CUI

ITAR Compliance Training

ITAR Compliance for the Aerospace Industry

Introduction
The International Traffic in Arms Regulations (ITAR) is a set of regulations established by the US Department of State to control the export and import of defense-related articles and services. The aerospace industry is a significant contributor to the US economy and is subject to the ITAR regulations due to its involvement in the production of defense-related equipment. In this article, we will discuss ITAR compliance in the aerospace industry, including the types of equipment subject to ITAR regulations and the export classification system.

Read more
CMMC Certification Services & Consulting

How to Get “ITAR Certified”

Introduction
ITAR certification is a commonly misunderstood concept in the defense industry. Many companies mistakenly believe that they can become “ITAR certified” by completing a certain set of requirements or passing an assessment. However, there is no formal ITAR certification process.

Read more
Labeling ITAR Data Webinar banner featuring a secure lock symbol and text overlay that reads 'Ensuring Information Compliance' on Cleared Systems website

Labeling ITAR Data: Ensuring Information Compliance Webinar

Information compliance is a critical aspect of ITAR (International Traffic in Arms Regulations) compliance. It is essential to ensure that any data or information that is subject to ITAR regulations is appropriately labeled and protected. In this 30-minute webinar, Carl B. Johnson of Cleared Systems will discuss the best practices for labeling ITAR data to ensure information compliance.

Read more
Comparison of NIST SP 800-171 and NIST SP 800-53 for protecting CUI and federal information systems

NIST SP 800-171 and NIST SP 800-53: Understanding the Differences and Compliance Requirements

NIST Special Publication (SP) 800-171 and NIST SP 800-53 are two important publications from the National Institute of Standards and Technology (NIST) that provide guidance on information security controls. Understanding the differences between the two publications is crucial for ensuring compliance with applicable regulations and best practices in information security. In this article, we will explore the details of each publication, their differences, and the compliance requirements.

Read more
Contact us

Partner with Us for Compliance & Protection

We’re happy to answer any questions you may have and help you determine which of our services best fit your needs.

Your benefits:
What happens next?
1

Schedule an initial meeting

2

Arrange a discovery and assessment call

3

Tailor a proposal and solution

How can we help you?