Quality Plus Consulting - Breakfast Bytes

Quality Plus Consulting - Breakfast Bytes

Felicia King is an internationally recognized CISO and considered to be one of the top network layer security strategists in the U.S. Since launching in 2004 on the WGTD network, her Breakfast Bytes podcast has focused on information security risk management and the issues business leaders need to be aware of to benefit from the challenges others have faced. Learn about the most effective approaches, what you can do to mitigate risk, and how to protect your most valuable assets, your data, and your time.

Episodes

May 13, 2024 28 mins

Welcome to an insightful episode of Breakfast Bytes, featuring an in-depth discussion about Zero-Trust Cybersecurity, a vital approach to modern cybersecurity practices. Understand why this network layer protection strategy is essential to guard your business and residential networks against harmful threats.

From a reflective analysis of the cybersecurity landscape four years ago, Felicia highlights the repercussions of a weak cybe...

Mark as Played

In this episode of Breakfast Bytes with Felicia King, we navigate the complex but crucial realm of cyber security. We explore the emerging menace of supply chain attacks and underscore the vital need for proactive incident response planning. Felicia reveals the staggering average cost of a cyber-attack, per employee and endpoint, and explains why smaller businesses might suffer even greater losses.

King sheds light on the often unn...

Mark as Played

In today's episode of Breakfast Bytes, hosted by Felicia King, we delve into the pressing issue of cybersecurity in K-12 education with special guest, Chris Rule, a Technology Director with 25 years of experience. We discuss the urgent need for tangible action in this area and explore operational maturity practices like third-party information security risk management, vendor risk management, vulnerability management, and password ...

Mark as Played

In this episode of Breakfast Bytes, vCISO Felicia King of QPC Security uses an example of dark web data and how it can be leveraged. She describes how operational maturity in an organization can make that organization more competitive, lower risk, improve collaboration, improve culture and employee retention, while reducing risk.

 

She explores why actioning relevant, specific data is more critical than simply having it available. ...

Mark as Played

"Unlocking Strategic IT Investments and Information Security: Expert Insights with Gina King" dives into the critical aspects of IT investments and infrastructure. Felicia King, host of 'Breakfast Bytes', engages in a captivating conversation with Gina King, a leading Chief Information Security Officer. The extensive dialogue sheds light on necessary expenditures on Information Systems and Technology, managing and optimizing securi...

Mark as Played

Join us in this insightful episode of Breakfast Bytes with Felicia King, along with our guest Kyle Wentworth of the Wentworth Group. We delve into a balanced exploration of business needs vs IT security needs, demonstrating the magnitude of this issue with a case study of a massive spam operation hijacking over 8000 trusted brand domains.

https://thehackernews.com/2024/02/8000-subdomains-of-trusted-brands.html

In this detailed conv...

Mark as Played
March 25, 2024 85 mins

In today's episode of Breakfast Bytes, we are delighted to have Joe Brunsman from Brunsman Advisory Group as our special guest. Known for his extensive knowledge on the intersecting worlds of insurance and cybersecurity, Joe offers beneficial insights on the evolving sphere of insurance exclusions and how businesses can navigate these changes amidst the increasing threats of cyber warfare. Tune in as we explore the importance of ad...

Mark as Played

Welcome to another eye-opening episode of Breakfast Bytes hosted by Felicia King. In this episode, we dissect prevalent misconceptions in the IT industry particularly regarding services like NOC, SOC, XDR, and SOAR. Explore the conundrum between cybersecurity checkbox exercises and the pivotal need for legitimate risk reduction efforts. Moreover, discover potential pitfalls of co-managed IT and strategies to sidestep them.

We delve...

Mark as Played

Felicia is joined by fellow CISO Dawn Montemayor, partner at PureCyber, which is a security minded business consulting firm. Learn from two CISOs about how vital it is to use operationally mature processes in requirements definitions in order to achieve effective outcomes while avoiding toxic behavior in complex entities.

  • the importance of vulnerability assessment and management requirements in contracts
  • It is imperative for re...
Mark as Played

Felicia is joined by Laura Conrad, a Security Architect with 30 years of experience in enterprise environments. Laura currently reports directly to a CISO, and has been an integral part of the information security program at two large enterprises.

Felicia has consulted with 26 large enterprises and numerous SMB organizations in the last 30 years. She finds that the same problems occur in every organization that lacks operational ma...

Mark as Played

Felicia shares insights on the pitfalls of changing IT service providers or MSPs for both clients and the IT service providers themselves. This content is based upon a number of questions that other MSPs have posed to Felicia asking for advice as well as numerous first hand experiences on the subject.

This podcast is primarily for IT service providers or MSPs, but business decisions makers who are considering making a change would ...

Mark as Played

Special guest Tobias Musser of MNS Group generously shares with the Breakfast Bytes audience his wisdom and insight into what is a challenging and nuanced regulatory landscape that has far reaching business implications.

https://mnsgroup.com/

A vigorous discussion of the implications of the latest DoD memo about DFARS 7012 FedRAMP or FedRAMP moderate.

FedRAMP Compliance Challenges and Hybrid Approach

Tobias...

Mark as Played
December 9, 2023 29 mins

Tom Dean of Consulting Adventures joins Felicia for part three of the analysis on mobile devices and the problems with them.

  • OKTA breach, IT admin’s password getting stored in gmail password synced manager
  • Two-way problems. Personal on business and business on personal
  • Lack of clarity around device wipe, device use policies, apps running on devices
  • Compliance is easier when business owns the asset and delineation of ownership o...
Mark as Played
Part 2 of a series on threats to mobile devices and through mobile devices. Tactics and techniques to deal with those threats. Cohost: Tom Dean – Consulting Ventures
  • Tom has decades in capital goods manufacturing industry (fortune 500 scale)
  • Years of experience in marketing, sales & interfacing with independent dealers/distributors (small/medium scale)
  • Current focus is strategy & risk management consulting
  • Lifelong lear...
Mark as Played
Part 1 of a two-part series on threats to mobile devices and through mobile devices. Tactics and techniques to deal with those threats. Cohost: Tom Dean – Consulting Ventures
  • Tom has decades in capital goods manufacturing industry (fortune 500 scale)
  • Years of experience in marketing, sales & interfacing with independent dealers/distributors (small/medium scale)
  • Current focus is strategy & risk management consulting
  • Life...
Mark as Played

The process of determining how workloads should be hosted is very complex and not a decision that should be abdicated to the IT service provider. Business decision-makers must be involved in those decisions as only they are able to define the key criteria that all other factors are dependent upon.

 

Mark as Played

CTO Kyle Wentworth joins Felicia for a discussion about how businesses can avoid adverse financial impacts.

 

Lack of understanding of the language of technology

It changes so incredibly fast that it takes a sea of people who understand the pieces

Read more

Mark as Played

Why it is critical to have an email security expert managing and monitoring email security configurations and delivery of email on an ongoing basis.

Instructions from marketing automation platforms are not adequate.

It matters A LOT what you are trying to do with email. Getting these items configured is an art form.

Vendors are continually failing vendor risk management analysis and losing business over their email not being proper...

Mark as Played

Kyle Wentworth of Wentworth Consulting Group joined Felicia to compare/contrast three C-suite level IT/IS related roles.

Kyle has 35 years of business experience and has been working on computers since 1976. He is a:

  • Fractional CTO
  • Business coach
  • Business process modeler

Kyle has a great resource on his website to help people understand the differences between these C-suite roles.

https://wentworthconsultinggroup.com/cto-...

Mark as Played
June 2, 2023 29 mins

Zero trust is not a product you buy. The problem that most organizations have is that they are still not doing the fundamentals well. CIS has a community defense model. I did a detailed webinar on it where I covered a lot of these fundamentals. https://www.qpcsecurity.com/2023/02/16/addressing-information-security-fundamentals-with-cis-and-community-defense-model/

Let's look at inventory management, asset management, change managem...

Mark as Played

Popular Podcasts

    Current and classic episodes, featuring compelling true-crime mysteries, powerful documentaries and in-depth investigations.

    The Nikki Glaser Podcast

    Every week comedian and infamous roaster Nikki Glaser provides a fun, fast-paced, and brutally honest look into current pop-culture and her own personal life.

    Stuff You Should Know

    If you've ever wanted to know about champagne, satanism, the Stonewall Uprising, chaos theory, LSD, El Nino, true crime and Rosa Parks, then look no further. Josh and Chuck have you covered.

    Crime Junkie

    If you can never get enough true crime... Congratulations, you’ve found your people.

    Start Here

    A straightforward look at the day's top news in 20 minutes. Powered by ABC News. Hosted by Brad Mielke.

Advertise With Us
Music, radio and podcasts, all free. Listen online or download the iHeart App.

Connect

© 2024 iHeartMedia, Inc.