Loading the Elevenlabs Text to Speech AudioNative Player...

Webinar

Event date:

Jul 9, 2025

|

AGO

AGO

AGO

Michigan Manufacturing + Cybersecurity: A CMMC Success Story

A CyberSecure My Business webinar.

Time left to webinar

26

days

Add to Calendar

Join the National Cybersecurity Alliance, STACK Cybersecurity, and Michigan-based Taylor Turning for a practical look at how small manufacturers can successfully navigate CMMC compliance. This 30-minute webinar + Q&A shares a real-world journey through the cybersecurity challenges of the defense supply chain—and how smart partnerships and strategic planning turned risk into resilience.

What You’ll Learn:

  • The current cybersecurity threat landscape facing manufacturers

  • CMMC levels, requirements, timelines, and costs—explained clearly

  • How a small manufacturer implemented CMMC Level 1 successfully

  • The role of MSSPs in assessments, planning, and documentation

  • Practical steps to bridge cybersecurity gaps without overwhelming resources

  • Available free resources and support programs for manufacturers

  • Lessons learned and strategies for long-term cyber maturity

Who Should Attend:

  • Small and mid-sized manufacturers

  • Compliance managers and IT leads

  • MSSPs and cybersecurity providers

  • Industry educators and support organizations

  • Anyone navigating CMMC in the defense industrial base

Featured Speakers:

  • Austin Ritz, Compliance Manager, Taylor Turning

  • Rich Miller, Founder and CEO, STACK Cybersecurity

Featured Articles

How You Can Help Secure Smaller Vendors with Limited Budgets and Know-How

If you work in third-party risk management (TPRM), you face a growing challenge: how to keep your supply chain secure when many vendors are small businesses with limited cybersecurity resources?

How You Can Help Secure Smaller Vendors with Limited Budgets and Know-How

If you work in third-party risk management (TPRM), you face a growing challenge: how to keep your supply chain secure when many vendors are small businesses with limited cybersecurity resources?

How You Can Help Secure Smaller Vendors with Limited Budgets and Know-How

If you work in third-party risk management (TPRM), you face a growing challenge: how to keep your supply chain secure when many vendors are small businesses with limited cybersecurity resources?

Your Business Has Been Hacked: How to Minimize the Damage

If your small business has been hacked, you need to act fast. Here are some key things to know to fight back, stay open, and build resilience in the event of a cyberattack.

Your Business Has Been Hacked: How to Minimize the Damage

If your small business has been hacked, you need to act fast. Here are some key things to know to fight back, stay open, and build resilience in the event of a cyberattack.

Your Business Has Been Hacked: How to Minimize the Damage

If your small business has been hacked, you need to act fast. Here are some key things to know to fight back, stay open, and build resilience in the event of a cyberattack.