- May 2025 -

Facebook  Linkedin  X

Welcome to the WPI Cyber Newsletter, a monthly publication from the Wisconsin Procurement Institute (WPI), Wisconsin's Apex Accelerator


If your organization needs assistance meeting Federal or Department of Defense cyber security requirements, contact Marc Violante, Director of Federal Market Strategies at marcv@wispro.org, or Matt Frost, Government Contract Specialist at mattf@wispro.org

NEWS & UPDATES

DoD Cybersecurity Compliance!

Raytheon, Nightwing to Pay $8.4 Million in Settlement Over Cybersecurity Failures


“The US government says defense contractor Raytheon and Nightwing agreed to pay $8.4 million to settle False Claims Act allegations.


Raytheon and RCSI allegedly not only failed to implement a security plan for the internal development system, but also failed to ensure that it complied with other Defense Federal Acquisition Regulation Supplement (DFARS) and Federal Acquisition Regulation (FAR) requirements.


Per DFARS and FAR, contractors are required to apply basic safeguarding to systems that process or store federal contract data, and to provide adequate security for those systems, respectively. “


See the following link for the complete article. https://www.securityweek.com/raytheon-to-pay-8-4-million-in-settlement-over-cybersecurity-failures/

CYBERSECURITY MATURITY MODEL CERTIFICATION CMMC DLA WEBSITE


The Defense Logistics Agency (DLA) Office of Small Business Programs revamped its website guidance and resources for Cybersecurity and the Cybersecurity Maturity Model Certification (CMMC) Programs which improved content and categorization providing a clear framework to help small businesses navigate this complex topic. Please review via this link: https://www.dla.mil/Small-Business/Resources/Cybersecurity-Resources/#cmmccert

This notice provides CMMC resources available to small businesses, with the intent to increase overall cyber readiness.

For additional resources, see DIBBS Notice on CYBERSECURITY MATURITY MODEL CERTIFICATION CMMC RESOURCES. 

CAGE Codes, Title 48 Status, and Terminology


Inaccuracies in CAGE codes have created issues for companies that have undergone their formal cybersecurity assessment. After the assessment, information needs to be transferred from the eMASS system to the SPRS database. Not only does the entity being assessed need to be in SAM and have its CAGE code active, all entities within the scope of the assessment also must be in SAM and have CAGE codes that are correct. This includes all entities in a company’s hierarchy.


Title 48 CFR Status – the rulemaking process continues; no new information concerning when the process will be finalized.


Important terminology – It seems like a small distinction but it is an important one. Please note the correct way to reference an ESP – see below. The inclusion of the phrase “not a CSP” is important. A link to this section is below the following text.


Level 2 certification assessment with the use of an External Service Provider (ESP), not a CSP. An OSA may use an ESP that is not a CSP to process, store, or transmit CUI in performance of a contract or subcontract with a requirement for the CMMC Status of Level 2 (C3PAO) under the following circumstances:


(i) The use of the ESP, its relationship to the OSA, and the services provided are documented in the OSA's SSP and described in the ESP's service description and customer responsibility matrix.


(ii) The ESP services used to meet OSA requirements are assessed within the scope of the OSA's assessment against all Level 2 security requirements.


(iii) In accordance with § 170.19(c)(2), the OSA's on-premises infrastructure connecting to the ESP's product or service offering is part of the CMMC Assessment Scope, which will also be assessed. As such, the security requirements from the CRM must be documented or referred to in the OSA's SSP.


URL: https://www.ecfr.gov/current/title-32/part-170#p-170.17(c)(6)

Need assistance with current DoD Cybersecurity requirements – Three resources that can assist


APEX Accelerators – In Wisconsin, WPI is the statewide Apex Accelerator


The APEX Accelerators program  , formerly known as Procurement Technical Assistance Program (PTAP), under management of the Department of Defense (DoD) Office of Small Business Programs (OSBP), plays a critical role in the Department’s efforts to identify and helps a wide range of businesses enter and participate in the defense supply-chain. The program provides the education and training to ensure that all businesses become capable of participating in federal, state, and local government contracts.


Get Started by Finding Your APEX Location 


For Wisconsin Companies, the Wisconsin Procurement Institute is your state-wide Apex Accelerator. Call 414-270-3600 or email apexaccelerator@wispro.org


Defense Acquisition University


Defense Acquisition University (DAU) hosts the DAU Cyber Solutions program  which has weekly small business cybersecurity acquisition webinars on topics such as CMMC, Cyber Incident Reporting, and Cybersecurity for Contracts. 


One training in particular that stands out is DAU Cyber Solutions - Basic Cyber Hygiene: A walk-through of the FAR 52-204.21 and CMMC Level 1 .


Department of the Air Force Chief Information Security Officer’s Blue Cyber Education Series


Department of the Air Force (DAF) Chief Information Security Officer’s (CISO) Blue Cyber Education Series  for Small Businesses provides free and open to the public cybersecurity information and support.


See: https://www.dla.mil/Small-Business/Resources/Cybersecurity-Resources/#cmmccert

DoD Memorandum addresses CMMC Levels and Waivers


Earlier this year DoD published a Memorandum that addresses implementation of the Cybersecurity Maturity Model Certification (CMMC) Program. This memorandum addresses timing of requirements, determining appropriate CMMC Compliance Assessment Levels and the Process for Waiving CMMC Assessment Requirements.


The following information is copied from this memorandum – “Upon publication of the final Title 48 CFR DFARS rule, 2019-D041, Program Managers and requiring activities shall include the need for CMMC assessments in procurement request and requirement documents in accordance with phase-in timelines described in Title 32 CFR §170.3. Attachment 1 to this memorandum provides Program Managers and requiring activities guidance to apply when determining the appropriate CMMC assessment level to include in each DoD solicitation and contract. Service and Component Acquisition Executive are authorized to waive inclusion of CMMC assessment requirements in DoD solicitations. Waiver are discussed in Attachment 2.”


The Memorandum is available at - https://dodprocurementtoolbox.com/uploads/DOPSR_Cleared_OSD_Memo_CMMC_Implementation_Policy_d26075de0f.pdf

6 hard-earned tips for leading through a cyberattack — from CSOs who’ve been there


“When a cyberattack strikes, security leaders must go beyond the incident response plan to ensure holistic preparation, effective collaboration, and strong leadership under fire.


An incident response plan is central to ensuring your organization is prepared for a cyberattack. But such documents, which detail steps that should be taken in the wake of various cyber scenarios, generally treat security response as a technical process.”


The following article provides information –“ hard-earned from-the-trenches best practices that are typically left out of incident response plans but are essential to leading successfully under attack.”


https://www.csoonline.com/article/3846318/6-hard-earned-tips-for-leading-through-a-cyberattack-from-csos-whove-been-there.html

Is HR running your employee security training? Here’s why that’s not always the best idea


“In today’s fast-changing threat landscape, relying solely on human resources to deliver employee security training can leave an enterprise vulnerable. “ --- 


If you haven’t read this article, please do. Then take a look at the following general questions. These are basic questions. They are a starting point. It is important to remember that a SPRS score is just that a score. It is an important metric but it doesn’t capture day-to-day employee behavior. Plans and policies provide important guidance but if the ideas and requirements are not regularly reviewed and tested, do they really elicit the necessary behaviors?


  • So, who is running your company’s security training?
  • Who is providing input?
  • Who is recommending training sources?
  • How are desired outcomes identified?
  • How is the effectiveness of the training evaluated?


https://www.csoonline.com/article/3856404/is-hr-running-your-employee-security-training-heres-why-thats-not-always-the-best-idea.html

From Third-Party Vendors to U.S. Tariffs: The New Cyber Risks Facing Supply Chains


Cyber threats targeting supply chains have become a growing concern for businesses across industries. As companies continue to expand their reliance on third-party vendors, cloud-based services, and global logistics networks, cybercriminals are exploiting vulnerabilities within these interconnected systems to launch attacks. By first infiltrating a third-party vendor with undetected security gaps, attackers can establish a foothold, leveraging these weaknesses to penetrate the primary business partners' network. From there, they move laterally through critical systems, ultimately gaining access to sensitive data, financial assets, intellectual property, or even operational controls.


https://thehackernews.com/2025/04/from-third-party-vendors-to-us-tariffs.html

CVE Program Cuts Send the Cyber Sector Into Panic Mode


After that, it looks like it's up to the private sector to find the cash to keep it going.


This is a very important topic and issue to keep current on.


After threatening to slash support for the CVE program, CISA threw MITRE a lifeline at the last minute — extending its government contract for another 11 months. After that, it looks like it's up to the private sector to find the cash to keep it going.


Read full article: https://www.darkreading.com/vulnerabilities-threats/cve-program-cuts-cyber-sector

‘Wrong Phone Number’ Scams Are on the Rise


Fraudsters actually do not care how your day is going.

 

“If you've received an innocent-sounding text from a number you don't recognize, it's not actually innocent. It's likely the start of a "wrong phone number" scam, which is increasingly being used to steal money and information from victims. I personally have been sent variations on this theme: "Hello! I hope you had a good day." "Are you able to work?" and just "Hello." “

 

Protect yourself and your personal information. Read the following short article.

 

Copied from: https://lifehacker.com/money/wrong-phone-number-scams-are-on-the-rise

If your organization needs assistance meeting Federal or Department of Defense cyber security requirements, contact Marc Violante, Director of Federal Market Strategies at marcv@wispro.org, or Matt Frost, Government Contract Specialist at mattf@wispro.org

OTHER NEWS
  • Be sure to follow WPI on social media (Facebook, LinkedIn, X) for regular updates on events, news and opportunities.
WPI 10437 Innovation Dr. Suite 320, Milwaukee, WI 53226 414-270-3600
Newsletter Editor: Doug Clemons, dougc@wispro.org 
Facebook  Linkedin  X

Not currently a subscriber to WPI's Newsletters?

Click Here to Subscribe