Transcript
A (0:00)
All right, folks, it is March of 2026 and we are at war with Iran. So there's two things that you need to know. First of all, they are a real cyber threat. And two, if you are a defense contractor, you're a target. So the question is, does CMMC help mitigate Iranian cyber threats? Hell yeah. And we have the numbers to prove it. We analyze 130 cyber techniques used by five different known Iranian cyber threat groups in the real world. And it turns out that the cyber requirements that defense contractors have had since 2016 still punch way above their weight class. And that's what we're going to talk about today. Jason, it is a rational question that a lot of people have. They say, how effective are these security requirements? And in actuality, and we went through all of the real world techniques used by Iranian cyber threat groups, turns out they're very effective. And I think people go into that question with sometimes an agenda and they sort of assume that these basic security requirements from 2016 can't possibly help a defense contracting business defend themselves against nation states. And it turns out that basic fundamentals, the blocking and tackling of cybersecurity from 30 years ago, like least privilege and baseline configuration and so on and so forth, are just as effective today as they were when they were created decades ago.
B (1:38)
You know, Jacob, the great poet Ric Flair once said, to beat the man, to be the man, you gotta beat the man. Woo.
A (1:48)
Right.
B (1:48)
And so to be the man. I think establishing yourself as a man, as a minimum security baseline is when you said years after your establishment, you're punching above your weight class. And the foundations that you establish for the organizations that implement you are good enough to stand up to threats at this point in time or to give you the capability to at least slow them down just a little bit. But that's what we've been saying all along, right?
A (2:12)
Yeah, absolutely. Well, we've got the analysis to prove what's going on. This is really just a high level summary of the presentation that I gave last October at CS5. But we'll get through all the highlights and give you guys the information that you need to know. So real quick, the three takeaways for you guys at the top of the episode. First of all, CMMC does not create security, it's verifying it.
B (2:35)
Right?
A (2:35)
We've said this many, many times. CMMC is a verification program for other pre existing cyber requirements imposed on defense contractors via other, other contract clauses. So CMMC is there to verify your compliance. It's requirements in baselines like NIST, SP 800171 that are doing the heavy lifting. If it was a different baseline, CMMC would be verifying that CMMC is just the verification mechanism and against these real world, in this case, Iranian cyber threats. All of Those requirements in SP 800171 really do hold up. That's why the assurance provided by CMMC verification is so valuable to the Department of Defense. They know the requirements work, so they need to know that you have implemented them. And as we all know, the history of the program came about because they knew that people weren't doing them. That's why the program is valuable is because of its verification. Second, the 2016 error requirements still disrupt 2026 adversaries and the threats that they pose in the cyber environment. So using data from the mitre, ATT and CK framework, which we'll explain in a little while, we looked at the real world techniques from five different Iranian threat groups. 100% of the techniques that are known to be used by these Iranian threat groups can be detected. If you have the right security controls in place. 68% of the techniques that can be mitigated are mitigatable. Right, if that makes sense. There are security controls to straight up mitigate 68% of the things that we know that these guys do in the real world. And just four security controls will blunt nearly all of the activity from those cyber intrusions and the cyber threat groups. So. So it's a very, very efficient way to mitigate a significant level of advanced adversary activity with just a handful of security controls. And again, this is not our theory. This is not something that we just thought of. This is not a sales pitch. This is based on real world activity as analyzed and mapped by the fine folks at mitre, as mapped by the
