top of page
hd-wallpaper-7228378_1920.jpg

MEET KIMBERLY SIMON

The Most Influential Woman in Cybersecurity

​

Konnect In a Minute (KIM)

 

Kimberly shares tips and tricks on enhancing your cybersecurity compliance program. 

​

Follow MeetKimberlySimon on YouTube - https://www.youtube.com/playlist?list=PLufAYLxNjYaampjXIOdPwU_v06d5NBUj

​

​

Incident Response Planning


An incident response plan is a vital document that will be reviewed as part of the cybersecurity audit. In the event of a cybersecurity incident, time is of the utmost importance if you are going to save your data.

​

Follow MeetKimberlySimon on YouTube - https://www.youtube.com/playlist?list=PLufAYLxNjYaampjXIOdPwU_v06d5NBUj

​

​

Policy & Procedure Documentation


Policies refer to the rules and guidelines that a company operates by. Examples of standard policies that each company should already have include privacy, acceptable use, internet access, email and communications, and information security policies. 

​

Follow MeetKimberlySimon on YouTube - https://www.youtube.com/playlist?list=PLufAYLxNjYaampjXIOdPwU_v06d5NBUj

​

​

Understanding the Scoping Phase


The "scoping" phase of an assessment pinpoints the people, processes, and technology that impact the security of your data.. 

​

Follow MeetKimberlySimon on YouTube - https://www.youtube.com/playlist?list=PLufAYLxNjYaampjXIOdPwU_v06d5NBUj

​

​

Risk Assessments Simplified


A risk assessment refers to an organization identifying the critical assets required to run their business effectively, where those assets are, and how they are protected.

​

Follow MeetKimberlySimon on YouTube - https://www.youtube.com/playlist?list=PLufAYLxNjYaampjXIOdPwU_v06d5NBUj

​

​

bottom of page