Easy Prey

Top 5 Supply Chain Risks with Kevin Kumpf


Listen Later

As businesses embrace digital transformation and rely on interconnected networks for their operations, the vulnerabilities within the digital supply chain become increasingly apparent. From data breaches to third party vulnerabilities, the threats are multi-faceted and ever-evolving.

Today’s guest is Kevin Kumpf. Kevin has more than 20 years of IT Security and Compliance experience including over 10 years of cybersecurity, governance, and critical infrastructure experience working in the energy, medical manufacturing, transportation, and fedramp realms. 

Show Notes:

  • [0:54] - Kevin shares what he does in his current role and his background in the industry.

  • [3:38] - He began his career in cybersecurity at a time when cybersecurity was not a priority.

  • [4:30] - Scammers target anyone and everyone. Even Kevin has been a victim.

  • [6:53] - It comes down to ownership.

  • [8:19] - Know your baseline and who is responsible.

  • [10:07] - Kevin makes an analogy to help us better understand the supply chain.

  • [12:30] - Most of the time, people don’t know where and how their data is being transferred back and forth.

  • [14:12] - You trust a process and then when something breaks, how do you find out about it?

  • [17:01] - Kevin describes an example of observing an organization’s work and discovering crypto mining.

  • [19:51] - What should be asked about the organization’s environment?

  • [21:34] - Think about all the things you use regularly that are connected to something. Now expand that thinking to companies and businesses.

  • [23:27] - Where do all of these components come from?

  • [26:47] - Kevin points out the challenges in the cybersecurity legislature.

  • [28:46] - Ask questions and accept the answers. Determine what is acceptable risk.

  • [31:22] - The trickle down of data is really what the supply chain is.

  • [33:17] - Kevin shares some information about articles for further reading on this topic as well as some interesting numbers about recent breaches.

  • [35:48] - If you don’t know what is normal, you won’t know what is abnormal. This is why knowing the baseline is so important.

Thanks for joining us on Easy Prey. Be sure to subscribe to our podcast on iTunes and leave a nice review. 

Links and Resources:
  • Podcast Web Page

  • Facebook Page

  • whatismyipaddress.com

  • Easy Prey on Instagram

  • Easy Prey on Twitter

  • Easy Prey on LinkedIn

  • Easy Prey on YouTube

  • Easy Prey on Pinterest

  • Cyolo Website

  • Kevin Kumpf on LinkedIn

...more
View all episodesView all episodes
Download on the App Store

Easy PreyBy Chris Parker

  • 4.6
  • 4.6
  • 4.6
  • 4.6
  • 4.6

4.6

27 ratings


More shows like Easy Prey

View all
The Joe Rogan Experience by Joe Rogan

The Joe Rogan Experience

225,512 Listeners

The School of Greatness by Lewis Howes

The School of Greatness

21,273 Listeners

The Jordan B. Peterson Podcast by Dr. Jordan B. Peterson

The Jordan B. Peterson Podcast

34,047 Listeners

The Diary Of A CEO with Steven Bartlett by DOAC

The Diary Of A CEO with Steven Bartlett

6,936 Listeners

Darknet Diaries by Jack Rhysider

Darknet Diaries

7,873 Listeners

Swindled by A Concerned Citizen

Swindled

9,747 Listeners

The Jordan Harbinger Show by Jordan Harbinger

The Jordan Harbinger Show

12,014 Listeners

The Perfect Scam by AARP

The Perfect Scam

1,091 Listeners

Hacking Humans by N2K Networks

Hacking Humans

314 Listeners

Strictly Stalking by PodcastOne

Strictly Stalking

2,526 Listeners

Huberman Lab by Scicomm Media

Huberman Lab

28,268 Listeners

Killer Psyche by Wondery | Treefort Media

Killer Psyche

4,623 Listeners

Betrayal: Season 4 by iHeartPodcasts and Glass Podcasts

Betrayal: Season 4

7,057 Listeners

Scamfluencers by Wondery

Scamfluencers

7,081 Listeners

What Came Next by Broken Cycle Media

What Came Next

625 Listeners