У нас вы можете посмотреть бесплатно Cybersecurity Strategy: The 5 Biggest Risks That Could Destroy Your Business with Jenna Gallagher или скачать в максимальном доступном качестве, видео которое было загружено на ютуб. Для загрузки выберите вариант из формы ниже:
Если кнопки скачивания не
загрузились
НАЖМИТЕ ЗДЕСЬ или обновите страницу
Если возникают проблемы со скачиванием видео, пожалуйста напишите в поддержку по адресу внизу
страницы.
Спасибо за использование сервиса ClipSaver.ru
Cybersecurity Strategy: The 5 Biggest Risks That Could Destroy Your Business with Jenna Gallagher Most small and growth-stage businesses don’t fail because of bad strategy, they fail because of invisible cybersecurity risk. In this episode of the Resilient Foundations, Rebecca sits down with cybersecurity and risk executive Jenna Gallagher, founder of GX Concepts, to break down what she calls The 5 Horsemen of Cybersecurity — the foundational risks that quietly threaten SMBs and high-growth companies. With 15+ years of experience at companies like American Express, PayPal, and Upwork, Jenna explains why security isn’t about flashy tools, it’s about disciplined processes. If you’re a founder, executive, or operator scaling your business, this conversation will change how you think about access, data protection, vendor risk, and employee behavior. #resilientfoundations #leadership #decisionmaking #corporateleadership Chapters: 00:00 Meet Jenna Gallagher 01:12 The “5 Horsemen” Framework 05:07 When Identity Data Goes Wrong 07:35 The Real Stakes: Protecting Your Crown Jewels (Customer Data & IP) 12:46 Practical Vendor Due Diligence 16:13 SOC Type I vs Type II 21:36 Cloud & Physical Security Controls 24:12 When Clients Demand Extreme Segregation 27:17 Acceptable Use Policies & High-Risk Environments 32:19 Visibility for SMBs 37:20 Hygiene & Configuration Management 41:27 SMB Security Top 3 Check out more episodes of Resilient Foundations: Inside a $135B Crisis: • Inside a $135B Crisis: How Project Maui Sa... How Leaders Make Decisions Under Pressure: • 🧠 How Leaders Make Decisions Under Pressur... What Makes a Situation High Stakes? • What Makes a Situation High Stakes? 4 Sign... Connect with Rebecca! Leader who drives strategy, execution, and change | Transformational Delivery and Operations Leader | Information Security & Technology Executive | Risk Management Expert Rebecca Plantz is a seasoned executive leader with more than 25 years of experience leading a variety of high-stakes crises and enterprise initiatives to achieve business transformation. Her experience in leading large, cross-functional teams to deliver innovative technology, AI-enabled platforms and operations, risk management programs, information security programs, and operational resilience resulted in a wealth of expertise and toolsets that will be shared. Tough times create great leaders. Having led executives and front-line teams to survive more than 750 crises, Rebecca has honed what it takes to prepare for and lead in circumstances that require Olympic-level skills and readiness. Website – resilientfoundations.com LinkedIn – www.linkedin.com/in/rebeccaplantz/ TikTok – resilientfoundations Send a Message - rebeccaplantz@gmail.com YouTube Channel - / @resilientfoundations This channel is for leaders, founders, and high-stakes decision-makers who want to build personal resilience, business success, and leadership presence under pressure. If you're ready for real tools and techniques, not inspirational fluff, hit subscribe. #ProjectManagement #StatusReporting #ExecutiveLeadership #WatermelonProject #RiskManagement #RebeccaPlantz #ResilientFoundations #pmo #DataIntegration #PriorityZero #CrisisLeadership #ProjectManagement #ITDisaster #RebeccaPlantz #ResilientFoundations #CIOStrategy #RootCauseAnalysis #ProblemSolving #StopFirefighting #OperationalExcellence #SystemsThinking #leadershipskills #FUD #TeamManagement #ChangeManagement #ExecutiveCoaching #CorporateCulture #StopTheRumors #ImpactFramework #StrategicAlignment #RansomwareRecovery #TeamPerformance #executivestrategy #Cybersecurity #InfoSec #VendorRisk #SOC2 #SMBsecurity #DataProtection #Ransomware #MFA #CyberThreats #ThirdPartyRisk #IdentityManagement The 5 Horsemen of Cybersecurity, SMB Cybersecurity Strategy 2026, Vendor Due Diligence Best Practices, SOC 2 Type 1 vs Type 2, Business Email Compromise Prevention, Immutable Air-gapped Backups, Endpoint Detection and Response EDR, Multifactor Authentication MFA, Third Party Risk Management, Identity and Access Management IAM, Acceptable Use Policies, Protecting Crown Jewels Data, Cloud Security Controls, Ransomware Prevention for SMBs, Cybersecurity Posture for Founders, NIST Cybersecurity Framework