Inside the United States v. Georgia Tech Case: A Deep Dive into the DOJ's Cybersecurity Allegations
Release Date: 08/23/2024
CMMC Proof
Join Derrich Phillips on the CMMC Proof Podcast as he sits down with Zach Walker, co-founder of ATX Defense. Discover how their revolutionary CMMC solution is helping small defense contractors avoid the CMMC expensive nightmare.
info_outlineCMMC Proof
In this engaging episode of the CMMC Proof Podcast, host Derrich Phillips sits down with Jeff Brown, Google US Public Sector Workspace Lead, to explore how Google Workspace is transforming CMMC compliance for defense contractors. Discover how Google Assured Controls and U.S.-based data centers empower organizations to meet CMMC Level 2 requirements with ease and confidence. What We Cover in This Episode: - Google Workspace for Defense: Tailored solutions for the defense industrial base (DIB) Whether you're a prime contractor, subcontractor, or IT lead, this conversation offers valuable...
info_outlineCMMC Proof
In this episode of the CMMC Proof Podcast, host Derrich Phillips sits down with Doug Landoll, CEO of Lantego and the author of the bestselling CMMC Assessment Handbook. Doug shares his journey into cybersecurity, offering a unique perspective on the importance of collaboration within the cybersecurity community. What you’ll learn in this episode: Doug’s experience as an author, focusing on CMMC and its impact on organizations. Insights into the CMMC assessment process, its challenges, and how it compares to frameworks like SOC 2 or ISO 27001. The future of CMMC compliance and why...
info_outlineCMMC Proof
Join Derrich Phillips, Lead Certified CMMC Assessor (CCA), as he interviews Tatiana Marin, Director, Information Security at Kruze Consulting. In this episode, Tatiana shares her unique journey into cybersecurity, her strategies for building a strong security culture, and valuable insights on navigating SOC 2 compliance. Key Topics Covered: Transitioning from operations management to cybersecurity leadership Practical tips for managing SOC 2 audits and selecting the right tools The importance of leadership support and fostering a security-first mindset Leveraging external partners to enhance...
info_outlineCMMC Proof
In this episode of the CMMC Proof Podcast, host Derrich Phillips interviews Melissa Burant, a supply chain project manager at Iowa State University CIRAS, to uncover the compliance challenges defense contractors face under the Cybersecurity Maturity Model Certification (CMMC). Melissa shares insights into bridging the gap between federal requirements and current compliance practices, emphasizing the importance of simplifying complex regulations and providing actionable steps for small and medium-sized manufacturers. She sheds light on the shortcomings of the current CMMC ecosystem, such...
info_outlineCMMC Proof
Join Emilyann Fogarty, CISO at NYSERNet, as she explores the unique cybersecurity challenges in higher education—from targeted attacks and compliance pressures to limited budgets. Emilyann shares her approach to building scalable security programs focused on risk management and aligned with institutional goals. Highlighting the importance of soft skills, effective communication, and relationship-building, she offers practical insights on asking the right questions and fostering trust within an organization. Ready to accelerate your own compliance journey? Start your 7-day trial of...
info_outlineCMMC Proof
In this episode of the CMMC Proof Podcast, host Derrich Phillips sits down with Tammie McClellan, Deputy CISO at the University of Central Florida (UCF). With over 31 years of experience at UCF, Tammie dives into the challenges of CMMC compliance in the higher education and research space. She shares valuable insights on the Knight Shield initiative, which aims to streamline the compliance process while protecting Controlled Unclassified Information (CUI). The conversation covers the evolving landscape of cybersecurity regulations, including NIST and the potential impact of future policies...
info_outlineCMMC Proof
In this insightful conversation, cybersecurity coach and instructor Kenneth Ellington provides and overview how SIEM and SOAR technology to meet CMMC requirements, specifically for small businesses. He shares practical advice on leveraging SIEM technology, emphasizing the importance of baseline understanding and tuning to avoid unexpected costs related to logging. Kenneth also offers tips on navigating license costs, data ingestion, and documentation to optimize cybersecurity efforts. Kenneth highlights the importance of hiring staff with honesty, integrity, and technical competence to manage...
info_outlineCMMC Proof
In this compelling episode, we explore the recent whistleblower lawsuit filed by the United States Department of Justice against Georgia Tech and Georgia Tech Research Corporation. This case, which alleges significant cybersecurity breaches, has sent shockwaves through the defense contracting and academic communities. Key Takeaways: Specific Contracts and Violations: We break down the particular contracts involved and the critical cybersecurity lapses, including failure to implement a System Security Plan (SSP) and the use of a false cybersecurity score. Egregious Violations: The case...
info_outlineCMMC Proof
Join us as Will Drake, Senior Security Analyst at Indiana University, dives into the intricate world of cybersecurity in academia. In this enlightening conversation, Will shares the successful strategies and challenges of the "Secure My Research" initiative, aimed at implementing cybersecurity best practices in research environments. What You'll Discover: Streamlined Solutions: Learn how Indiana University is providing end-to-end secure solutions to support researchers. Advocacy in Action: Explore how advocacy helps overcome barriers and secure research data, with practical examples from the...
info_outlineIn this compelling episode, we explore the recent whistleblower lawsuit filed by the United States Department of Justice against Georgia Tech and Georgia Tech Research Corporation. This case, which alleges significant cybersecurity breaches, has sent shockwaves through the defense contracting and academic communities.
Key Takeaways:
- Specific Contracts and Violations: We break down the particular contracts involved and the critical cybersecurity lapses, including failure to implement a System Security Plan (SSP) and the use of a false cybersecurity score.
- Egregious Violations: The case highlights the most serious violations—such as operating without anti-virus protection, submitting a fictitious SPRS score, and creating a false SSP based on a non-existent campus IT system.
- Intentional Misconduct: We delve into how Georgia Tech and GTRC knowingly violated federal cybersecurity requirements, particularly in handling Controlled Unclassified Information (CUI). Evidence and Documentation: Explore the evidence presented, including incriminating emails, text messages, and sworn testimonies that reveal a pattern of non-compliance and false claims.
- Impact on the Government: Learn about the damage done to the U.S. government, including millions of dollars paid for services that did not meet contractual obligations due to these cybersecurity failings.
- This episode is a must-watch for anyone involved in government contracting, cybersecurity, or compliance. We provide insights into how these violations were uncovered, the legal implications, and what this means for the future of cybersecurity in federally funded research. 🔔 Don’t forget to subscribe stay updated with our latest episodes on cybersecurity, legal developments, and more! Useful Links: DOJ Filing- https://www.justice.gov/opa/pr/united-states-files-suit-against-georgia-institute-technology-and-georgia-tech-research