Artwork

İçerik Chris Parker tarafından sağlanmıştır. Bölümler, grafikler ve podcast açıklamaları dahil tüm podcast içeriği doğrudan Chris Parker veya podcast platform ortağı tarafından yüklenir ve sağlanır. Birinin telif hakkıyla korunan çalışmanızı izniniz olmadan kullandığını düşünüyorsanız burada https://tr.player.fm/legal özetlenen süreci takip edebilirsiniz.
Player FM - Podcast Uygulaması
Player FM uygulamasıyla çevrimdışı Player FM !

Top 5 Supply Chain Risks with Kevin Kumpf

37:24
 
Paylaş
 

Manage episode 406266791 series 2774802
İçerik Chris Parker tarafından sağlanmıştır. Bölümler, grafikler ve podcast açıklamaları dahil tüm podcast içeriği doğrudan Chris Parker veya podcast platform ortağı tarafından yüklenir ve sağlanır. Birinin telif hakkıyla korunan çalışmanızı izniniz olmadan kullandığını düşünüyorsanız burada https://tr.player.fm/legal özetlenen süreci takip edebilirsiniz.

As businesses embrace digital transformation and rely on interconnected networks for their operations, the vulnerabilities within the digital supply chain become increasingly apparent. From data breaches to third party vulnerabilities, the threats are multi-faceted and ever-evolving.

Today’s guest is Kevin Kumpf. Kevin has more than 20 years of IT Security and Compliance experience including over 10 years of cybersecurity, governance, and critical infrastructure experience working in the energy, medical manufacturing, transportation, and fedramp realms.

Show Notes:

  • [0:54] - Kevin shares what he does in his current role and his background in the industry.

  • [3:38] - He began his career in cybersecurity at a time when cybersecurity was not a priority.

  • [4:30] - Scammers target anyone and everyone. Even Kevin has been a victim.

  • [6:53] - It comes down to ownership.

  • [8:19] - Know your baseline and who is responsible.

  • [10:07] - Kevin makes an analogy to help us better understand the supply chain.

  • [12:30] - Most of the time, people don’t know where and how their data is being transferred back and forth.

  • [14:12] - You trust a process and then when something breaks, how do you find out about it?

  • [17:01] - Kevin describes an example of observing an organization’s work and discovering crypto mining.

  • [19:51] - What should be asked about the organization’s environment?

  • [21:34] - Think about all the things you use regularly that are connected to something. Now expand that thinking to companies and businesses.

  • [23:27] - Where do all of these components come from?

  • [26:47] - Kevin points out the challenges in the cybersecurity legislature.

  • [28:46] - Ask questions and accept the answers. Determine what is acceptable risk.

  • [31:22] - The trickle down of data is really what the supply chain is.

  • [33:17] - Kevin shares some information about articles for further reading on this topic as well as some interesting numbers about recent breaches.

  • [35:48] - If you don’t know what is normal, you won’t know what is abnormal. This is why knowing the baseline is so important.

Thanks for joining us on Easy Prey. Be sure to subscribe to our podcast on iTunes and leave a nice review.

Links and Resources:
  continue reading

218 bölüm

Artwork

Top 5 Supply Chain Risks with Kevin Kumpf

Easy Prey

55 subscribers

published

iconPaylaş
 
Manage episode 406266791 series 2774802
İçerik Chris Parker tarafından sağlanmıştır. Bölümler, grafikler ve podcast açıklamaları dahil tüm podcast içeriği doğrudan Chris Parker veya podcast platform ortağı tarafından yüklenir ve sağlanır. Birinin telif hakkıyla korunan çalışmanızı izniniz olmadan kullandığını düşünüyorsanız burada https://tr.player.fm/legal özetlenen süreci takip edebilirsiniz.

As businesses embrace digital transformation and rely on interconnected networks for their operations, the vulnerabilities within the digital supply chain become increasingly apparent. From data breaches to third party vulnerabilities, the threats are multi-faceted and ever-evolving.

Today’s guest is Kevin Kumpf. Kevin has more than 20 years of IT Security and Compliance experience including over 10 years of cybersecurity, governance, and critical infrastructure experience working in the energy, medical manufacturing, transportation, and fedramp realms.

Show Notes:

  • [0:54] - Kevin shares what he does in his current role and his background in the industry.

  • [3:38] - He began his career in cybersecurity at a time when cybersecurity was not a priority.

  • [4:30] - Scammers target anyone and everyone. Even Kevin has been a victim.

  • [6:53] - It comes down to ownership.

  • [8:19] - Know your baseline and who is responsible.

  • [10:07] - Kevin makes an analogy to help us better understand the supply chain.

  • [12:30] - Most of the time, people don’t know where and how their data is being transferred back and forth.

  • [14:12] - You trust a process and then when something breaks, how do you find out about it?

  • [17:01] - Kevin describes an example of observing an organization’s work and discovering crypto mining.

  • [19:51] - What should be asked about the organization’s environment?

  • [21:34] - Think about all the things you use regularly that are connected to something. Now expand that thinking to companies and businesses.

  • [23:27] - Where do all of these components come from?

  • [26:47] - Kevin points out the challenges in the cybersecurity legislature.

  • [28:46] - Ask questions and accept the answers. Determine what is acceptable risk.

  • [31:22] - The trickle down of data is really what the supply chain is.

  • [33:17] - Kevin shares some information about articles for further reading on this topic as well as some interesting numbers about recent breaches.

  • [35:48] - If you don’t know what is normal, you won’t know what is abnormal. This is why knowing the baseline is so important.

Thanks for joining us on Easy Prey. Be sure to subscribe to our podcast on iTunes and leave a nice review.

Links and Resources:
  continue reading

218 bölüm

Tüm bölümler

×
 
Loading …

Player FM'e Hoş Geldiniz!

Player FM şu anda sizin için internetteki yüksek kalitedeki podcast'leri arıyor. En iyi podcast uygulaması ve Android, iPhone ve internet üzerinde çalışıyor. Aboneliklerinizi cihazlar arasında eş zamanlamak için üye olun.

 

Hızlı referans rehberi