Kelly O’Brien

Kelly O’Brien

Kelly O’Brien is a Senior IT Auditor with Compass IT Compliance. Kelly is an information technology & cybersecurity professional with over 20 years of experience in the field. She holds multiple industry-level certifications and belongs to several professional industry organizations. Kelly has been involved with The Honor Foundation, serving as a volunteer career coach for military Special Operations Forces looking to transition from a military career to a corporate career, specifically in Cyber Risk & Compliance.

Posts by Kelly O’Brien

Cyber Insurance & AI: Are You Fully Covered and Secure?

AI Cyber Liability Insurance

In today’s fast-evolving landscape, generative artificial intelligence (GenAI) is transforming nearly every industry, including insurance. From underwriting and claims processing to customer engagement, AI's integration brings a wealth of new opportunities—as well as complex risks tha …

Read Story

New CJIS Requirements: What You Need to Know

CJIS Updates

In a recent Compass IT Compliance blog, we delved into the fundamentals of the Criminal Justice Information Services (CJIS) Security Policy (CSP), its applicability, and the criticality of CJIS Compliance, terminology, and the thirteen policy areas applicable at the time of that writi …

Read Story

What Does It Mean to Be CJIS Compliant?

CJIS Compliance

If your organization is involved with government entities and operations, chances are you have heard of Criminal Justice Information Services (CJIS) compliance. The term is commonly used in law enforcement but can also apply to civil entities.

Read Story

Are You Protecting Your Attack Surface?

An empty office with mostly gray tones

Does your organization understand its attack surface? Gartner, Inc., a technological research and consulting firm, recently published the top trends in Cybersecurity for 2022, with attack surface expansion coming in at number one.

Read Story

Ignorance Is Not Bliss When It Comes to Security Assessments

Ignorance Is Not Bliss When It Comes to Security Assessments

It is no surprise that bad actors constantly seek to take advantage of current events and changing circumstances to exploit vulnerabilities and gaps in the security of organizations across a myriad of industry verticals and sizes.

Read Story

Bypassing Multi-Factor Authentication via Prompt Bombing

A woman logs into Facebook on her phone

It is the middle of the night, and you have finally fallen asleep, only to be awakened by the constant beeping of your phone. Bleary-eyed, you look at your phone to see it is prompting you to agree to log in on one of your accounts. You half wonder if you are dreaming and may instinct …

Read Story

Subscribe by email