• 5 Key Cybersecurity Elements with Kelly Hood

  • Jan 15 2025
  • Length: 43 mins
  • Podcast

5 Key Cybersecurity Elements with Kelly Hood

  • Summary

  • How do phishing scams, AI-powered attacks, and strategic governance intersect? Together, they're redefining the future of cybersecurity. Organizations are navigating a mix of challenges and implementing innovative solutions to proactively address today's threats.

    Today's guest is Kelly Hood. She is the EVP and cybersecurity engineer at Optics Cyber Solutions. She is a CISSP who specializes in implementing cybersecurity and privacy best practices to manage risks and to achieve compliance. She supports the NIST cybersecurity framework and serves as a CMMC registered practitioner, helping organizations strengthen their cybersecurity posture and develop effective risk management strategies.

    Show Notes:
    • [01:06] - Kelly is a cyber security engineer at Optic Cyber Solutions. It's her job to help companies protect themselves.
    • [02:17] - Don't be embarrassed if you fall for a phishing scam.
    • [03:01] - These attempts are getting more realistic. Kelly shares how she was briefly fooled by a phishing scam that looks like an email from her mother.
    • [05:25] - The NIST Cybersecurity Framework is a voluntary framework for defining cybersecurity. An update was put out in February of 2024. They also added a new function.
    • [06:01] - The five functions that organize a cybersecurity program have been to identify, protect, detect, respond, and recover. They recently added the govern function.
    • [06:38] - The govern function is about defining your business objective and then putting protections in place that makes sense for those objectives.
    • [09:01] - The identify function is focused on knowing what we have.
    • [09:40] - Protect includes everything from identity management, authentication, training, data security, and platform security.
    • [10:12] - Detect is looking at what's happening around us. It's continuous monitoring and knowing what happens if something goes wrong.
    • [11:00] - Respond is knowing what the plan is when something does happen.
    • [12:01] - Recover is about getting back to normal after something happens.
    • [16:22] - Data centers want to make sure that they have redundant power supplies.
    • [17:33] - We discuss some of the things that people might forget when identifying cybersecurity assets. Data and people need to be thought about as well as systems and hardware.
    • [21:00] - We need to write things down and understand what systems and data connections we have.
    • [23:10] - We talk about the importance of being aware of the physical space and who is actually supposed to be there.
    • [24:46] - Data is one of the assets that often gets overlooked for protection. There are many new requirements that require data to be protected.
    • [27:54] - Monitoring to understand what traffic you should expect and what is and isn't normal activity is also important.
    • [31:10] - Transparency and communication are paramount for creating trust.
    • [33:51] - Sometimes recovery doesn't mean 100%. Get up and running and prioritize the systems that matter most.
    • [36:56] - With governance, you really want to look at what you're trying to do with the business and then translate cybersecurity to fit that objective.
    • [37:27] - Have guidance documentation in place and have oversight.

    Thanks for joining us on Easy Prey. Be sure to subscribe to our podcast on iTunes and leave a nice review.

    Links and Resources:
    • Podcast Web Page
    • Facebook Page
    • whatismyipaddress.com
    • Easy Prey on Instagram
    • Easy Prey on Twitter
    • Easy Prey on LinkedIn
    • Easy Prey on YouTube
    • Easy Prey on Pinterest
    • Optic Cyber Solutions
    • (MaPT) Maturity and Progress Tracker
    • Optic Cyber Solutions on LinkedIn
    • Optic Cyber YouTube
    • NIST Cybersecurity Framework
    Show More Show Less

What listeners say about 5 Key Cybersecurity Elements with Kelly Hood

Average customer ratings

Reviews - Please select the tabs below to change the source of reviews.