Watch The Webinar Recording: CMMC – The Final Rule

CMMC - The Final Rule Webinar Recording

Our recent webinar on the Cybersecurity Maturity Model Certification (CMMC) is now available to watch on demand. Whether you’re working with the U.S. Department of Defense (DoD) or planning to pursue defense contracts, understanding CMMC compliance is crucial to protecting your business and meeting regulatory requirements.

What You’ll Learn:

  • Why CMMC compliance is critical for defense-related businesses
  • Key steps for achieving certification, including timelines and costs
  • Strategies to manage compliance risks and reduce expenses

Additional Resources:

  • Gain the knowledge you need to navigate CMMC compliance requirements and strengthen your cybersecurity posture.
  • Explore more cybersecurity insights and resources on the Convergence Networks website.

Please Fill The Form to Watch the Recording

Meet The Expert

John Stephens

John Stephens

CISSP, CRISC, CISA, CEH, Pentest+, Security+, ITIL Foundation

Chief Information Security Officer at Convergence Networks

John has over 20 years of experience providing IT and security services across a broad range of industries, including government, not-for-profit, health care clients, professional services, hospitality, manufacturing and retail. His areas of specialty include compliance, IT security assessments, penetration testing, and strategic security consulting and security programs development. 

At Convergence Networks, John is responsible for the overall security posture and program for the organization, and he provides security input into our customer solutions.

John began his career implementing security and remote access solutions for small to medium size businesses in Michigan before moving to the Pacific Northwest where he joined a local Managed Services Provider, providing IT services to clients across a broad range of industries, supporting over 100 local area businesses and nearly 6,000 managed nodes. As a result, he has extensive experience and skill in designing and implementing secure solutions within all kinds of businesses, with all kinds of budgets, requirements, and regulatory environments including HIPAA, PCI, CMMC/DFARS, NIST Cybersecurity Framework, and others.

This breadth of his experience has provided him a keen understanding of how best to direct and implement security in a manner that optimizes its impact while minimizing its overhead.

Contact Us

Get Started

Blog

Latest News

Contact Our CLIENT
Support Team
Get connected With
Remote Access

To connect, please enter the 6-digit code given to you by your Network Administrator: