Product Manager at Enova Technology, leading the development and strategy for innovative tech products.
1. Introduction to CMMC 2.0 and Latest Trends
The role of CMMC in national defense and enterprise supply chains
Key requirements and levels of CMMC 2.0 (L1-L3)
2. Security risks and compliance challenges for Edge AI
The shift of AI computing from cloud to edge
Common cybersecurity threats to Edge AI devices (unauthorized access, data breaches, hardware implants)
CMMC regulates data protection in Edge AI environments
3. Building a CMMC compliant security architecture with Root of Trust (RoT)
Ensuring system integrity through FIPS 140-2 certified hardware encryption
Implementing identity authentication and device protection with MX+ solutions to meet CMMC requirements
4. End-to-End data protection and CMMC Compliance
Data at Rest (DAR): FIPS 140-2 L2/L3 encrypted storage to secure sensitive data
Data in Transit (DIT): Secure communication and end-to-end encryption via APIs to prevent middle attack
Data in Use (DIU) security mechanisms: Protecting AI models and inference results from unauthorized access
CYBERSEC 2025 uses cookies to provide you with the best user experience possible. By continuing to use this site, you agree to the terms in our Privacy Policy 。