CMMC: The Final Rule

and What it Means For Your Business

Thursday, May 29th, 11:00 AM PT / 2:00 PM ET

The U.S. Department of Defense has finalized its Cybersecurity Maturity Model Certification (CMMC) requirements, meaning major changes are now in effect for any business working with the federal government. If you provide technology, support services, or handle sensitive defense data, understanding these updates is essential.

This webinar breaks down what the final rule means in plain language—and gives you a clear path forward.

Key Takeaways:

  • What the Cybersecurity Maturity Model Certification (CMMC) is and the key updates in the final rule, including the phased rollout plans

  • How will the changes impact organizations providing technology and support services

  • Practical strategies for preparing for audits, passing assessments, and staying compliant over time

WEBINAR

CMMC: The Final Rule and What It Means For Your Business

Thursday, May 29th, 2025
11:00 AM PT / 2:00 PM ET
Online | Zoom

Meet Your Presenters

Rob Schenk

Chief Security Officer,
Intelligent Technical Solutions

Rob Schenk, CSO at ITS and co-founder of ITS San Francisco, leads corporate strategy and fosters a security-first mindset among clients. With decades in IT, Rob began as a network engineer and writer with over 200 published articles. He co-founded Intivix, which later joined ITS, helping Bay Area businesses become more secure and efficient. Known for his calm, mindful leadership, Rob is active in the East Bay ICT, supports youth tech education, and enjoys family travel, Aikido, and guitar in his free time.

Justin Shanken

CEO,
Black Breach

Justin Shanken is a cybersecurity and counterintelligence expert with over 20 years of experience. He began as a Counterintelligence Special Agent in the U.S. Army and the Department of Defense, protecting defense contractors from foreign threats. Now, as CEO of BlackBreach, he leads a team delivering military-grade, AI-powered cybersecurity solutions that align with national defense strategies, focusing on trust and cost-effective protection.

Register now—and we’ll send you the full recording after the webinar.