5 Key Cybersecurity Elements with Kelly Hood

5 Key Cybersecurity Elements with Kelly Hood

How do phishing scams, AI-powered attacks, and strategic governance intersect? Together, they're redefining the future of cybersecurity. Organizations are navigating a mix of challenges and implementing innovative solutions to proactively address...
43 Minuten

Beschreibung

vor 11 Monaten

How do phishing scams, AI-powered attacks, and strategic
governance intersect? Together, they're redefining the future of
cybersecurity. Organizations are navigating a mix of challenges
and implementing innovative solutions to proactively address
today's threats. 


Today's guest is Kelly Hood. She is the EVP and cybersecurity
engineer at Optics Cyber Solutions. She is a CISSP who
specializes in implementing cybersecurity and privacy best
practices to manage risks and to achieve compliance. She supports
the NIST cybersecurity framework and serves as a CMMC registered
practitioner, helping organizations strengthen their
cybersecurity posture and develop effective risk management
strategies.
Show Notes:

[01:06] - Kelly is a cyber security engineer at Optic Cyber
Solutions. It's her job to help companies protect themselves.

[02:17] - Don't be embarrassed if you fall for a phishing
scam.

[03:01] - These attempts are getting more realistic. Kelly
shares how she was briefly fooled by a phishing scam that looks
like an email from her mother.

[05:25] - The NIST Cybersecurity Framework is a voluntary
framework for defining cybersecurity. An update was put out in
February of 2024. They also added a new function.

[06:01] - The five functions that organize a cybersecurity
program have been to identify, protect, detect, respond, and
recover. They recently added the govern function.

[06:38] - The govern function is about defining your business
objective and then putting protections in place that makes sense
for those objectives.

[09:01] - The identify function is focused on knowing what we
have.

[09:40] - Protect includes everything from identity
management, authentication, training, data security, and platform
security.

[10:12] - Detect is looking at what's happening around us.
It's continuous monitoring and knowing what happens if something
goes wrong.

[11:00] - Respond is knowing what the plan is when something
does happen.

[12:01] - Recover is about getting back to normal after
something happens.

[16:22] - Data centers want to make sure that they have
redundant power supplies.

[17:33] - We discuss some of the things that people might
forget when identifying cybersecurity assets. Data and people
need to be thought about as well as systems and hardware.

[21:00] - We need to write things down and understand what
systems and data connections we have.

[23:10] - We talk about the importance of being aware of the
physical space and who is actually supposed to be there.

[24:46] - Data is one of the assets that often gets
overlooked for protection. There are many new requirements that
require data to be protected.

[27:54] - Monitoring to understand what traffic you should
expect and what is and isn't normal activity is also important.

[31:10] - Transparency and communication are paramount for
creating trust.

[33:51] - Sometimes recovery doesn't mean 100%. Get up and
running and prioritize the systems that matter most.

[36:56] - With governance, you really want to look at what
you're trying to do with the business and then translate
cybersecurity to fit that objective.

[37:27] - Have guidance documentation in place and have
oversight.



Thanks for joining us on Easy Prey. Be sure to subscribe to
our podcast on iTunes and leave a nice review. 
Links and Resources:

Podcast Web Page

Facebook Page

whatismyipaddress.com

Easy Prey on Instagram

Easy Prey on Twitter

Easy Prey on LinkedIn

Easy Prey on YouTube

Easy Prey on Pinterest

Optic Cyber Solutions

(MaPT) Maturity and Progress Tracker

Optic Cyber Solutions on LinkedIn

Optic Cyber YouTube

NIST Cybersecurity Framework

Kommentare (0)

Lade Inhalte...

Abonnenten

15
15