WMEP works with manufacturers every day to help companies analyze new and existing technology to develop a framework for SECURE business operations.

Click here to learn how WMEP can help you make you make your company’s data and intellectual property more secure.

The Cybersecurity Standards

NIST Special Publication 800-171

All Department of Defense (DoD) contractors must meet the Defense Federal Acquisition Regulation Supplement (DFARS) minimum cybersecurity standards or risk losing federal contracts. If you’re like many businesses, you may not know what is expected or even how to get started. Not to worry. The WMEP has assembled a team of cybersecurity experts to determine if you are compliant with the requirements described in NIST Special Publication 800-171 and on the path to CMMC certification.

Cybersecurity Maturity Model Certification (CMMC)

The new security framework, Cybersecurity Maturity Model Certification is coming.  It will be required by October 2025.  The new framework is built upon the NIST 800-171 standard but will require more controls and a third-party audit.  This certification will be a requirement for all contracts that handle Federal Contract Information or Controlled Unclassified Information.  WMEP can help you determine what level of certification you need and how to get there.

For Frequently Asked Questions about Compliance. Click here.

The WMEP’s experienced team has designed a comprehensive four-step cybersecurity program. We will help you gauge your current situation and tailor a plan specifically for your internal capabilities, budget and time sensitivity.

Here’s how it works:

Step 1: Discovery – the professional assessment of your company’s practices related to the new standard. If necessary, a gap analysis will be completed to document the scope to be remediated.

Step 2: Remediate to Meet New Standard – supports all necessary fixes to ensure compliance. This may include updates to firewalls, patches, policy development, employee training, physical security, network configuration, etc.

Step 3: Test and Validate – verifies that all technology and physical security aspects are working properly. A penetration test may be necessary.

Step 4: Monitoring/Reporting – establishes ongoing monitoring and scanning of the required enterprise network. Creates a working process to log, remediate and report (as required) cyberattacks.

Ask how WMEP Manufacturing Solutions can help.
Contact Cory Larson today at 608.558.8137 or email [email protected] to get started.

Cory Larson
Consultant – Automation & Cybersecurity
Cory is a registered practitioner by the CMMC-AB (Cybersecurity Maturity Model Certification – Accreditation Board)

608.558.8137 | [email protected]

Case Study: WEM Automation on the Forefront of Operations Technology Cybersecurity

A message on the Internet of Things and Cybersecurity from WMEP and NIST

For Frequently Asked Questions about DFARS Compliance. Click here.


Get to know Eric Decker, Business Development Leader

“The organization’s mission to help improve and strengthen Wisconsin’s manufacturers aligns very closely with my own. I’ve known the WMEP and its staff through my various roles over the years and have always had a lot of respect for the organization.”

414.429.2252 | [email protected]