Quality Plus Consulting - Breakfast Bytes
Technology
"Unlocking Strategic IT Investments and Information Security: Expert Insights with Gina King" dives into the critical aspects of IT investments and infrastructure. Felicia King, host of 'Breakfast Bytes', engages in a captivating conversation with Gina King, a leading Chief Information Security Officer. The extensive dialogue sheds light on necessary expenditures on Information Systems and Technology, managing and optimizing security investments, and realigning perceptions of IT as a valuable strategic asset.
Through their enriching discussion, Felicia and Gina tackle widespread issues of underinvestment in IT, encouraging businesses to understand and optimize their IT expenditures. Pointing to the risks of non-compliance and inadequate IT security measures, they illustrate how a thorough approach to IT spend analysis can tremendously impact a company's financial bottom line, customer satisfaction, and overall client experience.
The episode highlights the importance of a proactive and continuous IT security investment to nurture an effective information security risk management program. Felicia and Gina underscore the significance of considering cybersecurity as an aspect of overall business risk, rather than an isolated problem. They also emphasize the value of tech-savvy leadership and security education in fostering a vigilant workforce and strengthening an organization's security posture.
Switching gears to effective risk management amidst the digital landscape, the episode ends on a call for creating clear policies, continuous vigilance, and an understanding of organizational identity to safeguard online infrastructures. This engaging discussion is a must-listen for anyone involved in IT procurement, investments, security, and overall business operation.
Practical example of how operational maturity improves productivity while reducing risk
Domain/DNS hosting, account ownership, security issues and TCO
Cyber Insurance versus Cyber Warranty
Demystifying IT Services and the Shared Responsibility Paradigm
How establishing requirements properly results in best outcomes
Operational Maturity is required to have Information Security Risk Management
Managing the impact of changing IT service providers
CMMC and latest DoD memo implications and far reaching effects related to FedRAMP
Why the ship has sailed on BYOD
Threats to mobile devices and how to manage them, part 2
Physical threats to mobile phones, SIM hijacking, out of band SMS, and Yubikeys
How to analyze workloads and decide how they should be hosted
How a lack of understanding of business processes relates to adverse financial impact
Email security management and monitoring is critical
CISO, CTO, CIO, what’s the difference?
Zero trust fundamentals
FTC SafeguardsRule, IRS requirements, and tax preparers
Methods to prevent business email compromise
Business survival over the next decade
Create your
podcast in
minutes
It is Free
Insight Story: Tech Trends Unpacked
Zero-Shot
Fast Forward by Tomorrow Unlocked: Tech past, tech future
Black Wolf Feed (Chapo Premium Feed Bootleg)
Bannon`s War Room