22 min

Cybersecurity Compliance Buzzwords with Marie Joseph and Christina Annechino, Trava The Tea on Cybersecurity

    • Technology

“It's hard to have privacy without security and to have effective security that requires strong protection of personal identifiable information, or PII. So security, privacy, and compliance really must go hand in hand. If one is prioritized over the other, it can have an adverse effect.” - Christina Annechino

On this episode, we welcome back both Christina Annechino and Marie Joseph to bring us back to a little more 101 on Cybersecurity. With host Jara Rowe, the team breaks down terms and buzzwords that you need to know to keep you and your company’s data safe. 
Find out the difference between a breach and an incident, the nuances of security, privacy, and compliance, and gain insights into the crucial importance of cyber hygiene. We'll also explore the key differences between data security and data protection, understanding acronyms like GDPR, CCPA, HIPAA, and PIPEDA, and grasping the significance of maintaining asset inventories.

In this episode, you’ll learn: 
The difference between a breach, when a threat actor gains unauthorized access, and an incident, where data is compromised, is crucial for proactive security measures.Understand frameworks vs. standards: Frameworks provide an overview of requirements for compliance and certification, while standards outline specific criteria that must be met, forming the foundation of cybersecurity best practices.The importance of cyber hygiene or the tools, processes, and policies you need to maintain a strong security posture, enabling constant improvement in cybersecurity health within organizations.
Things to listen for:
[00:24 - 02:47] Introduction to episode and compliance series
[02:57 - 04:25] The difference between security and privacy and compliance
[04:28 - 06:08] The challenges in balancing security, privacy and compliance
[06:26 - 07:24]  The difference between risk and control
[07:31 - 09:46] The difference between a breach and an incident
[09:58 - 11:03] The difference between data security and protection
[11:03 - 12:18] The most common data protection regulations
[12:31 - 13:10] The difference between frameworks and standards
[13:22 - 14:50] What is RBAC and how it relates to cybersecurity
[14:50 - 16:45] The meaning of IoT and maintaining inventory assets
[16:50 - 18:00] What does Cyber Hygiene mean
[18:01 - 20:37] Jara’s receipts

Resources:
Conquer Compliance Jargon: Download the Free Cybersecurity Compliance Glossary
Data Security 101: Decoding Incidents and Breaches
Safeguarding Your Connected Devices: A Practical Approach to IoT Security

Connect with the Guest:
Marie Joseph's LinkedIn
Christina Annechino's LinkedIn

Connect with the host:
Jara Rowe’s LinkedIn

Connect with Trava:
Website www.travasecurity.com 
Blog www.travasecurity.com/blog
LinkedIn @travasecurity
YouTube @travasecurity

“It's hard to have privacy without security and to have effective security that requires strong protection of personal identifiable information, or PII. So security, privacy, and compliance really must go hand in hand. If one is prioritized over the other, it can have an adverse effect.” - Christina Annechino

On this episode, we welcome back both Christina Annechino and Marie Joseph to bring us back to a little more 101 on Cybersecurity. With host Jara Rowe, the team breaks down terms and buzzwords that you need to know to keep you and your company’s data safe. 
Find out the difference between a breach and an incident, the nuances of security, privacy, and compliance, and gain insights into the crucial importance of cyber hygiene. We'll also explore the key differences between data security and data protection, understanding acronyms like GDPR, CCPA, HIPAA, and PIPEDA, and grasping the significance of maintaining asset inventories.

In this episode, you’ll learn: 
The difference between a breach, when a threat actor gains unauthorized access, and an incident, where data is compromised, is crucial for proactive security measures.Understand frameworks vs. standards: Frameworks provide an overview of requirements for compliance and certification, while standards outline specific criteria that must be met, forming the foundation of cybersecurity best practices.The importance of cyber hygiene or the tools, processes, and policies you need to maintain a strong security posture, enabling constant improvement in cybersecurity health within organizations.
Things to listen for:
[00:24 - 02:47] Introduction to episode and compliance series
[02:57 - 04:25] The difference between security and privacy and compliance
[04:28 - 06:08] The challenges in balancing security, privacy and compliance
[06:26 - 07:24]  The difference between risk and control
[07:31 - 09:46] The difference between a breach and an incident
[09:58 - 11:03] The difference between data security and protection
[11:03 - 12:18] The most common data protection regulations
[12:31 - 13:10] The difference between frameworks and standards
[13:22 - 14:50] What is RBAC and how it relates to cybersecurity
[14:50 - 16:45] The meaning of IoT and maintaining inventory assets
[16:50 - 18:00] What does Cyber Hygiene mean
[18:01 - 20:37] Jara’s receipts

Resources:
Conquer Compliance Jargon: Download the Free Cybersecurity Compliance Glossary
Data Security 101: Decoding Incidents and Breaches
Safeguarding Your Connected Devices: A Practical Approach to IoT Security

Connect with the Guest:
Marie Joseph's LinkedIn
Christina Annechino's LinkedIn

Connect with the host:
Jara Rowe’s LinkedIn

Connect with Trava:
Website www.travasecurity.com 
Blog www.travasecurity.com/blog
LinkedIn @travasecurity
YouTube @travasecurity

22 min

Top Podcasts In Technology

Acquired
Ben Gilbert and David Rosenthal
All-In with Chamath, Jason, Sacks & Friedberg
All-In Podcast, LLC
Hard Fork
The New York Times
TED Radio Hour
NPR
Lex Fridman Podcast
Lex Fridman
Darknet Diaries
Jack Rhysider