Easy Prey

5 Key Cybersecurity Elements with Kelly Hood


Listen Later

How do phishing scams, AI-powered attacks, and strategic governance intersect? Together, they're redefining the future of cybersecurity. Organizations are navigating a mix of challenges and implementing innovative solutions to proactively address today's threats.

Today's guest is Kelly Hood. She is the EVP and cybersecurity engineer at Optics Cyber Solutions. She is a CISSP who specializes in implementing cybersecurity and privacy best practices to manage risks and to achieve compliance. She supports the NIST cybersecurity framework and serves as a CMMC registered practitioner, helping organizations strengthen their cybersecurity posture and develop effective risk management strategies.

Show Notes:
  • [01:06] - Kelly is a cyber security engineer at Optic Cyber Solutions. It's her job to help companies protect themselves.
  • [02:17] - Don't be embarrassed if you fall for a phishing scam.
  • [03:01] - These attempts are getting more realistic. Kelly shares how she was briefly fooled by a phishing scam that looks like an email from her mother.
  • [05:25] - The NIST Cybersecurity Framework is a voluntary framework for defining cybersecurity. An update was put out in February of 2024. They also added a new function.
  • [06:01] - The five functions that organize a cybersecurity program have been to identify, protect, detect, respond, and recover. They recently added the govern function.
  • [06:38] - The govern function is about defining your business objective and then putting protections in place that makes sense for those objectives.
  • [09:01] - The identify function is focused on knowing what we have.
  • [09:40] - Protect includes everything from identity management, authentication, training, data security, and platform security.
  • [10:12] - Detect is looking at what's happening around us. It's continuous monitoring and knowing what happens if something goes wrong.
  • [11:00] - Respond is knowing what the plan is when something does happen.
  • [12:01] - Recover is about getting back to normal after something happens.
  • [16:22] - Data centers want to make sure that they have redundant power supplies.
  • [17:33] - We discuss some of the things that people might forget when identifying cybersecurity assets. Data and people need to be thought about as well as systems and hardware.
  • [21:00] - We need to write things down and understand what systems and data connections we have.
  • [23:10] - We talk about the importance of being aware of the physical space and who is actually supposed to be there.
  • [24:46] - Data is one of the assets that often gets overlooked for protection. There are many new requirements that require data to be protected.
  • [27:54] - Monitoring to understand what traffic you should expect and what is and isn't normal activity is also important.
  • [31:10] - Transparency and communication are paramount for creating trust.
  • [33:51] - Sometimes recovery doesn't mean 100%. Get up and running and prioritize the systems that matter most.
  • [36:56] - With governance, you really want to look at what you're trying to do with the business and then translate cybersecurity to fit that objective.
  • [37:27] - Have guidance documentation in place and have oversight.

Thanks for joining us on Easy Prey. Be sure to subscribe to our podcast on iTunes and leave a nice review.

Links and Resources:
  • Podcast Web Page
  • Facebook Page
  • whatismyipaddress.com
  • Easy Prey on Instagram
  • Easy Prey on Twitter
  • Easy Prey on LinkedIn
  • Easy Prey on YouTube
  • Easy Prey on Pinterest
  • Optic Cyber Solutions
  • (MaPT) Maturity and Progress Tracker
  • Optic Cyber Solutions on LinkedIn
  • Optic Cyber YouTube
  • NIST Cybersecurity Framework
...more
View all episodesView all episodes
Download on the App Store

Easy PreyBy Chris Parker

  • 4.7
  • 4.7
  • 4.7
  • 4.7
  • 4.7

4.7

30 ratings


More shows like Easy Prey

View all
Criminal by Vox Media Podcast Network

Criminal

37,514 Listeners

The School of Greatness by Lewis Howes

The School of Greatness

21,187 Listeners

20/20 by ABC News

20/20

11,783 Listeners

48 Hours by CBS News

48 Hours

10,756 Listeners

Health Report by ABC

Health Report

131 Listeners

Darknet Diaries by Jack Rhysider

Darknet Diaries

8,054 Listeners

The Perfect Scam by AARP

The Perfect Scam

1,088 Listeners

What Was That Like - True Stories. Real People. by Scott Johnson & Glassbox Media.

What Was That Like - True Stories. Real People.

1,908 Listeners

Dateline NBC by NBC News

Dateline NBC

47,350 Listeners

WHEN DATING HURTS by Evergreen Podcasts

WHEN DATING HURTS

349 Listeners

Killer Psyche by Wondery | Treefort Media

Killer Psyche

4,698 Listeners

Body Bags with Joseph Scott Morgan by CrimeOnline and iHeartPodcasts

Body Bags with Joseph Scott Morgan

2,141 Listeners

Betrayal: Weekly by iHeartPodcasts and Glass Podcasts

Betrayal: Weekly

7,982 Listeners

The Mel Robbins Podcast by Mel Robbins

The Mel Robbins Podcast

19,668 Listeners

If I Can Be SCAMMED, So Could YOU! by MsRomanceScam

If I Can Be SCAMMED, So Could YOU!

1 Listeners