show episodes
 
Artwork

1
Fresh Beef

Jeremy Balon, Dave Brenner

Unsubscribe
Unsubscribe
Monthly
 
Fresh Beef tackles the culture of internet commenting with hosts Dave Brenner & Jeremy Balon. Each episode they contact disgruntled internet commenters (improvised by a comedian) and attempt to right their purported wrong. Part of the Seltzer Kings Network.
  continue reading
 
If you’re a managed security provider (MSP), managed security service provider (MSSP), virtual CISO, or a cybersecurity professional looking for insights and advice on ways to build bridges with your clients (or vice versa), look no further than Cyber for Hire | The Managed Security Podcast! Presented in partnership with MSSP Alert and ChannelE2E, Cyber for Hire, is a weekly 60-minute podcast (in two 30-minute segments) hosted by Ryan Morris, Principal Consultant at Morris Management Partner ...
  continue reading
 
Loading …
show series
 
The days of an MSSP or MSP being a security device babysitter are over. Clients expect more from your SOC, SIEM and SecOps offerings, and evolving attacks will demand more of you. It's time to level up -- but how does one upgrade from basic to top-tier services? According to our featured speaker, there are several key steps: more comprehensive, cro…
  continue reading
 
One of the most significant takeaways of the White House's recently unveiled National Cybersecurity Strategy is the assertion that software developers, OEMs, and technology service providers must bear the brunt of the responsibility -- rather than end-users -- for keeping cyber environments secure. With the looming prospect of further legislation a…
  continue reading
 
Try as they might to keep their clients in compliance with privacy and security regulations, managed services providers are still at the mercy of the organizations they serve. Unfortunately, companies don't always follow the MSSP's or vCISO's advice on items like responsible data stewardship, privacy policies and breach notification. If an attack d…
  continue reading
 
Our guest for this segment spends his days where others dare not tread: the deep dark web. Here he collects information on cybercriminal activity that could be a precursor to major attack or evidence that one has already occurred. For companies that can't or won't conduct dark-web recon for themselves, outsourcing this threat intelligence service i…
  continue reading
 
Last year, ChannelE2E listed more than 1,000 merger and acquisition deals involving MSPs, MSSPs and other similar service provider organizations. Typically when any M&A deal occurs, there are bound to be redundancies and overlaps in services, tools and personnel. For MSSPs that find themselves in this situation, it's important to consolidate and in…
  continue reading
 
Risk isn't a static measurement. Threats like malware campaigns, vulnerabilities, human error and unreliable third-party partners can fluctuate in their severity depending on ever-changing circumstances. That's why knowing which risk is of highest priority at any given time can allow MSSPs to dynamically adjust their prevention and mitigation effor…
  continue reading
 
It's been a big year for the passwordless movement, with tech giants Apple, Google and Microsoft supporting the FIDO Alliance's efforts to replace conventional credentials with passkey technology. Still, passwords have long been engrained into people's daily routines, so users may need some convincing to change their behaviors. And likewise, manage…
  continue reading
 
Today marks the beginning of the Identiverse conference in Las Vegas, where leaders in security gather to discuss advancements in the world of identity and access management. For MSSPs that specialize in managed IAM services, it's important to stay on top of the latest trends, including those revealed in a series of reports and articles that CyberR…
  continue reading
 
Infosec leaders shouldn't just be reporting to the board room to explain themselves when things go wrong. They should be a regular part of the strategic business discussions that take place inside a company's executive halls. That's true whether they're directly employed by the company or they're a contracted vCISO provided by an external managed s…
  continue reading
 
Risk assessment questionnaires are a standard practice when evaluating current or prospective third-party partners. And yet some folks may justifiably ask: How valuable are these questionnaires if there are no consequences for fudging your answers, or even outright lying? This session will examine common weaknesses and oversights in the third-party…
  continue reading
 
What’s the best way to ensure operational resilience against cybercriminals’ tactics, techniques and procedures? Well, just rearrange the letters in TTP, and you get PPT: people, process and technology. This session will examine how organizations can score, benchmark and improve their cyber resilience through a combination of security processes, pr…
  continue reading
 
The cyber talent shortage is well documented. Rather than just trying to outbid each other in a competitive job market, wouldn't it be nice if MSSPs were also able to build out their talent pipelines through professional development programs? This session will look at strategies for creating an assembly line of ready-to-go cyber professionals to ad…
  continue reading
 
Your favorite intelligence feeds are warning of several up-and-coming new campaigns that are victimizing companies much like your clients. Maybe they're even targeting MSSPs themselves. Now it's up to you to assess and prioritize these latest threats, and determine to what extent they require you to change your approach, institute additional safegu…
  continue reading
 
Who won the Super Bowl this year? Everyone did, in the sense that there were no major cyberattacks that disrupted the flow of the "Big Game" -- unlike, for instance the Pyeongchang Olympics, where ticket distribution was affected on the night of the Opening Ceremonies. For contracted cybersecurity services providers, protecting a prestigious one-of…
  continue reading
 
Having a clear and cogent taxonomy that classifies your managed cyber services into distinct buckets or categories is an important step for MSSPs looking to define and differentiate their market offerings to clients. Customers can refer to your taxonomy to better understand your scope of services and ensure they don’t leave gaps in their security p…
  continue reading
 
What are the market trends that are driving growth and changes in the managed security service provider market? MSSPAlert.com, an affiliate of Cyber for Hire, does an annual survey of MSSPs to find out about growth trends, technology providers, different types of incidents they see in their work with small and mid-sized businesses, and other inform…
  continue reading
 
Now in its eighth iteration, the Center for Internet Security's Critical Security Controls (CIS Controls) framework provides organizations with 18 categories of high-priority best practices that they can follow in order to improve their cyber hygiene, while remaining in step with key regulations. In this segment, we'll look at what MSSPs and their …
  continue reading
 
Security is a shared responsibility between MSSPs and their clients. Yes, the provider was hired to do a job -- be it SOC operations, threat intelligence or offensive security -- but part of the job is also to consult and communicate with the client to help them gain some degree of cyber self-sufficiency. This discussion will reveal how providers c…
  continue reading
 
In late 2022, the MITRE Engenuity foundation revealed the findings from its first-ever ATT&CK Evaluations for managed security service providers. The report measured various MSSPs' ability to recognize, analyze and report the TTPs of the OilRig Advanced Persistent Threat group. This session will dig into the findings to help MSSPs better understand…
  continue reading
 
For managed services providers looking to build their market strategy around XDR and MDR -- or a hybrid of the two solutions -- it's important to understand how this approach will shape future priorities for their tech stacks and toolsets, their clients and their vendor partners. What kinds of next-generation services can they build from an XDR/MDR…
  continue reading
 
In late January, CISA, the NSA and the MS-ISAC released an advisory warning about the malicious the use of legitimate remote monitoring and management software, after uncovering illegal hacking activity on two federal civilian executive branch networks. Whether compromised via social engineering or through exploits, RMM tools can grant unauthorized…
  continue reading
 
The developer of a commonly used software issues an urgent out-of-band update for a coding vulnerability that is discovered to be under attack. Immediate patching is imperative. Under such circumstances, what can MSSPs do to quickly identify which of their clients are running this vulnerable software version? And then what are the best practices fo…
  continue reading
 
In late January, law enforcement officials disrupted the operations of the Hive cybercriminal group, which has profited off of a ransomware-as-a-service (RaaS) business model. And though the takedown was an inspiring victory, there’s plenty more ransomware where that came from. Indeed, Microsoft just reported that at the conclusion of 2022 it was t…
  continue reading
 
Some MSSPs have a hard time leaving their comfort zone when it comes to their toolsets. They prefer to stick to their own tried-and-true suite of tools and are reluctant to add new ones, even though it might be beneficial to do so. After all, not every client has the exact same needs and challenges. This session will look at how MSSPs can potential…
  continue reading
 
No matter how well constructed an MSSP's security architecture is, or how tight its security controls are -- all that good work can be wasted or sabotaged far too easily when the client organization fails to follow standard cyber security hygiene practices. Just because a company uses a managed security provider to bolster its cyber preparedness do…
  continue reading
 
A lot of thought goes into which cyber solutions vendors MSSPs ultimately align themselves with. There are many factors to consider: What capabilities do you want to prioritize based on client demand? How do you assess your weak points or gaps in services? And then what are the top qualities in vendors you're looking for? Today's episode will look …
  continue reading
 
It's not uncommon for IT security professionals and OT engineers to be at odds with each other over cyber governance policies and procedures inside industrial settings. And when the IT professionals work for an outside firm such as an MSP, then that can create another level of separation that can further expand the schism between IT and OT. With th…
  continue reading
 
Let's play the dating game! When pairing up a company with a fractional or virtual CISO, there are a lot of factors to consider. Personalities count, as do cyber skills and IT background, industry sector experience, geographical limitations, and the company's stated core objectives. The available IT expertise on the client's corporate payroll also …
  continue reading
 
It's becoming increasingly difficult to qualify for cyber insurance. Insurance providers are wary of multimillion dollar payouts resulting from costly ransomware attacks, and so the onus is on companies to prove that they can meet certain minimum cyber hygiene standards. One of the potential paths to reach this objective is by contracting a managed…
  continue reading
 
If you were to ask most companies right now, "Why you have you hired an MSP?" the answer probably would sound something like: “Resources are strained. Talented is limited. So we’re outsourcing certain security functions to a firm that has the built-in capabilities to manage this for us.” But is the MSSP model becoming more than a convenient economi…
  continue reading
 
On this episode Dave and Jeremy attempt to right a horrible review for a county jail by a guy named Emmett. Featuring Danny Tamberelli ("GTA V", "Pete & Pete") & Eric Gersen ("UCB"). Featuring: Danny Tamberelli, Eric Gersen Produced by: Jeremy Balon @ SeltzerKings, David Brenner Copyright © 2023 Fresh Beef Podcast (Jeremy Balon, David Brenner) Twit…
  continue reading
 
In this episode Dave and Jeremy attempt to help a discouraged patron of a NYC Horse and Carriage ride. Featuring: Josh Fadem (@joshfadem) Joe Bonacci (@Skissles) Produced by: Jeremy Balon @ SeltzerKings, David Brenner Copyright © 2023 Fresh Beef Podcast (Jeremy Balon, David Brenner) Twitter | Instagram | Facebook | Website Learn more about your ad …
  continue reading
 
In this episode Dave and Jeremy speak to Reginald about his two-star review of SafeSpace Securities, a startup bodyguard service by Matt & Max. Featuring: Cory Cavin (@corycavin) Josh Lay (@joshlay) Bill Grandberg (@TheWillBill) Produced by: Jeremy Balon @ SeltzerKings, David Brenner Copyright © 2023 Fresh Beef Podcast (Jeremy Balon, David Brenner)…
  continue reading
 
In this episode Dave and Jeremy try to settle an argument over questionable service at a pet salon. Featuring: Brett Davis, Jennifer Mills Produced by: Jeremy Balon @ SeltzerKings, David Brenner Copyright © 2023 Fresh Beef Podcast (Jeremy Balon, David Brenner) Twitter | Instagram | Facebook | Website Learn more about your ad choices. Visit podcastc…
  continue reading
 
Zero star reviewer “Trevor” voices his displeasure over a laundry app created by “Trish” called Chi Chi’s Laundry. Featuring Tim de la Motte and Sally Burtnick Featuring: Tim de la Motte and Sally Burtnick Produced by: Jeremy Balon @ SeltzerKings, David Brenner Copyright © 2023 Fresh Beef Podcast (Jeremy Balon, David Brenner) Twitter | Instagram | …
  continue reading
 
On this episode Dave and Jeremy want to do more. Instead of focusing on one internet comment/review the guys contact several with mixed results. They also speak to The Elwood's, a couple who had a bad service experience at the Natural Blessings couples retreat. Featuring: Matthew Schmid, Jacquie Baker Also Featuring: Seth Olenick, Jon Melamed Produ…
  continue reading
 
Dave and Jeremy track down "Kent" to discuss his one-star review of the typically well-reviewed Italian restaurant where "David" the waiter works. Featuring Shane Hartline and Joe Bonacci. Featuring: Shane Hartline and Joe Bonacci Produced by: Jeremy Balon @ SeltzerKings, David Brenner Copyright © 2023 Fresh Beef Podcast (Jeremy Balon, David Brenne…
  continue reading
 
Dave and Jeremy track down "CC" who purchased 1000 live crickets on Amazon which turned his life into a living hell. Featuring Gary Richardson ("SNL", "Shrill", "High Matinence") Featuring: Gary Richardson Produced by: Jeremy Balon @ SeltzerKings, David Brenner Copyright © 2023 Fresh Beef Podcast (Jeremy Balon, David Brenner) Twitter | Instagram | …
  continue reading
 
Dave and Jeremy talk with Amazon reviewer "Phantomile" to discuss her poor review of the children's book "Where is Baby's Belly Button". Featuring: Jo Firestone Produced by: Jeremy Balon @ SeltzerKings, David Brenner Copyright © 2023 Fresh Beef Podcast (Jeremy Balon, David Brenner) Twitter | Instagram | Facebook | Website Learn more about your ad c…
  continue reading
 
Loading …

Quick Reference Guide