Agenda
Explore expert-led sessions designed to accelerate your CMMC compliance. Choose from keynotes, panels, and workshops tailored for DoD contractors and supply chain partners.
Speakers and schedule subject to change.
Pre-Conference Training
- Tuition: $2,945 when you enroll by March 2
- Schedule: March 16–17, 2026
- 9 a.m. – 5 p.m.; lunch included
- Instructor: Vince Scott
- Tuition: $1,995
- Schedule: March 16–17, 2026
- 9 a.m. – 5 p.m.; lunch included
- Instructor: Regan Edens
Day 1 – March 18
You need CMMC to win contracts. Now the question is, what is the most cost-effective, and speedy, way to get there? This
session will discuss: resources (human and monetary), and provide a multi-step plan to certification.
You will learn:
- Briefing - CUI and the reasons why CMMC exists
- What is a POA&M?
- What is an SSP?
- What level of detail is required in my evidence?
- Recent Updates to CMMC regulation
Scoping your organization's CMMC implementation. It is all about the CUI. ...This session provides a roadmap to a cost-
effective, and manageable scope. What is an enclave and why build one? Big changes require buy-in from leadership. Often
organizational/culture change is the biggest cost of CMMC compliance. The session will deep-dive into scope choices and how
to deliver on those choices efficiently.
You will learn:
- How to make the scope right-sized, hint follow the CUI
- Enclave or not?
- Service Provider, Secure Repository, or do it yourself?
Sponsorship opportunity available!
Compliant options - for email, file storage and access. Discussion of whether and how to use GCC-High, including costs of use
and of migration. Out of the box isn't compliant. What is?
In addition, the session will cover GCC-HIgh alternatives: Microsoft Commercial, GCC, Google, and CMMC purpose built
repositories for CUI.
in writing and follow them. That means keeping artifacts of proof. This session will discuss which documents are expected (so
you don't overdo it), and which artifacts are needed to prove compliance. The speaker will also talk about sources of templates
and the risks of AI and its confidence building, yet often false promises.
the compliance of your subcontractors. Whether you are managing a supply chain beneath you or being managed from above,
understanding your responsibilities and being able to reliably execute is key.
Sponsorship opportunity available!
Please join us for a buffet style dinner at The Rustic in Dallas on March 18th from 6 – 8:30 p.m. Dinner will be $30 per person with a cash bar.
If you have any questions, please call Karoline Josey at 214-768-1086.
Registration Deadline: March 11, 2026
The Rustic
3656 Howell St
Dallas, TX 75204
Sponsorship opportunity available!
Phase I Enforcement Is Active. Every day you delay puts your contracts—and revenue—at risk.
Day 2 – March 19
Roundtable Revolution
Pick your topic and do a deep dive with your peers and an expert facilitator.
Round 1: 9:10 – 10 a.m.
Round 2: 10:20 – 11:10 a.m.
The second Roundtable Rotation will cover the same topics. Facilitators will remain at their tables while attendees rotate, giving
each participant a deep dive into a second topic with the facilitator and their peers
This presentation provides a practical legal overview of how the False Claims Act applies to defense contractors, with a focus on whistleblower activity and enforcement trends. Attendees will gain insight into common risk areas, how investigations unfold, and strategies for minimizing exposure before issues escalate.
Key topics include:
- Overview of the False Claims Act and its application to defense contracting
- Whistleblower (qui tam) actions: how they start and why they succeed
- Common compliance failures that trigger FCA liability
- Government investigation and enforcement processes
- Financial, legal, and reputational risks for contractors
- Best practices for internal controls, reporting, and risk mitigation
This presentation explains the role of the Customer Responsibility Matrix (CRM) in meeting NIST SP 800-171 requirements,
clarifying how compliance responsibilities are divided between an organization and its service providers. Attendees will learn
how shared responsibility works in practice, including how to validate whether a service provider has fully or partially assumed
responsibility for specific security controls.
Key topics include:
- Overview of NIST SP 800-171 and third-party responsibility models
- What a Customer Responsibility Matrix is and why it matters
- Defining customer vs. service provider responsibilities for 800-171 controls
- When and how a provider may assume full or partial control responsibility
- How to validate and assess a service provider’s CRM and supporting evidence
- Maintaining alignment through contracts, SLAs, and ongoing oversight
Many organizations operate under the mistaken belief that GCC High is the only compliant option for storing, processing, and
transmitting Controlled Unclassified Information (CUI). This session explains why that is not the case, explores other compliant
solutions—such as secure storage services (Dropbox , secure collaboration platforms, and Google Workspace—and helps
attendees determine when GCC High is the best fit versus when alternative solutions may better meet operational and business
needs.
Key topics include:
- Common misconceptions about GCC High and CUI compliance
- Actual requirements for storing, processing, and transmitting CUI
- Why GCC High is often chosen—and when it truly adds value
- Compliant alternatives to GCC High, including secure storage and collaboration tools
- Using platforms like Google Workspace to meet CUI requirements
- Matching solutions to use cases, risk tolerance, and business needs
This session explores the benefits of engaging third-party service providers such as RPOs, C3PAOs, and MSPs, while
highlighting the critical need for due diligence—not all providers are equally qualified or able to deliver on their claims. Attendees
will learn how to evaluate, select, and manage service providers effectively to reduce risk and ensure long-term compliance and
operational success.
Key topics include:
- Roles and differences between RPOs, C3PAOs, and MSPs
- Benefits and risks of relying on third-party service providers
- Common red flags and misleading claims to watch for
- Key questions to ask when evaluating a service provider
- How to verify qualifications, experience, and scope of services
- Best practices for managing and governing ongoing provider relationships
This session explains why CMMC compliance goes beyond written policies and procedures to require clear, defensible artifacts
and evidence that demonstrate controls are implemented, operating as intended, and effective. Attendees will learn how to
create, maintain, and curate proof of process over time—because in CMMC, if it isn’t documented and supported by evidence, it
effectively doesn’t exist.
Key topics include:
- The role of artifacts and evidence in CMMC assessments
- Difference between documentation, implementation, and operational proof
- What assessors look for as valid and sufficient evidence
- How to create, maintain, and curate artifacts over time
- Mapping artifacts to CMMC practices and processes
- How GRC platforms can simplify evidence collection, organization, and maintenance
Compliance implications for using AI on top of the dealing with tools that may only be 70% accurate, or could leak your data if
not configured properly. During this roundtable contractors share approaches to managing AI tool proliferation while protecting
CUI and maintaining CMMC compliance.
- Discovery and inventory: finding AI tools already in use across the organization
- Risk assessment: data exposure, model training, and third-party processing
- Policy development: acceptable use, data handling, and approval processes
- Technical controls: DLP integration, network monitoring, and access restrictions
- Vendor management: AI service provider assessments and contract terms
- Training and awareness: helping employees understand AI risks and proper usage
Round table attendees will trade proven approaches to POA&M development that satisfy assessors and actually drive security
improvements.
- Writing deficiencies that pass: root cause analysis, risk scoring, and remediation specificity
- Milestone planning: realistic timelines, resource allocation, and dependency management
- Evidence linkage: connecting findings to controls and tracking remediation proof
- Risk management: accepting, mitigating, and transferring risks appropriately
- Ongoing maintenance: tracking progress, updating timelines, and closing items
- Assessor perspective: what makes a POA&M acceptable vs. what triggers re-work
sharing, or not having the right materials available. Just how much evidence do you need? The answers are here.
a gratis FutureFeed subscription using either sample data or their own data.
FutureFeed Compliance Jam™
Compliance Jam™ Learning Lab Sponsored by FutureFeed
Group exercise
We all log in together. You will use FutureFeed, a leading GRC tool (or a tool of your own) to either define and document your
system (or to use sample data to practice the process). In this session, we'll help you organize much of what is likely already in
your head to ready as evidence the CMMC controls.
Compliance Jam™ Learning Lab Sponsored by FutureFeed
Group exercise
After a break, we'll go through a few controls, using the sample evidence and an expert RPO to associate and document specific
controls. You'll walk through a process of gathering evidence and artifacts, and then tying them together with objective
statements and summary notes.