Kip Boyle
Kip Boyle is an influencer

Kent, Washington, United States Contact Info
16K followers 500+ connections

Join to view profile

About

I’ve been working in cybersecurity since 1992. I started as an air force officer, leading…

Courses by Kip

See all courses

Articles by Kip

See all articles

Activity

Experience & Education

  • Cyber Risk Opportunities LLC

View Kip’s full experience

See their title, tenure and more.

or

By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.

Licenses & Certifications

Volunteer Experience

  • Domestic Abuse Women's Network (DAWN) Graphic

    Tech Safety Instructor

    Domestic Abuse Women's Network (DAWN)

    - 3 years 11 months

    Civil Rights and Social Action

    We taught survivors of domestic abuse how to be on the Internet safely. We also gave them free computers that were pre-configured to be and stay secure.

Publications

  • Cyber Security and Supply Chain Management

    World Scientific Pub Co Inc

    What are the cyber vulnerabilities in supply chain management? How can firms manage cyber risk and cyber security challenges in procurement, manufacturing, and logistics? Today it is clear that supply chain is often the core area of a firm's cyber security vulnerability, and its first line of defense. This book brings together several experts from both industry and academia to shine light on this problem, and advocate solutions for firms operating in this brave new world. Specific topics…

    What are the cyber vulnerabilities in supply chain management? How can firms manage cyber risk and cyber security challenges in procurement, manufacturing, and logistics? Today it is clear that supply chain is often the core area of a firm's cyber security vulnerability, and its first line of defense. This book brings together several experts from both industry and academia to shine light on this problem, and advocate solutions for firms operating in this brave new world. Specific topics addressed in this book include: defining the world of cyber space, understanding the connection between supply chain management and cyber security, the implications of cyber security and supply chain risk management, the ""human factor"" in supply chain cyber security, the executive view of cyber security, cyber security considerations in procurement, logistics, and manufacturing among other areas.

    See publication
  • Fire Doesn’t Innovate: The Executive's Practical Guide to Thriving in the Face of Evolving Cyber Risks

    Lioncrest

    In Fire Doesn’t Innovate, I teach executives how to treat cyber as a business risk, on par with sales, order fulfillment, and accounts receivable. The book also provides practical cyber risk management tools. Today, execs usually have to choose between simplistic “red, yellow, green” qualitative approaches or go all the way to the other extreme and dabble in the probability estimation techniques found in advanced statistics. In my experience, neither extreme satisfies their needs.

    See publication
  • 5 Ways to Prevent Cyber Attacks

    Chief Executive

    Heavily quoted in Warren Strugatch's article on hacking and cyber attacks.

    See publication
  • The Director of the FBI Puts a Piece of Tape Over His Laptop Webcam. Should You?

    Entrepreneur

    Quoted in Dan Bova's article on cyber security.

    See publication
  • The Computer Security Handbook, 5th Edition

    Wiley

    Co-author of chapter 68, Outsourcing Security Functions.

    Other authors
    See publication

Projects

  • Cybersecurity Hiring Manager Handbook

    I recently did a live stream workshop on the Cybersecurity Hiring Manager Handbook. Here’s the replay. Check it out!

    In 40 minutes you will learn how to:

    * Create a strong team
    * Build a wildly successful security program
    * Become an internal influencer

    You’ll know you're successful when instead of hearing about a major business change after it’s been decided, you’ll have decision makers coming to you for advice while that change is still just an idea.

    Here are…

    I recently did a live stream workshop on the Cybersecurity Hiring Manager Handbook. Here’s the replay. Check it out!

    In 40 minutes you will learn how to:

    * Create a strong team
    * Build a wildly successful security program
    * Become an internal influencer

    You’ll know you're successful when instead of hearing about a major business change after it’s been decided, you’ll have decision makers coming to you for advice while that change is still just an idea.

    Here are two free resources I mentioned during the live stream:

    * Get the Cybersecurity Hiring Manager Handbook here — https://lnkd.in/gY-5Ss3Y

    * Get the HR Training Guide here — https://lnkd.in/gxc9mcPh

    Other creators
    See project
  • Author: IT and Cybersecurity Risk Management Essential Training

    If you work in IT risk management, you already know that one of the biggest challenges you face is the fact that you have limited resources to manage seemingly unlimited risk. So, how can you use your limited resources to reduce your greatest IT risks down to an acceptable level? To do that you need to understand what IT risk management really is and how it works in practice. In this course, information security expert Kip Boyle teaches how to set your organization up for success so they can…

    If you work in IT risk management, you already know that one of the biggest challenges you face is the fact that you have limited resources to manage seemingly unlimited risk. So, how can you use your limited resources to reduce your greatest IT risks down to an acceptable level? To do that you need to understand what IT risk management really is and how it works in practice. In this course, information security expert Kip Boyle teaches how to set your organization up for success so they can stay in control of their data and systems. Kip imparts knowledge that will help deliver solid results with confidence and clarity, no matter the size of your company or the size of your budget. As he shows, if you do IT risk management well, you’ll have no trouble complying with cybersecurity laws, regulations, and customer requirements that require you to take a risk-based approach to protecting your digital assets.

    See project
  • Udemy: Implementing the NIST Cybersecurity Framework

    Have you ever wondered how to actually use the NIST Cybersecurity Framework and apply it to your business or organization?

    In this course, you will get an inside look at how cybersecurity, information technology (IT), and business professionals use the NIST Cybersecurity Framework (CSF) to understand and actively manage their risk posture.

    You will begin by learning the fundamentals of the NIST Cybersecurity Framework, including:

    🧿 What are the components of the…

    Have you ever wondered how to actually use the NIST Cybersecurity Framework and apply it to your business or organization?

    In this course, you will get an inside look at how cybersecurity, information technology (IT), and business professionals use the NIST Cybersecurity Framework (CSF) to understand and actively manage their risk posture.

    You will begin by learning the fundamentals of the NIST Cybersecurity Framework, including:

    🧿 What are the components of the framework?
    🧿 Why is the framework is valuable?
    🧿 What type of organizations can use the framework?

    Then, you will dive deeper into the framework to fully understand the Framework Core, the Framework Tiers, and the Framework Implementation Profile.

    You will also review various case studies from diverse organizations across the globe, including critical infrastructure organizations, technology companies, governmental organizations, and others.

    Finally, we will spend the majority of this course walking you through how to implement this framework within your own organization by conducting a Cyber Risk Mapping (CR-MAP). This CR-MAP of your organization will aid you in identifying your weaknesses and creating a remediation plan to achieve higher levels of security by minimizing your cyber risk.

    We even include a free bonus digital workbook that helps you conduct a step-by-step Cyber Risk Mapping at the conclusion of the course.

    Upon completion of this course, you will earn 4 CEUs towards the renewal of your CompTIA A+, Network+, Security+, Linux+, Cloud+, PenTest+, CySA+, or CASP+ certifications.

    Other creators
    See project
  • Author: Implementing a Vulnerability Management Lifecycle

    In the past several years, a series of devastating cyberattacks have periodically dominated headlines. While each attack affected different industries and governments, they shared the same root cause: unfixed—but publicly known—vulnerabilities. In this course, get a step-by-step process for finding, prioritizing, and mitigating the vulnerabilities in your own computing environment, no matter what technology stack you're running. Instructor Kip Boyle shows how to prepare for and create a robust…

    In the past several years, a series of devastating cyberattacks have periodically dominated headlines. While each attack affected different industries and governments, they shared the same root cause: unfixed—but publicly known—vulnerabilities. In this course, get a step-by-step process for finding, prioritizing, and mitigating the vulnerabilities in your own computing environment, no matter what technology stack you're running. Instructor Kip Boyle shows how to prepare for and create a robust vulnerability management program, explaining how to set program goals and secure funding by creating a compelling business case. Kip also covers how to conduct weekly vulnerability scans, as well as mitigate any vulnerabilities that crop up. Along the way, Kip shares case studies that illustrate how a real-world organization would approach each step in this process.

    See project
  • Author: Security Outsourcing: Vendor Selection and Management

    Outsourcing your cybersecurity program can provide major benefits but can also present distinct challenges. Join instructor Kip Boyle for a practical course that provides you with an overview of cybersecurity outsourcing including identifying tasks best suited for outsourcing, selecting vendors, and managing vendors. Kip explains how to get the best value and outcome over time by sharing valuable insights and practical steps for business professionals with or without cybersecurity experience.

    See project
  • PODCAST: Your Cyber Path

    🧿 You need a path. So, how do you find yours? 🧿
    It all starts with learning to think differently than other cybersecurity candidates, starting with the end in mind, and then taking actions to advanced along your path. Here’s how you do it:

    🔸Subscribe to the podcast.
    It’s completely free to subscribe and a new episode is released every two weeks. Each episode is about a half-hour in length, so you can easily consume it while driving to your current J-O-B while creating your new…

    🧿 You need a path. So, how do you find yours? 🧿
    It all starts with learning to think differently than other cybersecurity candidates, starting with the end in mind, and then taking actions to advanced along your path. Here’s how you do it:

    🔸Subscribe to the podcast.
    It’s completely free to subscribe and a new episode is released every two weeks. Each episode is about a half-hour in length, so you can easily consume it while driving to your current J-O-B while creating your new path to your cybersecurity career.

    🔸Identify your career goal.
    There is no one cyber path, there are countless ways to achieving your dream cybersecurity position! Therefore, it is imperative you know what your dream cybersecurity job is so that you can design your own cyber path to get you there.

    🔸Start taking action.
    Listening to the podcast is great, but it alone won’t get you into the dream position you are seeking. You have to take action.

    🔸Invest in your career.
    You don’t need to spend much money, but it is imperative that you invest into yourself and your career. Find a local mentor who is two or three steps ahead of you on the path and get their guidance concerning your local job market.

    🔸Become a continual learner.
    The cybersecurity industry is always changing, and you have to change and adapt with it. The things that worked ten or twenty years ago will not work today, so you need to evolve with the changing market conditions.

    🔷 Check out our website for more information!

    Other creators
    See project
  • Author: Reasonable Cybersecurity for Business Leaders

    In today's connected world, no business is completely secure. The Federal Trade Commission acknowledges there may be breaches that companies can't control. Instead, they require organizations to practice "reasonable cybersecurity." The definition and standard for reasonable cybersecurity is still evolving, but business leaders can achieve compliance by understanding the basic requirements. This course provides an introduction to reasonable cybersecurity, distilling the most important…

    In today's connected world, no business is completely secure. The Federal Trade Commission acknowledges there may be breaches that companies can't control. Instead, they require organizations to practice "reasonable cybersecurity." The definition and standard for reasonable cybersecurity is still evolving, but business leaders can achieve compliance by understanding the basic requirements. This course provides an introduction to reasonable cybersecurity, distilling the most important information in under 30 minutes. Learn from the example of Equifax, a company that didn't realize it was vulnerable until it was too late, and explore an FTC-recommended security framework, NIST, that can help you identify, protect, detect, respond to, and recover from security issues, without sacrificing business productivity or innovation.

    See project
  • Author: Cybersecurity for Executives

    Most executives want to be better cyber risk managers. They want to manage cybersecurity risks in the same thoughtful and intelligent way as they manage other aspects of their business. Fortunately, you don't need to be a technology expert to improve your cyber risk management skills. This course provides practical, to-the-point training for the busy executive, in everyday language, complete with examples that are easy to understand. Instructor Kip Boyle describes the big picture events driving…

    Most executives want to be better cyber risk managers. They want to manage cybersecurity risks in the same thoughtful and intelligent way as they manage other aspects of their business. Fortunately, you don't need to be a technology expert to improve your cyber risk management skills. This course provides practical, to-the-point training for the busy executive, in everyday language, complete with examples that are easy to understand. Instructor Kip Boyle describes the big picture events driving cybercrimes today and the top cyber risks affecting executives and their organizations. He provide examples of common cyberattacks, including actual impacts to real organizations. He uses germ theory to explain how good "security hygiene" can help you and your organization combat security threats, and introduces the top actions executives can take to avoid threats such as phishing, identity theft, hacking, and financial fraud. Plus, learn how contract "firewalls" and third-party cyber risk management can help you mitigate the most common cyber risks.

    See project
  • PODCAST: Cyber Risk Management

    About the Cyber Risk Management Podcast
    The Cyber Risk Management Podcast helps executives to become more proficient cyber risk managers. You’ll learn how to efficiently and effectively reduce your cybersecurity risks and how to continuously improve your cybersecurity management processes.

    You’ll also learn of the legal aspects of cybersecurity, from the reasonableness standard to the European Union’s General Data Protection Regulation. You will understand that having documentation…

    About the Cyber Risk Management Podcast
    The Cyber Risk Management Podcast helps executives to become more proficient cyber risk managers. You’ll learn how to efficiently and effectively reduce your cybersecurity risks and how to continuously improve your cybersecurity management processes.

    You’ll also learn of the legal aspects of cybersecurity, from the reasonableness standard to the European Union’s General Data Protection Regulation. You will understand that having documentation without provable implementation is a massive risk factor for which upper management will be held responsible.

    Other creators
    See project
  • Author: Implementing an Information Security Program

    Building and operating an information security program at your organization can be challenging. The scope can be vast and complex. Thinking of all the ways an organization can fail and coming up with actionable measures you can take to prevent issues, mitigate risk, or recover from events is a large undertaking. In this course, Kip Boyle, president of Cyber Risk Opportunities, guides you through the entire process of creating an information security program, rolling it out to your organization,…

    Building and operating an information security program at your organization can be challenging. The scope can be vast and complex. Thinking of all the ways an organization can fail and coming up with actionable measures you can take to prevent issues, mitigate risk, or recover from events is a large undertaking. In this course, Kip Boyle, president of Cyber Risk Opportunities, guides you through the entire process of creating an information security program, rolling it out to your organization, and maintaining it for continuous risk management.

    Other creators
    See project

Languages

  • English

    -

Organizations

  • Bellevue Brain Trust

    Member

    Founded in October of 2011, the Bellevue Brain Trust is a volunteer group of business leaders who are committed to helping one another succeed and giving back to their community.

  • Provisors

    Member

    Where we’ve been and where we’re going... We started in 1988 as a select group of top “trusted advisors” to the Los Angeles business community, from attorneys to bankers. Now ProVisors is a national organization with 7,000+ members in major cities throughout California, Boston, Chicago, Atlanta, Seattle, Dallas, and New York, with expansion planned across the United States. Our premise when we began was to create a platform for professionals to leverage relationships without blatantly…

    Where we’ve been and where we’re going... We started in 1988 as a select group of top “trusted advisors” to the Los Angeles business community, from attorneys to bankers. Now ProVisors is a national organization with 7,000+ members in major cities throughout California, Boston, Chicago, Atlanta, Seattle, Dallas, and New York, with expansion planned across the United States. Our premise when we began was to create a platform for professionals to leverage relationships without blatantly “selling” our services to each other. Out of this vision, we evolved a system – and a support organization – founded on principles of reciprocity and “Know. Like. Trust. Refer.”

Recommendations received

24 people have recommended Kip

Join now to view

View Kip’s full profile

  • See who you know in common
  • Get introduced
  • Contact Kip directly
Join to view full profile

Other similar profiles

Explore collaborative articles

We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.

Explore More

Add new skills with these courses