Loading the Elevenlabs Text to Speech AudioNative Player...

Webinar

Event date:

Jul 9, 2025

|

AGO

AGO

AGO

Michigan Manufacturing + Cybersecurity: A CMMC Success Story

A CyberSecure My Business webinar.

Event Concluded

Webinar Available On-Demand

Add to Calendar

Join the National Cybersecurity Alliance, STACK Cybersecurity, and Michigan-based Taylor Turning for a practical look at how small manufacturers can successfully navigate CMMC compliance. This 30-minute webinar + Q&A shares a real-world journey through the cybersecurity challenges of the defense supply chain—and how smart partnerships and strategic planning turned risk into resilience.

What You’ll Learn:

  • The current cybersecurity threat landscape facing manufacturers

  • CMMC levels, requirements, timelines, and costs—explained clearly

  • How a small manufacturer implemented CMMC Level 1 successfully

  • The role of MSSPs in assessments, planning, and documentation

  • Practical steps to bridge cybersecurity gaps without overwhelming resources

  • Available free resources and support programs for manufacturers

  • Lessons learned and strategies for long-term cyber maturity

Who Should Attend:

  • Small and mid-sized manufacturers

  • Compliance managers and IT leads

  • MSSPs and cybersecurity providers

  • Industry educators and support organizations

  • Anyone navigating CMMC in the defense industrial base

Featured Speakers:

  • Austin Ritz, Compliance Manager, Taylor Turning

  • Rich Miller, Founder and CEO, STACK Cybersecurity

Featured Articles

Data Deletion: Why Erasing Your Information Matters More Than Ever

If you're online, you spend time thinking about passwords, privacy settings, and multifactor authentication.

Data Deletion: Why Erasing Your Information Matters More Than Ever

If you're online, you spend time thinking about passwords, privacy settings, and multifactor authentication.

Data Deletion: Why Erasing Your Information Matters More Than Ever

If you're online, you spend time thinking about passwords, privacy settings, and multifactor authentication.

Data Brokers: What They Are, How They Work, and How You Can Protect Your Privacy

Sometimes, you might think that the internet feels a little too good at knowing who you are – and, often, you’re not imagining it!

Data Brokers: What They Are, How They Work, and How You Can Protect Your Privacy

Sometimes, you might think that the internet feels a little too good at knowing who you are – and, often, you’re not imagining it!

Data Brokers: What They Are, How They Work, and How You Can Protect Your Privacy

Sometimes, you might think that the internet feels a little too good at knowing who you are – and, often, you’re not imagining it!