Lionfish Cyber Security

Cybersecurity Maturity Model Certification
(CMMC)

The By-With-Through Model™ from Lionfish Cyber Security is a self-aid, mentoring program with a command-and-control element which allows for on-demand scaling of training and incident response resources. The BWT Model™ is designed to ensure organizations are proficient in foundational concepts and skills across key areas of cyber security. This is accomplished through an integrated employee training suite, on-the-job training (OJT), participation in a mentoring program, and ongoing support that includes professional managed security services and a 24/7 cyber hotline.
 
The BWT Model™ becomes your organization’s cyber security shield by providing you with proper training, planning, and support that will improve your ability to defend against cyber-attacks targeting your company and community.
 
We follow the “by-with-and-through” mentality of the Army special forces because the Pentagon's push to protect industrial base networks and controlled unclassified information (CUI) from cyber attacks falls under CMMC.  We know that CMMC has what you need, as it follows the NIST framework and incorporates other models.  
 

Beginning in June, Defense Industrial Base (DIB) contractors for the Department of Defense (DoD) are required to provide certified assurance based on the CMMC framework.  The CMMC framework is a set of mandatory cybersecurity requirements that all contractors within the DoD supply chain will be required to implement and, beginning this year, to have verified by an independent CMMC Third Party Assessment Organization (C3PAO). 

The CMMC framework establishes five certification levels that define the minimum-security posture or maturity an organization must achieve based on the sensitivity of its information. Eligibility to receive a new DoD contract award or renewal is dependent on achieving CMMC certification, outlined in each program’s acquisition strategy or RFP.

Our Lionfish’s CMMC learning will bring you to a level of cyber control you can count on…hook, line and sinker.  We are currently offering Level 1-3 support as part of our basic By-With-Through Platform, with additional fees for Levels 4 & 5 available.

Portrait of happy young attractive asian entrepreneur woman looking at camera using smart tablet in warehouse with inventory management or industry digital era concept. Asian small business or sme.
Lionfish Cyber Security

Don't Get Underwater...

Certification can be an arduous assignment with a roadmap,
but we know how to kick into action and school your team in the right direction.

Join us for our next event:

Family standing near the house with a bag with the word Money support. Financial assistance to support young families. Stimulating demographic growth. Soft loans and tax breaks for buying a new home

06/10/2021 Virtual, Free 11:00 AM-12:00 PM EDT

This is a limited-time opportunity. The state will run out of money for this program! You are Invited to our exclusive webinar to learn more.
Indiana Businesses Could Be Reimbursed For Company Training & Cyber Security Protections With a State Grant. Do You Qualify? Find Out!

Register Now

  • Are you a Prime?
    Benefits for primes that use Lionfish Cyber Security™ to help prep their subs include:

    • Confidence subs will meet CMMC requirements.
    • System can be co-branded with prime’s logo and colors. Build loyalty with subs.
    • Subs save time and money with one-stop option to learn, implement, monitor and manage CMMC solutions.
    • Ensure subs have ongoing protection and compliance.

New BWT Logo 2
Lionfish Cyber Security - LOGO
  • Benefits of the Lionfish BWT™ managed security service platform:

    • Uniquely credentialed to assist you to qualify for and maintain government contracts
    • Supplement your staffing needs with our seasoned security professionals and apprenticeships
    • Management of routine IT tasks to save you time and focus on your business
    • Affordable enterprise-level managed security services designed specifically for small businesses
    • Proactive Technology Management to prevent malicious activity
    • Cyber awareness training to achieve data care best practices that protect your most valuable assets – customer and employee data
    • We quickly identify, remediate and set up appropriate disaster recovery mechanisms to keep your business running smoothly

  • We are Registered, So We Are Ready to Serve You…

    Lionfish is a CMMC Registered Provider Organization (RPO), and a Lionfish Cyber Security is a CMMC Accredited Practitioner™, so able to assist in these requirements.  As a vet-owned business, we provide guidance and activity-driven models for small businesses everywhere that seek to achieve a high standard of cybersecurity excellence for cyber deterrence and resilience. We are working towards a world where all businesses are cyber resilient and are no longer easy targets for cyber-attacks. 

    CMMC guidelines require DoD contractors to meet mandatory requirements and go through multiple assessments to prove their certification level. 

    Lionfish Cyber Security will assist you in determining the CMMC levels of certification the DoD requires of your company, which all begin with minimal cyber hygiene requirements.

Lionfish Cyber Security

What Exactly is CMMC?

The CMMC model measures cybersecurity maturity with five levels and aligns a set of processes and practices with the information you wish to protect, and possible associated threats. The model consists of maturity processes and cybersecurity best practices from multiple cybersecurity standards, frameworks, and other references.  The model encompasses the basic safeguarding requirements for FCI specified in FAR Clause 52.204-21 and the security requirements for CUI specified in NIST SP 800-171 per DFARS Clause 252.204-7012.

Why Was It Created?

DOD will migrate to the new CMMC framework in order to assess and enhance the cybersecurity posture of the Defense Industrial Base (DIB). CMMC is intended to serve as a verification mechanism to ensure appropriate levels of cybersecurity practices and processes are in place to ensure basic cyber hygiene.  It will also protect controlled unclassified information (CUI) that resides on the Department’s industry partners’ networks.

Where to Begin…

Below you will find CMMC practices grouped by level and by domain. Each practice contains helpful publicly available cybersecurity resources and clarification from CMMC Model v1.02 Appendix B.

Need guidelines for assessing CMMC practices?

Have questions about NIST 800-171 or CMMC compliance?  We are happy to answer any of your questions about our product offerings.

CMMC Blogs

CMMC icon (1)

Getting Ready for New CMMC Requirements Now

Right off the bat, we’re here to tell you that anyone promising you a sure-shot solution to all your CMMC woes is trying to pull a fast one on you. The Cybersecurity Maturity Model Certification (CMMC) is a comprehensive move by the U.S. Department of ...

Read More 

CMMC_DFARS Rule and What it Means for you

Achieving CMMC: The Interim DFARS Rule and What It Means for You

The Cybersecurity Maturity Model Certification (CMMC) was formally made part of the Defense Federal Acquisition Regulation Supplement (DFARS) in January 2020. The decision sent over 300,000 members of the defense industrial base (DIB), mostly small and midsize businesses (SMBs), into a state of frenzy. Most ...

Read More 

Katie Arrington

CISO for DoD Acquisition Office

“Every company within the DoD supply chain — not just the defense industrial base, but the 300,000 contractors — are going to have to get certified to do work with the Department of Defense,” Katie Arrington said at the 2020 Intelligence and National Security Summit. “We get everyone on a level-set playing field for cybersecurity, and then we can really start looking at our supply chain, where our most and greatest vulnerabilities lie and how we can work together in a collaborative event with industry.”