
Best Practices for Achieving and Maintaining CMMC Compliance
CMMC compliance isn’t just about passing an assessment — it’s about implementing security practices that protect your organization and the sensitive information with which you are entrusted long-term.
This webinar series will guide you through the entire CMMC journey, from initial preparation to certification and beyond, with expert insights, best practices, and real-world tips to make compliance manageable and sustainable.
FutureFeed Explorers goes beyond the “What”, explaining the “Why” behind each step of the CMMC journey. Understanding your destination is essential; “if you don’t know where you’re going you might up some place else”.
Topics:
- Establishing What’s in Scope – How to start on the right foot
- Addressing Non-Technical Controls – The role of policies and procedures
- Addressing Technical Controls – Understanding what’s behind the technobabble
- Selecting External Service Providers – Determining who is right for you
- Creating and Managing POA&Ms – Creating and executing a remediation plan
- Building and Curating Your Body of Evidence – Satisfying adequacy and sufficiency
- Managing the Certification Assessment – Being prepared and in control
- Responding to Change – Maintaining compliance in a dynamic environment

Upcoming Webinar
Managing Scope: Identifying and Limiting Your CUI Boundary
Wed. April 16th at 1PM ET
Hosted by Rachel Leidy and Stuart Itkin of FutureFeed, with Nancy Laney, President @ PEAK Complyance
Your journey to achieving CMMC compliance starts with scope: identifying, and in some cases reducing your CUI boundary. Getting scope right will limit the cost and time to achieve and maintain compliance. Getting it wrong can leave sensitive information exposed and your organization noncompliant.
This webinar will take you through the process of establishing and defining your CUI boundary and show you how to categorize and inventory both in scope and out-of-scope assets.
Past Webinars
Mastering Configuration Items (CIs)
Tues. January 29th at 1pm ET
Hosted by Rachel Leidy and Matthew Titcombe, CEO at Peak InfoSec
Read the blog and watch the replay highlights here.