Agenda
- Welcome Reception | May 5
- Day One | May 6
- Day Two | May 7
Welcome Reception: May 5
-
17:00 - 19:00 PM
CS2 Welcome Reception – Sponsored by AvePoint & Summit 7
Kick off CS2 with an evening of networking, great food, and drinks at the CS2 Welcome Reception, sponsored by AvePoint and Summit 7. Mingle with fellow attendees, get a head start on conversations, and take advantage of early check-in to pick up your badge and avoid the registration lines on May 6. Don’t miss this opportunity to connect before the main event!
Day One: May 6
-
08:00 - 09:00AM Check-In Open
Networking Breakfast
-
09:00 - 10:00AM Main Session One
Can I Pet that DOGE? Making the CMMC Assessment Guide More Efficient
The verification procedures in NIST Special Publication 800-171A are a double-edged sword. On one hand they tell you exactly what questions will be asked during your assessment. On the other hand they are repetitive, redundant, and difficult to read. Unfortunately, the CMMC program is directly "aligned" to NIST standards so the Department of Defense has little room to edit the contents of SP 800-171 and SP 800-171A. There is a way forward. This presentation will showcase a method for reformatting the contents of the CMMC assessment guide to make it shorter, more understandable, and much easier to use - all without changing the substance of the NIST requirements at all. The government may never adopt this approach, but you'll get access to the proof of concept formatting for your own use on your CMMC journey.Read More-
Jacob Horne
Chief Cybersecurity Evangelist, Summit 7
-
-
10:15 - 11:15AM Main Session Two
TBA
-
11:30 - 12:30PM Main Session Three
CUI Hotline LIVE - Unfiltered. Unscripted.
Every Friday, the CUI Hotline goes live to answer the toughest questions about CMMC, DFARS, NIST, and CUI—the acronyms everyone loves to hate. This time, instead of answering questions from behind a screen, we are bringing the conversation to CS2 for a live, in-person session. No scripts, no canned responses—just real discussions about the compliance and security challenges facing the Defense Industrial Base. Whether you're dealing with regulations, struggling with implementation, or just looking for clarity, this is your chance to ask questions and get straight answers from industry experts. Bring your questions and join the conversation—the CUI Hotline is live at CS2.Read More-
Jacob Horne
Chief Cybersecurity Evangelist, Summit 7 -
Ryan Bonner
CEO, DEFCERT
-
Daniel Akridge
Director of Engagement, Summit 7
-
Scott Edwards
CEO, Summit 7
-
-
12:30PM
Networking and Lunch
-
14:00 - 15:00PM Executive Breakout One
Staying Competitive: What Prime Contractors Expect from Their Supply Chain
As the defense industry transforms under CMMC, large prime contractors are setting the pace for early adoption and supply chain security. Their decisions on Controlled Unclassified Information (CUI) flow, certification timelines, and subcontractor expectations will define the path forward for thousands of suppliers. In this panel, key leaders from aerospace, defense, and critical infrastructure sectors share their perspectives on the compliance landscape, the real-world challenges of securing the supply chain, and what they expect from subcontractors moving forward. Whether you're a small business or a mid-tier supplier, understanding how primes are approaching CMMC is crucial to staying competitive in the defense ecosystem.Read More-
Scott Edwards
CEO, Summit 7
-
Matthew Ramsey
CIO, BlueHalo
-
John Kronick
Chief Information Security Officer, Tutor Perini
-
Matt Reynolds
Chief Information Officer, The Marvin Group
-
-
14:00 - 15:00PM Technical Breakout One
Pentest Diaries: The Most Common Configuration Baseline Mistakes That Are Exposing the DIB
The penetration testing team at PKF O’Connor Davies has years of experience conducting offensive security operations in cooperation with the defense industrial base. During these tests, we find ourselves abusing the same security weaknesses across over and over again, many of which stem from weak security configurations rather than vulnerable software. During this talk, PKFOD’s red team lead will outline the top 5 configuration weaknesses that are putting your organization at risk. We will be diving deep into a subset of NIST SP 800-171 configuration management security controls to outline ways the defense industrial base can prevent the most common hacker tactics, techniques, and procedures, while also demonstrating compliance with NIST and CMMC requirements.Read More-
Scott Goodwin
Principal – Cybersecurity & Privacy Advisor, PKF O’Conner Davies Advisory, LLC
-
-
15:15 - 16:15PM Executive Breakout Two
CMMC Enclaves by Industry
Creating a CMMC enclave is a proven strategy for achieving compliance while minimizing disruption to an organization’s broader IT environment. However, the best approach to designing and managing an enclave depends heavily on the industry. A solution that works seamlessly for a manufacturing company may pose significant challenges for a university conducting regulated research or an AEC firm handling controlled design data. With varying needs in security, accessibility, and cost, how can organizations determine the right approach?Read More
This session will explore the unique enclave considerations for manufacturing, regulated research (higher education), and architectural, engineering, and construction (AEC) industries. We’ll discuss the pros and cons of different deployment models, share lessons learned from real-world implementations, and provide actionable insights to help organizations make informed decisions about their compliance strategy.-
Daniel Akridge
Director of Engagement, Summit 7
-
-
15:15 - 16:15PM Technical Breakout Two
How to Eliminate CUI From Your Supply Chain
CMMC creates certification requirements that flow down to your suppliers. But many subcontractors are nowhere close to achieving a CMMC Level 2 certification. How can defense contractors continue to perform in a reality where critical suppliers won't be certified in time to receive future awards? We'll discuss a multidisciplinary approach that will reduce or eliminate Controlled Unclassified Information (CUI) from supplier relationships, reclaim indirect costs, and preserve supply chains during this period of consolidation in the defense industrial base.Read More-
Ryan Bonner
CEO, DEFCERT
-
-
16:30 - 17:30 Technical Breakout Two
CS2 Happy Hour - Sponsored by Carahsoft
Wrap up Day 1 of CS2 with a drink and networking at the CS2 Happy Hour, sponsored by Carahsoft. Join us to connect with sponsors, engage with fellow attendees, and unwind after a day of insightful sessions. This is the perfect opportunity to continue discussions, build relationships, and gear up for Day 2!Read More
Day Two: May 7
-
08:00 - 09:00AM Check-In Open
Networking Breakfast
-
09:00 - 10:00AM Main Session One
TBA
-
10:15 - 11:15AM Main Session Two
I've Got a GAP in my CAP
If you were privy to the original version 1.0 of the “draft” CMMC Assessment Process (CAP) document, then you likely agree that version 2.0 released by the Cyber AB in December 2024 is a huge improvement. After all, the CAP is the authoritative document followed by all C3PAOs in conducting a CMMC Assessment for OSAs, and success (or failure) can be found in the detailed guidance.Read More
There’s a few areas that were left open to interpretation, however … and those gaps in guidance have been tricky for the C3PAO assessors to navigate. In this session, we will sit down with three of the leading C3PAO firms to talk through how they have been addressing things like:
• Assessing ESPs (External Service Providers) who by and large do not process, store or transmit CUI, but provide the capability to do so on behalf of their customers
• What a “lower burden of proof” looks like when reviewing evidence from an OSA who is using a CMMC L2 Assessment Certified ESP for some portion of their control implementation
• What type of Not Met control implementation would be considered unacceptable for the OSA to fix the 10-day window following the active assessment period, if any?
• How difficult is the review of FedRAMP Moderate Equivalent evidence packages?
Are all C3PAOs doing the same thing? Is there a common understanding and expectation, or is each assessment team doing it their own way? Let’s find out in this lively and informative discussion between our panel of experts.-
Joy Beland
VP of Cybersecurity Compliance, Summit 7
-
Fernando Machado
Managing Principal and Chief Information Security Officer, Cybersec Investments
-
Matt Bruggeman
Director of Federal Sales, A-LIGN
-
Logan Therrien
Operations Manager, Kieri Solutions
-
-
11:30 - 12:30PM Main Session Three
Certified: Real Stories from Defense Contractors Who Achieved Compliance
Defense contractors across the industry are working toward CMMC compliance to secure their place in the Defense Industrial Base. But passing an assessment isn’t always straightforward. Organizations face challenges in understanding requirements, implementing the right security measures, and navigating the assessment process. With impending DoD requirements and urgent expectations from prime contractors, how can businesses ensure they are on the right track?Read More
Hear directly from defense contractors who have successfully met compliance standards, passed assessments, and strengthened their cybersecurity posture. Panelists will share their real-world experiences, key challenges, and lessons learned to help others on the same journey. This discussion will offer a candid look at what worked, what didn’t, and what companies wish they had known before starting the process. Attendees will gain practical takeaways to apply in their own compliance efforts.-
Jana Abbott
Director of Sales, Summit 7
-
Inna Robinson
Cybersecurity Operations Manager, HDR
-
Andrew Geppert
Cybersecurity Compliance Manager, HDR
-
Craig Hartburg
Managing Directory, Cayuse Government Operations, LLC
-
-
12:30PM
Networking and Lunch
-
14:00 - 15:00PM Executive Breakout One
Evolving ESPs: Like Buccee’s but for CMMC
To meet the growing demands of defense contractors facing CMMC, External Service Providers (ESPs) have transformed significantly. As clients become more aware of CMMC requirements, their needs have grown, prompting ESPs to evolve their service offerings to eliminate deficiencies. Each phase of this transformation represents a shift in compliance roles and responsibilities, increasing the shared responsibility in achieving and maintaining certification. This presentation will explore Summit 7's evolution in supporting clients from contract to compliance and what's next in our journey.Read More-
Jason Sproesser
Director of Product Management, Compliance Services, Summit 7
-
-
14:00 - 15:00PM Technical Breakout One
Unveiling Azure Government Secret – A Secure Cloud Solution for Classified Workloads
The DIB is under increasing pressure to modernize IT infrastructure while maintaining the highest levels of security and compliance for classified workloads. Traditional on-premises solutions and SCIF-based data storage come with high costs, scalability challenges, and complex maintenance requirements. At the same time, shifting classified workloads to the cloud raises questions about security, compliance, and seamless access while meeting DoD Impact Level 6 (IL6) standards.Read More
This session will break down Azure Government Secret, Microsoft’s secure cloud platform built to handle classified workloads at IL6. The discussion will cover what Azure Government Secret is, how organizations can gain access, key integration considerations, available services, and real-world applications. Deployment timelines and best practices will also be explored, providing a clear picture of how defense contractors and government partners can take advantage of this secure cloud environment while staying ahead of evolving cybersecurity requirements.-
Richard Wakeman
Chief Architect, Microsoft
-
Shane Shipley
Director of Cleared Cloud, Summit 7
-
-
15:15 - 16:15PM Executive Breakout Two
TBA
-
15:15 - 16:15PM Technical Breakout Two
TBA