About
Courses by Kip
-
IT and Cybersecurity Risk Management Essential Training1h 38m
IT and Cybersecurity Risk Management Essential Training
By: Kip Boyle
-
Cybersecurity Outsourcing: Vendor Selection and Management1h 7m
Cybersecurity Outsourcing: Vendor Selection and Management
By: Kip Boyle
Articles by Kip
-
Inflection Point | Dropping the Hammer on Kaspersky
Inflection Point | Dropping the Hammer on Kaspersky
By Kip Boyle
-
Inflection Point | The Impact of the CDK Global Cyberattacks on the Auto Industry
Inflection Point | The Impact of the CDK Global Cyberattacks on the Auto Industry
By Kip Boyle
-
YCP Mentor Notes: The "Insider View" of the Hiring Manager
YCP Mentor Notes: The "Insider View" of the Hiring Manager
By Kip Boyle
Activity
-
It’s been a rough day for the cyber industry, with real world impact felt across the globe. Lots of stories of friends and colleagues stranded in…
It’s been a rough day for the cyber industry, with real world impact felt across the globe. Lots of stories of friends and colleagues stranded in…
Liked by Kip Boyle
Experience & Education
Licenses & Certifications
Volunteer Experience
-
Tech Safety Instructor
Domestic Abuse Women's Network (DAWN)
- 3 years 11 months
Civil Rights and Social Action
We taught survivors of domestic abuse how to be on the Internet safely. We also gave them free computers that were pre-configured to be and stay secure.
Publications
-
Cyber Security and Supply Chain Management
World Scientific Pub Co Inc
What are the cyber vulnerabilities in supply chain management? How can firms manage cyber risk and cyber security challenges in procurement, manufacturing, and logistics? Today it is clear that supply chain is often the core area of a firm's cyber security vulnerability, and its first line of defense. This book brings together several experts from both industry and academia to shine light on this problem, and advocate solutions for firms operating in this brave new world. Specific topics…
What are the cyber vulnerabilities in supply chain management? How can firms manage cyber risk and cyber security challenges in procurement, manufacturing, and logistics? Today it is clear that supply chain is often the core area of a firm's cyber security vulnerability, and its first line of defense. This book brings together several experts from both industry and academia to shine light on this problem, and advocate solutions for firms operating in this brave new world. Specific topics addressed in this book include: defining the world of cyber space, understanding the connection between supply chain management and cyber security, the implications of cyber security and supply chain risk management, the ""human factor"" in supply chain cyber security, the executive view of cyber security, cyber security considerations in procurement, logistics, and manufacturing among other areas.
-
Fire Doesn’t Innovate: The Executive's Practical Guide to Thriving in the Face of Evolving Cyber Risks
Lioncrest
In Fire Doesn’t Innovate, I teach executives how to treat cyber as a business risk, on par with sales, order fulfillment, and accounts receivable. The book also provides practical cyber risk management tools. Today, execs usually have to choose between simplistic “red, yellow, green” qualitative approaches or go all the way to the other extreme and dabble in the probability estimation techniques found in advanced statistics. In my experience, neither extreme satisfies their needs.
-
5 Ways to Prevent Cyber Attacks
Chief Executive
Heavily quoted in Warren Strugatch's article on hacking and cyber attacks.
-
The Director of the FBI Puts a Piece of Tape Over His Laptop Webcam. Should You?
Entrepreneur
Quoted in Dan Bova's article on cyber security.
Projects
-
Cybersecurity Hiring Manager Handbook
I recently did a live stream workshop on the Cybersecurity Hiring Manager Handbook. Here’s the replay. Check it out!
In 40 minutes you will learn how to:
* Create a strong team
* Build a wildly successful security program
* Become an internal influencer
You’ll know you're successful when instead of hearing about a major business change after it’s been decided, you’ll have decision makers coming to you for advice while that change is still just an idea.
Here are…I recently did a live stream workshop on the Cybersecurity Hiring Manager Handbook. Here’s the replay. Check it out!
In 40 minutes you will learn how to:
* Create a strong team
* Build a wildly successful security program
* Become an internal influencer
You’ll know you're successful when instead of hearing about a major business change after it’s been decided, you’ll have decision makers coming to you for advice while that change is still just an idea.
Here are two free resources I mentioned during the live stream:
* Get the Cybersecurity Hiring Manager Handbook here — https://lnkd.in/gY-5Ss3Y
* Get the HR Training Guide here — https://lnkd.in/gxc9mcPhOther creatorsSee project -
Author: IT and Cybersecurity Risk Management Essential Training
If you work in IT risk management, you already know that one of the biggest challenges you face is the fact that you have limited resources to manage seemingly unlimited risk. So, how can you use your limited resources to reduce your greatest IT risks down to an acceptable level? To do that you need to understand what IT risk management really is and how it works in practice. In this course, information security expert Kip Boyle teaches how to set your organization up for success so they can…
If you work in IT risk management, you already know that one of the biggest challenges you face is the fact that you have limited resources to manage seemingly unlimited risk. So, how can you use your limited resources to reduce your greatest IT risks down to an acceptable level? To do that you need to understand what IT risk management really is and how it works in practice. In this course, information security expert Kip Boyle teaches how to set your organization up for success so they can stay in control of their data and systems. Kip imparts knowledge that will help deliver solid results with confidence and clarity, no matter the size of your company or the size of your budget. As he shows, if you do IT risk management well, you’ll have no trouble complying with cybersecurity laws, regulations, and customer requirements that require you to take a risk-based approach to protecting your digital assets.
-
Udemy: Implementing the NIST Cybersecurity Framework
Have you ever wondered how to actually use the NIST Cybersecurity Framework and apply it to your business or organization?
In this course, you will get an inside look at how cybersecurity, information technology (IT), and business professionals use the NIST Cybersecurity Framework (CSF) to understand and actively manage their risk posture.
You will begin by learning the fundamentals of the NIST Cybersecurity Framework, including:
🧿 What are the components of the…Have you ever wondered how to actually use the NIST Cybersecurity Framework and apply it to your business or organization?
In this course, you will get an inside look at how cybersecurity, information technology (IT), and business professionals use the NIST Cybersecurity Framework (CSF) to understand and actively manage their risk posture.
You will begin by learning the fundamentals of the NIST Cybersecurity Framework, including:
🧿 What are the components of the framework?
🧿 Why is the framework is valuable?
🧿 What type of organizations can use the framework?
Then, you will dive deeper into the framework to fully understand the Framework Core, the Framework Tiers, and the Framework Implementation Profile.
You will also review various case studies from diverse organizations across the globe, including critical infrastructure organizations, technology companies, governmental organizations, and others.
Finally, we will spend the majority of this course walking you through how to implement this framework within your own organization by conducting a Cyber Risk Mapping (CR-MAP). This CR-MAP of your organization will aid you in identifying your weaknesses and creating a remediation plan to achieve higher levels of security by minimizing your cyber risk.
We even include a free bonus digital workbook that helps you conduct a step-by-step Cyber Risk Mapping at the conclusion of the course.
Upon completion of this course, you will earn 4 CEUs towards the renewal of your CompTIA A+, Network+, Security+, Linux+, Cloud+, PenTest+, CySA+, or CASP+ certifications.Other creatorsSee project -
Author: Implementing a Vulnerability Management Lifecycle
In the past several years, a series of devastating cyberattacks have periodically dominated headlines. While each attack affected different industries and governments, they shared the same root cause: unfixed—but publicly known—vulnerabilities. In this course, get a step-by-step process for finding, prioritizing, and mitigating the vulnerabilities in your own computing environment, no matter what technology stack you're running. Instructor Kip Boyle shows how to prepare for and create a robust…
In the past several years, a series of devastating cyberattacks have periodically dominated headlines. While each attack affected different industries and governments, they shared the same root cause: unfixed—but publicly known—vulnerabilities. In this course, get a step-by-step process for finding, prioritizing, and mitigating the vulnerabilities in your own computing environment, no matter what technology stack you're running. Instructor Kip Boyle shows how to prepare for and create a robust vulnerability management program, explaining how to set program goals and secure funding by creating a compelling business case. Kip also covers how to conduct weekly vulnerability scans, as well as mitigate any vulnerabilities that crop up. Along the way, Kip shares case studies that illustrate how a real-world organization would approach each step in this process.
-
Author: Security Outsourcing: Vendor Selection and Management
Outsourcing your cybersecurity program can provide major benefits but can also present distinct challenges. Join instructor Kip Boyle for a practical course that provides you with an overview of cybersecurity outsourcing including identifying tasks best suited for outsourcing, selecting vendors, and managing vendors. Kip explains how to get the best value and outcome over time by sharing valuable insights and practical steps for business professionals with or without cybersecurity experience.
-
PODCAST: Your Cyber Path
🧿 You need a path. So, how do you find yours? 🧿
It all starts with learning to think differently than other cybersecurity candidates, starting with the end in mind, and then taking actions to advanced along your path. Here’s how you do it:
🔸Subscribe to the podcast.
It’s completely free to subscribe and a new episode is released every two weeks. Each episode is about a half-hour in length, so you can easily consume it while driving to your current J-O-B while creating your new…🧿 You need a path. So, how do you find yours? 🧿
It all starts with learning to think differently than other cybersecurity candidates, starting with the end in mind, and then taking actions to advanced along your path. Here’s how you do it:
🔸Subscribe to the podcast.
It’s completely free to subscribe and a new episode is released every two weeks. Each episode is about a half-hour in length, so you can easily consume it while driving to your current J-O-B while creating your new path to your cybersecurity career.
🔸Identify your career goal.
There is no one cyber path, there are countless ways to achieving your dream cybersecurity position! Therefore, it is imperative you know what your dream cybersecurity job is so that you can design your own cyber path to get you there.
🔸Start taking action.
Listening to the podcast is great, but it alone won’t get you into the dream position you are seeking. You have to take action.
🔸Invest in your career.
You don’t need to spend much money, but it is imperative that you invest into yourself and your career. Find a local mentor who is two or three steps ahead of you on the path and get their guidance concerning your local job market.
🔸Become a continual learner.
The cybersecurity industry is always changing, and you have to change and adapt with it. The things that worked ten or twenty years ago will not work today, so you need to evolve with the changing market conditions.
🔷 Check out our website for more information!Other creatorsSee project -
Author: Reasonable Cybersecurity for Business Leaders
In today's connected world, no business is completely secure. The Federal Trade Commission acknowledges there may be breaches that companies can't control. Instead, they require organizations to practice "reasonable cybersecurity." The definition and standard for reasonable cybersecurity is still evolving, but business leaders can achieve compliance by understanding the basic requirements. This course provides an introduction to reasonable cybersecurity, distilling the most important…
In today's connected world, no business is completely secure. The Federal Trade Commission acknowledges there may be breaches that companies can't control. Instead, they require organizations to practice "reasonable cybersecurity." The definition and standard for reasonable cybersecurity is still evolving, but business leaders can achieve compliance by understanding the basic requirements. This course provides an introduction to reasonable cybersecurity, distilling the most important information in under 30 minutes. Learn from the example of Equifax, a company that didn't realize it was vulnerable until it was too late, and explore an FTC-recommended security framework, NIST, that can help you identify, protect, detect, respond to, and recover from security issues, without sacrificing business productivity or innovation.
-
Author: Cybersecurity for Executives
Most executives want to be better cyber risk managers. They want to manage cybersecurity risks in the same thoughtful and intelligent way as they manage other aspects of their business. Fortunately, you don't need to be a technology expert to improve your cyber risk management skills. This course provides practical, to-the-point training for the busy executive, in everyday language, complete with examples that are easy to understand. Instructor Kip Boyle describes the big picture events driving…
Most executives want to be better cyber risk managers. They want to manage cybersecurity risks in the same thoughtful and intelligent way as they manage other aspects of their business. Fortunately, you don't need to be a technology expert to improve your cyber risk management skills. This course provides practical, to-the-point training for the busy executive, in everyday language, complete with examples that are easy to understand. Instructor Kip Boyle describes the big picture events driving cybercrimes today and the top cyber risks affecting executives and their organizations. He provide examples of common cyberattacks, including actual impacts to real organizations. He uses germ theory to explain how good "security hygiene" can help you and your organization combat security threats, and introduces the top actions executives can take to avoid threats such as phishing, identity theft, hacking, and financial fraud. Plus, learn how contract "firewalls" and third-party cyber risk management can help you mitigate the most common cyber risks.
-
PODCAST: Cyber Risk Management
About the Cyber Risk Management Podcast
The Cyber Risk Management Podcast helps executives to become more proficient cyber risk managers. You’ll learn how to efficiently and effectively reduce your cybersecurity risks and how to continuously improve your cybersecurity management processes.
You’ll also learn of the legal aspects of cybersecurity, from the reasonableness standard to the European Union’s General Data Protection Regulation. You will understand that having documentation…About the Cyber Risk Management Podcast
The Cyber Risk Management Podcast helps executives to become more proficient cyber risk managers. You’ll learn how to efficiently and effectively reduce your cybersecurity risks and how to continuously improve your cybersecurity management processes.
You’ll also learn of the legal aspects of cybersecurity, from the reasonableness standard to the European Union’s General Data Protection Regulation. You will understand that having documentation without provable implementation is a massive risk factor for which upper management will be held responsible.Other creatorsSee project -
Author: Implementing an Information Security Program
Building and operating an information security program at your organization can be challenging. The scope can be vast and complex. Thinking of all the ways an organization can fail and coming up with actionable measures you can take to prevent issues, mitigate risk, or recover from events is a large undertaking. In this course, Kip Boyle, president of Cyber Risk Opportunities, guides you through the entire process of creating an information security program, rolling it out to your organization,…
Building and operating an information security program at your organization can be challenging. The scope can be vast and complex. Thinking of all the ways an organization can fail and coming up with actionable measures you can take to prevent issues, mitigate risk, or recover from events is a large undertaking. In this course, Kip Boyle, president of Cyber Risk Opportunities, guides you through the entire process of creating an information security program, rolling it out to your organization, and maintaining it for continuous risk management.
Other creatorsSee project
Languages
-
English
-
Organizations
-
Bellevue Brain Trust
Member
Founded in October of 2011, the Bellevue Brain Trust is a volunteer group of business leaders who are committed to helping one another succeed and giving back to their community.
-
Provisors
Member
Where we’ve been and where we’re going... We started in 1988 as a select group of top “trusted advisors” to the Los Angeles business community, from attorneys to bankers. Now ProVisors is a national organization with 7,000+ members in major cities throughout California, Boston, Chicago, Atlanta, Seattle, Dallas, and New York, with expansion planned across the United States. Our premise when we began was to create a platform for professionals to leverage relationships without blatantly…
Where we’ve been and where we’re going... We started in 1988 as a select group of top “trusted advisors” to the Los Angeles business community, from attorneys to bankers. Now ProVisors is a national organization with 7,000+ members in major cities throughout California, Boston, Chicago, Atlanta, Seattle, Dallas, and New York, with expansion planned across the United States. Our premise when we began was to create a platform for professionals to leverage relationships without blatantly “selling” our services to each other. Out of this vision, we evolved a system – and a support organization – founded on principles of reciprocity and “Know. Like. Trust. Refer.”
Recommendations received
-
LinkedIn User
24 people have recommended Kip
Join now to viewOther similar profiles
Explore collaborative articles
We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.
Explore More