Jeff Baldwin, D.Sc.

Jeff Baldwin, D.Sc.

Melbourne, Florida, United States
500+ connections

Services

Articles by Jeff

  • Can you have a POA&M in CMMC?

    Can you have a POA&M in CMMC?

    You may have heard somewhere over the years that you cannot have a Plan of Action & Milestones in CMMC, but this…

    11 Comments
  • Endpoints accessing VDI can be out of scope for CMMC

    Endpoints accessing VDI can be out of scope for CMMC

    Back in 2020, I wrote an article about whether the endpoints connecting to Virtual Desktop Infrastructure (VDI) should…

    16 Comments
  • Opinion: Not All FOUO Should Be CUI

    Opinion: Not All FOUO Should Be CUI

    Usual disclaimer: this article and the opinions within are my own and not those of any of my employers. I also will not…

    17 Comments
  • PSA: Unmarked does not mean publicly releasable

    PSA: Unmarked does not mean publicly releasable

    Usual disclaimer: this article and the opinions within are my own and not those of any of my employers. I also will not…

    1 Comment
  • CMMC Opinion: Scoping Security Protection Assets (SPA)

    CMMC Opinion: Scoping Security Protection Assets (SPA)

    Disclaimer: this article and the opinions within are my own and not those of any of my employers. I also will not be…

    21 Comments
  • How does DoDI 5200.48 apply to defense contractors?

    How does DoDI 5200.48 apply to defense contractors?

    Usual disclaimers, this article and the opinions within are my own and not those of any of my employers. I also will…

    52 Comments
  • Discussion on N/A for 800-171 and CMMC

    Discussion on N/A for 800-171 and CMMC

    EDIT: This article was written for CMMC 1.0 and has not been updated for CMMC 2.

    11 Comments
  • Home Inspections as part of CMMC?

    Home Inspections as part of CMMC?

    Usual disclaimers, this article and the opinions within are my own and not those of any of my employers. I also will…

    37 Comments

Activity

Join now to see all activity

Licenses & Certifications

Publications

  • Cyber Supply Chain Risk Management (C-SCRM) across the Defense Industrial Base (DIB): A Cross-Sectional Survey of NISTIR 8276 Key Practices

    Capitol Technology University ProQuest Dissertations Publishing

    National Institute of Standards and Technology Interagency Report (NISTIR) 8276 identifies a
    set of Key Practices in Cyber Supply Chain Risk Management (C-SCRM) that any organization
    can use to manage cybersecurity risks associated with their supply chains. NISTIR 8276 was
    published in February 2021, and information about the prevalence of these practices has not
    previously been researched. Since only 25 organizations were used in the development of
    NISTIR 8276, there is…

    National Institute of Standards and Technology Interagency Report (NISTIR) 8276 identifies a
    set of Key Practices in Cyber Supply Chain Risk Management (C-SCRM) that any organization
    can use to manage cybersecurity risks associated with their supply chains. NISTIR 8276 was
    published in February 2021, and information about the prevalence of these practices has not
    previously been researched. Since only 25 organizations were used in the development of
    NISTIR 8276, there is limited information about the practices of organizations that were not
    included in the creation of NISTIR 8276. The problem researched by this study is that there is a
    lack of data regarding the sentiment and current state of implementation of the recommendations
    and Key Practices of NISTIR 8276 across the United States Defense Industrial Base (DIB). This
    quantitative research study surveyed 121 participants to capture data about the sentiments and
    the implementation status of the 8 Key Practices and 24 recommendations from NISTIR 8276.
    The survey questionnaire included 46 close-ended questions. The first section of the
    questionnaire asked biographical questions that were used as variables to compare results and
    test hypotheses. The second section of the questionnaire captured sentiment about the C-SCRM
    Key Practices with a Likert scale. The third section of the questionnaire asked participants to
    self-report their organization’s implementation status against the 24 recommendations.

    See publication

Courses

  • Applied Database Management

    -

  • Applied Wireless Network Security

    -

  • Complementary Security

    -

  • Computer Forensics & Incident Handling

    -

  • Database Appl and Programng I

    -

  • Database Concepts

    -

  • Effective Speaking

    -

  • Essentials of Info Security

    -

  • Financial Accounting

    -

  • Fundamentals of Management

    -

  • Human Resource Management

    -

  • Internal Protection

    -

  • Internetworking I

    -

  • Internetworking II

    -

  • Intro to Information Tech

    -

  • Intro to Programming for IT

    -

  • Intro to Web Page Development

    -

  • Legal Aspects of Computer Security & Information Privacy

    -

  • Malicious Software

    -

  • Management Communications

    -

  • Microcomputer Systems I

    -

  • Network & Host Security

    -

  • Network Administration

    -

  • Network Design Concepts

    -

  • Network Systems Security Concepts

    -

  • Networking I

    -

  • Networking II

    -

  • Object-Oriented Programming

    -

  • Perimeter Protection

    -

  • Precalculus

    -

  • Principles of Economics I

    -

  • Project Management

    -

  • Secure Info Transfer & Storage

    -

  • Security Risk Management

    -

  • Sft Op and Interoperability

    -

  • Spanish I

    -

  • Statistics I

    -

  • Systems Analysis & Design

    -

  • Technical Writing

    -

  • Visual Programming & Development

    -

  • Vulnerability Mitigation

    -

  • Wireless Security

    -

Languages

  • English

    Native or bilingual proficiency

Recommendations received

More activity by Jeff

View Jeff’s full profile

  • See who you know in common
  • Get introduced
  • Contact Jeff directly
Join to view full profile

Other similar profiles

Explore collaborative articles

We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.

Explore More

Add new skills with these courses