Apply to facilitate these roundtables. Each roundtable will meet in a group of 10, and the groups will switch tables at the end of the session. The facilitator will then welcome a new group to the topic. Details in the application.
Export control meets CUI: practical pitfalls and fixes
Trade insights on how export-controlled data becomes CUI—and what that shift means for your contracts, audits, and clients.
CUI, DLP, routing & domains, FedRAMP "first hop," GCC High vs. enclaves, threat intel
Contractors and service providers trade real-world tactics to lock down email, protect CUI, and satisfy assessors—without vendor spin.
Surface shadow IT, align processes, and avoid assessment surprises
IT often gets drafted to "do CMMC," but the answers live across the business. This roundtable swaps the soft skills and exact questions to ask ops, engineering, HR, finance, and suppliers so you can map scope, surface shadow IT, and document what must change—before an assessment does it for you.
Cost-effective compliance for small manufacturers
Small manufacturers swap practical ways to meet CMMC without breaking the shop: clear scope, right-sized controls, and implementation that fits real production schedules.
What's proper, how to push back, what to request
Swap real experiences and language that works when primes mark everything "CUI." We'll clarify what proper markings look like and how OSCs can request fixes—professionally and on the record.
Inheritance Understood
Contractors and service providers compare how they document shared control ownership so assessments are clear, defensible, and true to the architecture.
Real-time telemetry, alerts, audit-ready proof
Contractors and service providers trade ways to turn system data into continuous, assessor-ready evidence—without screenshot drudgery.
Making CUI Encryption Work
Compare practical ways to meet 3.13.11 with FIPS-validated encryption while still getting CUI to federal recipients and subs—without weakening controls.
What to Expect at Each Step
Prep for a CAP-aligned CMMC audit—from first contact to closeout—so there are no surprises on assessment days.
Policy→practice: baselines, hardening, vuln mgmt, supply-chain controls
Contractors and service providers trade playbooks for using CMMC to prevent incidents—not just pass audits.
Policy to Practice: Aligned by Design
Trade practical ways to turn policy into engineered, testable security—using Systems Security Engineering (CMMC 3.13.2) so controls are designed-in, not bolted on.
Identity-first access, micro-segmentation, continuous validation
Contractors and service providers trade practical Zero Trust patterns that reduce blast radius and produce assessor-ready evidence.
Beyond check-the-box: behavior change that lasts
Swap proven tactics to make security training actually change behavior—not just satisfy assessors.
Migration planning, cost control, and vendor lock-in avoidance
Contractors compare real-world GCC High migrations: what works, what costs more than expected, and how to avoid vendor lock-in.
Flow-downs, risk assessment, and supplier management
Prime contractors share how they manage OSC compliance across their supply chain: effective flow-downs, risk assessment, and ongoing monitoring.
Beyond badge readers: practical controls that pass assessment
Contractors share what physical security controls actually work for CMMC—and what assessors really look for during site visits.
Strategic deficiency management and remediation planning
Trade proven approaches to POA&M development that satisfy assessors and actually drive security improvements.
Assessment ecosystem: roles, relationships, and expectations
Understanding the CMMC assessment ecosystem: how DIBCAC, C3PAOs, and OSCs work together effectively.
Managing AI tools, data exposure, and emerging risks
Contractors share approaches to managing AI tool proliferation while protecting CUI and maintaining CMMC compliance.
Flow-down identification, compliance mapping, and risk management
Legal and compliance professionals share contract review processes that identify cybersecurity obligations and map them to implementation requirements.
Separating FCI and CUI workflows for cost control and compliance
Contractors share strategies for cleanly separating Level 1 and Level 2 environments to control costs while maintaining compliance.
Hours of Roundtables
Unique Topics
People Per Table
Total Participants
At CEIC West 2025 in Las Vegas, we observed something powerful: the most valued sessions weren't the keynotes or panels—they were the organic conversations happening between sessions.
Our surveys confirmed it. The most popular sessions had one thing in common: interaction. Real professionals solving real problems together.
"The best part of the conference was meeting others facing the same challenges and hearing how they solved them."
So we're reinventing the conference experience with the Roundtable Revolution—42 focused discussions, expert facilitators, and the connections you've been looking for.
Three hours. Three sessions. Unlimited potential.
1
Reserve Your
Spots
Browse 21 topics online. Reserve your seat at three different tables. Each limited to 10 participants.
2
Join Your
First Circle
Expert facilitators guide focused 60-minute discussions. Share challenges, exchange solutions, build connections.
3
Network &
Rotate
Between sessions, continue conversations over refreshments. Then move to your next chosen topic.
4
Multiply Your Impact
By day's end, you've engaged with 30 peers and 3 experts on topics that matter most to your business.
Picture 21 tables buzzing with focused conversations.
We're seeking to learn what the challenges are, and desire expert facilitators to lead these transformative discussions. CCPs and CCAs receive priority consideration, but all industry experts with validated experience are welcome to suggest a topic and apply.
As a facilitator, you'll:
Share your challenge(s), submit a Roundtable topic, and become a facilitator today.
Reserve your spots at the tables that matter most to your business. Limited to 10 participants per topic.