
Sign up to save your podcasts
Or
#SecurityConfidential #DarkRhinoSecurity
Jax is a cyber influencer, author, speaker, podcaster, President, and Founder of Outpost Gray. With over 13 years of experience working in IT and cyber, both private and public sectors. Jax spent a significant portion of her life serving in the Special Operations Command, spearheading global Cyber, Electronic Warfare, and Intelligence operations. She is also the co-host of the cybersecurity podcast 2CyberChicks.
00:00 Introduction
00:16 Our Guest
01:52 Being in the Special Forces as a Woman
04:30 Cultural Support Team Program
07:47 Jaxs’ Current Mission
09:29 What is an Entry-Level Job?
11:49 How Jax began her journey into Cybersecurity
16:07 Data Breaches: What’s broken?
18:07 Company Policies and Bringing Awareness
19:38 Compliance isn’t security
23:17 NIST vs CMMC vs ISO
27:03 Who uses CMMC?
30:56 Resources for CMMC
32:12 What should the Federal Government be adopting?
36:45 HackBack
41:58 Connect with Jax
----------------------------------------------------------------------
To learn more about Jax visit https://www.linkedin.com/in/iamjax/
https://twitter.com/outpostgray
https://iamjax.me/
To learn more about Dark Rhino Security visit https://www.darkrhinosecurity.com
----------------------------------------------------------------------
SOCIAL MEDIA: Stay connected with us on our social media pages where we'll give you snippets, alerts for new podcasts, and even behind the scenes of our studio!
Instagram: @securityconfidential and @OfficialDarkRhinoSecurity
Facebook: @Dark-Rhino-Security-Inc
Twitter: @darkrhinosec
LinkedIn: @dark-rhino-security
Youtube: @Dark Rhino Security
----------------------------------------------------------------------
Articles and Resources Mentioned in this Video:
Jaxs' Book: https://www.amazon.com/Cybersecurity-Career-Master-Plan-cybersecurity/dp/1801073562/ref=sr_1_2?crid=2NPCHKN8K746B&keywords=jaclyn+scott&qid=1645818712&sprefix=jaclyn+scott%2Caps%2C181&sr=8-2&redirectFromSmile=1
Cultural Support Team Program: https://arsof-history.org/articles/v12n2_cst_timeline_page_1.html
NICE and NIST Frameworks:
https://resources.infosecinstitute.com/topic/what-is-the-nice-cybersecurity-workforce-framework/
https://www.cisa.gov/nice-cybersecurity-workforce-framework
https://www.securityprogram.io/a-guide-to-common-security-standards/
Target Breach: https://www.darkreading.com/attacks-breaches/target-ignored-data-breach-alarms
JP Morgan Breach: https://archive.nytimes.com/dealbook.nytimes.com/2014/10/02/jpmorgan-discovers-further-cyber-security-issues/
HackBack: https://foresite.com/blog/what-is-the-proposed-hack-back-bill/
Computer Fraud and Abuse Act: https://www.sciencedirect.com/topics/computer-science/computer-fraud-and-abuse-act#:~:text=The%20Computer%20Fraud%20and%20Abuse%20Act%20of%201986%20makes%20it,or%20foreign%20commerce%20or%20communication.
Active Cyber Defense Certainty Act https://www.billtrack50.com/BillDetail/1133039
5
1010 ratings
#SecurityConfidential #DarkRhinoSecurity
Jax is a cyber influencer, author, speaker, podcaster, President, and Founder of Outpost Gray. With over 13 years of experience working in IT and cyber, both private and public sectors. Jax spent a significant portion of her life serving in the Special Operations Command, spearheading global Cyber, Electronic Warfare, and Intelligence operations. She is also the co-host of the cybersecurity podcast 2CyberChicks.
00:00 Introduction
00:16 Our Guest
01:52 Being in the Special Forces as a Woman
04:30 Cultural Support Team Program
07:47 Jaxs’ Current Mission
09:29 What is an Entry-Level Job?
11:49 How Jax began her journey into Cybersecurity
16:07 Data Breaches: What’s broken?
18:07 Company Policies and Bringing Awareness
19:38 Compliance isn’t security
23:17 NIST vs CMMC vs ISO
27:03 Who uses CMMC?
30:56 Resources for CMMC
32:12 What should the Federal Government be adopting?
36:45 HackBack
41:58 Connect with Jax
----------------------------------------------------------------------
To learn more about Jax visit https://www.linkedin.com/in/iamjax/
https://twitter.com/outpostgray
https://iamjax.me/
To learn more about Dark Rhino Security visit https://www.darkrhinosecurity.com
----------------------------------------------------------------------
SOCIAL MEDIA: Stay connected with us on our social media pages where we'll give you snippets, alerts for new podcasts, and even behind the scenes of our studio!
Instagram: @securityconfidential and @OfficialDarkRhinoSecurity
Facebook: @Dark-Rhino-Security-Inc
Twitter: @darkrhinosec
LinkedIn: @dark-rhino-security
Youtube: @Dark Rhino Security
----------------------------------------------------------------------
Articles and Resources Mentioned in this Video:
Jaxs' Book: https://www.amazon.com/Cybersecurity-Career-Master-Plan-cybersecurity/dp/1801073562/ref=sr_1_2?crid=2NPCHKN8K746B&keywords=jaclyn+scott&qid=1645818712&sprefix=jaclyn+scott%2Caps%2C181&sr=8-2&redirectFromSmile=1
Cultural Support Team Program: https://arsof-history.org/articles/v12n2_cst_timeline_page_1.html
NICE and NIST Frameworks:
https://resources.infosecinstitute.com/topic/what-is-the-nice-cybersecurity-workforce-framework/
https://www.cisa.gov/nice-cybersecurity-workforce-framework
https://www.securityprogram.io/a-guide-to-common-security-standards/
Target Breach: https://www.darkreading.com/attacks-breaches/target-ignored-data-breach-alarms
JP Morgan Breach: https://archive.nytimes.com/dealbook.nytimes.com/2014/10/02/jpmorgan-discovers-further-cyber-security-issues/
HackBack: https://foresite.com/blog/what-is-the-proposed-hack-back-bill/
Computer Fraud and Abuse Act: https://www.sciencedirect.com/topics/computer-science/computer-fraud-and-abuse-act#:~:text=The%20Computer%20Fraud%20and%20Abuse%20Act%20of%201986%20makes%20it,or%20foreign%20commerce%20or%20communication.
Active Cyber Defense Certainty Act https://www.billtrack50.com/BillDetail/1133039