Defense Leaders Urge Compliance With Final CMMC Cybersecurity Rule
Pentagon leaders say businesses should start complying with current standards to avoid costly changes later.

Defense leaders urge contractors to prioritize compliance with the department’s upcoming Cybersecurity Maturity Model Certification (CMMC) 2.0 rule set to publish next week.
“Don’t sit on the sidelines. There are things that you can do today that are no cost or low cost [to ensure compliance],” said Farooq Mitha, director of the Defense Department Office of Small Business Programs, at the Professional Services Council’s Defense Conference in Arlington, Virginia, Tuesday. “The more you can prepare for what’s coming, the better it’ll be for your business.”
The department’s update to the CMMC program outlines security controls for all three CMMC security levels, establishes processes for monitoring compliance and defines roles ensuring cybersecurity for the federal government, contractors and third parties. The rule applies to all DOD contractors and subcontractors that process, store or transmit federal contract information (FCI) or controlled unclassified information (CUI) on contractor information systems.
Mitha noted that contractors of all sizes can take steps to implement self assessments now.
“We want all our suppliers — small, medium, large — to be compliant with the current standards,” said Mitha. “It’s already required just that they’re able to solve the test [of self-assessments required by CMMC]. We’re hoping that companies are compliant, and they are doing more to move toward compliance once [CMMC 2.0] rolls out. It gives a competitive advantage to the small business to make investments early.”
Pentagon Senior Information Security Officer David McKeown added that DOD is examining how to include previously assessed businesses in compliance with CMMC when 2.0 is finalized.
“If you did get one of those early assessments [prior to the rule’s release], we’re looking at ways that we can potentially grandfather either part of that certification that you went through … or grandfather in to where it’s a full three-year accreditation,” he said at the conference.
McKeown and Mitha spoke to some of the concerns in the contracting community that CMMC compliance would be too expensive.
The DOD Office of Small Business Programs provides resources to small contractors to help them achieve compliance, Mitha said, because small businesses are often most vulnerable to cyber attacks.
“In my office, we launched a platform several years ago called Project Spectrum,” said Mitha. “I think there is a [bipartisan] consensus in industry, government … that our small businesses are the most vulnerable part of our industrial base, prime contractors and subcontractors.”
McKeown noted that compliance is necessary for the DIB to strengthen cybersecurity and cited recent breaches and intellectual property theft.
“When you look at the Chinese F-35, the Russian space shuttle and all the intellectual theft that has gone on,” said McKeown, “all of us have worked hard on [these projects] and spent taxpayer dollars to develop them. It’s a shame to see that go out the door so quickly and easily.”
This is a carousel with manually rotating slides. Use Next and Previous buttons to navigate or jump to a slide with the slide dots
-
Inside Oak Ridge National Lab’s Pioneer Approach to AI
Energy Department’s Oak Ridge National Lab transforms AI vulnerabilities into strategic opportunities for national defense.
22m listen -
AWS Summit: Innovation Accelerates IT Delivery at DOD
Marine Corps Community Services is tackling outdated IT processes with agile development and cutting-edge cloud security to deliver mission-critical capabilities faster.
12m watch -
AWS Summit: NIST Secures High-Performance Computing Against Evolving Threats
NIST’s Yang Guo reveals the broad attack surface of high-performance computing and explains developing guidance and future-proofing security strategies.
9m watch -
Trump Overhauls Federal Cybersecurity with New Executive Order
The new directive aims to strengthen digital defenses while rolling back "burdensome" software requirements and refocusing AI security.
3m read -
AWS Summit: Forging Successful Cloud Modernization Partnerships
Industry leaders share insights on the critical role industry partnerships have in enabling government agencies to navigate procurement challenges for cloud and zero trust solutions.
24m watch Partner Content -
CISA's CVE Program and Why it Matters for Zero Trust
The vulnerability program provides the cybersecurity community visibility into software as part of a key pillar of CISA's zero trust model.
5m read -
Air Force, Coast Guard Talk Data Security Efforts for AI Development
The services' AI initiatives include efforts like creating clean training data, countering data poisoning and bridging siloed teams.
4m read -
DHS Secretary Urges Congress to Reauthorize CISA 2015
Federal leaders highlight CISA 2015's role in strengthening public-private partnerships and defending against evolving cyber threats.
3m read -
Rep. Gerry Connolly Leaves Lasting Mark on Federal Tech
Connolly's leadership in Congress significantly advanced government IT, emphasizing accountability, efficiency and a robust cybersecurity posture.
4m read -
Agencies Use AI to Boost Efficiency, Cybersecurity Under White House Mandates
DLA and GAO are investigating how AI can boost efficiency and bolster cybersecurity as agencies align with the president's tech directives.
3m read -
DOD Cyber Strategy to Adapt to New Budgets, Tech Innovation
Budgetary pressures spur innovation as department tackles aging infrastructure and evolving threats, says top cyber official.
4m read -
Federal Agencies Tout Tech in President Trump’s First 100 Days
Defense modernization and health care restructuring landed among some of the key IT highlights within the president's first few months.
6m read