<?xml version="1.0" encoding="utf-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>SEI Blog | Cybersecurity Maturity Model Certification (CMMC)</title><link>http://sei.cmu.edu/feeds/tag/</link><description>Updates on changes and additions to the                         SEI Blog for posts matching Cybersecurity Maturity Model Certification (CMMC)</description><atom:link href="http://sei.cmu.edu/blog/feeds/tag/cybersecurity-maturity-model-certification-cmmc/atom/" rel="self"/><language>en-us</language><lastBuildDate>Wed, 03 Mar 2021 00:00:00 -0500</lastBuildDate><item><title>How to Use the CMMC Assessment Guides</title><link>https://www.sei.cmu.edu/blog/how-to-use-the-cmmc-assessment-guides/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>This blog post is intended for DoD contractors looking for additional clarification as they prepare for a CMMC assessment. It will walk you through the assessment guides, provide basic CMMC concepts and definitions, and introduce alternate descriptions of some practices.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Douglas Gardner</dc:creator><pubDate>Wed, 03 Mar 2021 00:00:00 -0500</pubDate><guid>https://www.sei.cmu.edu/blog/how-to-use-the-cmmc-assessment-guides/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Cybersecurity Maturity Model Certification (CMMC)</category></item><item><title>Follow the CUI: 4 Steps to Starting Your CMMC Assessment</title><link>https://www.sei.cmu.edu/blog/follow-the-cui-4-steps-to-starting-your-cmmc-assessment/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>One of the primary drivers of the DoD's Cybersecurity Maturity Model Certification (CMMC) is the congressional mandate to reduce the risk of accidental disclosure of controlled unclassified information (CUI).</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Matthew Trevors</dc:creator><pubDate>Mon, 24 Aug 2020 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/follow-the-cui-4-steps-to-starting-your-cmmc-assessment/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Cybersecurity Maturity Model Certification (CMMC)</category></item><item><title>Beyond NIST SP 800-171: 20 Additional Practices in CMMC</title><link>https://www.sei.cmu.edu/blog/beyond-nist-sp-800-171-20-additional-practices-cmmc/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>These 20 practices are intended to make DoD contractors more security conscious.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Andrew Hoover, Katie Stewart</dc:creator><pubDate>Mon, 22 Jun 2020 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/beyond-nist-sp-800-171-20-additional-practices-cmmc/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Cybersecurity Maturity Model Certification (CMMC)</category></item><item><title>Cybersecurity Maturity Model Certification (CMMC) Part 2: Process Maturity's Role in Cybersecurity</title><link>https://www.sei.cmu.edu/blog/cybersecurity-maturity-model-certification-cmmc-part-2-process-maturitys-role-in-cybersecurity/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>Mature cybersecurity processes will improve an organization's ability to prevent and respond to a cyberattack</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Andrew Hoover, Katie Stewart</dc:creator><pubDate>Mon, 01 Jun 2020 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/cybersecurity-maturity-model-certification-cmmc-part-2-process-maturitys-role-in-cybersecurity/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Cybersecurity Maturity Model Certification (CMMC)</category></item><item><title>The Latest Work from the SEI: DevSecOps, Artificial Intelligence, and Cybersecurity Maturity Model Certification</title><link>https://www.sei.cmu.edu/blog/the-latest-work-from-the-sei-devsecops-artificial-intelligence-and-cybersecurity-maturity-model-certification/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>As part of an ongoing effort to keep you informed about our latest work, this blog post summarizes some recently published SEI reports, podcasts, conference papers, and webcasts highlighting our work....</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Douglas Schmidt</dc:creator><pubDate>Mon, 25 May 2020 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/the-latest-work-from-the-sei-devsecops-artificial-intelligence-and-cybersecurity-maturity-model-certification/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Cybersecurity Maturity Model Certification (CMMC)</category></item><item><title>An Introduction to the Cybersecurity Maturity Model Certification (CMMC)</title><link>https://www.sei.cmu.edu/blog/an-introduction-to-the-cybersecurity-maturity-model-certification-cmmc/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>A cyber attack within the DIB supply chain could result in devastating losses of intellectual property and controlled unclassified information.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Katie Stewart, Andrew Hoover</dc:creator><pubDate>Mon, 30 Mar 2020 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/an-introduction-to-the-cybersecurity-maturity-model-certification-cmmc/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Cybersecurity Maturity Model Certification (CMMC)</category></item></channel></rss>