Recap on Season 3 - Receipts on The Tea on Cybersecurity
DESCRIPTION
We’ve come to the end of another Season of The Tea on Cybersecurity and you know what that means. Join host Jara Rowe in her ultimate receipts from season 3. She highlights the most important things she has learned from her guests this season including why MFA is key to keeping yourself safe online, how to manage vulnerabilities, what steps you need in preparing for cybersecurity incidents, and how to cultivate trust and transparency within your organizations.
Listen in as Jara revisits her conversations with all of our Season 3 guests including Trava CEO Jim Goldman, Craig Saldanha and Mario Vlieg with Insight Insurance, and John Boomershine with BlankInkIT, among others.
In this episode, you’ll learn:
- Multi-Factor Authentication (MFA) is Your Best Friend: It's like adding an extra lock to your door to keep the bad guys out—and who doesn’t want that extra peace of mind? Enabling MFA can be a game-changer in protecting against cyber vulnerabilities. It's easy to implement and adds that essential layer of security without the hassle!
- Bring Your Own Device (BYOD) Take Control of Your Digital Inventory: This is a deep dive on how to make sure all devices, company-owned or personal, are secure and compliant in this digitally diverse world. This is super relevant for those offering flexible work arrangements and want to stay ahead in your cybersecurity game.
- Establishing Trust and Transparency is Key: This isn’t just about securing your systems but also about earning and maintaining the trust of your customers and stakeholders— whether it’s securing communications through encryption or ensuring third-party vendors are just as vigilant.
Jump into the conversation:
[00:00 - 00:41] Introduction to the Tea on Cybersecurity podcast
[00:41 - 3:46] The importance of MFA
[03:47 - 05:07] MFA in cyber hygiene
[05:08 - 06:02] Employee training as a vital part of cybersecurity defense strategy
[06:52 - 07:45] BOYD (bring your own device) and the challenges of inventory management
[07:45 - 10:07] A different way to think about risk
[10:08 - 12:12] The difference between risks and vulnerabilities
[12:18 - 13:24] The difference between breaches and incidents
[13:25 - 14:15] What to do if an incident should occur
[14:19 - 16:17] Steps to take if an incident were to occur with a third-party vendor
[16:18 - 17:58] Why trust is foundational to cybersecurity
[17:59 - 19:03] How a compliance framework is like a cookbook
[19:03 - 21:21] Cybersecurity in healthcare and banking
Connect with the host:
Connect with Trava:
Website www.travasecurity.com
Blog www.travasecurity.com/blog
LinkedIn @travasecurity
YouTube @travasecurity