Quality Plus Consulting - Breakfast Bytes

Quality Plus Consulting - Breakfast Bytes

Felicia King is an internationally recognized CISO and considered to be one of the top network layer security strategists in the U.S. Since launching in 2004 on the WGTD network, her Breakfast Bytes podcast has focused on information security risk management and the issues business leaders need to be aware of to benefit from the challenges others have faced. Learn about the most effective approaches, what you can do to mitigate risk, and how to protect your most valuable assets, your data, and your time.

Episodes

April 11, 2024 76 mins

"Unlocking Strategic IT Investments and Information Security: Expert Insights with Gina King" dives into the critical aspects of IT investments and infrastructure. Felicia King, host of 'Breakfast Bytes', engages in a captivating conversation with Gina King, a leading Chief Information Security Officer. The extensive dialogue sheds light on necessary expenditures on Information Systems and Technology, managing and optimizing securi...

Mark as Played

Join us in this insightful episode of Breakfast Bytes with Felicia King, along with our guest Kyle Wentworth of the Wentworth Group. We delve into a balanced exploration of business needs vs IT security needs, demonstrating the magnitude of this issue with a case study of a massive spam operation hijacking over 8000 trusted brand domains.

https://thehackernews.com/2024/02/8000-subdomains-of-trusted-brands.html

In this detailed conv...

Mark as Played
March 25, 2024 85 mins

In today's episode of Breakfast Bytes, we are delighted to have Joe Brunsman from Brunsman Advisory Group as our special guest. Known for his extensive knowledge on the intersecting worlds of insurance and cybersecurity, Joe offers beneficial insights on the evolving sphere of insurance exclusions and how businesses can navigate these changes amidst the increasing threats of cyber warfare. Tune in as we explore the importance of ad...

Mark as Played

Welcome to another eye-opening episode of Breakfast Bytes hosted by Felicia King. In this episode, we dissect prevalent misconceptions in the IT industry particularly regarding services like NOC, SOC, XDR, and SOAR. Explore the conundrum between cybersecurity checkbox exercises and the pivotal need for legitimate risk reduction efforts. Moreover, discover potential pitfalls of co-managed IT and strategies to sidestep them.

We delve...

Mark as Played

Felicia is joined by fellow CISO Dawn Montemayor, partner at PureCyber, which is a security minded business consulting firm. Learn from two CISOs about how vital it is to use operationally mature processes in requirements definitions in order to achieve effective outcomes while avoiding toxic behavior in complex entities.

  • the importance of vulnerability assessment and management requirements in contracts
  • It is imperative for re...
Mark as Played

Felicia is joined by Laura Conrad, a Security Architect with 30 years of experience in enterprise environments. Laura currently reports directly to a CISO, and has been an integral part of the information security program at two large enterprises.

Felicia has consulted with 26 large enterprises and numerous SMB organizations in the last 30 years. She finds that the same problems occur in every organization that lacks operational ma...

Mark as Played

Felicia shares insights on the pitfalls of changing IT service providers or MSPs for both clients and the IT service providers themselves. This content is based upon a number of questions that other MSPs have posed to Felicia asking for advice as well as numerous first hand experiences on the subject.

This podcast is primarily for IT service providers or MSPs, but business decisions makers who are considering making a change would ...

Mark as Played

Special guest Tobias Musser of MNS Group generously shares with the Breakfast Bytes audience his wisdom and insight into what is a challenging and nuanced regulatory landscape that has far reaching business implications.

https://mnsgroup.com/

A vigorous discussion of the implications of the latest DoD memo about DFARS 7012 FedRAMP or FedRAMP moderate.

FedRAMP Compliance Challenges and Hybrid Approach

Tobias...

Mark as Played
December 9, 2023 29 mins

Tom Dean of Consulting Adventures joins Felicia for part three of the analysis on mobile devices and the problems with them.

  • OKTA breach, IT admin’s password getting stored in gmail password synced manager
  • Two-way problems. Personal on business and business on personal
  • Lack of clarity around device wipe, device use policies, apps running on devices
  • Compliance is easier when business owns the asset and delineation of ownership o...
Mark as Played
Part 2 of a series on threats to mobile devices and through mobile devices. Tactics and techniques to deal with those threats. Cohost: Tom Dean – Consulting Ventures
  • Tom has decades in capital goods manufacturing industry (fortune 500 scale)
  • Years of experience in marketing, sales & interfacing with independent dealers/distributors (small/medium scale)
  • Current focus is strategy & risk management consulting
  • Lifelong lear...
Mark as Played
Part 1 of a two-part series on threats to mobile devices and through mobile devices. Tactics and techniques to deal with those threats. Cohost: Tom Dean – Consulting Ventures
  • Tom has decades in capital goods manufacturing industry (fortune 500 scale)
  • Years of experience in marketing, sales & interfacing with independent dealers/distributors (small/medium scale)
  • Current focus is strategy & risk management consulting
  • Life...
Mark as Played

The process of determining how workloads should be hosted is very complex and not a decision that should be abdicated to the IT service provider. Business decision-makers must be involved in those decisions as only they are able to define the key criteria that all other factors are dependent upon.

 

Mark as Played

CTO Kyle Wentworth joins Felicia for a discussion about how businesses can avoid adverse financial impacts.

 

Lack of understanding of the language of technology

It changes so incredibly fast that it takes a sea of people who understand the pieces

Read more

Mark as Played

Why it is critical to have an email security expert managing and monitoring email security configurations and delivery of email on an ongoing basis.

Instructions from marketing automation platforms are not adequate.

It matters A LOT what you are trying to do with email. Getting these items configured is an art form.

Vendors are continually failing vendor risk management analysis and losing business over their email not being proper...

Mark as Played

Kyle Wentworth of Wentworth Consulting Group joined Felicia to compare/contrast three C-suite level IT/IS related roles.

Kyle has 35 years of business experience and has been working on computers since 1976. He is a:

  • Fractional CTO
  • Business coach
  • Business process modeler

Kyle has a great resource on his website to help people understand the differences between these C-suite roles.

https://wentworthconsultinggroup.com/cto-...

Mark as Played
June 2, 2023 29 mins

Zero trust is not a product you buy. The problem that most organizations have is that they are still not doing the fundamentals well. CIS has a community defense model. I did a detailed webinar on it where I covered a lot of these fundamentals. https://www.qpcsecurity.com/2023/02/16/addressing-information-security-fundamentals-with-cis-and-community-defense-model/

Let's look at inventory management, asset management, change managem...

Mark as Played

The IRS regulations for tax preparers being compliant with the FTC Safeguards rule is specified to be enforced starting in June 2023. It is doubtful that the majority of tax preparers are adequately compliant.

The IRS published information about this compliance requirement as far back as 2019.

https://www.irs.gov/newsroom/heres-what-tax-professionals-should-know-about-creating-a-data-security-plan

All of it is common sense and thin...

Mark as Played
Mark as Played
What is the number one thing you can do as a consumer to protect yourself when dealing with tax preparers?

Practical examples of what to ask for from your tax preparer and why.

What are the total number of people that would have access to my records if I do business with you? You want me to sign a contract with you, terms and conditions that I have to abide by. If you are going to prepare my taxes, show me your affirmation statemen...

Mark as Played

I get a lot of questions about PSAs, ERPs, and overall paradigms related to core business software. This podcast summarizes things you should be thinking about in your software selection process.

After three years of investigating PSA and ERP options including spending a lot of money on software and payroll, the product we like is Odoo. Organizations using a PSA with add-ons approach are really missing the mark. There is no PSA tha...

Mark as Played

Popular Podcasts

    Current and classic episodes, featuring compelling true-crime mysteries, powerful documentaries and in-depth investigations.

    Death, Sex & Money

    Anna Sale explores the big questions and hard choices that are often left out of polite conversation.

    Stuff You Should Know

    If you've ever wanted to know about champagne, satanism, the Stonewall Uprising, chaos theory, LSD, El Nino, true crime and Rosa Parks, then look no further. Josh and Chuck have you covered.

    Crime Junkie

    If you can never get enough true crime... Congratulations, you’ve found your people.

    Start Here

    A straightforward look at the day's top news in 20 minutes. Powered by ABC News. Hosted by Brad Mielke.

Advertise With Us
Music, radio and podcasts, all free. Listen online or download the iHeart App.

Connect

© 2024 iHeartMedia, Inc.