Welcome to MSP 1337 - Cybersecurity Maturity Journey | Guidance and Best Practices for MSPs!

Episodes

ITN Connect Recap 2023
Nov. 14, 2023

ITN Connect Recap 2023

I sat down with Matt Fisch of Fortmesa to discuss observations and highlights from ITN Connect. From new vendors in the pavilion tackling niche cybersecurity challenges to conversations with Solution providers that show our i...

Listen to the Episode
Business Email Compromise
Nov. 7, 2023

Business Email Compromise

Maybe we have talked about this before? At any rate Business email compromise is a constant threat. We do Phishing simulations and other security awareness training to help our staff and clients make good choices, but we aren...

Listen to the Episode
Insider Threats
Oct. 31, 2023

Insider Threats

What are insider threats? Tim Schnurr and I discuss the importance of cybersecurity in protecting digital assets and preventing insider threats in organizations. There is a overwhelming need for employee education, the use of...

Listen to the Episode
Industry Conference Overload
Oct. 24, 2023

Industry Conference Overload

Thinking back ten-plus years on the industry conferences we have attended in person and online. With vendor mergers and acquisitions it is hard to determine which shows you should still attend and every day it seems there is ...

Listen to the Episode
Fireside Chat - CIS Control 10 - Malware Defense
Oct. 17, 2023

Fireside Chat - CIS Control 10 - Malware Defense

As we go through the CIS controls we try to stay in sequence but as a result of some discussions at recent events, we decided to jump to Malware Defenses. Hopefully, Matt Lee's insights and my humor will be enough for you to ...

Listen to the Episode
Getting an Assessment...
Oct. 10, 2023

Getting an Assessment...

We talk about frameworks, compliance, cybersecurity, and many things in between but we haven't discussed getting assessed against a framework or even the new CompTIA Cybersecurity Trustmark. I sat down with Omer Kasim Aslim o...

Listen to the Episode
Should I Sell Compliance Services?
Oct. 3, 2023

Should I Sell Compliance Services?

In recent years we have seen Solution Providers begin offering services that are showing a shift in our industry around our client and client prospect needs. Five years ago very few solution providers would be comfortable tal...

Listen to the Episode
CompTIA Cybersecurity Trustmark Progress
Sept. 26, 2023

CompTIA Cybersecurity Trustmark Progress

From the trenches... I sit down with Jim Harryman of Kinetic Technology Group to discuss their progress through the new CompTIA Cybersecurity Trustmark. What are the significant challenges and what are the easy wins. A glipse...

Listen to the Episode
Fireside Chat - CIS Control 6 Access Management
Sept. 19, 2023

Fireside Chat - CIS Control 6 Access Management

Fireside chat with Matt Lee brings us control 6. Access Management goes hand in hand with Account Management but if you have been following along we coverd control 5 last month. Join Matt Lee and I as we deep dive into each s...

Listen to the Episode
Do I know my assets (IoT, IIoT, and OT)?
Sept. 12, 2023

Do I know my assets (IoT, IIoT, and OT)?

Each day we are bombarded by cybersecurity threats and this episode adds another vector you should be looking at as you address your asset inventory. Are you looking at the asset that controls your thermostat? How about the I...

Listen to the Episode
Committing Fraud Through CMMC.
Sept. 5, 2023

Committing Fraud Through CMMC.

There is no question that CMMC is here to stay. It is a much-needed maturity model for measuring companies that cater to the Defense space and are doing what is needed to protect Confidential Unclassified Information (CUI). I...

Listen to the Episode
Preparing For A Storm.
Aug. 29, 2023

Preparing For A Storm.

In Cyber we often focus only on the events that come from the ether, the dark web, and we forget that disasters can come from all sorts of events. With a hurricane less than 24 hours from making landfall, I sit down with Char...

Listen to the Episode
Was I a victim?
Aug. 22, 2023

Was I a victim?

I am a big fan of Scott Augenbaum's book, "The Secret to Cybersecurity." Specifically, the 4 truths that we talk about with Tye Male, Senior Pastor of Wellspring church. Suspicious email, inconvenient timing, stress-inducing,...

Listen to the Episode
Fireside Chat - CIS Control 5 Hurdles
Aug. 15, 2023

Fireside Chat - CIS Control 5 Hurdles

We are 1/3 of the way through the CIS Top 18 and I think Control 5 might be my favorite. Matt Lee joins me as we dive into all six safeguards and how important they are in the journey toward cyber resilience.

Listen to the Episode
Cybersecurity for Big and Small MSPs
Aug. 8, 2023

Cybersecurity for Big and Small MSPs

I remember the days when Joshua Smith and I decided we should build our own MSP. It was simpler times and Cybersecurity was defined largely by firewalls and antivirus. Today starting an MSP or even being a small MSP trying to...

Listen to the Episode
MSPs Need Compliance
Aug. 1, 2023

MSPs Need Compliance

There are lots of frameworks to choose from and some are more complicated than others. What is important is that you use some set of controls/safeguards or standards that are measurable and can be aligned with. I sit down wit...

Listen to the Episode
Showing Evidence
July 25, 2023

Showing Evidence

Over the past few months we have spent time on policies, how to tackle controls and safeguards in CIS Top 18, and we have even pointed out cybersecurity areas that might be overlooked. In this episode, as we all look at matur...

Listen to the Episode
Fireside Chat - CIS Control 4 Hurdles
July 19, 2023

Fireside Chat - CIS Control 4 Hurdles

It is the 3rd Tuesday of the month and it is time for Control 4 With Mat Lee. This is a shorter episode but we get it done and got great insights on how to go about addressing CIS Control 4.

Listen to the Episode
Policy Creation Involves Everyone!
July 4, 2023

Policy Creation Involves Everyone!

Policies are the one thing no company wants to create but everyone has to have. We see them show up in employee handbooks, Written Information Security Plans (WISP), and System Security Plans (SSP), and there is no shortage c...

Listen to the Episode
Do You Know Who Your Users Are?
June 27, 2023

Do You Know Who Your Users Are?

I don't often have vendors as guests on the show and so when there is an exception made it is because they are bringing something to the table that is exceptional. Discussing Single Sign-on with Nick Wolf Of Evo Security is a...

Listen to the Episode
Fireside Chat - CIS Control 3 Hurdles
June 20, 2023

Fireside Chat - CIS Control 3 Hurdles

A little Chutes and Ladders, a little Yellow Brick Road. In this episode, I think you will find that Data Protection is a rather complex beast but through the guidance of Matt Lee of Pax8 you will have the tools you need to b...

Listen to the Episode
Counterintelligence and TikTok
June 13, 2023

Counterintelligence and TikTok

This week we put a thought towards adding counterintelligence as something that should be part of your Business Continuity, Disaster Recover, and Incident Response. It makes sense when you hear what Darren Mott has to say. As...

Listen to the Episode
Check Vendor's Security Posture
June 6, 2023

Check Vendor's Security Posture

After we did, "A Doozy of a Story." I was presented with this Gem. It almost feels like a perfect storm but in fact it is a legitimate business and as I discuss the details with Eric Hanson, I want you to think about CIS Cont...

Listen to the Episode
Cyber Insurance Industry Maturation
May 30, 2023

Cyber Insurance Industry Maturation

When cybersecurity insurance first came on the scene it was a new frontier. Everyone seemed to be selling it and everyone seemed to qualify for it. That was then... Sitting down with Reid Wellock of FifthWall was an enlighten...

Listen to the Episode