It is the 3rd Tuesday of the month and it is time for Control 4 With Mat Lee. This is a shorter episode but we get it done and got great insights on how to go about addressing CIS Control 4.
Policies are the one thing no company wants to create but everyone has to have. We see them show up in employee handbooks, Written Information Security Plans (WISP), and System Security Plans (SSP), and there is no shortage c...
I don't often have vendors as guests on the show and so when there is an exception made it is because they are bringing something to the table that is exceptional. Discussing Single Sign-on with Nick Wolf Of Evo Security is a...
A little Chutes and Ladders, a little Yellow Brick Road. In this episode, I think you will find that Data Protection is a rather complex beast but through the guidance of Matt Lee of Pax8 you will have the tools you need to b...
This week we put a thought towards adding counterintelligence as something that should be part of your Business Continuity, Disaster Recover, and Incident Response. It makes sense when you hear what Darren Mott has to say. As...
After we did, "A Doozy of a Story." I was presented with this Gem. It almost feels like a perfect storm but in fact it is a legitimate business and as I discuss the details with Eric Hanson, I want you to think about CIS Cont...
When cybersecurity insurance first came on the scene it was a new frontier. Everyone seemed to be selling it and everyone seemed to qualify for it. That was then... Sitting down with Reid Wellock of FifthWall was an enlighten...
What is a PenTest? What if I can't afford a PenTest? How is a pentest different from a vulnerability assessment? These questions and many more Matt Lang and I attempt to give some direction. Perhaps redefining what a pentest ...
Our first fireside chat was about Physical Assets and the hurdles or obstacles faced when trying to get a complete inventory. In this month's special edition, a fireside chat with Matt Lee, we are addressing control 2. This i...
I love a good origin story. Sitting down with Matt Lang of SVAM International showed me just how alike many of our stories are. How we got started in IT, why we started an MSP, and in some cases why we became super passionate...
We are all too familiar with regulatory requirements and penalties for failing to comply. The FTC has put into effect June 9, 2023 requirements that will directly impact financial institutions. In this episode, we talk specif...
Domain Registrations and an extra invoice that has a bit of sticker shock... This and more with Charles Love of ShowTech Solutions. We have talked about doom and gloom in the past but this story is one that I am already losin...
If you haven't met me, you know that my passion is to help others with improving their cybersecurity posture. In an effort to make a bigger impact, I have brought Matt Lee of Pax8 on to the show as a special guest to talk abo...
We are all to familiar with our own mortality. In this episode we talk about the scenarios that can arise when a key person in a company holds all of the keys and is suddenly taken from us. While there is some morbidity to th...
As a podcast we pride ourselves in the focus of cybersecurity topics. This is an episode focused on Cybersecurity without talking about cybersecurity. Crazy, I think Ian Richardson of Richardson and Richardson make it almost ...
CompTIA's research team Seth Robinson and Carolyn April join me in discussing some interesting research trends that cover 4 pillars or steps that I like to refer to as the 4 Ps. Policy, Process, People, and Product. Be forewa...
Cybersecurity challenges exist in every aspect of our daily lives. Join me as I discuss with Dom Kirby of Pax8 an approach to cybersecurity with friends and family. Technology helps but it doesn't solve it all.
Ever wonder why your prospect or client gets a confused look on their face? You try to describe the new service offering or features that have been added to improve the security or efficiencies of their task force but they j...
If my organization has no technology can I still be secure? Matt Topper of Connectwise and I explore Cybersecurity with an approach that says you can prove a mature cybersecurity posture without technology. Technology is sh...
With Communities, Councils, and Forums just a few weeks away, I thought we should tee up the Unfiltered Fireside chat between Matt Lee of Pax8 and myself. In this precursor, you will hear our two different approaches to achi...
We talk a lot about social engineering and its potential impact on our employees, our businesses, and even our family and friends. What we often fail to talk about is our responsibility to ensure that our employees, clients,...
We are beginning to see a pattern in frameworks updating or adding additional privacy controls. Whether they are long overdue or not is neither here nor there as they are now being stood up. From CCPA becoming CPRA, ISO 2700...
Have you ever dealt with a client, prospect, or perhaps an internal event that caused harm to your business or others? If so I am sure you can relate to feelings of shame, and embarrassment and I am sure many sleepless night...
There is some buzz circulating about the upcoming CompTIA Cybersecurity Trustmark, Compliance with frameworks, and how to get started as a solution provider. I sit down with Matt Lee of Pax8 to discuss the opportunities pres...