MEET KIMBERLY SIMON
The Most Influential Woman in Cybersecurity
​
Konnect In a Minute (KIM)
Kimberly shares tips and tricks on enhancing your cybersecurity compliance program.
​
Follow MeetKimberlySimon on YouTube - https://www.youtube.com/playlist?list=PLufAYLxNjYaampjXIOdPwU_v06d5NBUj
​
​
Incident Response Planning
An incident response plan is a vital document that will be reviewed as part of the cybersecurity audit. In the event of a cybersecurity incident, time is of the utmost importance if you are going to save your data.
​
Follow MeetKimberlySimon on YouTube - https://www.youtube.com/playlist?list=PLufAYLxNjYaampjXIOdPwU_v06d5NBUj
​
​
Policy & Procedure Documentation
Policies refer to the rules and guidelines that a company operates by. Examples of standard policies that each company should already have include privacy, acceptable use, internet access, email and communications, and information security policies.
​
Follow MeetKimberlySimon on YouTube - https://www.youtube.com/playlist?list=PLufAYLxNjYaampjXIOdPwU_v06d5NBUj
​
​
Understanding the Scoping Phase
The "scoping" phase of an assessment pinpoints the people, processes, and technology that impact the security of your data..
​
Follow MeetKimberlySimon on YouTube - https://www.youtube.com/playlist?list=PLufAYLxNjYaampjXIOdPwU_v06d5NBUj
​
​
Risk Assessments Simplified
A risk assessment refers to an organization identifying the critical assets required to run their business effectively, where those assets are, and how they are protected.
​
Follow MeetKimberlySimon on YouTube - https://www.youtube.com/playlist?list=PLufAYLxNjYaampjXIOdPwU_v06d5NBUj
​
​