Watch The Webinar Recording: CMMC – The Final Rule
CMMC - The Final Rule Webinar Recording
Our recent webinar on the Cybersecurity Maturity Model Certification (CMMC) is now available to watch on demand. Whether you’re working with the U.S. Department of Defense (DoD) or planning to pursue defense contracts, understanding CMMC compliance is crucial to protecting your business and meeting regulatory requirements.
What You’ll Learn:
- Why CMMC compliance is critical for defense-related businesses
- Key steps for achieving certification, including timelines and costs
- Strategies to manage compliance risks and reduce expenses
Additional Resources:
- Gain the knowledge you need to navigate CMMC compliance requirements and strengthen your cybersecurity posture.
Explore more cybersecurity insights and resources on the Convergence Networks website.
Please Fill The Form to Watch the Recording
Meet The Expert

John Stephens
CISSP, CRISC, CISA, CEH, Pentest+, Security+, ITIL Foundation
Chief Information Security Officer at Convergence Networks
John has over 20 years of experience providing IT and security services across a broad range of industries, including government, not-for-profit, health care clients, professional services, hospitality, manufacturing and retail. His areas of specialty include compliance, IT security assessments, penetration testing, and strategic security consulting and security programs development.
At Convergence Networks, John is responsible for the overall security posture and program for the organization, and he provides security input into our customer solutions.
John began his career implementing security and remote access solutions for small to medium size businesses in Michigan before moving to the Pacific Northwest where he joined a local Managed Services Provider, providing IT services to clients across a broad range of industries, supporting over 100 local area businesses and nearly 6,000 managed nodes. As a result, he has extensive experience and skill in designing and implementing secure solutions within all kinds of businesses, with all kinds of budgets, requirements, and regulatory environments including HIPAA, PCI, CMMC/DFARS, NIST Cybersecurity Framework, and others.
This breadth of his experience has provided him a keen understanding of how best to direct and implement security in a manner that optimizes its impact while minimizing its overhead.