CMMC-AB Marketplace Listings

*Before a C3PAO can conduct an assessment, they must successfully complete a CMMC L2 Assessment conducted by DCMA DIBCAC.

CMMC-AB Logo

11 Found

Accuratus LLC

Accuratus LLC

Accuratus is vendor independent cybersecurity, information security, compliance and audit consulting firm. We provide a comprehensive range of services across multiple industries to help businesses s…

Adanna Onyewuchi

Adanna Onyewuchi

Associate Director | Protiviti Government Services | Technology Consulting – Security & Privacy

Carl Carpenter

Carl Carpenter

Highly experienced and certified cybersecurity professional interacting with all levels of federal, state, and local governments as well as commercial entities in highly regulated environments such a…

Centre Technologies, Inc.

Centre Technologies, Inc.

Centre Technologies is a full-service IT consulting and managed services provider headquartered in Texas. As a trusted IT partner for well over a decade, Centre is recognized for its local experience…

Duffy Compliance Services

Duffy Compliance Services

DCS has a proven methodology that sets us apart. Anyone can look at the compliance security requirements. The real power comes from knowing how to interpret security requirements and apply them in…

Emagined Security, Inc.

Emagined Security, Inc.

Emagined Security offers corporations a comprehensive array of sophisticated, adaptive security solutions that include both consulting and managed services.  In support of this initiative, Emagined S…

Eric Chapman

Eric Chapman

CISSP. 15 year veteran in IT and Cybersecurity. Proven leader who fights for his team and his clients. Determined to ensure success in mission to become CMMC certified.

Kristi Gilliat

Kristi Gilliat

As a risk professional with more than 18 years of experience, Kristi has focused her career on security risk and compliance and can seamlessly translate those concepts to a non-technical audience. Sh…

Steven Oneill

Steven Oneill

Versatile, creative information security executive with over fifteen (15) years’ of experience in secure technology implementations of networking equipment, systems architecture, systems configuratio…