Podchaser Logo
Home
Top 5 Supply Chain Risks with Kevin Kumpf

Top 5 Supply Chain Risks with Kevin Kumpf

Released Wednesday, 13th March 2024
Good episode? Give it some love!
Top 5 Supply Chain Risks with Kevin Kumpf

Top 5 Supply Chain Risks with Kevin Kumpf

Top 5 Supply Chain Risks with Kevin Kumpf

Top 5 Supply Chain Risks with Kevin Kumpf

Wednesday, 13th March 2024
Good episode? Give it some love!
Rate Episode

As businesses embrace digital transformation and rely on interconnected networks for their operations, the vulnerabilities within the digital supply chain become increasingly apparent. From data breaches to third party vulnerabilities, the threats are multi-faceted and ever-evolving.

Today’s guest is Kevin Kumpf. Kevin has more than 20 years of IT Security and Compliance experience including over 10 years of cybersecurity, governance, and critical infrastructure experience working in the energy, medical manufacturing, transportation, and fedramp realms. 

Show Notes:

  • [0:54] - Kevin shares what he does in his current role and his background in the industry.

  • [3:38] - He began his career in cybersecurity at a time when cybersecurity was not a priority.

  • [4:30] - Scammers target anyone and everyone. Even Kevin has been a victim.

  • [6:53] - It comes down to ownership.

  • [8:19] - Know your baseline and who is responsible.

  • [10:07] - Kevin makes an analogy to help us better understand the supply chain.

  • [12:30] - Most of the time, people don’t know where and how their data is being transferred back and forth.

  • [14:12] - You trust a process and then when something breaks, how do you find out about it?

  • [17:01] - Kevin describes an example of observing an organization’s work and discovering crypto mining.

  • [19:51] - What should be asked about the organization’s environment?

  • [21:34] - Think about all the things you use regularly that are connected to something. Now expand that thinking to companies and businesses.

  • [23:27] - Where do all of these components come from?

  • [26:47] - Kevin points out the challenges in the cybersecurity legislature.

  • [28:46] - Ask questions and accept the answers. Determine what is acceptable risk.

  • [31:22] - The trickle down of data is really what the supply chain is.

  • [33:17] - Kevin shares some information about articles for further reading on this topic as well as some interesting numbers about recent breaches.

  • [35:48] - If you don’t know what is normal, you won’t know what is abnormal. This is why knowing the baseline is so important.

Thanks for joining us on Easy Prey. Be sure to subscribe to our podcast on iTunes and leave a nice review. 

Links and Resources:

Show More

Unlock more with Podchaser Pro

  • Audience Insights
  • Contact Information
  • Demographics
  • Charts
  • Sponsor History
  • and More!
Pro Features