Recap on Season 3 - Receipts on The Tea on Cybersecurity

Media Thumbnail
00:00
00:00
1x
  • 0.5
  • 1
  • 1.25
  • 1.5
  • 1.75
  • 2
This is a podcast episode titled, Recap on Season 3 - Receipts on The Tea on Cybersecurity. The summary for this episode is: <p>We’ve come to the end of another Season of The Tea on Cybersecurity and you know what that means. Join host Jara Rowe in her ultimate receipts from season 3. She highlights the most important things she has learned from her guests this season including why MFA is key to keeping yourself safe online, how to manage vulnerabilities, what steps you need in preparing for cybersecurity incidents, and how to cultivate trust and transparency within your organizations.</p><p><br></p><p>Listen in as Jara revisits her conversations with all of our Season 3 guests including Trava CEO Jim Goldman, Craig Saldanha and Mario Vlieg with Insight Insurance, and John Boomershine with BlankInkIT, among others.&nbsp;</p><p><br></p><p><br></p><p><strong>In this episode, you’ll learn:</strong></p><p><br></p><ul><li>Multi-Factor Authentication (MFA) is Your Best Friend: It's like adding an extra lock to your door to keep the bad guys out—and who doesn’t want that extra peace of mind? Enabling MFA can be a game-changer in protecting against cyber vulnerabilities. It's easy to implement and adds that essential layer of security without the hassle!</li><li>Bring Your Own Device (BYOD) Take Control of Your Digital Inventory: This is a deep dive on how to make sure all devices, company-owned or personal, are secure and compliant in this digitally diverse world. This is super relevant for those offering flexible work arrangements and want to stay ahead in your cybersecurity game.</li><li>Establishing Trust and Transparency is Key: This isn’t just about securing your systems but also about earning and maintaining the trust of your customers and stakeholders— whether it’s securing communications through encryption or ensuring third-party vendors are just as vigilant.&nbsp;</li></ul><p><br></p><p><br></p><p><strong>Jump into the conversation:</strong></p><p><br></p><p>[00:00 - 00:41] Introduction to the Tea on Cybersecurity podcast</p><p>[00:41 - 3:46] The importance of MFA</p><p>[03:47 - 05:07] MFA in cyber hygiene</p><p>[05:08 - 06:02] Employee training as a vital part of cybersecurity defense strategy</p><p>[06:52 - 07:45] BOYD (bring your own device) and the challenges of inventory management</p><p>[07:45 - 10:07] A different way to think about risk</p><p>[10:08 - 12:12] The difference between risks and vulnerabilities</p><p>[12:18 - 13:24] The difference between breaches and incidents</p><p>[13:25 - 14:15] What to do if an incident should occur</p><p>[14:19 - 16:17] Steps to take if an incident were to occur with a third-party vendor</p><p>[16:18 - 17:58] Why trust is foundational to cybersecurity</p><p>[17:59 - 19:03] How a compliance framework is like a cookbook</p><p>[19:03 - 21:21] Cybersecurity in healthcare and banking</p><p><br></p><p><strong>Connect with the host:</strong></p><p><a href="https://www.linkedin.com/in/jararowe/" rel="noopener noreferrer" target="_blank">Jara Rowe’s LinkedIn</a></p><p><br></p><p><strong>Connect with Trava:</strong></p><p>Website <a href="http://www.travasecurity.com/" rel="noopener noreferrer" target="_blank">www.travasecurity.com</a></p><p>Blog <a href="http://www.travasecurity.com/blog" rel="noopener noreferrer" target="_blank">www.travasecurity.com/blog</a></p><p>LinkedIn <a href="https://www.linkedin.com/company/travasecurity/?utm_source=casted&amp;utm_medium=podcast&amp;utm_campaign=podcast_share" rel="noopener noreferrer" target="_blank">@travasecurity</a></p><p>YouTube <a href="https://www.youtube.com/@travasecurity?utm_source=casted&amp;utm_medium=podcast&amp;utm_campaign=podcast_share" rel="noopener noreferrer" target="_blank">@travasecurity </a></p>
The importance of MFA
03:05 MIN
MFA in cyber hygiene
01:20 MIN
Employee training as a vital part of cybersecurity defense strategy
00:53 MIN
BOYD (bring your own device) and the challenges of inventory management
01:42 MIN
A different way to think about risk
02:21 MIN
The difference between risks and vulnerabilities
02:03 MIN
The difference between breaches and incidents
01:06 MIN
What to do if an incident should occur
00:49 MIN
Steps to take if an incident were to occur with a third-party vendor
01:57 MIN
Why trust is foundational to cybersecurity
01:40 MIN
How a compliance framework is like a cookbook
01:03 MIN
Cybersecurity in healthcare and banking
02:18 MIN

DESCRIPTION

We’ve come to the end of another Season of The Tea on Cybersecurity and you know what that means. Join host Jara Rowe in her ultimate receipts from season 3. She highlights the most important things she has learned from her guests this season including why MFA is key to keeping yourself safe online, how to manage vulnerabilities, what steps you need in preparing for cybersecurity incidents, and how to cultivate trust and transparency within your organizations.


Listen in as Jara revisits her conversations with all of our Season 3 guests including Trava CEO Jim Goldman, Craig Saldanha and Mario Vlieg with Insight Insurance, and John Boomershine with BlankInkIT, among others. 



In this episode, you’ll learn:


  • Multi-Factor Authentication (MFA) is Your Best Friend: It's like adding an extra lock to your door to keep the bad guys out—and who doesn’t want that extra peace of mind? Enabling MFA can be a game-changer in protecting against cyber vulnerabilities. It's easy to implement and adds that essential layer of security without the hassle!
  • Bring Your Own Device (BYOD) Take Control of Your Digital Inventory: This is a deep dive on how to make sure all devices, company-owned or personal, are secure and compliant in this digitally diverse world. This is super relevant for those offering flexible work arrangements and want to stay ahead in your cybersecurity game.
  • Establishing Trust and Transparency is Key: This isn’t just about securing your systems but also about earning and maintaining the trust of your customers and stakeholders— whether it’s securing communications through encryption or ensuring third-party vendors are just as vigilant. 



Jump into the conversation:


[00:00 - 00:41] Introduction to the Tea on Cybersecurity podcast

[00:41 - 3:46] The importance of MFA

[03:47 - 05:07] MFA in cyber hygiene

[05:08 - 06:02] Employee training as a vital part of cybersecurity defense strategy

[06:52 - 07:45] BOYD (bring your own device) and the challenges of inventory management

[07:45 - 10:07] A different way to think about risk

[10:08 - 12:12] The difference between risks and vulnerabilities

[12:18 - 13:24] The difference between breaches and incidents

[13:25 - 14:15] What to do if an incident should occur

[14:19 - 16:17] Steps to take if an incident were to occur with a third-party vendor

[16:18 - 17:58] Why trust is foundational to cybersecurity

[17:59 - 19:03] How a compliance framework is like a cookbook

[19:03 - 21:21] Cybersecurity in healthcare and banking


Connect with the host:

Jara Rowe’s LinkedIn


Connect with Trava:

Website www.travasecurity.com

Blog www.travasecurity.com/blog

LinkedIn @travasecurity

YouTube @travasecurity