
government building


June 7, 2021 uncategorized 0

If you’ve heard of one, you’ve probably heard of the other. CMMC vs NIST has long been a question...

read more



Phone :

Visit Us :
4301 University Dr. Suite: 220 Fairfax VA 22030

    Request A Free