June 2025

Not Just Talking CMMC — Leading Efforts

🎙️ Cordell Rolle Speaks at Space Coast Women In Defense Annual Awards Panel: CMMC, AI, and How to Stay Smart and Secure

At the Women In Defense Space Coast (WIDSC) Annual Awards Event, Rolle IT’s CEO Cordell Rolle joined an expert panel of cybersecurity and compliance leaders to unpack the evolving challenges of CMMC (Cybersecurity Maturity Model Certification) and Artificial Intelligence (AI). The panel brought together perspectives from across the industry and was expertly moderated by David Bragg from the University of Florida.

Cordell spoke alongside:

  • Reagan Edens, Chief Technologist and Founder at DTC Global
  • Elizabeth Huy, VP of Business Operations at Alluvionic
  • David Bragg, Moderator and Cybersecurity Programs Director, University of Florida

Together, they tackled some of the most urgent and nuanced topics facing the defense industrial base and government contractors today.


🔐 CMMC: Building a Culture of Compliance, Not Just Checking Boxes

The panel opened by reinforcing the mission behind CMMC:

“CMMC isn’t a hurdle — it’s a shield. It’s how we protect our nation’s supply chain, intellectual property, and the future of our industrial base.”

The panel addressed real-world concerns many small and mid-sized contractors face:

  • Confusion around what level of CMMC is required for subcontractors
  • Cost implications of CMMC Compliance and Assessments- which should have already been factored into contract prices
  • Companies looking to “just get compliant” without understanding the risk landscape

Cordell emphasized education and empowerment, not fear-mongering:

“We can’t just talk about compliance as a cost. It’s a capability. It tells our partners we’re ready, responsible, and reliable.”


🤖 AI & Compliance: Smart Technology Needs Smarter Boundaries

The conversation then shifted to Artificial Intelligence — one of the most anticipated and complicated topics of the evening.

Cordell discussed how AI can be a powerful force multiplier in cybersecurity, automating detection, correlation, and even response in ways humans can’t match. But he also cautioned against blind adoption:

“You can’t use just any AI tool in a compliant environment. You need to know exactly where your data is going — and who owns it once it leaves your network.”

One key insight from Cordell: Using AI within your controlled environment — not as an external, public tool — may be the only way to remain compliant under frameworks like CMMC, NIST 800-171, and DFARS.

He challenged companies to ask:

  • Is the AI processing data locally or in the cloud?
  • Is the model trained on your proprietary information — and if so, how is it secured?
  • Can you control retention, deletion, and auditability?
  • Who has access to your prompts, responses, and metadata?
  • How are permissions set for access to information within your environment?

“AI isn’t the enemy — it’s your responsibility. If you can’t explain where your information is going, then you’re not compliant. And you’re definitely not secure.”


🧠 Key Takeaways from the Panel

This year’s WIDSC event brought together government leaders, defense tech innovators, women in STEM, and cybersecurity trailblazers. Cordell’s message was clear:

CMMC compliance is achievable — if you start early and build smart habits
AI should be internalized, audited, and tested before use in sensitive environments
Zero trust applies to software too — especially those with autonomous learning
Education is the strongest defense — and free, public guidance must continue


💬 The Bigger Picture: Rolle IT Leads With Purpose

Cordell Rolle’s panel appearance reflects a broader principle at Rolle IT: We don’t just offer cybersecurity solutions — we help shape the cybersecurity conversation.

From supporting small DIB contractors to contributing on non-sponsored expert panels, Rolle IT shows up where it counts — with practical advice, not a sales pitch.

To learn more about how we support compliant AI adoption, CMMC readiness, and cyber risk reduction, visit us at https://rolleit.com.

Not Just Talking CMMC — Leading Efforts Read More »

It’s not actually an invite to collaborate.

🚨 Security Alert: Business Email Compromise (BEC) Campaign Targeting Government Contractors
Date: June 17, 2025
Threat Level: High
Audience: Government Contractors and Client Partners

Summary:
Rolle IT has identified an active and sophisticated Business Email Compromise (BEC) campaign targeting government contractors and their clients. In this campaign, attackers are sending emails directly from legitimate, but compromised email accounts belonging to trusted partners, subcontractors, or government personnel. As a result, these messages appear authentic at first glance — they may pass SPF/DKIM checks and match known contacts in your address book.

However, the contents of the emails are malicious. The embedded links redirect to fraudulent document-sharing portals or credential harvesting sites. In many cases, the email signature blocks have been altered or spoofed — they may look familiar but include subtle changes or incorrect information.

This compromise prompts users to log into their OneDrive, allowing the bad actors access to critical systems and accounts.

Key Red Flags to Watch For:

Inflated Sense of urgency to complete a task
Unexpected document collaboration requests or urgent contract discussions
Hyperlinks pointing to suspicious or non-standard domains
Slight alterations in email signature details (phone numbers, job titles, etc.)
Odd tone or timing of emails from known contacts

What You Should Do:

Do not click on unexpected or unsolicited document links — even if they come from known contacts.
Verify independently via phone or a different communication method before responding or opening any attachments.
Report immediately to your IT or security team if you suspect compromise.
Ensure MFA is active on all user accounts and that staff are trained on BEC red flags.
Ensure you have appropriate Email Security Protection.

Need Assistance?

If your organization is targeted or if you have concerns about a suspicious message, contact Rolle IT Cybersecurity Services at info@rolleit.com.
hashtag#BEC hashtag#receipts hashtag#Rolleit hashtag#cybersecurity hashtag#ITRemediation hashtag#cybersecurity hashtag#emailsecurity

business email compromise warning

It’s not actually an invite to collaborate. Read More »