CMMC-AB Marketplace Listings

*Before a C3PAO can conduct an assessment, they must successfully complete a CMMC ML3 Assessment conducted by DCMA DIBCAC.

CMMC-AB Logo

29 Found

A.B. Closing Corporation D.B.A., Kavaliro

A.B. Closing Corporation D.B.A., Kavaliro

Kavaliro is a CMMC-AB Registered Provider Organization (RPO). This means we are accredited to provide CMMC consulting and support to Organizations Seeking Certification (OSC) in the De…

Ben Ellis, CISSP

Ben Ellis, CISSP

Ben Ellis brings more than 20 years of experience as a Cyber Security (CS) Governance, Risk, & Compliance (GRC) professional, primarily focused on information security, program protection, DEVSECOPS,…

Charles Steward

Charles Steward

ECR has over 100 years combined experience in all levels of IT and computer-related services.

Dickman Technology Consultants

Dickman Technology Consultants

DTC, LLC is a veteran owned, engineering and information system security company supporting clients in the areas of systems engineering, computational modeling and simulation, cybersecurity, cyberspa…

Diligent eSecurity International, Inc.

Diligent eSecurity International, Inc.

Diligent eSecurity International, Inc. (Diligent) provides enterprise level Information Assurance, Governance, Risk, Compliance and Cybersecurity solutions to protect our client's critical informatio…

Dopkins & Company, LLP

Dopkins & Company, LLP

A unique combination of your knowledge of your business, and our knowledge of information security controls and how they work together.

Extend Resources LLC

Extend Resources LLC

Our team has a deep knowledge of information security. Together with years of practical experience and an innovative toolset, we help organizations develop a mature cybersecurity program designed to …

GlobalSecurityIQ

GlobalSecurityIQ

GlobalSecurityIQ is a full service cybersecurity company that is committed to providing comprehensive solutions that leverage cybersecurity best practices, risk assessment strategies, vulnerability s…

Grove Technologies

Grove Technologies

We are a Mac MSP and a member of the Apple Consultants Network. We work to bring stability back to the Mac Business environment by providing next-level Mac Management, Mac Repairs, Mac Purchasing, Ma…

Grove Technologies

Grove Technologies

We take the fear out of preparing for a CMMC assessment. We provide, fair, honest, and reliable CMMC guidance provided by CMMC Registered Practitioners. If you need help with your CMMC assessment …

Holly Hubert, CISSP, CISM, CGEIT, CRISC, GRCP

Holly Hubert, CISSP, CISM, CGEIT, CRISC, GRCP

Background Founder and CEO of GlobalSecurityIQ, a Registered Provider Organization (RPO) and C3PAO, Holly Hubert is a retired FBI Special Agent of 25 years, a highly experienced cybersecurity practi…

Inherent Security

Inherent Security

As Founder of Inherent Security, Larry Trotter II is responsible for defining the mission and vision of the company, ensuring execution aligns with the business purpose. Larry has provided services f…

Jack McCready Ph.D.

Jack McCready Ph.D.

Dr. Jack McCready of JWM Consulting LLC JWM Consulting is a Cybersecurity Compliance Specialist company focusing on small and medium-sized businesses’ DFARS, NIST, CMMC, and GDPR requirements.

Kelser Corporation

Established Technology Success Partner focused on providing robust Cyber Security practices and procedures for the protection of your organizations future.

Marwan Abu-Fadel

Marwan Abu-Fadel

Registered Practitioner assisting businesses achieve their compliance goals. Consults with organizations on best practices and inspection preparation. Advises and assists with implementing variou…

Michael Fry, CISSP, PMP

Michael Fry, CISSP, PMP

Michael Fry is a driven individual that started his career 13 years ago as a network and system administrator for the United States Navy. His positions within the Navy enabled him to gain experience …

Michael Welch

Michael Welch

Subject matter expert in Enterprise Risk Management. Accomplished senior manager with over 20 years’ experience successfully assessing information security risks and designing information security pr…