Podcast cover

Mission Compliance: Unleashing Growth Potential For Defense Contractors

On Call Compliance Solutions
49 episodes   Last Updated: May 16, 24

Mission Compliance is a podcast dedicated to helping defense contractors navigate the complex world of DoD requirements and compliance, ultimately empowering them to win more contracts and position themselves as leaders in the defense industry. Our podcast aims to provide actionable guidance, insights, and cutting-edge strategies that can fast-track businesses to defense contract success. Visit cmmccompliancesecrets.com for more.

Episodes

In this episode, we bring you an in-depth breakdown of the role that encryption plays in the NIST SP 800-171 compliance framework.
On this week's episode, we offer an in-depth breakdown of DFARS and NIST SP 800-171 and the impact of compliance on small businesses.
In this episode, we bring you an in-depth breakdown of CMMC 2.0 control: AC.L2-3.1.18, breaking down the importance of controlling the connection of mobile devices.
In this episode, we celebrate a pretty big milestone - On Call Compliance Solutions hitting 2,000 subscribers on YouTube! Thank you all for coming along this journey with us.
In this episode, we bring you an in-depth breakdown of CMMC 2.0 control: AC.L2-3.1.17, breaking down the importance of protecting wireless access with the use of authentication and encryption.
In this episode, we bring you an in-depth breakdown of CMMC 2.0 control: AC.L2-3.1.16, breaking down the importance of authorizing access to wireless networks with a password or token in order to protect CUI.
In this episode, we bring you an in-depth breakdown of CMMC 2.0 control: AC.L2-3.1.15, breaking down the importance of authorizing remote execution of privileged commands to security information as needed.
In this episode, we bring you an in-depth breakdown of CMMC 2.0 control: AC.L2-3.1.14, breaking down the importance of routing remote access through managed access control points for compliance, system architecture considerations, and best practices.
In this episode, we bring you an in-depth breakdown of CMMC 2.0 control: AC.L2-3.1.13, breaking down the importance of employing cryptographic mechanisms to protect the confidentiality of remote access sessions.
In this episode, we celebrate or 40th episode and the vital role that Microsoft Intune and conditional access play in the security process.