Events
Blog
FAQs

- November 2024 -

Facebook  Linkedin  X

Welcome to the new Cyber Newsletter, a monthly publication from the Wisconsin Procurement Institute (WPI), Wisconsin's Apex Accelerator


If your organization needs assistance meeting Federal or Department of Defense cyber security requirements, contact Marc Violante, Director of Federal Market Strategies at marcv@wispro.org, or Matt Frost, Government Contract Specialist at mattf@wispro.org

NEWS & UPDATES

CMMC


CMMC took a major step forward with the publishing of the Title 32 Rule. While the CMMC program has not been fully implemented, current and prospective members of the DIB need to align their cybersecurity efforts with the upcoming requirements.


On October 15, 2024, the Cybersecurity Maturity Model Certification (CMMC) Program Final Rule was published in the Federal Register – see: https://www.federalregister.gov/documents/2024/10/15/2024-22905/cybersecurity-maturity-model-certification-cmmc-program


This rule published under Title 32 of the CFR will work in conjunction with the Title 48 rule which was published earlier this year.


The Title 32 Rule addresses and authorizes the CMMC program. According to the Federal Register, “This rule is effective December 16, 2024.” The Title 48 Rule addresses how CMMC will be implemented in Defense contracts in four Phases.


When the Title 48 Rule was published earlier this year on August 15, 2024, it was published as a proposed rule. The comment period closed on October 15, 2024 and comments are being reviewed. According to a DoD press release published on October 11, 2024, “The DoD's follow-on Defense Federal Acquisition Regulation Supplement (DFARS) rule change to contractually implement the CMMC Program will be published in early to mid-2025. Once that rule is effective, DoD will include CMMC requirements in solicitations and contracts. Contractors who process, store, or transmit FCI or CUI must achieve the appropriate level of CMMC as a condition of contract award.” (emphasis added)


Implementation of the requirements is not a trivial matter. Implementation takes time, effort and may involve costs. Some companies may have the required experience and expertise “in-house” others may need to identify appropriate talent that can most effectively assist with implementing a tailored program. Implementing CMMC requires a specific set of knowledge and skills. Companies should establish a company's credentials. One source of company information is the Cyber AB Marketplace – see: https://cyberab.org/Catalog


In implementing CMMC, companies should evaluate the types of information that they may handle. If they will only handle Federal Contract Information (FCI) then they will need to implement only those elements that apply to CMMC Level 1. See: FAR 52.204-21: 15 elements. However, if a company will likely handle Controlled Unclassified Information (CUI), it will need to determine if it will pursue the self-assessment path or external assessment path. This choice will make a difference. This choice will may also limit a company’s future opportunities.


Additionally, CMMC has flow-down requirements. Companies that use suppliers and/or subcontractors will need to ensure that each member of their supply chain is compliant with program requirements at least equal to their certification level or recruit new supply chain members.


Each company will need to evaluate its information system to determine how to best implement this critical program. Trying to take a cookie-cutter approach may work for some NIST elements but this approach cannot factor in important variables.


To assist companies with identifying resources, “the DoD CIO DIB Cybersecurity Program has compiled a list of current resources available at dibnet.dod.mil under DoD DIB Cybersecurity-as-a-Service (CSaaS) Services and Support.”


As always, companies that have questions about federal contracts, contracting and/or cybersecurity issues should reach out to the Wisconsin Procurement Institute.

Cybersecurity and the need for balance


This month’s newsletter centers around the idea of managing risk and identifying Risk. Read on!

Cybersecurity involves managing Risk. In fact, NIST requirement 3.11 is titled Risk Assessment and requires the company to periodically to assess the risk on a wide variety of topics.

Identifying various risks is just as important as finding an acceptable balance between risk and compliance. Sometimes being to warry may also have a negative impact.


Seattle Kraken Assistant Coach Jessica Campbell Initially Ignored Email About NHL Job Because 'She Thought It Was Spam'


Jessica Campbell made hockey history on Tuesday, Oct. 8, becoming the first woman to appear behind the bench as an NHL coach when she and the Seattle Kraken kicked off the season with a matchup against the St. Louis Blues.


But the history-making moment almost didn’t happen because Campbell, the 32-year-old assistant coach, told The Athletic she initially didn’t open an email from head coach Dan Bylsma because she "wondered if it was spam."


https://www.msn.com/en-us/sports/nhl/seattle-kraken-assistant-coach-jessica-campbell-initially-ignored-email-about-nhl-job-because-she-thought-it-was-spam/ar-AA1rYlxR


Do you or does your organization have a policy about opening questionable emails? Many of the emails that find their way into our in-boxes are not harmful, they are just irritating. However, in some cases, “if your email client allows scripting, then it is possible to get a virus by simply opening a message.” https://www.cisa.gov/news-events/news/virus-basics email is an essential business tool especially for members of the DIB. Unfortunately, user mistakes can cause great harm to both networks and potentially compromise sensitive information.


The above story has a happy ending in part because the recipient was cautious. When in doubt about an email pause, don’t act. Phishing emails are designed to overcome our natural instincts and hesitation. Phishing emails create tension, a need for rapid action, and threaten potential loss by not acting as examples.


Lastly remember that DFARS 252.204-7012 requires members of the DIB to take specific actions upon receipt of Malicious Software and should there be a Cyber Incident.


One last question – Do you have your Medium Assurance Certificate?


See: https://public.cyber.mil/eca/

Beware of The QR Code


QR codes provide an easily disguised surface for phishing cyberattacks


Today, quick response (QR) codes are quite popular—leading to increased risks of phishing cyberattacks designed to gain access to systems and data. Images in emails, flyers offering information about campus and school events, parking passes, financial aid forms, and other official communications all frequently contain QR codes. Physical and virtual education spaces might be the most “flyer friendly” and QR code-intensive environments anywhere, given how big a role handouts, physical and digital bulletin boards, and other casual correspondence help students navigate a mix of curriculum, institutional, and social correspondence. This creates an attractive backdrop for malicious actors to target users who are trying to save time with a quick image scan. 


Recently the United States Federal Trade Commission issued a consumer alert on the rising threat of malicious QR codes being used to steal login credentials or deliver malware.³


https://www.microsoft.com/en-us/security/blog/2024/10/10/cyber-signals-issue-8-education-under-siege-how-cybercriminals-target-our-schools/


The QR code is so simple, so convenient – Point, click and voila information is magically transferred to your device. Students often bring home more than homework, students may also bring home a variety of germs and viruses. What if, the virus they brought home was a computer virus and they link their device to the home network? What if you use your company device on the home network? Can it be infected? When you log on to your business network might you be a source of infection?


Alternatively, maybe you were at school for an athletic event or school play. Maybe, there was an interesting flyer with a QR code on a bulletin board. Maybe you only have your work phone. Torn, convenience wins the argument – after all its only a QR code – Right?


Microsoft Defender for Office 365 telemetry shows that approximately more than 15,000 messages with malicious QR codes are targeted toward the educational sector daily—including phishing, spam, and malware. MS Cyber Signals Issue 8 


This idea of a story directly leads to the next idea – Risk Storytelling. The article is framed around the CISO – The Chief Information Security Officer. Typically, this is a position in larger businesses. Small businesses do not normally have such a position. That said, who is your Risk Story Teller?


As pointed out in a Microsoft report, “We must find a way to stem the tide of this malicious cyber activity. That includes continuing to harden our digital domains to protect our networks, data, and people at all levels. However, this challenge will not be accomplished solely by executing a checklist of cyber hygiene measures but only through a focus on and commitment to the foundations of cyber defense from the individual user to the corporate executive and to government leaders.”


Microsoft Digital Defense Report 2024 - Escalating Cyber Threats Demand Stronger Global Defense and Cooperation - Microsoft On the Issues

Chief risk storyteller: How CISOs are developing yet another skill


Cybersecurity risks are critical to communicate, but CISOs are finding crafting a narrative that resonates requires more than technical expertise.


Chief risk storyteller: How CISOs are developing yet another skill | CSO Online

Using the NIST Cybersecurity Framework to address organizational risk


Using the NIST Cybersecurity Framework to address organizational risk | CSO Online

Attackers impersonate freight companies in double brokering scams


Business email compromise.


“These scams can result in more than just monetary loss,” the Cloudflare researchers warned. “For example, if the threat actor gives the load to a cargo carrier with poor reliability or safety ratings, it might be delayed, damaged, or lost during shipment. That could result in reputational harm and additional financial losses, especially if the shipment is not properly insured.”

 

https://www.csoonline.com/article/3540629/attackers-impersonate-freight-companies-in-double-brokering-scams.html

North Korea Hackers Linked to Breach of German Missile Manufacturer


The targeting of Diehl Defence is significant because the company specializes in the production of missiles and ammunition.


A professional hacking team linked to the North Korean government has broken into Diehl Defence, a German company that manufactures Iris-T air defense systems, using a clever phishing campaign with fake job offers and advanced social engineering tactics, according to a report by Der Spiegel.


The attack, pinned on the Kimsuky APT, combined the use of booby-trapped PDF files with spear-phishing lures offering Diehl Defence employees jobs with American defense contractors. 


The targeting of Diehl Defence is significant because the company specializes in the production of missiles and ammunition. Last October, Diehl Defence inked a deal to supply South Korea with its Iris-T short-range air-to-air missiles.


According to the Der Spiegel report, researchers at Mandiant investigated the compromise and found the attackers performed detailed reconnaissance on Diehl Defense ahead of the spear-phishing attacks.

North Korea Hackers Linked to Breach of German Missile Manufacturer - SecurityWeek

If your organization needs assistance meeting Federal or Department of Defense cyber security requirements, contact Marc Violante, Director of Federal Market Strategies at marcv@wispro.org, or Matt Frost, Government Contract Specialist at mattf@wispro.org

FEATURED EVENTS

October 28-30


Fox Cities Exhibition Center

213 S. Nicolet Rd. Appleton, WI 54914 


The Wisconsin Governor’s Cybersecurity Summit is an opportunity for professionals to broaden their awareness of cybersecurity threats and learn how the industry continues to proactively meet challenges and protect the virtual world. The Summit provides opportunities for presenters to connect with attendees. There is availability for those who would like to speak on technical, organizational, and research-based topics that are critical to the cyber-threat landscape during hour long break-out sessions (Speaker selections will be confirmed no later than September 1, 2024). There will also be multiple 2024 Wisconsin Governor’s Cybersecurity Summit sponsorship and exhibitor opportunities offered.


More Information at https://wedc.eventsair.com/2024-wi-cybersecurity/

The focus on this year’s series is Building a CMMC Ready Program.


Registration now available at

https://www.wispro.org/wpi-events/featured-webinars/cyber-fridays/

This series is intended as an information tool and resource for contract managers and those with a compliance function.  


Registration now available at

https://www.wispro.org/wpi-events/featured-webinars/emerging-issues/

New Sessions Added


Presented by the National Contract Management Association (NCMA) Wisconsin Chapter, this webinar series covers a range of topics from market entry, sales growth, small business certifications, compliance, and more. Attendees receive 1 CPE credit for attending.


  • October 25 – CMMC Update – October 2024
  • November 12 – Preparing for One-on-One Buyer Meetings 
  • November 13 – Responding to Sources Sought Notices and Preparing a Capabilities Statement 
  • November 22 – CMMC Update – November 2024  
  • December 20 - CMMC Update – December 2024 


Registration now available at

https://www.wispro.org/wpi-events/featured-webinars/acquisition-hour/

Save the Date

December 10

 

Registration and more information will be available at

https://wicontractingacademy.org/

OTHER NEWS
  • Be sure to follow WPI on social media (Facebook, LinkedIn, X) for regular updates on events, news and opportunities.
WPI 10437 Innovation Dr. Suite 320, Milwaukee, WI 53226 414-270-3600
Newsletter Editor: Doug Clemons, dougc@wispro.org 
Facebook  Linkedin  X

Not currently a subscriber to WPI's Newsletters?

Click Here to Subscribe