Easy Prey

Top 5 Supply Chain Risks with Kevin Kumpf


Listen Later

As businesses embrace digital transformation and rely on interconnected networks for their operations, the vulnerabilities within the digital supply chain become increasingly apparent. From data breaches to third party vulnerabilities, the threats are multi-faceted and ever-evolving.

Today’s guest is Kevin Kumpf. Kevin has more than 20 years of IT Security and Compliance experience including over 10 years of cybersecurity, governance, and critical infrastructure experience working in the energy, medical manufacturing, transportation, and fedramp realms. 

Show Notes:

  • [0:54] - Kevin shares what he does in his current role and his background in the industry.

  • [3:38] - He began his career in cybersecurity at a time when cybersecurity was not a priority.

  • [4:30] - Scammers target anyone and everyone. Even Kevin has been a victim.

  • [6:53] - It comes down to ownership.

  • [8:19] - Know your baseline and who is responsible.

  • [10:07] - Kevin makes an analogy to help us better understand the supply chain.

  • [12:30] - Most of the time, people don’t know where and how their data is being transferred back and forth.

  • [14:12] - You trust a process and then when something breaks, how do you find out about it?

  • [17:01] - Kevin describes an example of observing an organization’s work and discovering crypto mining.

  • [19:51] - What should be asked about the organization’s environment?

  • [21:34] - Think about all the things you use regularly that are connected to something. Now expand that thinking to companies and businesses.

  • [23:27] - Where do all of these components come from?

  • [26:47] - Kevin points out the challenges in the cybersecurity legislature.

  • [28:46] - Ask questions and accept the answers. Determine what is acceptable risk.

  • [31:22] - The trickle down of data is really what the supply chain is.

  • [33:17] - Kevin shares some information about articles for further reading on this topic as well as some interesting numbers about recent breaches.

  • [35:48] - If you don’t know what is normal, you won’t know what is abnormal. This is why knowing the baseline is so important.

Thanks for joining us on Easy Prey. Be sure to subscribe to our podcast on iTunes and leave a nice review. 

Links and Resources:
  • Podcast Web Page

  • Facebook Page

  • whatismyipaddress.com

  • Easy Prey on Instagram

  • Easy Prey on Twitter

  • Easy Prey on LinkedIn

  • Easy Prey on YouTube

  • Easy Prey on Pinterest

  • Cyolo Website

  • Kevin Kumpf on LinkedIn

...more
View all episodesView all episodes
Download on the App Store

Easy PreyBy Chris Parker

  • 4.6
  • 4.6
  • 4.6
  • 4.6
  • 4.6

4.6

28 ratings


More shows like Easy Prey

View all
Stuff You Should Know by iHeartPodcasts

Stuff You Should Know

77,775 Listeners

The Joe Rogan Experience by Joe Rogan

The Joe Rogan Experience

225,779 Listeners

The Tom Woods Show by Tom Woods

The Tom Woods Show

3,358 Listeners

The One You Feed by Eric Zimmer

The One You Feed

2,511 Listeners

Casefile True Crime by Casefile Presents

Casefile True Crime

37,964 Listeners

Being Well with Forrest Hanson and Dr. Rick Hanson by Rick Hanson, Ph.D., Forrest Hanson

Being Well with Forrest Hanson and Dr. Rick Hanson

2,469 Listeners

The Diary Of A CEO with Steven Bartlett by DOAC

The Diary Of A CEO with Steven Bartlett

7,315 Listeners

Swindled by A Concerned Citizen

Swindled

9,770 Listeners

The Jordan Harbinger Show by Jordan Harbinger

The Jordan Harbinger Show

11,968 Listeners

Hacking Humans by N2K Networks

Hacking Humans

316 Listeners

Women of Impact by Impact Theory

Women of Impact

655 Listeners

Shawn Ryan Show by Shawn Ryan

Shawn Ryan Show

42,666 Listeners

The Megyn Kelly Show by SiriusXM

The Megyn Kelly Show

38,511 Listeners

Huberman Lab by Scicomm Media

Huberman Lab

28,598 Listeners

The Telepathy Tapes by Ky Dickens

The Telepathy Tapes

7,695 Listeners