Recap on Season 3 - Receipts on The Tea on Cybersecurity
00:00
00:00
1x
- 0.5
- 1
- 1.25
- 1.5
- 1.75
- 2
This is a podcast episode titled, Recap on Season 3 - Receipts on The Tea on Cybersecurity. The summary for this episode is: <p>We’ve come to the end of another Season of The Tea on Cybersecurity and you know what that means. Join host Jara Rowe in her ultimate receipts from season 3. She highlights the most important things she has learned from her guests this season including why MFA is key to keeping yourself safe online, how to manage vulnerabilities, what steps you need in preparing for cybersecurity incidents, and how to cultivate trust and transparency within your organizations.</p><p><br></p><p>Listen in as Jara revisits her conversations with all of our Season 3 guests including Trava CEO Jim Goldman, Craig Saldanha and Mario Vlieg with Insight Insurance, and John Boomershine with BlankInkIT, among others. </p><p><br></p><p><br></p><p><strong>In this episode, you’ll learn:</strong></p><p><br></p><ul><li>Multi-Factor Authentication (MFA) is Your Best Friend: It's like adding an extra lock to your door to keep the bad guys out—and who doesn’t want that extra peace of mind? Enabling MFA can be a game-changer in protecting against cyber vulnerabilities. It's easy to implement and adds that essential layer of security without the hassle!</li><li>Bring Your Own Device (BYOD) Take Control of Your Digital Inventory: This is a deep dive on how to make sure all devices, company-owned or personal, are secure and compliant in this digitally diverse world. This is super relevant for those offering flexible work arrangements and want to stay ahead in your cybersecurity game.</li><li>Establishing Trust and Transparency is Key: This isn’t just about securing your systems but also about earning and maintaining the trust of your customers and stakeholders— whether it’s securing communications through encryption or ensuring third-party vendors are just as vigilant. </li></ul><p><br></p><p><br></p><p><strong>Jump into the conversation:</strong></p><p><br></p><p>[00:00 - 00:41] Introduction to the Tea on Cybersecurity podcast</p><p>[00:41 - 3:46] The importance of MFA</p><p>[03:47 - 05:07] MFA in cyber hygiene</p><p>[05:08 - 06:02] Employee training as a vital part of cybersecurity defense strategy</p><p>[06:52 - 07:45] BOYD (bring your own device) and the challenges of inventory management</p><p>[07:45 - 10:07] A different way to think about risk</p><p>[10:08 - 12:12] The difference between risks and vulnerabilities</p><p>[12:18 - 13:24] The difference between breaches and incidents</p><p>[13:25 - 14:15] What to do if an incident should occur</p><p>[14:19 - 16:17] Steps to take if an incident were to occur with a third-party vendor</p><p>[16:18 - 17:58] Why trust is foundational to cybersecurity</p><p>[17:59 - 19:03] How a compliance framework is like a cookbook</p><p>[19:03 - 21:21] Cybersecurity in healthcare and banking</p><p><br></p><p><strong>Connect with the host:</strong></p><p><a href="https://www.linkedin.com/in/jararowe/" rel="noopener noreferrer" target="_blank">Jara Rowe’s LinkedIn</a></p><p><br></p><p><strong>Connect with Trava:</strong></p><p>Website <a href="http://www.travasecurity.com/" rel="noopener noreferrer" target="_blank">www.travasecurity.com</a></p><p>Blog <a href="http://www.travasecurity.com/blog" rel="noopener noreferrer" target="_blank">www.travasecurity.com/blog</a></p><p>LinkedIn <a href="https://www.linkedin.com/company/travasecurity/?utm_source=casted&utm_medium=podcast&utm_campaign=podcast_share" rel="noopener noreferrer" target="_blank">@travasecurity</a></p><p>YouTube <a href="https://www.youtube.com/@travasecurity?utm_source=casted&utm_medium=podcast&utm_campaign=podcast_share" rel="noopener noreferrer" target="_blank">@travasecurity </a></p>
Key Takeaways
The importance of MFA
03:05 MIN
MFA in cyber hygiene
01:20 MIN
Employee training as a vital part of cybersecurity defense strategy
00:53 MIN
BOYD (bring your own device) and the challenges of inventory management
01:42 MIN
A different way to think about risk
02:21 MIN
The difference between risks and vulnerabilities
02:03 MIN
The difference between breaches and incidents
01:06 MIN
What to do if an incident should occur
00:49 MIN
Steps to take if an incident were to occur with a third-party vendor
01:57 MIN
Why trust is foundational to cybersecurity
01:40 MIN
How a compliance framework is like a cookbook
01:03 MIN
Cybersecurity in healthcare and banking
02:18 MIN
DESCRIPTION
Dive into the essentials of cybersecurity with host Jara Rowe in the latest season of "The Tea on Cybersecurity" from Trava. This season unpacks multifactor authentication (MFA), the shift in remote work dynamics, and the nuances between breaches and incidents, featuring insights from industry experts Jim, Craig, Mario, Marie, Michael, Christina, and Boomer. Learn how to fortify your digital security through real-world advice on risk management, cyber hygiene, and the importance of trust and transparency in safeguarding data and systems. Don't miss out on these critical cybersecurity strategies and discussions—subscribe to "The Tea on Cybersecurity" on your favorite podcast platform today.
Today's Host

Jara Rowe
|Marketing Manager at Trava
Today's Guests

Craig Saldanha
|Associate Director of Technology Risk and Assurance at Insight Assurance

John Boomershine
|Vice President of Security and Compliance at BlackInk IT

Mario Vlieg
|ISO Practice Manager at Insight Assurance

Jim Goldman
|CEO of Trava Security