This online course contains three self-paced lessons:
- The Need for Continuous Monitoring at the DoD [2:51 minutes]
- What is Comply to Connect? [2:06 minutes]
- How to Implement Comply to Connect [3:54 minutes]
The Defense Department created Comply to Connect (C2C) as a way to secure its growing array of network endpoints. It is a formal framework for validating new devices, evaluating their compliance with DoD security policies, and continuously monitoring these assets to ensure they remain in security compliance. It also provides automated remediation of device issues, reducing the impact of maintaining cyber hygiene on cybersecurity administrators.
Enroll in this course to learn the challenges to secure device adoption and connection at DoD, as well as how C2C helps defense agencies overcome those challenges. It also walks through a workflow of four phases to implement the C2C framework and explores solutions that can help automate C2C.
Please fill out the form below to access the course: