Join visionary thought leaders and industry experts in the Cybersecurity Maturity Model Certification (CMMC) field. Share your insights, innovative approaches, and valuable knowledge at the premier cybersecurity event of 2025.
Explore our carefully curated sessions
The general sessions (Thursday morning) and the Mock Assessment (Friday afternoon) are selected outside of the Community Speaker Application process.
Apply to speak at these sessions.
Scoping shouldn't feel like spelunking through server racks. This fast-paced, plain-English session demystifies the single most misunderstood step in CMMC and other cybersecurity frameworks: figuring out exactly what's in scope, what's out, and why it matters to your bottom line.
Why attend?
Subtitle: Maximizing Each Hour Spent & Each Dollar Burned
When every week on the calendar and line on the budget matters, how do you move from CMMC planning to a fully compliant organization without draining resources? This session answers that question with a battle-tested playbook for squeezing maximum value out of every task, meeting, and dollar along your CMMC journey.
What we'll cover
Whether you're a program manager hunting for efficiencies, a finance lead guarding cash flow, or a CISO orchestrating both, you'll leave with a clear roadmap to deliver compliance on schedule—and on budget—while positioning your organization for future growth.
Subtitle: The Two-Way Pain of Flowdown
With Title 48 expected to be finalized by October 2025, keeping suppliers and subcontractors aligned with CMMC and DFARS 252.204-7020/7021 will be a contractual must for every prime contractor. In this panel discussion, supply-chain leads from major defense primes and veteran CMMC advisors outline what large contractors are already asking for and what lower-tier companies must be ready to deliver as final rules take effect.
Discussion highlights
Attendees will gain a clear view of the prime-contract expectations coming with Title 48, the most common pitfalls seen in 2025 audits, and practical steps to keep their supplier chain—and their revenue stream—secure, compliant, and ready for the next contract cycle.
Subtitle: Untangling the Truth Behind External Service Provider Promises
External Service Providers (ESPs) can accelerate a CMMC program, but they don't erase your accountability—or an assessor's scrutiny. In this frank panel, a veteran CMMC assessor, an ESP executive, a contracts attorney, and a defense-industry OSC unpack the promises, limits, and documentation every organization must nail down before handing off critical controls.
What the panel will cover
You'll leave with a concise checklist for vetting ESPs, verifying CRMs, and keeping provider support aligned with your obligations—so your organization stays compliant, contract-ready, and firmly in control.
Subtitle: The Culture Shift Behind CMMC
CMMC audits live and die on written evidence. Controls may be rock-solid in practice, but if policies, procedures, and activity logs aren't captured and organized, assessors must score them Not Met. This session shows how successful primes and resource-strapped SMBs have transformed "paperwork" into a routine operational output—eliminating last-minute scrambles and costly rework.
Session highlights
Leave with a clear picture of how "write it down, organize it, prove it" becomes second nature—securing certifications, protecting schedules, and freeing your team to focus on real security work.
Subtitle: Do's, Don'ts and Imagination. (and a few other leading edge technologies)
Large-language models can draft policies, summarize logs, and spot data anomalies in seconds—but they'll also invent citations, skip edge-cases, and present an 80 percent answer with 100 percent confidence. CMMC assessors will grade you on the missing 20. This session shows how forward-leaning defense contractors are harnessing artificial intelligence without surrendering accuracy, accountability, or budget.
In 50 minutes we'll cover
Expect candid do's, don'ts, and imaginative next steps—from choosing AI copilots that log every prompt to setting up review queues that turn risky suggestions into assessor-ready artifacts. Leave with a blueprint for faster audits and fewer findings, built on technology you trust and evidence you can prove.
You manage firewalls, patch fleets, and monitor SIEMs for defense contractors—yet an assessor can still hand your client a Not Met and send everyone back to square one. Why? Because CMMC success hinges as much on how you frame the work as on the work itself. This session flips the script to focus on the missteps service providers most often make when guiding organizations seeking certification (OSCs).
If you're an MSP, MSSP, RPO, or any external team supporting the defense industrial base, this session will sharpen your strategy, tighten your evidence trail, and position both you and your clients for first-pass success.
Dashboards that "auto-map" controls, AI engines that "close" POA&Ms, one-click platforms that "solve CMMC." The market is overflowing with products that promise effortless compliance—yet a poor choice can drain budgets, distort scope, and leave gaps an assessor will spot in minutes. This session equips service providers and OSCs with a vendor-agnostic checklist for separating genuine enablers from costly distractions.
Leave with a practical evaluation matrix and the confidence to ask tough questions—so every tool you adopt accelerates compliance and generates management insight instead of becoming your next expensive trap.
The False Claims Act (FCA) empowers whistleblowers to sue on the government's behalf when they believe a contractor is committing fraud—recovering billions for taxpayers every year. Amid persistent confusion over CMMC, CUI handling, and cybersecurity in general, FCA filings have climbed steadily, and the DOJ's Civil Cyber-Fraud Initiative is accelerating that trend. With Title 48, new DFARS clauses, and a forthcoming FAR CUI rule set to make third-party certification the norm by October 2025, legal exposure for both primes and service providers is poised to spike.
This legal-centric briefing—delivered by government-contract attorneys, former DOJ cyber-fraud prosecutors, and veteran C3PAO assessors—breaks down the latest enforcement data, average settlement figures, and hard-won lessons every contractor and managed service provider needs before their next audit.
Title 48, DFARS 7020/7021, and the coming FAR CUI rule have thrust service providers onto the front line of CMMC compliance. This session gives providers the playbook to stay profitable while meeting assessor and legal scrutiny.
Hear candid insights from competing MSP leaders, a CMMC assessor, and a contracts attorney—so you can refine offerings, draft stronger CRMs, and navigate the compliance minefield with confidence.
Subtitle: AND... the case for contractors to have their own CCP
The CMMC Certified Professional (CCP) badge is marketed as the on-ramp to assessment teams and consulting roles—yet many new holders discover that real-world credibility demands far more than exam scores. This session dissects the gap between certification and practice, then shows how to turn the CCP into tangible career leverage.
Hear candid insights from CCP holders, OSC security leads, and C3PAO hiring managers who have navigated the reality check—so you can transform a certificate into a thriving career, not a paper credential.
With CMMC live since December 16 2024—and the complementary 48 CFR acquisition rule slated for release this fall—defense contractors now juggle CMMC alongside ISO 27001, NIST CSF, HIPAA, PCI-DSS, and more. Maintaining separate policies and evidence sets for each mandate wastes time and money. The Secure Controls Framework (SCF) fixes that by unifying requirements into a single, outcome-focused control library.
Whether you're an OSC chasing CMMC certification or a service provider supporting multiple frameworks, you'll learn how to deploy SCF to synchronize controls, reduce effort, and future-proof your compliance program.
Apply to facilitate these roundtables. Each roundtable will meet in a group of 10, and the groups will switch tables at the end of the session. The facilitator will then welcome a new group to the topic. Details in the application.
Export control meets CUI: practical pitfalls and fixes
Trade insights on how export-controlled data becomes CUI—and what that shift means for your contracts, audits, and clients.
CUI, DLP, routing & domains, FedRAMP "first hop," GCC High vs. enclaves, threat intel
Contractors and service providers trade real-world tactics to lock down email, protect CUI, and satisfy assessors—without vendor spin.
Surface shadow IT, align processes, and avoid assessment surprises
IT often gets drafted to "do CMMC," but the answers live across the business. This roundtable swaps the soft skills and exact questions to ask ops, engineering, HR, finance, and suppliers so you can map scope, surface shadow IT, and document what must change—before an assessment does it for you.
Cost-effective compliance for small manufacturers
Small manufacturers swap practical ways to meet CMMC without breaking the shop: clear scope, right-sized controls, and implementation that fits real production schedules.
What's proper, how to push back, what to request
Swap real experiences and language that works when primes mark everything "CUI." We'll clarify what proper markings look like and how OSCs can request fixes—professionally and on the record.
Inheritance Understood
Contractors and service providers compare how they document shared control ownership so assessments are clear, defensible, and true to the architecture.
Real-time telemetry, alerts, audit-ready proof
Contractors and service providers trade ways to turn system data into continuous, assessor-ready evidence—without screenshot drudgery.
Making CUI Encryption Work
Compare practical ways to meet 3.13.11 with FIPS-validated encryption while still getting CUI to federal recipients and subs—without weakening controls.
What to Expect at Each Step
Prep for a CAP-aligned CMMC audit—from first contact to closeout—so there are no surprises on assessment days.
Policy→practice: baselines, hardening, vuln mgmt, supply-chain controls
Contractors and service providers trade playbooks for using CMMC to prevent incidents—not just pass audits.
Policy to Practice: Aligned by Design
Trade practical ways to turn policy into engineered, testable security—using Systems Security Engineering (CMMC 3.13.2) so controls are designed-in, not bolted on.
Identity-first access, micro-segmentation, continuous validation
Contractors and service providers trade practical Zero Trust patterns that reduce blast radius and produce assessor-ready evidence.
Beyond check-the-box: behavior change that lasts
Swap proven tactics to make security training actually change behavior—not just satisfy assessors.
Migration planning, cost control, and vendor lock-in avoidance
Contractors compare real-world GCC High migrations: what works, what costs more than expected, and how to avoid vendor lock-in.
Flow-downs, risk assessment, and supplier management
Prime contractors share how they manage OSC compliance across their supply chain: effective flow-downs, risk assessment, and ongoing monitoring.
Beyond badge readers: practical controls that pass assessment
Contractors share what physical security controls actually work for CMMC—and what assessors really look for during site visits.
Strategic deficiency management and remediation planning
Trade proven approaches to POA&M development that satisfy assessors and actually drive security improvements.
Assessment ecosystem: roles, relationships, and expectations
Understanding the CMMC assessment ecosystem: how DIBCAC, C3PAOs, and OSCs work together effectively.
Managing AI tools, data exposure, and emerging risks
Contractors share approaches to managing AI tool proliferation while protecting CUI and maintaining CMMC compliance.
Flow-down identification, compliance mapping, and risk management
Legal and compliance professionals share contract review processes that identify cybersecurity obligations and map them to implementation requirements.
Separating FCI and CUI workflows for cost control and compliance
Contractors share strategies for cleanly separating Level 1 and Level 2 environments to control costs while maintaining compliance.
Position yourself and your organization as a trusted voice in the evolving CMMC compliance landscape.
Present to an audience of cybersecurity, compliance, and defense industry professionals eager to learn.
Be featured on the official conference agenda, website, and promotional materials reaching thousands.
Connect with peers, decision-makers, and potential partners from across the CMMC and DIB community.
Contribute to critical conversations that will shape the future of cybersecurity compliance.
Selected speakers receive an exclusive discounted ticket to attend CS5 East for just $299.
Get exclusive facilitator pricing - attend CS5 East for only $299
Create consultative relationships with potential clients at your table in a focused, small-group setting
Connect with up to 27 potential buyers as groups rotate through your session. All roundtable visitors sign in and facilitators receive a copy of the attendee list.
Build meaningful connections with peers across the DIB community
Contribute to critical conversations that shape the future of cybersecurity compliance
Position yourself as a subject matter expert by leading focused discussions on key topics
Thursday
Aug. 21st
Friday
Aug. 29th
TBD
October 16–17, 2025
Washington D.C.
Joy Beland | CMMC Lead CCA & PI, CISM, QTE
VP Cybersecurity Compliance, Summit 7
Joy Beland serves as the Vice President of Cybersecurity Compliance for Summit 7, as well as Vice President and Board Member of MSPs for the Protection of Critical Infrastructure and Board Member for MSPCyberX. Her involvement in the CMMC community includes working with Provisional Instructors as a 1099 PI for Edwards Performance Solutions after having stood up their CMMC training program, as well as actively participating as a 1099 CCA Lead Assessor with multiple C3PAOs.
Amy Williams, PhD, CISSP, CMMC- CCA, PA, PI
Vice President, CMMC, COALFIRE FEDERAL
Amy Williams, PhD, CISSP, CMMC-PA, PI, is Vice President of CMMC for Coalfire Federal and Advisory Board Member for the CyberGuild. Prior to joining Coalfire Federal, she built and managed NIST 800-171, CMMC and CIS advisory practices for two former employers. Amy is recognized as an innovative leader of cybersecurity and IT teams.
Koren Wise
CEO and Lead Assessor, Wise Technical Innovations
Koren is a Certified CMMC Lead Assessor and Instructor, as well as the CEO of Wise Technical Innovations, an Authorized Training Provider for the CCP and CCA program under the CAICO. Koren is a dedicated educator and expert in network and systems engineering, with a Master’s degree in education. She is passionate about empowering the Defense Industrial Base (DIB), Managed Service Providers (MSPs), and aspiring assessors by sharing her deep knowledge and innovative solutions. Koren’s contributions include developing the MVP Enclave and the 800-171 Compliance Program, along with conducting Joint Surveillance Voluntary Assessments (JSVAs). Her work bridges technical expertise and educational leadership to support cybersecurity and compliance excellence across the ecosystem.
Jarrod Peterson
Sr Manager of Cyber Risk, General Dynamics Mission Systems
Jarrod Peterson is a seasoned Cyber Risk professional with over 20 years of experience, currently serving as the Senior Manager of Enterprise Risk and Compliance at General Dynamics Mission Systems. Throughout his distinguished career, Jarrod has cultivated a deep expertise in cybersecurity threats, risk management, and strategic leadership.
His comprehensive knowledge of the cyber landscape and unwavering commitment to excellence have played a pivotal role in protecting the company’s critical assets, strengthening its security posture, and navigating complex risk challenges. Jarrod is known for implementing robust security frameworks and fostering a culture of accountability and security awareness across the organization.
Driven by a mission-first mindset, he continues to lead with integrity, ensuring resilient cyber defenses in support of both business continuity and national security.
Langston Keith
M365 GCC-H Administrator, J&J Worldwide Services|CBRE
Langston Keith is a seasoned cybersecurity professional and compliance strategist, currently serving as the GCC-High Administrator at CBRE Goverment & Defense Services. With over a decade of experience in IT, Langston has played a pivotal role in driving secure digital transformation, spearheading audit-readiness efforts, and contributing to regulatory excellence.
Most notably, he helped guide his organization to a perfect 110/110 CMMC Level 2 score, a rare achievement that underscores his commitment to operational excellence and cyber resilience. Langston recently served as a panelist at CS2 Reston, sharing real-world lessons from the frontlines of CMMC compliance.