Easy Prey

5 Key Cybersecurity Elements with Kelly Hood


Listen Later

How do phishing scams, AI-powered attacks, and strategic governance intersect? Together, they're redefining the future of cybersecurity. Organizations are navigating a mix of challenges and implementing innovative solutions to proactively address today's threats. 

Today's guest is Kelly Hood. She is the EVP and cybersecurity engineer at Optics Cyber Solutions. She is a CISSP who specializes in implementing cybersecurity and privacy best practices to manage risks and to achieve compliance. She supports the NIST cybersecurity framework and serves as a CMMC registered practitioner, helping organizations strengthen their cybersecurity posture and develop effective risk management strategies.

Show Notes:
  • [01:06] - Kelly is a cyber security engineer at Optic Cyber Solutions. It's her job to help companies protect themselves.
  • [02:17] - Don't be embarrassed if you fall for a phishing scam.
  • [03:01] - These attempts are getting more realistic. Kelly shares how she was briefly fooled by a phishing scam that looks like an email from her mother.
  • [05:25] - The NIST Cybersecurity Framework is a voluntary framework for defining cybersecurity. An update was put out in February of 2024. They also added a new function.
  • [06:01] - The five functions that organize a cybersecurity program have been to identify, protect, detect, respond, and recover. They recently added the govern function.
  • [06:38] - The govern function is about defining your business objective and then putting protections in place that makes sense for those objectives.
  • [09:01] - The identify function is focused on knowing what we have.
  • [09:40] - Protect includes everything from identity management, authentication, training, data security, and platform security.
  • [10:12] - Detect is looking at what's happening around us. It's continuous monitoring and knowing what happens if something goes wrong.
  • [11:00] - Respond is knowing what the plan is when something does happen.
  • [12:01] - Recover is about getting back to normal after something happens.
  • [16:22] - Data centers want to make sure that they have redundant power supplies.
  • [17:33] - We discuss some of the things that people might forget when identifying cybersecurity assets. Data and people need to be thought about as well as systems and hardware.
  • [21:00] - We need to write things down and understand what systems and data connections we have.
  • [23:10] - We talk about the importance of being aware of the physical space and who is actually supposed to be there.
  • [24:46] - Data is one of the assets that often gets overlooked for protection. There are many new requirements that require data to be protected.
  • [27:54] - Monitoring to understand what traffic you should expect and what is and isn't normal activity is also important.
  • [31:10] - Transparency and communication are paramount for creating trust.
  • [33:51] - Sometimes recovery doesn't mean 100%. Get up and running and prioritize the systems that matter most.
  • [36:56] - With governance, you really want to look at what you're trying to do with the business and then translate cybersecurity to fit that objective.
  • [37:27] - Have guidance documentation in place and have oversight.

Thanks for joining us on Easy Prey. Be sure to subscribe to our podcast on iTunes and leave a nice review. 

Links and Resources:
  • Podcast Web Page
  • Facebook Page
  • whatismyipaddress.com
  • Easy Prey on Instagram
  • Easy Prey on Twitter
  • Easy Prey on LinkedIn
  • Easy Prey on YouTube
  • Easy Prey on Pinterest
  • Optic Cyber Solutions
  • (MaPT) Maturity and Progress Tracker
  • Optic Cyber Solutions on LinkedIn
  • Optic Cyber YouTube
  • NIST Cybersecurity Framework
...more
View all episodesView all episodes
Download on the App Store

Easy PreyBy Chris Parker

  • 4.6
  • 4.6
  • 4.6
  • 4.6
  • 4.6

4.6

27 ratings


More shows like Easy Prey

View all
The Art of Manliness by The Art of Manliness

The Art of Manliness

14,144 Listeners

Hacked by Hacked

Hacked

174 Listeners

Malicious Life by Malicious Life

Malicious Life

923 Listeners

Darknet Diaries by Jack Rhysider

Darknet Diaries

7,822 Listeners

The Jordan Harbinger Show by Jordan Harbinger

The Jordan Harbinger Show

11,934 Listeners

The Perfect Scam by AARP

The Perfect Scam

1,080 Listeners

Hacking Humans by N2K Networks

Hacking Humans

304 Listeners

People Who Read People: A Behavior and Psychology Podcast by Zachary Elwood

People Who Read People: A Behavior and Psychology Podcast

230 Listeners

The Dr. Phil Podcast by Dr. Phil McGraw

The Dr. Phil Podcast

13,730 Listeners

Creating Confidence with Heather Monahan by Heather Monahan | YAP Media

Creating Confidence with Heather Monahan

1,098 Listeners

Huberman Lab by Scicomm Media

Huberman Lab

28,212 Listeners

What the Hack with Adam Levin by Loud Tree Media

What the Hack with Adam Levin

209 Listeners

Navigating Narcissism with Dr. Ramani by iHeartPodcasts

Navigating Narcissism with Dr. Ramani

1,707 Listeners

Hacker And The Fed by Chris Tarbell & Hector Monsegur

Hacker And The Fed

150 Listeners

Tetragrammaton with Rick Rubin by Rick Rubin

Tetragrammaton with Rick Rubin

959 Listeners