We use cookies to better understand the activities and interests of our users through technologies like Google Analytics and Crazy Egg to improve user's experience on our site. Please click 'Accept Cookies' to let us know you're okay with our use of cookies.
x

CMMI Institute

Capability Counts 2019

30 April & 1 May, 2019

Reston, VA

View Gallery

Speaker Profile

Kelly Hood, Cybersecurity Engineer

Optic Cyber Solutions

View Organization

About

Ms. Kelly Hood is a cybersecurity engineer at Optic Cyber Solutions. Kelly supports organizations across sectors to develop and implement strategies to manage the cybersecurity risks to their business. Kelly also works with organizations to meet cybersecurity best practices, controls, and standards including the NIST Cybersecurity Framework, SP 800-53, SP 800-171, ISO 27001, and many others. As a member of the Cybersecurity Framework team at NIST, Kelly also assists in the evolution and outreach of the Cybersecurity Framework. Recently, Kelly has supported the CMMI Institute in their development and expansion of the CMMI Cybermaturity Platform. The patent pending approach she helped develop for CMMI translates cybersecurity risk to cybermaturity goals and identifies mitigation strategies to help organizations improve their cybersecurity capabilities. 
 

SPEAKER PRESENTATION

Managing Cybersecurity Risks

Conference Track: Building Resilience Through Greater Cybersecurity Capability

Facilitating a cyber risk discussion can seem daunting whether you work in a small business or a global enterprise. Many organizations are familiar with their business risks, but don’t know how they relate to cybersecurity. What new threats should be considered? Have new technologies brought new vulnerabilities? Learn how to leverage your understanding of business risks to identify your greatest cyber risks and build a strategy to protect what matters most.

Managing Cybersecurity Risks

Conference Track: Building Resilience Through Greater Cybersecurity Capability

Facilitating a cyber risk discussion can seem daunting whether you work in a small business or a global enterprise. Many organizations are familiar with their business risks, but don’t know how they relate to cybersecurity. What new threats should be considered? Have new technologies brought new vulnerabilities? Learn how to leverage your understanding of business risks to identify your greatest cyber risks and build a strategy to protect what matters most.