top of page
hd-wallpaper-7228378_1920.jpg

MEET KIMBERLY SIMON

The Most Influential Woman in Cybersecurity

Konnect In a Minute (KIM)

 

Kimberly shares tips and tricks on enhancing your cybersecurity compliance program. 

Follow MeetKimberlySimon on YouTube - https://www.youtube.com/playlist?list=PLufAYLxNjYaampjXIOdPwU_v06d5NBUj

Incident Response Planning


An incident response plan is a vital document that will be reviewed as part of the cybersecurity audit. In the event of a cybersecurity incident, time is of the utmost importance if you are going to save your data.

Follow MeetKimberlySimon on YouTube - https://www.youtube.com/playlist?list=PLufAYLxNjYaampjXIOdPwU_v06d5NBUj

Policy & Procedure Documentation


Policies refer to the rules and guidelines that a company operates by. Examples of standard policies that each company should already have include privacy, acceptable use, internet access, email and communications, and information security policies. 

Follow MeetKimberlySimon on YouTube - https://www.youtube.com/playlist?list=PLufAYLxNjYaampjXIOdPwU_v06d5NBUj

Understanding the Scoping Phase


The "scoping" phase of an assessment pinpoints the people, processes, and technology that impact the security of your data.. 

Follow MeetKimberlySimon on YouTube - https://www.youtube.com/playlist?list=PLufAYLxNjYaampjXIOdPwU_v06d5NBUj

Risk Assessments Simplified


A risk assessment refers to an organization identifying the critical assets required to run their business effectively, where those assets are, and how they are protected.

Follow MeetKimberlySimon on YouTube - https://www.youtube.com/playlist?list=PLufAYLxNjYaampjXIOdPwU_v06d5NBUj

bottom of page