Articles

With the Clock Ticking on CMMC, Here are 3 Essential Cybersecurity Steps to Take Now

The Department of Defense (DoD) continues to push toward Cybersecurity Maturity Model Certification (CMMC) 2.0 implementation, with requirements forecast to be in contracts as early as this summer.ย 

But not all contractors in the defense industrial base (DIB) are ready for CMMC, according to recent surveys and industry experts. And that is despite DoD officials estimating that each day, hackers steal sensitive data worth up to $2 million. And despite manufacturing ranking as the top cyberattack target for the fourth year in a row, as measured by the IBM X-Force 2025 Threat Intelligence Index.ย 

โ€œA lot of people are focused โ€˜on the businessโ€™ and see cybersecurity as a cost-sink, thinking, โ€˜Well, I haven’t been hacked, so how is cybersecurity going to help me?โ€™โ€ said Brett Cox, Boeingโ€™s DFARS Cybersecurity Program Management Office Lead. โ€œBut there are two kinds of companies out there: the ones that have been hacked and the ones that don’t know they’ve been hacked.โ€ย 

Cox, who also teaches cybersecurity and CMMC courses at St. Louis University, shared insights as manufacturers in the DIB awaited finalization of the 48 CFR Rule. When that rule change is complete โ€” expected by the end of the second quarter or early in the third quarter โ€” CMMC requirements will begin to appear in DoD contracts.ย 

With the clock ticking, manufacturers are working on cybersecurity hygiene and ensuring they understand CMMC requirements. Many large prime contractors, including Boeing, have completed CMMC qualification, which for Boeing is Level 2.   

Boeing, meanwhile, was recently recognized by Acting DoD Chief Information Officer Katherine Arrington in the Networks and Digital Warfare section of Breaking Defense for its efforts to ensure that adversaries are unable to reverse engineer the F-47. 

Organizations that have not started on their CMMC prep โ€” perhaps because they assumed its measures would continue to be delayed โ€” are being urged to begin immediately. Cox shared three essential steps to take now. 

  1. Set up multi-factor authentication 

โ€œThe No. 1 concrete step is to implement multi-factor authentication (MFA). Before you take classes โ€” before you do anything โ€” start MFA because with that, the majority of attacks can be stopped,โ€ Cox said. 

Many organizations don’t know how crucial MFA is, Cox added. But Microsoft and others have stated that nearly all cyberattacks can beย  prevented if MFA is used.ย 

The three main authentication factors (with use of at least two recommended) are: 

  • Something you know, such as a password or pin number. 
  • Something you have, such as a company badge or token. 
  • Something you are, or biometric authentication, which most commonly is  your fingerprint. 

2. Join industry organizations 

There are a lot of opportunities to get information about CMMC implementation, Cox said, โ€œbut you have to hear about them in the first place.โ€ To do that he suggests:  

  • Attending industry events, webinars and courses, many of which are free. Cox shares information about such opportunities on his LinkedIn page and answers questions he receives there as well.ย 

3. Reach out to other manufacturers 

โ€œStart communicating with your peers, because your peers are in the exact same boat that you are,โ€ Cox said.   

 
โ€œCMMC is incredibly important to the cybersecurity hygiene of the entire defense industrial base,โ€ he added. โ€œThere are all sorts of people who are willing to listen to your questions. There’s nobody whoโ€™s going to say, โ€˜Oh no, you go read that on your own.โ€™โ€ 

Visit the MxD Virtual Training Center for information on cybersecurity workforce training resources.

More News

Press Releases

CDMEย and MxD Launch Interactiveย Toolย to Help Small Manufacturers Strengthen Cybersecurityย 

Ohio is one of the top states in the country for manufacturing output...

Read More
Articles

Taking the Mystery Out of Controlled Unclassified Information (CUI)

Keeping secrets is everyday work for defense industry contractors. But how do you...

Read More
Articles

2026 Cybersecurity Outlook: โ€˜Hardening Ourselves Against Attacks Has Never Been More Importantโ€™

In 2025, cybercriminals leaned heavily on artificial intelligence (AI) to automate attacks at...

Read More