top of page


The Most Influential Woman in Cybersecurity

Konnect In a Minute (KIM)


Kimberly shares tips and tricks on enhancing your cybersecurity compliance program. 

Follow MeetKimberlySimon on YouTube -

Incident Response Planning

An incident response plan is a vital document that will be reviewed as part of the cybersecurity audit. In the event of a cybersecurity incident, time is of the utmost importance if you are going to save your data.

Follow MeetKimberlySimon on YouTube -

Policy & Procedure Documentation

Policies refer to the rules and guidelines that a company operates by. Examples of standard policies that each company should already have include privacy, acceptable use, internet access, email and communications, and information security policies. 

Follow MeetKimberlySimon on YouTube -

Understanding the Scoping Phase

The "scoping" phase of an assessment pinpoints the people, processes, and technology that impact the security of your data.. 

Follow MeetKimberlySimon on YouTube -

Risk Assessments Simplified

A risk assessment refers to an organization identifying the critical assets required to run their business effectively, where those assets are, and how they are protected.

Follow MeetKimberlySimon on YouTube -

bottom of page