Guest: Lori Crooks, CEO of CADRA Inc. (specializes in security assessments and security management projects)
Main Discussion Topics
Why Compliance Matters
- Protection: Compliance frameworks provide controls to protect business data and prevent breaches
- Competitive Advantage: Being compliant can create business opportunities over competitors who aren't compliant
- Contract Requirements: Many clients now require security compliance as a baseline
- Insurance Requirements: Cybersecurity insurance policies require specific compliance measures
- State/Industry Requirements: Some states and industries have mandatory compliance standards
Common Compliance Frameworks
- CMMC: For Department of Defense contractors
- PCI: For businesses handling credit card data
- HIPAA: For healthcare information
- NIST Cybersecurity Framework: Good starting point for small businesses
- ISO 27001: International standard focused on management systems
The Assessment Process
- Typical timeline: 3-6 months (smaller businesses) to 12+ months (larger organizations)
- Cost range: Mid five-figures ($50,000+) to six figures
- Process includes: Initial assessment, gap analysis, remediation, policy documentation
- Most organizations have some technical controls (firewalls, AV) but lack policies and procedures
Key Policies Every Business Needs
- Acceptable Use Policy: Defines how employees should use company systems and data
- Information Security Policy: Covers usernames/passwords, remote access, etc.
- Incident Response Policy: Details how to detect, investigate, and respond to security incidents
Building a Security Culture
- Security awareness must start at the top with leadership
- Training should be gamified and interactive where possible
- Regular reminders and tips help reinforce security policies
- Consider leaderboards to create healthy competition around security awareness
Two-Factor Authentication Challenges
- Some employees resist using personal phones for 2FA
- Options: Provide company phones, compensate for personal phone use, or use hardware tokens
- Ultimately, employees unwilling to follow security protocols may need to be let go
Key Takeaways
- Every business falls under some type of compliance framework
- Building a security-minded culture must start with leadership
- Compliance can be viewed as a competitive advantage rather than just a burden
- Third-party verification is important - don't just assume your IT provider "has you covered"
- Policies need regular review and reinforcement to be effective