Easy Prey

Top 5 Supply Chain Risks with Kevin Kumpf


Listen Later

As businesses embrace digital transformation and rely on interconnected networks for their operations, the vulnerabilities within the digital supply chain become increasingly apparent. From data breaches to third party vulnerabilities, the threats are multi-faceted and ever-evolving.

Today's guest is Kevin Kumpf. Kevin has more than 20 years of IT Security and Compliance experience including over 10 years of cybersecurity, governance, and critical infrastructure experience working in the energy, medical manufacturing, transportation, and fedramp realms.

Show Notes:

  • [0:54] - Kevin shares what he does in his current role and his background in the industry.

  • [3:38] - He began his career in cybersecurity at a time when cybersecurity was not a priority.

  • [4:30] - Scammers target anyone and everyone. Even Kevin has been a victim.

  • [6:53] - It comes down to ownership.

  • [8:19] - Know your baseline and who is responsible.

  • [10:07] - Kevin makes an analogy to help us better understand the supply chain.

  • [12:30] - Most of the time, people don't know where and how their data is being transferred back and forth.

  • [14:12] - You trust a process and then when something breaks, how do you find out about it?

  • [17:01] - Kevin describes an example of observing an organization's work and discovering crypto mining.

  • [19:51] - What should be asked about the organization's environment?

  • [21:34] - Think about all the things you use regularly that are connected to something. Now expand that thinking to companies and businesses.

  • [23:27] - Where do all of these components come from?

  • [26:47] - Kevin points out the challenges in the cybersecurity legislature.

  • [28:46] - Ask questions and accept the answers. Determine what is acceptable risk.

  • [31:22] - The trickle down of data is really what the supply chain is.

  • [33:17] - Kevin shares some information about articles for further reading on this topic as well as some interesting numbers about recent breaches.

  • [35:48] - If you don't know what is normal, you won't know what is abnormal. This is why knowing the baseline is so important.

Thanks for joining us on Easy Prey. Be sure to subscribe to our podcast on iTunes and leave a nice review.

Links and Resources:
  • Podcast Web Page

  • Facebook Page

  • whatismyipaddress.com

  • Easy Prey on Instagram

  • Easy Prey on Twitter

  • Easy Prey on LinkedIn

  • Easy Prey on YouTube

  • Easy Prey on Pinterest

  • Cyolo Website

  • Kevin Kumpf on LinkedIn

...more
View all episodesView all episodes
Download on the App Store

Easy PreyBy Chris Parker

  • 4.7
  • 4.7
  • 4.7
  • 4.7
  • 4.7

4.7

30 ratings


More shows like Easy Prey

View all
Criminal by Vox Media Podcast Network

Criminal

37,610 Listeners

Wait Wait... Don't Tell Me! by NPR

Wait Wait... Don't Tell Me!

38,878 Listeners

Let's Not Meet: A True Horror Podcast by Cryptic County

Let's Not Meet: A True Horror Podcast

8,772 Listeners

Darknet Diaries by Jack Rhysider

Darknet Diaries

8,114 Listeners

The Intelligence from The Economist by The Economist

The Intelligence from The Economist

2,553 Listeners

Dateline NBC by NBC News

Dateline NBC

47,696 Listeners

The Shawn Ryan Show by Shawn Ryan

The Shawn Ryan Show

46,150 Listeners

Watchman Privacy by Gabriel Custodiet

Watchman Privacy

74 Listeners

Body Bags with Joseph Scott Morgan by CrimeOnline and iHeartPodcasts

Body Bags with Joseph Scott Morgan

2,182 Listeners

The Rest Is Classified by Goalhanger

The Rest Is Classified

1,282 Listeners