Close Menu
    Facebook X (Twitter) Instagram
    Wifi PortalWifi Portal
    • Blogging
    • SEO & Digital Marketing
    • WiFi / Internet & Networking
    • Cybersecurity
    • Tech Tools & Mobile / Apps
    • Privacy & Online Earning
    Facebook X (Twitter) Instagram
    Wifi PortalWifi Portal
    Home»Cybersecurity»How Granite complied with new federal cyber regs before a critical deadline
    Cybersecurity

    How Granite complied with new federal cyber regs before a critical deadline

    adminBy adminJanuary 31, 2026No Comments5 Mins Read
    Facebook Twitter LinkedIn Telegram Pinterest Tumblr Reddit WhatsApp Email
    How Granite complied with new federal cyber regs before a critical deadline
    Share
    Facebook Twitter LinkedIn Pinterest Email

    Malcolm Jack wants you to understand that when it comes to cybersecurity, people are just as important as technology.

    Jack is the chief technology officer for Watsonville, California-based contractor Granite, which announced a significant tech milestone for government contracting in December: reaching Cybersecurity Maturity Model Certification Level 2.

    The CMMC framework requires government contractors to certify their cybersecurity practices to meet the federal government’s standards, and it’s a must-have to handle controlled unclassified information, according to the announcement. 

    By Oct. 31, 2026, all contracts with the Department of War, formerly the Department of Defense, will require the appropriate CMMC certificate.

    In a recent assessment, Granite achieved what it characterized as “an almost impossible perfect score,” successfully passing all 110 security requirements and meeting 320 assessment objectives.

    Here, Jack discusses the timeline of adoption, what contractors should know about the process and how to play catch-up.

    Editor’s note: This interview has been edited for brevity and clarity.

    CONSTRUCTION DIVE: When did Granite start pursuing CMMC Level 2 certification?

    MALCOLM JACK: We actually call it a two-year journey, but when I look back at some of my records, this is more of a five- or six-year journey. 

    We looked at CMMC back in 2019, when the government first announced the new Defense Federal Acquisition Regulation Supplement regulations that were going to require CMMC certification for federal contractors, of which we’re one. We have a federal division [that has] been doing federal work for years.

    It’s been an interesting evolution over those five to six years to get us where we are today, which included some pivots and curveballs thrown at us by the government.

    They moved the goal posts a number of times, as far as when you had to have CMMC certification in place for bidding on federal work. But now, it seems like they really are holding firm to their 2026 requirements.

    What was the process to become certified like?

    It was a journey.

    In CMMC Level 2, there’s 110 things you have to have in place, so that actually flows down to about 300-plus controls you have to replace. It’s a large implementation. You don’t wait until you think you have everything ready to go to actually test it.

    Instead, we would get a few things in place, and then go test it. We’d bring somebody in from the outside, or work with our internal audit team to see if we could find faults. 

    Going through that iterative testing on the controls shortly after we implemented them, and then moving forward, is how we were able to continue to make forward progress and feel confident about what we had put in place.

    What was this implementation like for the company?

    A headshot of Malcolm Jack

    Malcolm Jack

    Permission granted by Granite Construction

     

    You’ve just hit on probably one of the biggest parts of CMMC in general. 

    This is not a technology engagement. The reason that we were successful in getting this done is tight partnership with our federal division. It’s more about the people. 

    We can have the technology and the tools in place, but really it’s the people who are dealing with the controlled unclassified information on a daily basis.

    If they don’t know the rules and the regulations and the safe handling protocols, they won’t know where to put the information or how to put it there. If they don’t understand how to interact with people and what you can share and what you can’t share, then you’re going to end up in a lot of trouble.

    While CMMC seems like a technology success, this is truly a partnership success between the IT organization and our federal group, because they both took on a big part of understanding it and how to operate on a daily basis. They put together the training programs on how to use these systems that worked really, really well.

    What I’m noticing as I talk to my colleagues in the industry is that it’s the people who are missing. I’ve had colleagues come to me and say, “Hey, how do you implement the technologies and the solutions?” I can give you some advice on that. But really, how are you changing your staff and your workforce to understand how to operate within this new DFARS requirement?

    What hurdles exist for contractors now?

    People have asked me, “What do I do to get there?” And I say, “Well, the best advice I could give you is to start two years ago.”

    Because, like I said, it was a two-year journey, but really it was a five-year journey for us, because we had to pivot over time and really get the experience and that partnership with our federal team. It took time to get there. So if I was starting right now, I’d be very nervous.

    I’m sure there’s a way to play catch up. I’m sure there’s going to be a number of companies and consultancies out there that will be happy to take a bunch of money to help you implement it very quickly. 

    But I would worry about that, because oftentimes when you’re slamming something in place, you’re not actually taking the time to train your teams and your staff on what the requirements are.

    complied Critical Cyber deadline federal Granite regs
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Telegram Email
    Previous ArticleWhat It Means For SEO
    Next Article This open-source AI tool makes Google Assistant look obsolete
    admin
    • Website

    Related Posts

    Week in review: Acrobat Reader flaw exploited, Claude Mythos offensive capabilities and limits

    April 19, 2026

    Recently leaked Windows zero-days now exploited in attacks

    April 19, 2026

    Android 17 Beta 4 arrives with post-quantum cryptography and new memory limits

    April 19, 2026
    Add A Comment
    Leave A Reply Cancel Reply

    Search Blog
    About
    About

    At WifiPortal.tech, we share simple, easy-to-follow guides on cybersecurity, online privacy, and digital opportunities. Our goal is to help everyday users browse safely, protect personal data, and explore smart ways to earn online. Whether you’re new to the digital world or looking to strengthen your online knowledge, our content is here to keep you informed and secure.

    Trending Blogs

    This $10 accessory has completely transformed my Pixel 10

    April 19, 2026

    Week in review: Acrobat Reader flaw exploited, Claude Mythos offensive capabilities and limits

    April 19, 2026

    If X Isn’t Working, It’s Not Just You

    April 19, 2026

    Recently leaked Windows zero-days now exploited in attacks

    April 19, 2026
    Categories
    • Blogging (65)
    • Cybersecurity (1,398)
    • Privacy & Online Earning (172)
    • SEO & Digital Marketing (849)
    • Tech Tools & Mobile / Apps (1,672)
    • WiFi / Internet & Networking (232)

    Subscribe to Updates

    Stay updated with the latest tips on cybersecurity, online privacy, and digital opportunities straight to your inbox.

    WifiPortal.tech is a blogging platform focused on cybersecurity, online privacy, and digital opportunities. We share easy-to-follow guides, tips, and resources to help you stay safe online and explore new ways of working in the digital world.

    Our Picks

    This $10 accessory has completely transformed my Pixel 10

    April 19, 2026

    Week in review: Acrobat Reader flaw exploited, Claude Mythos offensive capabilities and limits

    April 19, 2026

    If X Isn’t Working, It’s Not Just You

    April 19, 2026
    Most Popular
    • This $10 accessory has completely transformed my Pixel 10
    • Week in review: Acrobat Reader flaw exploited, Claude Mythos offensive capabilities and limits
    • If X Isn’t Working, It’s Not Just You
    • Recently leaked Windows zero-days now exploited in attacks
    • 5 classic series that are guaranteed to turn you into an anime fan
    • I didn’t expect these earbuds to win me over with such a rare feature
    • The Roku App (Official) 13.7.0.8240800 APK Download by Roku, Inc. & its affiliates
    • Android 17 Beta 4 arrives with post-quantum cryptography and new memory limits
    © 2026 WifiPortal.tech. Designed by WifiPortal.tech.
    • Home
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms and Conditions
    • Disclaimer

    Type above and press Enter to search. Press Esc to cancel.