Artwork

Content provided by MSSP Alert. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by MSSP Alert or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://player.fm/legal.
Player FM - Podcast App
Go offline with the Player FM app!

CFH #1 - Chris McCurdy

1:07:54
 
Share
 

Manage episode 407135696 series 3558120
Content provided by MSSP Alert. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by MSSP Alert or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://player.fm/legal.

If you were to ask most companies right now, "Why you have you hired an MSP?" the answer probably would sound something like: “Resources are strained. Talented is limited. So we’re outsourcing certain security functions to a firm that has the built-in capabilities to manage this for us.” But is the MSSP model becoming more than a convenient economics and personnel decision? Is this actually becoming a go-to "must have" for all organizations -- the next logical evolution in the industry’s approach to solving security? Plus: Dear Cyber for Hire, our marriage counselor advice column for MSPs and their clients. And The Security Detail, our curated rundown and analysis of the latest cybersecurity news. Companies must communicate clear expectations when contracting with pentesters, red teams and vulnerability hunters in order to set key ground rules for what data and systems can be accessed, what’s off limits and who is responsible if something breaks. Of course, if you set too many restrictions and parameters, then how do you really know if you’re safe from malicious hackers, who of course don’t play by the rules? Plus: We Speak Geek, a weekly segment where our guest shares what they geek out about!

Show Notes: https://scmagazine.com/cfh1

  continue reading

30 episodes

Artwork
iconShare
 
Manage episode 407135696 series 3558120
Content provided by MSSP Alert. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by MSSP Alert or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://player.fm/legal.

If you were to ask most companies right now, "Why you have you hired an MSP?" the answer probably would sound something like: “Resources are strained. Talented is limited. So we’re outsourcing certain security functions to a firm that has the built-in capabilities to manage this for us.” But is the MSSP model becoming more than a convenient economics and personnel decision? Is this actually becoming a go-to "must have" for all organizations -- the next logical evolution in the industry’s approach to solving security? Plus: Dear Cyber for Hire, our marriage counselor advice column for MSPs and their clients. And The Security Detail, our curated rundown and analysis of the latest cybersecurity news. Companies must communicate clear expectations when contracting with pentesters, red teams and vulnerability hunters in order to set key ground rules for what data and systems can be accessed, what’s off limits and who is responsible if something breaks. Of course, if you set too many restrictions and parameters, then how do you really know if you’re safe from malicious hackers, who of course don’t play by the rules? Plus: We Speak Geek, a weekly segment where our guest shares what they geek out about!

Show Notes: https://scmagazine.com/cfh1

  continue reading

30 episodes

All episodes

×
 
Loading …

Welcome to Player FM!

Player FM is scanning the web for high-quality podcasts for you to enjoy right now. It's the best podcast app and works on Android, iPhone, and the web. Signup to sync subscriptions across devices.

 

Quick Reference Guide