show episodes
 
Artwork

1
MSP 1337

Chris Johnson

Unsubscribe
Unsubscribe
Weekly
 
Educational sound bytes to help MSPs and their clients navigate Cyber Security. Cybersecurity maturity is a journey, don't go it alone. Interviews and guidance from fellow MSPs and other Industry experts. Our goal is Secure Outcomes and together we can make a difference. Support this podcast: https://podcasters.spotify.com/pod/show/msp1337/support
  continue reading
 
Join an all-star cast — including Dan DeCloss and Shawn Scott from PlexTrac, Paul Asadoorian and Tyler Robinson from Security Weekly, and Bryson Bort from SCYTHE — for a podcast mini-series focused on getting the real work done in cybersecurity. These four episodes will consider the perspectives of red, blue, and purple teamers alike in tracking signal through the noise to identify and prioritize the right things. Additionally, we’ll show off how PlexTrac empowers all types of security pros ...
  continue reading
 
Join an all-star cast — including Dan DeCloss and Shawn Scott from PlexTrac, Paul Asadoorian and Tyler Robinson from Security Weekly, and Bryson Bort from SCYTHE — for a podcast mini-series focused on getting the real work done in cybersecurity. These four episodes will consider the perspectives of red, blue, and purple teamers alike in tracking signal through the noise to identify and prioritize the right things. Additionally, we’ll show off how PlexTrac empowers all types of security pros ...
  continue reading
 
Loading …
show series
 
What happens if your RMM goes down and doesn't come back? We sit down with Mike Stewart of Anchor Networks and Charles Love of ShowTech Solutions to get their take on the importance of Runbooks. By the way, they were at a peer group and brought this up. Let's just say those who sleep alone at night are always looking for friends to share their no-s…
  continue reading
 
Each of the items in the title are titles for show episodes dating all the way back to the beginning of 2020. They have made the top 10 playbacks for all time. I sit down with Chad Holstead of the BKS Team to talk through current trends and challenges related to these five. --- Support this podcast: https://podcasters.spotify.com/pod/show/msp1337/s…
  continue reading
 
Last week we talked about playbooks and runbooks... This week we are back in the CIS Top 18 controls, #17 and while the timing might be coincidental it is a perfect fit. What we have learned going through the first 16 controls to get to here. Listen to Matt Lee of Pax8 unpack the safeguards and perhaps here a bit of a tussle as we grapple with Yell…
  continue reading
 
I always like to catch one or two attendees of an event after they get home to see what did they come away with. I spoke with Jim Harryman of Kinetic Technology Group to get his reaction on an event that he has now attended for the third year in a row. If you weren't at Channelcon24 I hope this gives you some FOMO and that we will see you at CCF an…
  continue reading
 
The demand for cyber soldiers is always on the rise. We look at the challenges of protecting Critical Infrastructure and that while there is a lot of Doom and Gloom... there is hope. I sit down with Chris Storey of Qriar to discuss the importance of Incident response planning and how the right plan and some education might actually create a tipping…
  continue reading
 
Using a framework to find gaps in your organization is a great way to improve your security posture. Have you thought about using the same framework with your clients? I think you find this discussion with Jim Harryman of Kinetic Technology Group a real eye-opener to the opportunities you have to reduce risk within your own company and that of your…
  continue reading
 
Ever wonder what the world outside of IT does with cybersecurity awareness training? If they don’t engage with an MSP, how many do it at all? I sit down with Jennie Johnson of TCE Company to get her perspective on transitioning from the world of education (K12) to working in the IT Managed Services space. --- Support this podcast: https://podcaster…
  continue reading
 
We have all configured Email automation at some point and we often use systems and tools that automate email notifications with actions or instructions. With that being said, how often do we check in on the recipient as to whether or not the action and instructions are being followed. Listen to Charles Love of ShowTech Solutions share his experienc…
  continue reading
 
Talking through the CompTIA Cybersecurity Audit outcome with Jim Harryman of Kinetic Technology Group. Obtaining the Trustmark is no small feat and requires dedication and effort by the entire organization. In this episode, we will talk about where they find themselves as they navigate the next twelve months as they prepare for the next audit. --- …
  continue reading
 
We find ourselves getting closer to the end of CIS Top 18. In this episode, Matt Lee of Pax8 and I discuss Service Provider Management. Matt does an excellent job of laying out a success path for any MSP to implement. You should note that this is a non-technical control. --- Support this podcast: https://podcasters.spotify.com/pod/show/msp1337/supp…
  continue reading
 
Ever feel like a punching bag when the phone rings and you have an upset client? Do you communicate with your clients outside of IT support? I sit down with Morgan Barse of Wing Woman to talk about Marketing and how the majority of marketing needs to start after you onboard your client. I learned a lot from Morgan's insights, and I think you will, …
  continue reading
 
From Layoffs to job transitions in the channel. Desraie Thomas and I chat about cybersecurity and how it impacts us all. It doesn't just happen at work; yet, as employees, we have been given the tools and resources we don't often see at home. The kids and elderly are usually victims who never have their stories heard. Then, we wrap things up with a…
  continue reading
 
Security Awareness and Skills Training is CIS Top 18 Control 14 is where Matt Lee of Pax8 and I sit down in our home offices to discuss the ins and outs of all nine safeguards. The importance of them and how they help your organization mature your workforce. --- Support this podcast: https://podcasters.spotify.com/pod/show/msp1337/support…
  continue reading
 
Cybersecurity should be front and center in every organization, and who you hire impacts how well you can implement it. In this episode, we discuss having the right staff and aligning with company expectations and goals. While not necessarily a cybersecurity focus, we highlight how cybersecurity plays a role in who you hire and what you might look …
  continue reading
 
Social media lives Social media is somehow a part of our everyday lives, and we see different platforms that cater to varying types of communication and content. With that said, when we misuse the platforms or share too much, we potentially risk all that we care to protect. Join me as I discuss the ins and outs of the appropriate use of Social Medi…
  continue reading
 
Cybersecurity is not the primary focus for hiring new employees but is vital to ensuring you hire the right candidate. I sit down with Ted White with Vertical Talent Solutions to discuss a strategy that lines up suitable candidates with MSPs so that the effort spent to get the right candidate isn't a pleasant and perhaps even enjoyable opportunity.…
  continue reading
 
It is the Third Tuesday of the month, and we bring you to Control 13. This is an exciting Control (they all are) because it is often confused with being legacy, it is also potentially cost-prohibitive, and we believe it will likely only be doable when partnering with third-party resources. Matt Lee brings it home as he always does! --- Support this…
  continue reading
 
MSP spend a lot of time and energy trying to align with standards from one of the many frameworks that are out there to improve their cybersecurity posture. Whether you do it to meet regulatory requirements, or are just looking to improve your business operations, how do you know when you are failing or succeeding? I sit down with Jim Harryman of K…
  continue reading
 
If you are familiar with CIS v8 Top 18 then you might be comfortable talking about Security Awareness and Skills Training. I sit down with Jim Harryman of Kinetic Technology Group to talk about the Why and the Proof that ever solution provider should be considering in their own traning. --- Support this podcast: https://podcasters.spotify.com/pod/s…
  continue reading
 
We are on Control 12 in our Fireside chat with Matt Lee and are digging into a control with only one IG1 safeguard and only one IG3 safeguard. Network Infrastructure comes with some rabbit holes and tangents, but I think you will find that this control is essential to most MSPs. --- Support this podcast: https://podcasters.spotify.com/pod/show/msp1…
  continue reading
 
As an MSP, many decisions go into taking on a new client or getting rid of an existing one. I sit down with Charles Love of Showtech Solutions to discuss when the decisions are tied to cybersecurity and where one should consider drawing a line in the sand. --- Support this podcast: https://podcasters.spotify.com/pod/show/msp1337/support…
  continue reading
 
What does it look like to have an employee request approval for a specific tool? Do you have an evaluation process? What types of risks are introduced that you need to consider when evaluating a new vendor, product, or service? All of these questions and more are discussed with Chad Holstead of BKS Group. --- Support this podcast: https://podcaster…
  continue reading
 
When a vendor fills a gap in cyber, they deserve to be heard. I sat down with Nick Wolf of Cork to discuss the cyber insurance industry and the space they fill. I'd say Cork is to cyber insurance like Aflac is to Medical insurance. Join Nick and I as we navigate the challenges with questionnaires, insurance questionnaires, and all the crazy around …
  continue reading
 
Storage costs are relatively cheap compared to the cost of storage, but one might say that data recovery is where most MSPs have been very successful. Years back, we were challenged with costs around storage and destination fees costs, so we had to be selective about what we backed up. In today's world, the cost of storage is relatively cheap in co…
  continue reading
 
Data protection is tough when you don't know where your data is or who might have access to it. Join me as I sit down with Prandar Das, cofounder of Sotero, as we discuss the challenges and the opportunities that AI and LLM bring as we continue to look at better ways to protect data. Stick around for the four tips to follow on your own journey to p…
  continue reading
 
How we manage our time for a work life balance plays a role in how we work in both in our strategic and tactical workflow. I sit down with Jason Slagle of CNRW to discuss how important keeping track of what we do in a planner or in our PSA or other tools is critical when things happen. Evidence is hard to come by after the fact. --- Support this po…
  continue reading
 
I have heard MSPs say, "we just eat the cost for some services." Whether they are services you have implemented internally are not, it doesn't mean you shouldn't sell those services. Liste to Bill Mulcahey of M6 Technology share his challenges and opportunities. Remember forward progress is good progress! --- Support this podcast: https://podcaster…
  continue reading
 
Hiring cybersecurity resources and the costs associated with it. What does the job description look like, and what are the responsibilities? Mike Stewart of Anchor Networks and I discuss the challenges and opportunities of hiring staff to help with cybersecurity. --- Support this podcast: https://podcasters.spotify.com/pod/show/msp1337/support…
  continue reading
 
I have had multiple conversations around backup vendors and the shift to solutions that are direct to cloud and other feature requirements that we didn't even consider 6-10 years ago. Remember the world before the data actors started doing data exfiltration. Join me with Matt Horning of Blue Tree Technology as we explore everything from the 3, 2, 1…
  continue reading
 
As 2023 comes to a close and you I thought in traditional fashion, we share with you our outlook for 2024. Joshua Smith of Reliaquest and I have a few optimistic observations that might have been shadowed by some Sky Net references, but I think 2024 has a lot of potential. Enjoy the holidays and we will see you soon in 2024. --- Support this podcas…
  continue reading
 
CJ and Matt Lee of Pax8 discuss control 8, which pertains to audit logs. Some of the safeguards are easy to satisfy... just turn the logging function on and set to 90 days. Others will require more effort but all are reasonable for MSPs to pull off. --- Support this podcast: https://podcasters.spotify.com/pod/show/msp1337/support…
  continue reading
 
What does future growth and sustainability look like in the MSP space? Acquisitions abound, SMBs and micro-SMBs bounce from one MSP to another... What is the future yield especially when we start discussing cybersecurity challenges and adopting even good cyber hygiene? I sit down with Eric Hanson of Inland Productivity to get his take on the future…
  continue reading
 
Deep dive into control 7 with some influences of other controls. We know that OS patch management, change management, Third Party App management and third party app patching aren't always prioritized the way it should be considering today's threat landscape. Matt Lee is on a pedestal on this control so stay tuned through the end as we run a bit lon…
  continue reading
 
Maybe we have talked about this before? At any rate Business email compromise is a constant threat. We do Phishing simulations and other security awareness training to help our staff and clients make good choices, but we aren't always perfect. I sit down with Dan Gilligan with Integra MSP to hear his journey in dealing with this issue and the tools…
  continue reading
 
What are insider threats? Tim Schnurr and I discuss the importance of cybersecurity in protecting digital assets and preventing insider threats in organizations. There is a overwhelming need for employee education, the use of data classification tools, and the implementation of monitoring tools to track data flow. This is a great way to have open c…
  continue reading
 
Thinking back ten-plus years on the industry conferences we have attended in person and online. With vendor mergers and acquisitions it is hard to determine which shows you should still attend and every day it seems there is a new road show, quarterly show or another membership conference. How do you make decisions to attend what is relevant? --- S…
  continue reading
 
As we go through the CIS controls we try to stay in sequence but as a result of some discussions at recent events, we decided to jump to Malware Defenses. Hopefully, Matt Lee's insights and my humor will be enough for you to endure 30 minutes on what you should do in your journey to address Malware Defenses. --- Support this podcast: https://podcas…
  continue reading
 
We talk about frameworks, compliance, cybersecurity, and many things in between but we haven't discussed getting assessed against a framework or even the new CompTIA Cybersecurity Trustmark. I sat down with Omer Kasim Aslim of Lake Ridge to discuss assessments. How the different frameworks, whether prescriptive or not, are often looking for complia…
  continue reading
 
In recent years we have seen Solution Providers begin offering services that are showing a shift in our industry around our client and client prospect needs. Five years ago very few solution providers would be comfortable talking about risk registers, GRC tools, PoAMs, and take a leadership role with our clients. Joine me as I sit down with Chad Ho…
  continue reading
 
From the trenches... I sit down with Jim Harryman of Kinetic Technology Group to discuss their progress through the new CompTIA Cybersecurity Trustmark. What are the significant challenges and what are the easy wins. A glipse into the journey that got Kinetic Technology Group to where they are today and preparing for their asessment at the end of t…
  continue reading
 
Loading …

Quick Reference Guide