Free Checklist: CMMC Assessment Cheat Sheet for CUI
Download
Resources

Webinars

See our upcoming webinars or watch a webinar on-demand.

Securing Controlled Unclassified Information (CUI) in CAD files is critical for Department of Defense (DoD) contractors. Cybersecurity Maturity Model Certification (CMMC) is finally here, and meeting compliance requirements is no longer optional, it’s essential for accepting DoD contracts in 2025 and beyond.

The challenge? Understanding if your CAD files contains or qualifies as CUI. Identifying and classifying CUI is one of the biggest uncertainties contractors face. Beyond CUI identification securing your endpoint with the requirements (NIST/DFARS) that CMMC validates can add an additional layer of complexity.  

Secude’s HaloCAD, combined with Redspin’s expertise as a Managed Cloud Service Provider and CMMC 3rd Party Assessment Organization (C3PAO), provides an end-to-end security and compliance solution to help contractors easily identify, protect, and track CUI within CAD files, accelerating your CMMC journey while ensuring ongoing compliance and operational security.

What You’ll Learn:

  • How to identify CUI and determine your CMMC requirement  
  • Best practices for securing endpoints  
  • The role of CMMC 2.0 in protecting CUI and ensuring compliance
  • How HaloCAD makes securing and tracking CAD files simple and assessment-ready, even beyond your network
  • Insights from C3PAO, Redspin’s expert team on assessment readiness, Managed Cloud Services, and compliance strategies
  • Best practices for securing sensitive design data from assessment to ongoing compliance

Whether you’re preparing for your CMMC assessment or looking for long-term compliance strategies, this webinar is a must-attend for DoD contractors handling CAD files.

Register now to learn how to secure your sensitive design data and maintain compliance.

Thursday, April 3, 2025

2PM - 3PM EST
1PM - 2PM Central
12PM - 1PM Mountain
11AM -12PM Pacific

We will also have Live Q&A

 

Blake Wood
Blake Wood
VP Global Alliances
Secude
Robert Teague
Robert Teague
Director of CMMC Services
Redspin
Jay Giunta
Jay Giunta
Technical Lead - US
Secude

Watch this short overview video to learn more about what you need to know for Securing CAD Design for Defense Contracts.

Be sure to check out our blog "CMMC 2.0 Explained: What You Must Know for 2025".

Blake Wood
Blake Wood
VP Global Alliances
Secude
Gautam Daswani
Gautam Daswani
President
Gold Comet

In today’s defense industrial base, CAD files are the lifeblood of critical design projects, making their security a top priority. This webinar focuses on the specific cybersecurity challenges and solutions for CAD users working with defense contractors. CISOs and Senior Cybersecurity Managers will learn how to meet stringent defense-related requirements, protect sensitive designs, and ensure compliance with CMMC 2.0.

Key Topics:

  • Meeting defense-related cybersecurity requirements for CAD files.
  • Implementing secure communication protocols when sharing defense designs.
  • The Problem, Mitigation and CMMC 2.0 Requirement

Whether you're navigating the complexities or implementing CMMC 2.0 standards, this session will provide actionable insights to strengthen your CAD security strategy. Ensure your designs remain protected and compliant in the defense space.

Blake Wood
Blake Wood
VP Global Alliances
Secude
Gautam Daswani
Gautam Daswani
President
Gold Comet

Join us for an insightful webinar tailored for professionals in the industrial sector, focusing on critical strategies for securing intellectual property (IP) and CAD files. This session will explore the implementation of zero trust architecture and robust data loss prevention (DLP) measures to ensure comprehensive risk management across your organization.

Key discussion points include:

Securing IP and CAD Files: Learn how to protect your most valuable assets from unauthorized access and cyber threats.

Compliance: Stay ahead of regulatory requirements and ensure your cybersecurity practices meet industry standards.

Zero Trust: Understand the principles of zero trust and how to apply them to create a resilient security framework.

Data Loss Prevention: Explore advanced DLP solutions to prevent data breaches and accidental data leaks. Discover strategies for safeguarding SAP files during export processes to ensure data integrity and confidentiality.

Blake Wood
Blake Wood
VP Global Alliances
Secude
Kevin Poireault
Kevin Poireault
Reporter
Infosecurity Magazine
Peter Wood
Peter Wood
Partner and Lead Consultant
Naturally Cyber LLP
Phil Green
Phil Green
Lead Cyber Essentials Auditor and Founder
Cyber23

Feliciano Intini, Data Security, Risk, Compliance & TrustedCloud Specialist at Microsoft; Davide Bertarelli, Head of Cybersecurity of 4wardPRO; and Blake Wood, Vice President Global Alliances, Secude discuss the implications of the NIS2 directive and and the need to protect CAD files and prevent intellectual property theft in compliance with NIS2 regulation.

*Note: this webinar is presented in Italian and English

Blake Wood
Blake Wood
VP Global Alliances
Secude
Feliciano Intini
Feliciano Intini
Data Security, Risk, Compliance & TrustedCloud Specialist
Microsoft
Davide Bertarelli
Davide Bertarelli
Head of Cybersecurity
4wardPRo

John Tolbert, Director of Cybersecurity Research and Lead Analyst at KuppingerCole Analysts, will provide an overview of the challenges and regulatory drivers of protecting sensitive unstructured and structured data such as found in CAD, PLM, and SAP systems.

Markus Nüsseler-Polke, Head of Consulting & Projects​ at Secude will provide an overview of Secude’s HaloCORE and HaloCAD solutions and how they implement zero-trust principles, extending Microsoft Purview Information Protection (MPIP) to safeguard these key systems.

Markus Nüsseler-Polke
Markus Nüsseler-Polke
Senior SAP Security Consultant
Secude
John Tolbert
John Tolbert
Director of Cybersecurity Research
KuppingerCole

Ensuring compliance with the Department of Defense’s CMMC 2.0 is paramount, but could CAD files be your Achilles’ heel? Join us for a conversation with cybersecurity expert Alex Trafton, Managing Director at Ankura, as he unveils a foolproof method for identifying if CAD files are posing a compliance risk in your CMMC 2.0 framework, along with precise steps to address any issues.

Explore how safeguarding CAD files can be the decisive factor in the distinction between achieving CMMC compliance and facing potential audit failures.

Alex Trafton
Alex Trafton
Senior Managing Director
Ankura
Jay Giunta
Jay Giunta
Technical Lead - US
Secude

In today’s interconnected digital landscape, CAD drawings are among the most prized assets of engineering and manufacturing entities. With regulations like CMMC 2.0 in the US and NIS2 in Europe intensifying, it’s essential to have a crystal-clear roadmap on securing these critical assets.

Join us as we demystify the world of data security in the context of these regulations. Discover Microsoft’s innovative solutions, and get a firsthand look at how Secude’s offerings seamlessly integrate with them to enhance this security framework.

Mike Lord
Mike Lord
Data Security/Compliance Global Blackbelt
Microsoft
Jay Giunta
Jay Giunta
Technical Lead - US
Secude

Be Secure with Secude

Protect your data. Protect your brand.