Felicia King is an internationally recognized CISO and considered to be one of the top network layer security strategists in the U.S. Since launching in 2004 on the WGTD network, her Breakfast Bytes podcast has focused on information security risk management and the issues business leaders need to be aware of to benefit from the challenges others have faced. Learn about the most effective approaches, what you can do to mitigate risk, and how to protect your most valuable assets, your data, a ...
…
continue reading
Join Felicia King in this eye-opening episode of Breakfast Bytes as she unravels the concept of third-party information security risk management. Felicia highlights the growing debates around software as a service (SaaS) platforms and the complexities they entail, raising poignant questions about security, backups, and risk. Dive deep into the intr…
…
continue reading

1
Mastering Operational Maturity: The Secret to AI Success
27:31
27:31
Play later
Play later
Lists
Like
Liked
27:31Welcome to another episode of Breakfast Bytes with Felicia King. In this gripping sequel, Felicia delves deeper into the concept of operational maturity and its vital role in driving organizational profitability and AI readiness. If you've ever wondered why achieving consistency in management across departments can be challenging, this episode shed…
…
continue reading

1
Driving Cultural Change Toward Profitability and Operational Maturity
27:32
27:32
Play later
Play later
Lists
Like
Liked
27:32In this enlightening episode of Breakfast Bytes, Felicia King draws upon her three decades of business experience to guide us through the crucial steps organizations must take to flourish amidst today's challenges. With a focus on operational maturity, Felicia unravels the strategies businesses need to implement to harness the power of AI without c…
…
continue reading

1
Mastering the AI Landscape: A Guide for Businesses
27:55
27:55
Play later
Play later
Lists
Like
Liked
27:55In this episode of Breakfast Bytes, Felicia King delves into the intertwining worlds of AI and technology adoption for businesses. She sheds light on how small and midsize businesses can leverage AI safely and the pivotal role of adopting the right technology. Drawing from three decades of experience, Felicia explores real-world scenarios, such as …
…
continue reading

1
Survive and Thrive in 2025: Empowering Your Team with Continuous Learning
28:55
28:55
Play later
Play later
Lists
Like
Liked
28:55In this episode of Breakfast Bytes, join Felicia King as she sits down with Chris Gross, the Director of Product at Breach Secure Now, to explore the revolutionary impact of continuous education in cybersecurity and productivity. Discover how Breach Secure Now's unique approach to training empowers managers and employees alike to enhance organizati…
…
continue reading
In this inspiring episode of Breakfast Bytes, Felicia King delves into the pressing strategies businesses need to adopt to thrive in the year 2025. With intriguing insights, Felicia articulates why companies must stay competitive and adapt to the ever-changing landscape—focusing on the integral role of a Chief Technology Officer and the imperative …
…
continue reading

1
The Hidden Risks of Data Centers: A Deep Dive with Dr. Eric Woodell
1:23:33
1:23:33
Play later
Play later
Lists
Like
Liked
1:23:33In this episode of Breakfast Bytes, host Felicia King sits down with Dr. Eric Woodell, founder of Ameris and a leading expert in data center infrastructure and operations compliance. Dive into the world of data centers as Dr. Woodell reveals the shocking truths behind their operations and the risks that could be lurking behind the scenes. Dr. Woode…
…
continue reading

1
Why You Need a CTO: Avoiding Costly Mistakes in Document Management
27:43
27:43
Play later
Play later
Lists
Like
Liked
27:43In this riveting episode of Breakfast Bytes, host Felicia King delves into the often overlooked but crucial aspect of business technology: document management platforms. With a sharp focus on how organizations of all sizes can benefit from these systems, Felicia underscores the importance of operational maturity and strategic decision-making. Throu…
…
continue reading

1
Navigating the Cloud: Unveiling the Hidden Costs and Risks
27:34
27:34
Play later
Play later
Lists
Like
Liked
27:34In this compelling episode of Breakfast Bytes, host Felicia King delves into the complex world of cloud computing, exploring the intricacies of public cloud, private cloud, self-hosting, and premise servers. With insights from a newly recognized expert in the field, this episode promises to challenge conventional wisdom and offer fresh perspectives…
…
continue reading

1
Exploring Network Security and AI Threats with Crystal Redmann
28:49
28:49
Play later
Play later
Lists
Like
Liked
28:49In this riveting episode of Breakfast Bytes, host Felicia sits down with Crystal Redmann, the inquisitive Operations Director from Redmann Farms, to dive into the intricacies of network security. Crystal brings forth compelling questions about network segmentation, shedding light on how this fundamental security measure can protect even the smalles…
…
continue reading

1
The Real Skinny on Penetration Testing: Debunking the Myths
19:03
19:03
Play later
Play later
Lists
Like
Liked
19:03Welcome to Breakfast Bytes with Felicia King. Today, we delve deep into the often-misunderstood realm of penetration testing. As business owners grapple with the necessity and costs associated with these tests, Felicia demystifies the process, drawing from her three decades of cybersecurity expertise. In this episode, discover why traditional penet…
…
continue reading
Good morning and welcome to another episode of Breakfast Bytes. I'm your host, Felicia King, and today, I'm joined by my colleague, Jeff Birner, hailing from Florida. Our riveting discussion centers around the recent CrowdStrike incident that has sent shockwaves through the cybersecurity community and beyond. This episode promises to offer insights…
…
continue reading

1
Navigating the AI Frontier: Caution, Control, and Opportunity
28:29
28:29
Play later
Play later
Lists
Like
Liked
28:29Good morning, you're listening to Breakfast Bytes, and I'm Felicia King. Today's episode takes a deep dive into the world of artificial intelligence, offering a perspective that challenges the mainstream narrative. Instead of jumping on the AI bandwagon, we'll explore the importance of cautious engagement and risk management when dealing with this …
…
continue reading

1
Understand implications of IT procurement using cabinets as an example
29:22
29:22
Play later
Play later
Lists
Like
Liked
29:22Felicia stressed the importance of informed decision-making in technology services and products, and the need for involving skilled professionals in decision-making processes. She also discussed the longevity of structural furniture, the challenges in network switch installation, and the need for a formal procurement process in the IT department. F…
…
continue reading
Welcome to an insightful episode of Breakfast Bytes, featuring an in-depth discussion about Zero-Trust Cybersecurity, a vital approach to modern cybersecurity practices. Understand why this network layer protection strategy is essential to guard your business and residential networks against harmful threats. From a reflective analysis of the cybers…
…
continue reading

1
Incident response and mitigating supply chain attacks
28:44
28:44
Play later
Play later
Lists
Like
Liked
28:44In this episode of Breakfast Bytes with Felicia King, we navigate the complex but crucial realm of cyber security. We explore the emerging menace of supply chain attacks and underscore the vital need for proactive incident response planning. Felicia reveals the staggering average cost of a cyber-attack, per employee and endpoint, and explains why s…
…
continue reading

1
K12 Technology and Cybersecurity Challenges and Solutions
29:12
29:12
Play later
Play later
Lists
Like
Liked
29:12In today's episode of Breakfast Bytes, hosted by Felicia King, we delve into the pressing issue of cybersecurity in K-12 education with special guest, Chris Rule, a Technology Director with 25 years of experience. We discuss the urgent need for tangible action in this area and explore operational maturity practices like third-party information secu…
…
continue reading

1
Practical example of how operational maturity improves productivity while reducing risk
28:20
28:20
Play later
Play later
Lists
Like
Liked
28:20In this episode of Breakfast Bytes, vCISO Felicia King of QPC Security uses an example of dark web data and how it can be leveraged. She describes how operational maturity in an organization can make that organization more competitive, lower risk, improve collaboration, improve culture and employee retention, while reducing risk. She explores why a…
…
continue reading

1
Unlocking Strategic IT Investments and Information Security
1:16:18
1:16:18
Play later
Play later
Lists
Like
Liked
1:16:18"Unlocking Strategic IT Investments and Information Security: Expert Insights with Gina King" dives into the critical aspects of IT investments and infrastructure. Felicia King, host of 'Breakfast Bytes', engages in a captivating conversation with Gina King, a leading Chief Information Security Officer. The extensive dialogue sheds light on necessa…
…
continue reading

1
Domain/DNS hosting, account ownership, security issues and TCO
58:52
58:52
Play later
Play later
Lists
Like
Liked
58:52Join us in this insightful episode of Breakfast Bytes with Felicia King, along with our guest Kyle Wentworth of the Wentworth Group. We delve into a balanced exploration of business needs vs IT security needs, demonstrating the magnitude of this issue with a case study of a massive spam operation hijacking over 8000 trusted brand domains. https://t…
…
continue reading

1
Cyber Insurance versus Cyber Warranty
1:25:57
1:25:57
Play later
Play later
Lists
Like
Liked
1:25:57In today's episode of Breakfast Bytes, we are delighted to have Joe Brunsman from Brunsman Advisory Group as our special guest. Known for his extensive knowledge on the intersecting worlds of insurance and cybersecurity, Joe offers beneficial insights on the evolving sphere of insurance exclusions and how businesses can navigate these changes amids…
…
continue reading

1
Demystifying IT Services and the Shared Responsibility Paradigm
33:45
33:45
Play later
Play later
Lists
Like
Liked
33:45Welcome to another eye-opening episode of Breakfast Bytes hosted by Felicia King. In this episode, we dissect prevalent misconceptions in the IT industry particularly regarding services like NOC, SOC, XDR, and SOAR. Explore the conundrum between cybersecurity checkbox exercises and the pivotal need for legitimate risk reduction efforts. Moreover, d…
…
continue reading

1
How establishing requirements properly results in best outcomes
29:51
29:51
Play later
Play later
Lists
Like
Liked
29:51Felicia is joined by fellow CISO Dawn Montemayor, partner at PureCyber, which is a security minded business consulting firm. Learn from two CISOs about how vital it is to use operationally mature processes in requirements definitions in order to achieve effective outcomes while avoiding toxic behavior in complex entities. the importance of vulnerab…
…
continue reading

1
Operational Maturity is required to have Information Security Risk Management
2:01:30
2:01:30
Play later
Play later
Lists
Like
Liked
2:01:30Felicia is joined by Laura Conrad, a Security Architect with 30 years of experience in enterprise environments. Laura currently reports directly to a CISO, and has been an integral part of the information security program at two large enterprises. Felicia has consulted with 26 large enterprises and numerous SMB organizations in the last 30 years. S…
…
continue reading

1
Managing the impact of changing IT service providers
29:43
29:43
Play later
Play later
Lists
Like
Liked
29:43Felicia shares insights on the pitfalls of changing IT service providers or MSPs for both clients and the IT service providers themselves. This content is based upon a number of questions that other MSPs have posed to Felicia asking for advice as well as numerous first hand experiences on the subject. This podcast is primarily for IT service provid…
…
continue reading

1
CMMC and latest DoD memo implications and far reaching effects related to FedRAMP
29:25
29:25
Play later
Play later
Lists
Like
Liked
29:25Special guest Tobias Musser of MNS Group generously shares with the Breakfast Bytes audience his wisdom and insight into what is a challenging and nuanced regulatory landscape that has far reaching business implications. https://mnsgroup.com/ A vigorous discussion of the implications of the latest DoD memo about DFARS 7012 FedRAMP or FedRAMP modera…
…
continue reading
Tom Dean of Consulting Adventures joins Felicia for part three of the analysis on mobile devices and the problems with them. OKTA breach, IT admin’s password getting stored in gmail password synced manager Two-way problems. Personal on business and business on personal Lack of clarity around device wipe, device use policies, apps running on devices…
…
continue reading

1
Threats to mobile devices and how to manage them, part 2
29:47
29:47
Play later
Play later
Lists
Like
Liked
29:47Part 2 of a series on threats to mobile devices and through mobile devices. Tactics and techniques to deal with those threats.Cohost: Tom Dean – Consulting Ventures Tom has decades in capital goods manufacturing industry (fortune 500 scale) Years of experience in marketing, sales & interfacing with independent dealers/distributors (small/medium sca…
…
continue reading

1
Physical threats to mobile phones, SIM hijacking, out of band SMS, and Yubikeys
29:34
29:34
Play later
Play later
Lists
Like
Liked
29:34Part 1 of a two-part series on threats to mobile devices and through mobile devices. Tactics and techniques to deal with those threats.Cohost: Tom Dean – Consulting Ventures Tom has decades in capital goods manufacturing industry (fortune 500 scale) Years of experience in marketing, sales & interfacing with independent dealers/distributors (small/m…
…
continue reading

1
How to analyze workloads and decide how they should be hosted
29:28
29:28
Play later
Play later
Lists
Like
Liked
29:28The process of determining how workloads should be hosted is very complex and not a decision that should be abdicated to the IT service provider. Business decision-makers must be involved in those decisions as only they are able to define the key criteria that all other factors are dependent upon.By Felicia King
…
continue reading

1
How a lack of understanding of business processes relates to adverse financial impact
29:37
29:37
Play later
Play later
Lists
Like
Liked
29:37CTO Kyle Wentworth joins Felicia for a discussion about how businesses can avoid adverse financial impacts. Lack of understanding of the language of technology It changes so incredibly fast that it takes a sea of people who understand the pieces Complete perspective of how the business of technology should be run Understand what governance and comp…
…
continue reading

1
Email security management and monitoring is critical
29:17
29:17
Play later
Play later
Lists
Like
Liked
29:17Why it is critical to have an email security expert managing and monitoring email security configurations and delivery of email on an ongoing basis. Instructions from marketing automation platforms are not adequate. It matters A LOT what you are trying to do with email. Getting these items configured is an art form. Vendors are continually failing …
…
continue reading
Kyle Wentworth of Wentworth Consulting Group joined Felicia to compare/contrast three C-suite level IT/IS related roles. Kyle has 35 years of business experience and has been working on computers since 1976. He is a: Fractional CTO Business coach Business process modeler Kyle has a great resource on his website to help people understand the differe…
…
continue reading
Zero trust is not a product you buy. The problem that most organizations have is that they are still not doing the fundamentals well. CIS has a community defense model. I did a detailed webinar on it where I covered a lot of these fundamentals. https://www.qpcsecurity.com/2023/02/16/addressing-information-security-fundamentals-with-cis-and-communit…
…
continue reading

1
FTC SafeguardsRule, IRS requirements, and tax preparers
29:31
29:31
Play later
Play later
Lists
Like
Liked
29:31The IRS regulations for tax preparers being compliant with the FTC Safeguards rule is specified to be enforced starting in June 2023. It is doubtful that the majority of tax preparers are adequately compliant. The IRS published information about this compliance requirement as far back as 2019. https://www.irs.gov/newsroom/heres-what-tax-professiona…
…
continue reading

1
Methods to prevent business email compromise
29:30
29:30
Play later
Play later
Lists
Like
Liked
29:30Methods to prevent business email compromise.By Felicia King
…
continue reading
What is the number one thing you can do as a consumer to protect yourself when dealing with tax preparers? Practical examples of what to ask for from your tax preparer and why. What are the total number of people that would have access to my records if I do business with you? You want me to sign a contract with you, terms and conditions that I have…
…
continue reading

1
PSA or ERP - paradigm and requirements analysis
50:03
50:03
Play later
Play later
Lists
Like
Liked
50:03I get a lot of questions about PSAs, ERPs, and overall paradigms related to core business software. This podcast summarizes things you should be thinking about in your software selection process. After three years of investigating PSA and ERP options including spending a lot of money on software and payroll, the product we like is Odoo. Organizatio…
…
continue reading

1
Tech E&O and cyber insurance with Joe Brunsman
1:00:32
1:00:32
Play later
Play later
Lists
Like
Liked
1:00:32Tech E&O and Cyber insurance with: Joe Brunsman of The Brunsgroup – Expert on Tech E&O and Cyber Insurance YouTube channel – Joseph Brunsman https://www.youtube.com/@JosephBrunsman https://www.thebrunsgroup.com/ Damage Control book https://www.thebrunsgroup.com/book2 Tech E&O and cyber MSP should have a tech E&O policy. They cover different things.…
…
continue reading

1
Implications of poor design on security - an example
29:15
29:15
Play later
Play later
Lists
Like
Liked
29:15Google and how they do their technology Things that make security hard. This is not an exhaustive list of the implications of poor design on security. Covering that topic adequately would likely rival the size of War and Peace. This is a discussion of a tangible example to convey understanding of how technology selection directly correlates to an o…
…
continue reading

1
Dark web monitoring and avoiding FUD decisions
1:50:09
1:50:09
Play later
Play later
Lists
Like
Liked
1:50:09Kathy Durfee – CEO & Founder of Tech House joined Felicia to discuss dark web breach monitoring Scenario: FUD report from a competitor Perceived: Multiple users in their environment were breached. Perceived proof was report with the listing of the users and the passwords and columns that the customers did not know what that data was. Good: Customer…
…
continue reading

1
The relationship between proper data handling and real risk reduction
29:35
29:35
Play later
Play later
Lists
Like
Liked
29:35Those who listened to the November 19th, 2022 podcast I did with breach attorney Spencer Pollock know that he stated that 90% of the breaches he was involved in over the prior 12-month period would have been non-reportable had the data been properly encrypted. https://qpcsecurity.podbean.com/e/what-you-must-do-in-order-to-prepare-for-a-breach/ (Rev…
…
continue reading

1
Understanding vCISO services and why you need them
29:28
29:28
Play later
Play later
Lists
Like
Liked
29:28Recent question I got: What are the major changes that you have seen from security auditors in recent years and/or where do you see the audit process heading? Quick response: For the sake of a high level, automation is and will continue to be used. The size of the IT service provider is NOT a conveyance of their capabilities or capacity. Many 60 pe…
…
continue reading

1
What you must do in order to prepare for a breach
39:24
39:24
Play later
Play later
Lists
Like
Liked
39:24Breach attorney, Spencer Pollock joins Felicia for a vigorous discussion of what you must do in order to be prepared for an incident or breach. Learn from the breach attorney perspective. Spencer is with the well-known firm McDonald Hopkins. Policies preparation incident response plan tabletop exercises must get breach attorney involved before ther…
…
continue reading

1
Information Security, Cybersecurity, and Everyone’s Responsibility
29:21
29:21
Play later
Play later
Lists
Like
Liked
29:21What is information security versus cybersecurity? What are policies and why do we care? Isn't that IT's problem? Examples to learn fromBy Felicia King
…
continue reading
Special guest: Vince Gremillion – President and Founder of Restech: CISSP, CvCISO, GCIH Overview Travelers policy – requires MFA on switches. They require you comply with the intent of that. Recent Cowbell application did not require MFA! What is required is contingent upon the coverage you are asking for. Some suggestions: Never fill out an app fo…
…
continue reading
Frank Raimondi, VP of Channel Development at IGI Cyber Labs IGI CyberLabs has a product called Nodeware which does continuous vulnerability assessment. PenLogic – regular penetration test – once a quarter deep dive heavy one and a monthly light test. CEO buyer’s journey Security velocity Risk scoring is part of security velocity Improve your cyber-…
…
continue reading
Ken Dwight is “The Virus Doctor” – Business consultant and advisor to IT service providers and internal IT at many businesses who have come to him for his training, has his own direct clients. Ken conducts a monthly community meetings for alumni. He provides a list of curated items of current interest for discussion and resources, and has a feature…
…
continue reading

1
Vulnerability management with Felicia and Dan - Part 2
54:58
54:58
Play later
Play later
Lists
Like
Liked
54:58This episode of Breakfast Bytes is Part 2 of a series where Felicia King and Dan Moyer of QPC Security continue their conversation on Vulnerability Management. Listen to Part 1 at https://qpcsecurity.podbean.com/e/vulnerability-management-part-1/. In today’s episode, Felicia and Dan discuss vulnerability management workflows, supply chain risk mana…
…
continue reading

1
File integrity checks (hashing) versus communications or data encryption
29:51
29:51
Play later
Play later
Lists
Like
Liked
29:51We have seen some really goofy cybersecurity insurance application questions. It is always best to not answer a question that is goofy, but instead to write an addendum that defines terms and explains the cybersecurity posture of an organization related to the topic. You need to try to figure what the insurance company was trying to evaluate rather…
…
continue reading