Kim Albarella - TikTok | LinkedIn (original) (raw)

About

Kim Albarella specializes in mitigating risk against information threat vectors, leading…

Activity

Experience & Education

View Kim’s full experience

See their title, tenure and more.

Licenses & Certifications

ADP Management Development Program

ADP

Volunteer Experience

Hackers in Heels

Jul 2022 - Present2 years 3 months
Science and Technology

Publications

ADP June 2, 2021

Watch this segment from Cheddar News (TV network) sponsored by ADP, featuring Kim Albarella VP, Risk and Security Advocacy at ADP. She shares insights about new security measures employees may see when returning to work, threats to physical and digital security, protecting data in the hybrid workplace and security guidelines employers can leverage during the pandemic and beyond.
See publication

ADP June 2, 2021

Returning to work post-pandemic looks a bit different! Here are some of the physical changes you may experience in your workplace.
See publication

HR Professional December 2, 2020

With millions of employees working remotely, organizations cannot overlook the importance of security.
During the COVID-19 pandemic, businesses have been forced to rethink many aspects of their operations. With millions of employees forced to vacate their offices and work from home — many for the foreseeable future — organizations of all sizes must understand how technology is changing the workplace.
See publication

Stay Safe Online October 2, 2018

Emoji appeared in 1999 with a set of 176 symbols that were meant to convey weather, traffic, technology and time. Today, there are 2,823 emoji that convey information across language, culture, lifestyle and diversity. Learn about the threats that are embedded beneath the seemingly fun and innocent icons.
See publication

Thrive Powered by ADP November 8, 2017

You've probably heard plenty about the wonders of cloud computing. But even now that the technology is rapidly becoming a fixture in everyday life, you might suspect that cloud computing security issues make it too risky for your business.
When it's approached correctly, in fact, cloud computing is considered to be more secure than keeping your data and applications in-house. For cloud service providers, security is a top priority, and they typically invest significant resources in…
You've probably heard plenty about the wonders of cloud computing. But even now that the technology is rapidly becoming a fixture in everyday life, you might suspect that cloud computing security issues make it too risky for your business.
When it's approached correctly, in fact, cloud computing is considered to be more secure than keeping your data and applications in-house. For cloud service providers, security is a top priority, and they typically invest significant resources in keeping the cloud secure. Ultimately, storing data in the cloud reduces your risk of loss, gives you more flexibility and allows you to recover more quickly should a disaster occur.
See publication

Triblive.com October 30, 2017

Cybersecurity stories fill the headlines almost daily: The Equifax breach potentially compromised personal data of more than 140 million Americans — nearly half of us. Yahoo finally acknowledged losing email addresses and passwords for every single customer — about 3 billion accounts. We're still waiting to find out just how much the Russians hacked into the 2016 general election .
We see such headlines so often that many of us have become numb to the potential risk. Worse, reporters…
Cybersecurity stories fill the headlines almost daily: The Equifax breach potentially compromised personal data of more than 140 million Americans — nearly half of us. Yahoo finally acknowledged losing email addresses and passwords for every single customer — about 3 billion accounts. We're still waiting to find out just how much the Russians hacked into the 2016 general election .
We see such headlines so often that many of us have become numb to the potential risk. Worse, reporters covering these stories don't always know how to describe the real danger — or how to separate legitimate threats from hyperbole. Too often, they lack the vocabulary, context and experience to converse with technical experts and convey meaningful alerts to the public. Instead, the public hears a wall of noise in which relatively minor events get similar billing to those that really threaten our lives.
See publication

National Cyber Security Administration / Stay Safe Online October 13, 2017

Cyberbullying has been stereotyped in the media as a problem that occurs with teenagers, cell phones, sexualized photographs and social media. But what happens when cyberbullies graduate and join the workforce? How has the popularity of social media, instant messaging and online forums changed the face of bullying in the professional environment?
See publication

Projects

Jul 2023 - Jul 2023

https://itookahike.com/kim-albarella/
Other creators

Organizations

Advisory Committee Member

Sep 2023 - Present

-

Mar 2018 - Present

-

Mar 2016 - Present

-

Feb 2016 - Present
Selected to represent ADP at annual Executive Women's Forum National Conference

Facilitator / Trainer

Nov 2014 - Present
- Keynote speaker / facilitator at MISTI Audit Director and Manager Symposium - Trainer at MISTI 2014 Governance, Risk, Compliance Conference

Trainer

Nov 2014 - Present
Trainer / Facilitator

-

-

-

Vice President

-

Recommendations received

More activity by Kim

Other similar profiles

Explore collaborative articles

We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.

Explore More

Add new skills with these courses