Previous All Posts Next

CMMC vs HIPAA: Defense Health 2026 Compliance Guide

Posted: December 31, 1969 to Compliance.

If your contract portfolio includes both a Defense Department prime relationship and any clinical, telehealth, occupational health, or behavioral health workload, you have two regulatory regimes pointed at the same network. The Cybersecurity Maturity Model Certification program governs how you handle Controlled Unclassified Information for the Defense Industrial Base. The HIPAA Security Rule governs how you handle electronic Protected Health Information for the United States healthcare system. They are written by different agencies, enforced by different inspectors, breach-reported through different portals, and certified on different cadences. Yet on the day a CUI-bearing system also processes ePHI - and that day is now routine across the Defense Health Agency, VA contracting, Tricare backend, military behavioral health, and medical-device supply chains - the two regimes collide inside one System Security Plan, one incident response runbook, and one assessor calendar.

This article is the dual-regulated buyer's view of how CMMC and HIPAA actually overlap, where they diverge, what a hybrid compliance program looks like in practice, and how to scope the engagement so you are not paying two consultants to write the same control narrative twice. It is not a primer on either framework in isolation. For framework-vs-framework basics, our CMMC vs ISO 27001 pillar covers the international-standard angle, and our CMMC vs NIST 800-171 comparison walks through the underlying control catalog. This article assumes you already know what CMMC and HIPAA are, and you need to operate both at once.

Petronella Technology Group is a Cyber AB Registered Provider Organization (RPO #1449) in Raleigh, North Carolina, with an entire CMMC-RP certified team and ComplianceArmor, our compliance documentation platform that maintains dual-regime evidence trails. The hybrid defense-health customer is one of our core specialties. The trade-offs below reflect what actually appears across these engagements, not a theoretical mapping exercise.

1. Framework Origin and Authority: DoD vs HHS Threat Models

CMMC and HIPAA were authored to defend two completely different things, and that authorship history shows up in every clause downstream. CMMC traces its lineage to the 2010 Executive Order 13556 on Controlled Unclassified Information, then to DFARS 252.204-7012 (the 2013 safeguarding clause), then to NIST SP 800-171 as the operational control catalog, then to DoD's 2019 CMMC 1.0 maturity-model wrapper, then to the streamlined 2021 CMMC 2.0 release, and finally to the 32 CFR Part 170 final rule that codified CMMC into the DFARS clause set. The authority is the Department of Defense acting under Title 10 acquisition powers, with the Cyber AB as the accreditation body and C3PAO assessors as the credentialed third parties. The threat model is foreign-state CUI exfiltration, supply-chain compromise of weapons-systems IP, and economic espionage targeted at the DIB.

HIPAA traces its lineage to the Health Insurance Portability and Accountability Act of 1996, with the Privacy Rule and Security Rule promulgated by the Department of Health and Human Services through the Office for Civil Rights (OCR). The HITECH Act of 2009 added breach notification requirements and stronger enforcement teeth. The authority is HHS acting under Title 42 public-health powers, with OCR conducting audits and levying civil monetary penalties through administrative proceedings. The threat model is ePHI disclosure that harms the patient, employer discrimination based on health status, identity theft from medical-record exfiltration, and the broader public-health system trust erosion that follows large healthcare breaches.

Why this matters operationally: when a single incident hits a hybrid CUI-and-ePHI system, you have potentially two breach-notification clocks running in parallel against two different reporting portals. CMMC-relevant incidents involving CUI exfiltration flow through DoD's DIBNet portal under DFARS 252.204-7012 within 72 hours, with a Cyber Incident Reporting Tool (CIRT) submission and a follow-on damage-assessment workflow. ePHI breaches flow through the HHS OCR Breach Reporting Portal, with breaches affecting 500 or more individuals reportable within 60 days of discovery, smaller breaches in an annual log, and media notification required for any state affected by a 500-plus incident. The two regimes do not coordinate. The same forensic report has to be packaged twice, with different metadata, against different deadlines, by personnel who may be wearing different hats on the response team.

The assessor populations are also different. C3PAOs operate under Cyber AB credentialing with published assessment objectives drawn from NIST SP 800-171A. HIPAA assessments are typically conducted by either an OCR investigator (post-incident or in response to a complaint) or a private auditor performing a HIPAA risk analysis under the Security Rule's required Administrative Safeguard 164.308(a)(1)(ii)(A). The same control evidence may satisfy both audiences, but the audit objectives, sampling plans, and documentation conventions differ enough that an SSP written for one regime in isolation will draw findings in the other.

2. Who Must Comply: The Dual-Regulated Buyer Persona

The dual-regulated buyer is not a niche. Across the Defense Health Agency footprint alone there are thousands of subcontractor relationships where CUI and ePHI live on the same engineering laptop, the same private cloud, or the same SaaS tenant. The following persona archetypes account for the majority of hybrid engagements we see.

Defense Health Agency subcontractors. The DHA contracts for behavioral health, occupational medicine, telehealth, electronic health record integration, claims adjudication, and revenue-cycle services across the military health system. The data crossing these contracts is ePHI under HIPAA. The contract envelope is DFARS-clausable and frequently carries CUI markings on technical drawings, treatment protocols tied to operational deployment, or aggregated health intelligence relevant to force-readiness assessment. The subcontractor inherits both regimes.

Military medical device manufacturers. Companies building battlefield trauma kits, deployable diagnostic imaging, field-hospital monitoring, or wearable physiological telemetry for service members operate under FDA quality system regulation, ITAR if the device has dual-use export concerns, CMMC if technical data packages contain CUI, and HIPAA if the device transmits identifiable health data back to a covered-entity backend. A single product line can land four compliance regimes on one engineering team.

Tricare backend providers. Tricare network claims processing, prior authorization workflows, pharmacy benefit management, and provider credentialing all involve covered-entity-equivalent data flows. When the backend processor is also handling DoD-funded program integrity analytics or fraud-detection workloads that touch CUI, the dual stack engages.

VA-adjacent SaaS vendors. The Department of Veterans Affairs is a covered entity for HIPAA purposes. Contract vehicles like Transformation Twenty-One Total Technology (T4NG) and Veterans Affairs Enterprise Cloud routinely require both FedRAMP authorizations and CMMC alignment where CUI is involved. Many SaaS vendors serving veteran care end up running parallel FedRAMP, HIPAA Business Associate, and CMMC workstreams against the same product.

Military behavioral health subcontractors. Embedded behavioral health teams supporting deployable units, sexual assault response programs, and post-deployment care contracts produce highly sensitive ePHI alongside operational reporting that can carry CUI markings. The privacy expectations from clinicians, the security expectations from the contracting officer, and the operational-security expectations from the unit commander all converge on a single record system.

If you recognize your contract portfolio in two or more of these archetypes, the dual-regulated playbook below is the operating model you need. If you are pure-play DIB (no health data) or pure-play healthcare (no DoD prime), the single-regime guidance from our standalone CMMC compliance pillar or HIPAA compliance pillar is more efficient.

3. Control Overlap Matrix: Where CMMC 800-171 r2 and r3 and HIPAA Security Rule Map

The good news is that roughly 70 percent of the technical control surface area overlaps. The bad news is the 30 percent gap is where most dual-compliance programs fail an audit, because the team assumed HIPAA-good meant CMMC-good (or vice versa) and skipped the differentiated work. The table below walks through the major NIST SP 800-171 control families and shows the corresponding HIPAA Security Rule safeguards.

NIST SP 800-171 Family HIPAA Security Rule Safeguard (45 CFR 164) Overlap Quality
3.1 Access Control164.308(a)(3) Workforce Security, 164.308(a)(4) Information Access Management, 164.312(a) Technical Access ControlStrong overlap
3.2 Awareness and Training164.308(a)(5) Security Awareness and TrainingStrong overlap
3.3 Audit and Accountability164.312(b) Audit ControlsStrong overlap (CMMC stricter on retention)
3.4 Configuration ManagementImplicit in 164.308(a)(8) Evaluation and 164.310(d) Device and Media ControlsPartial overlap (CMMC stricter)
3.5 Identification and Authentication164.312(d) Person or Entity AuthenticationStrong overlap
3.6 Incident Response164.308(a)(6) Security Incident ProceduresPartial overlap (different reporting destinations)
3.7 Maintenance164.310(a)(2)(iv) Maintenance RecordsStrong overlap
3.8 Media Protection164.310(d) Device and Media ControlsStrong overlap (CMMC stricter on sanitization)
3.9 Personnel Security164.308(a)(3) Workforce Security, 164.308(a)(3)(ii)(C) Termination ProceduresStrong overlap
3.10 Physical Protection164.310(a) Facility Access Controls, 164.310(b) Workstation Use, 164.310(c) Workstation SecurityStrong overlap
3.11 Risk Assessment164.308(a)(1)(ii)(A) Risk Analysis, 164.308(a)(1)(ii)(B) Risk ManagementStrong overlap
3.12 Security Assessment164.308(a)(8) EvaluationPartial (CMMC requires C3PAO, HIPAA self-assessable)
3.13 System and Communications Protection164.312(e) Transmission Security, 164.312(a)(2)(iv) EncryptionPartial (CMMC requires FIPS 140 validated modules)
3.14 System and Information Integrity164.308(a)(5)(ii)(B) Protection from Malicious SoftwarePartial (CMMC stricter on flaw remediation tempo)
3.15-3.17 (r3 additions: Planning, System Services Acquisition, Supply Chain Risk)No direct HIPAA analog (Business Associate Agreements partially address supply chain)CMMC unique

The 70 percent overlap is real. Multi-factor authentication, encryption in transit, audit logging, workforce training, access reviews, and termination procedures are written in slightly different language across the two regimes, but a single implementation typically satisfies both. The 30 percent gap is where the work happens.

On the CMMC-stricter side, FIPS 140 validated cryptographic modules are a hard CMMC requirement at Level 2 and above. HIPAA addressable-implementation language permits compensating controls, and many HIPAA-only programs run on non-FIPS encryption that meets the statute but fails the CMMC objective. CUI marking, labeling, and handling procedures are CMMC-unique and require physical and digital marking workflows that have no HIPAA analog. Supply chain risk management (the 800-171 r3 additions) requires a documented vendor risk program that goes well beyond the HIPAA Business Associate Agreement.

On the HIPAA-stricter side, minimum-necessary access is a HIPAA Privacy Rule principle that does not exist as a CMMC concept. The Business Associate Agreement framework, breach-notification individual-level letters, the 60-day individual notification clock, and the Notice of Privacy Practices are all HIPAA-unique requirements with no CMMC counterpart. Patient access rights under 45 CFR 164.524 and accounting of disclosures under 164.528 add data-subject workflow that a CUI program would never face.

4. Where CMMC Exceeds HIPAA (and Where HIPAA Exceeds CMMC)

The differentiated work above deserves a closer walk because it is where dual-regulated programs either succeed or collect findings.

CMMC exceeds HIPAA on cryptographic rigor. NIST SP 800-171 control 3.13.11 requires FIPS-validated cryptography to protect CUI confidentiality. The Cyber AB scoring guide and the NIST SP 800-171A assessment objective treat this as a hard requirement, not an addressable safeguard. Practical impact: full-disk encryption using BitLocker in non-FIPS mode passes HIPAA but fails CMMC. The remediation is enabling FIPS mode (Group Policy or registry setting) plus validating that the chosen TLS suite and VPN configuration are using FIPS-validated modules end to end. Most healthcare-first IT teams have never traced this through their stack.

CMMC exceeds HIPAA on CUI marking and handling. The CUI program established under 32 CFR 2002 imposes specific marking conventions on documents, emails, removable media, and (where applicable) physical artifacts. HIPAA has no analog. A subcontractor producing a deliverable that combines clinical narrative (ePHI) with technical specifications (CUI) must mark the combined document under CUI handling rules even though the underlying ePHI carries no marking obligation. Training the workforce on this distinction is itself a control objective.

CMMC exceeds HIPAA on supply chain. NIST SP 800-171 r3 adds a supply chain risk management family that requires documented vendor selection, vendor assessment, and vendor monitoring procedures aligned to the criticality of each upstream component. HIPAA addresses this only through the Business Associate Agreement framework, which is a contractual instrument, not a risk-management program. A hybrid program needs both: BAAs for all ePHI flows and a supply-chain risk assessment for all CUI flows, with the assessment going deeper than the BAA on technical posture.

CMMC exceeds HIPAA on flaw remediation tempo. Control 3.14.1 requires identifying, reporting, and correcting flaws in a timely manner, and the assessor will ask for the procedural definition of timely. Most mature CMMC programs commit to critical-severity remediation inside 14 days and high-severity inside 30. HIPAA permits a slower cycle, particularly for non-internet-facing systems, and a HIPAA-only program may not have a written tempo at all.

HIPAA exceeds CMMC on minimum necessary. The Privacy Rule's minimum-necessary standard at 45 CFR 164.502(b) requires limiting use and disclosure of ePHI to the minimum amount needed for the intended purpose. CMMC has nothing comparable. A dual-regulated subcontractor needs role-based access enforcement that goes finer than CMMC requires, with specific role definitions tied to specific data classes and a documented justification for each role's ePHI access scope.

HIPAA exceeds CMMC on breach notification scope and clock. A reportable HIPAA breach affecting 500 or more individuals triggers individual notification letters, media notification in the affected state, OCR portal submission, and (under HITECH) potential involvement of state attorneys general. The clock is 60 days from discovery to individual notification, with daily-update content requirements for breaches still under investigation. CMMC incident reporting is faster (72 hours) but narrower (DIBNet portal only, with the CIRT submission, plus the damage assessment workflow). A dual program needs both clocks running and both notification templates pre-built.

HIPAA exceeds CMMC on Business Associate scoping. The Business Associate framework cascades obligations to every downstream party that creates, receives, maintains, or transmits ePHI on behalf of the covered entity. The BAA chain can run three or four parties deep. CMMC scoping for CUI is generally more contained: prime, sub, sub-sub. A hybrid program needs to maintain the BAA chain (HIPAA) and the CUI flow-down clauses (DFARS 252.204-7012 paragraph (m)) as parallel scoping exercises, with neither one shortcut against the other.

HIPAA exceeds CMMC on data-subject rights. Patient access requests under 164.524, accounting of disclosures under 164.528, and amendment requests under 164.526 require operational workflows that CMMC simply does not contemplate. A dual program must own these workflows for the ePHI surface even when the same data is also CUI-marked, and the workflow has to navigate the tension between patient transparency rights and CUI handling rules. This is one of the genuinely hard spots in the hybrid program.

5. The Hybrid Contractor Compliance Playbook

The most expensive mistake a dual-regulated buyer makes is to run two compliance programs in parallel with separate consultants, separate SSPs, separate risk registers, and separate evidence repositories. The cost shows up in three places: redundant control narratives that drift out of sync over time, contradictory findings between auditors who do not coordinate, and remediation backlogs that double-count the same root-cause fix against two POAMs. The playbook below is the operating model that avoids all three.

Step 1: Build a single SSP that satisfies both regimes. The System Security Plan is the master document. Structure it around the NIST SP 800-171 control families (because CMMC assessment is the more rigorous of the two and the SSP is a hard requirement under DFARS 252.204-7012). For each control narrative, append a HIPAA Security Rule mapping pointer using the matrix from section 3 above. Where CMMC exceeds HIPAA, the CMMC narrative is the authoritative implementation. Where HIPAA exceeds CMMC, add a HIPAA-specific appendix that extends the CMMC narrative without contradicting it. The result is one document, one version control thread, one set of approvals, and a single source of truth that both assessor populations can read against their own objective set.

Step 2: Integrated incident response runbook. A single security incident on a hybrid system can trigger both the CMMC 72-hour DIBNet clock and the HIPAA breach-assessment process simultaneously. The incident response runbook must explicitly call out the dual-notification decision tree: data classification first (is the affected data CUI, ePHI, or both?), then containment and forensic evidence preservation (a CUI-bearing system requires DoD-aligned forensic preservation under the CIRT submission), then the dual-clock parallel-track notifications (DIBNet submission within 72 hours, HIPAA breach assessment within 60 days of discovery for individual notifications). Tabletop the runbook against a hybrid scenario at least once a year. The exercise consistently surfaces gaps that single-regime tabletops miss.

Step 3: C3PAO selection considerations for healthcare-defense. Not every C3PAO has experience with hybrid CUI-ePHI environments. When scoping a Level 2 certification assessment, ask candidate C3PAOs whether they have assessed organizations with HIPAA-regulated workloads on the same boundary as CUI. The right answer is yes with examples. The wrong answer is silence followed by a generic statement that CMMC does not address HIPAA. The latter is technically correct but operationally unhelpful: you need an assessor who can read your SSP and understand why a specific control narrative references both regimes without writing it up as scope-creep.

Step 4: Harmonized risk assessment cadence. HIPAA requires a documented risk analysis under 164.308(a)(1)(ii)(A) and risk management under 164.308(a)(1)(ii)(B). CMMC inherits the NIST SP 800-171 risk assessment family (3.11) which requires periodic risk assessment, vulnerability scanning, and remediation tracking. The HIPAA Security Rule does not specify a cadence; CMMC under the program rule implies an annual minimum. Set a single quarterly risk assessment cadence that satisfies both. Use one risk register that classifies each finding by impacted-data-class (CUI, ePHI, both, neither) so that POA&M remediation can be reported into both regimes from the same source.

Step 5: Unified evidence repository. ComplianceArmor and equivalent SaaS platforms let you maintain a single evidence tree mapped to both NIST SP 800-171 controls and HIPAA Security Rule safeguards. Each artifact (policy, screenshot, configuration export, training record) is tagged with the regimes it satisfies. When the C3PAO comes onsite or the OCR investigator requests records, the evidence pulls are scoped by regime without rewriting the documents. ComplianceArmor was built explicitly for this kind of multi-regime mapping.

Step 6: Joint training cadence. The HIPAA-required annual workforce training and the CMMC awareness and training family (3.2) can be delivered as one curriculum with two attestation surfaces. The curriculum covers ePHI handling, CUI marking, incident reporting decision tree, BAA scope reminders, and the dual-notification call paths. Each workforce member signs both an ePHI handling attestation and a CUI handling attestation, and both attestations live in the unified evidence repository.

6. Cost of Dual-Compliance: Realistic Engagement Sizing

Dual-compliance engagement sizing depends on the starting posture of your environment, the size of your in-scope user base, the complexity of your data flows, and whether you already have an SSP that just needs HIPAA mapping (or vice versa). The phases below reflect typical engagement shape for a mid-sized DoD-health subcontractor (25 to 150 employees, single network boundary, hybrid SaaS plus on-prem). All pricing is From-pricing because final scope depends on discovery; specific numbers are provided after the discovery phase.

Discovery: 4 to 6 weeks. Inventory all CUI flows under DFARS 252.204-7012 paragraph (b) and all ePHI flows under 45 CFR 164. Map the network and SaaS boundary to identify systems that touch one or both data classes. Identify all BAAs in place and all DFARS flow-down obligations. Produce a discovery report with a regime-tagged data-flow diagram, an SSP gap list, and a HIPAA risk-analysis gap list.

Gap analysis: 6 to 8 weeks. For each NIST SP 800-171 control, document current state and target state. For each HIPAA safeguard, document current state and target state. Identify overlaps and conflicts. Produce a unified gap register classified by regime, severity, and effort. Cost-load remediation tasks for budgeting.

Remediation: 12 to 24 weeks. Implement the technical and procedural controls identified in the gap analysis. Typical workstreams include FIPS-validated cryptography across the boundary, MFA rollout with phishing-resistant factors where feasible, audit logging with the retention period that satisfies the longer of the two regime requirements, RBAC role definitions that satisfy HIPAA minimum-necessary while preserving CMMC need-to-know, supply chain risk assessment for all CUI-handling vendors plus BAA renewals for all ePHI-handling vendors, and the unified SSP build.

Pre-assessment readiness: 4 to 6 weeks. Tabletop the incident response runbook against a hybrid scenario. Conduct internal C3PAO-style assessment dry-run. Run a HIPAA Security Rule self-assessment. Close any residual findings. Submit SPRS score (CMMC) and HIPAA risk-analysis attestation. Prepare evidence bundles tagged by regime.

Pricing is From-pricing across all phases. Total engagement runs From $50,000 to From $250,000 depending on size and starting posture, with ongoing ComplianceArmor SaaS plus optional managed-compliance retainer for evidence maintenance, POA&M lifecycle, and regulatory-update tracking. We provide firm pricing after the discovery phase. Schedule a no-cost scoping call at our contact page or call (919) 348-4912 to discuss your specific dual-regulated environment.

7. FAQ: CMMC vs HIPAA for Defense Health

Does HIPAA compliance count as evidence for CMMC Level 2?

Partially. HIPAA Security Rule evidence will satisfy roughly 70 percent of the NIST SP 800-171 control objectives, particularly across access control, audit logging, training, and physical protection. The 30 percent gap (FIPS validated cryptography, CUI marking, supply chain risk, flaw remediation tempo) requires CMMC-specific implementation and evidence. A C3PAO will not accept a HIPAA risk analysis as a substitute for the NIST SP 800-171A assessment objectives.

If I have a single incident affecting both CUI and ePHI, do I report twice?

Yes. The DFARS 252.204-7012 CUI cyber incident report to DIBNet within 72 hours is independent of the HIPAA breach assessment process and (if required) the 60-day individual notification clock under 45 CFR 164.404. Your incident response runbook should explicitly handle the dual notification path. Coordinate forensic preservation so the same evidence package supports both reports.

Can a single SSP satisfy both CMMC and HIPAA?

Yes, and that is the recommended pattern. Structure the SSP around the NIST SP 800-171 control families (which CMMC assessment requires) and append HIPAA Security Rule mapping pointers for each control narrative. Where HIPAA imposes additional obligations (minimum-necessary, data-subject rights, BAA scoping) add a HIPAA-specific appendix. One document, one version control thread, two regime-aligned reads.

Does CMMC require Business Associate Agreements?

No. CMMC uses the DFARS 252.204-7012 paragraph (m) flow-down clause to cascade CUI obligations to subcontractors. Business Associate Agreements are a HIPAA construct under 45 CFR 164.504(e). A hybrid program maintains both: DFARS flow-down for CUI subcontractors, BAAs for ePHI subcontractors, and frequently both for vendors handling combined data.

Is FIPS 140 validated cryptography required by HIPAA?

HIPAA encryption is an addressable implementation specification under 164.312(a)(2)(iv) and 164.312(e)(2)(ii). NIST has guidance recommending FIPS validated modules but the Security Rule does not impose it as a hard requirement. CMMC, by contrast, treats FIPS validated cryptography under NIST SP 800-171 control 3.13.11 as a hard objective at Level 2 and above. Hybrid programs should default to FIPS validated modules across the boundary to clear the stricter requirement.

Should I use one consultant for both CMMC and HIPAA, or specialists for each?

For environments where CUI and ePHI live on the same boundary, a single RPO who understands both regimes is usually more efficient than parallel single-regime consultants. The shared SSP, integrated incident response, and unified evidence repository are easier to maintain under one practice. Petronella Technology Group (RPO #1449) is structured to deliver the hybrid engagement; if your environment is single-regime, a specialist in that regime alone may serve you better.

Need a hybrid CMMC and HIPAA compliance program scoped against your actual defense-health contract portfolio?

Petronella Technology Group operates as Cyber AB RPO #1449 with a full team of CMMC-RP certified practitioners. Craig Petronella holds CMMC-RP, CCNA, CWNE, DFE #604180 and MIT-Certified credentials in AI and Blockchain. BBB A+ accredited since 2003, headquartered at 5540 Centerview Dr., Suite 200, Raleigh, NC 27606.

Schedule a Dual-Compliance Scoping Call   Call (919) 348-4912

Further reading. If you are still building the framework comparison view, our CMMC vs ISO 27001 pillar covers the international-standard angle, and our CMMC vs NIST 800-171 deep-dive walks the underlying control catalog. For the CMMC pricing model conversation see our ComplianceForge Alternative analysis. For the regional-RPO selection view see the Summit7 Alternative trade-off blog.

Need help implementing these strategies? Our cybersecurity experts can assess your environment and build a tailored plan.
Get Free Assessment

About the Author

Craig Petronella, CEO and Founder of Petronella Technology Group
CEO, Founder & AI Architect, Petronella Technology Group

Craig Petronella founded Petronella Technology Group in 2002 and has spent 20+ years professionally at the intersection of cybersecurity, AI, compliance, and digital forensics. He holds the CMMC Registered Practitioner credential issued by the Cyber AB and leads Petronella as a CMMC-AB Registered Provider Organization (RPO #1449). Craig is an NC Licensed Digital Forensics Examiner (License #604180-DFE) and completed MIT Professional Education programs in AI, Blockchain, and Cybersecurity. He also holds CompTIA Security+, CCNA, and Hyperledger certifications.

He is an Amazon #1 Best-Selling Author of 15+ books on cybersecurity and compliance, host of the Encrypted Ambition podcast (95+ episodes on Apple Podcasts, Spotify, and Amazon), and a cybersecurity keynote speaker with 200+ engagements at conferences, law firms, and corporate boardrooms. Craig serves as Contributing Editor for Cybersecurity at NC Triangle Attorney at Law Magazine and is a guest lecturer at NCCU School of Law. He has served as a digital forensics expert witness in federal and state court cases involving cybercrime, cryptocurrency fraud, SIM-swap attacks, and data breaches.

Under his leadership, Petronella Technology Group has served hundreds of regulated SMB clients across NC and the southeast since 2002, earned a BBB A+ rating every year since 2003, and been featured as a cybersecurity authority on CBS, ABC, NBC, FOX, and WRAL. The company leverages SOC 2 Type II certified platforms and specializes in AI implementation, managed cybersecurity, CMMC/HIPAA/SOC 2 compliance, and digital forensics for businesses across the United States.

CMMC-RP NC Licensed DFE MIT Certified CompTIA Security+ Expert Witness 15+ Books
Related Service
Achieve Compliance with Expert Guidance

CMMC, HIPAA, NIST, PCI-DSS - we have 80% of documentation pre-written to accelerate your timeline.

Learn About Compliance Services
Previous All Posts Next
Free cybersecurity consultation available Schedule Now