MSP 1337

By Chris Johnson

Listen to a podcast, please open Podcast Republic app. Available on Google Play Store and Apple App Store.

Image by Chris Johnson

Category: Tech News

Open in Apple Podcasts


Open RSS feed


Open Website


Rate for this podcast

Subscribers: 3
Reviews: 0
Episodes: 183

Description

Educational sound bytes to help MSPs and their clients navigate Cyber Security. Cybersecurity maturity is a journey, don't go it alone. Interviews and guidance from fellow MSPs and other Industry experts. Our goal is Secure Outcomes and together we can make a difference. Support this podcast: https://podcasters.spotify.com/pod/show/msp1337/support

Episode Date
Where MSP and an MSSP Intersect
Apr 23, 2024
Fireside Chat Control 13 Network Monitoring & Defense
Apr 16, 2024
Collecting Evidence
Apr 09, 2024
Getting Started With Tabletop Exercises
Apr 03, 2024
Security Awareness and Skills Training
Mar 26, 2024
Fireside Chat CIS Control 12
Mar 19, 2024
Parting ways with a client or prospect
Mar 12, 2024
Vendor and Product Evaluation
Mar 05, 2024
Is Cyber Insurance Enough?
Feb 27, 2024
Fireside Chat: Control 11 Data Recovery
Feb 20, 2024
Data Protection
Feb 13, 2024
Risk of Risky AI...
Feb 06, 2024
ToDo or not ToDo
Jan 30, 2024
Selling Cybersecurity Services
Jan 23, 2024
Fireside Chat - Control 9 Email & Web Browser Protections
Jan 16, 2024
Hiring Security Resources
Jan 09, 2024
Data Backup and Air gapped?
Jan 02, 2024
2024 Outlook in Cyber
Dec 26, 2023
Fireside Chat - CIS Control 8 - Audit Logs
Dec 19, 2023
2023 Look back in Cyber
Dec 12, 2023
My Cell Phone's Been Cloned
Dec 05, 2023
Ideals vs Reality
Nov 28, 2023
Fireside Chat - Control 07 Continuous Vulnerability Mgmt.
Nov 21, 2023
ITN Connect Recap 2023
Nov 14, 2023
Business Email Compromise
Nov 07, 2023
Insider Threats
Oct 31, 2023
Industry Conference Overload
Oct 24, 2023
Fireside Chat - CIS Control 10 - Malware Defense
Oct 17, 2023
Getting an Assessment...
Oct 10, 2023
Should I Sell Compliance Services?
Oct 03, 2023
CompTIA Cybersecurity Trustmark Progress
Sep 26, 2023
Fireside Chat - CIS Control 6 Access Management
Sep 19, 2023
Do I know my assets (IoT, IIoT, and OT)?
Sep 12, 2023
Committing Fraud Through CMMC.
Sep 05, 2023
Preparing For A Storm.
Aug 29, 2023
Was I a victim?
Aug 22, 2023
Fireside Chat - CIS Control 5 Hurdles
Aug 15, 2023
Cybersecurity for Big and Small MSPs
Aug 08, 2023
MSPs Need Compliance
Aug 01, 2023
Showing Evidence
Jul 25, 2023
Fireside Chat - CIS Control 4 Hurdles
Jul 19, 2023
Policy Creation Involves Everyone!
Jul 04, 2023
Do You Know Who Your Users Are?
Jun 27, 2023
Fireside Chat - CIS Control 3 Hurdles
Jun 20, 2023
Counterintelligence and TikTok
Jun 13, 2023
Check Vendor's Security Posture
Jun 06, 2023
Cyber Insurance Industry Maturation
May 30, 2023
Do I need a PenTest?
May 23, 2023
Fireside Chat - CIS Control 2 Hurdles
May 16, 2023
One Man Shop to CISSP...
May 09, 2023
FTC Safeguard Rule and Opportunity
May 02, 2023
A Doozie of a Story
Apr 25, 2023
Fireside Chat - CIS Control 1 Hurdles
Apr 18, 2023
Suddenly Gone
Apr 11, 2023
Security Without Cybersecurity?
Apr 04, 2023
State of Cybersecurity
Mar 28, 2023
Protecting Friends and Family
Mar 21, 2023
Explaining Cybersecurity to a 5th Grader
Mar 14, 2023
Cybersecurity Maturity Without Technology?
Mar 07, 2023
MSPs, Controls & Safeguard Capabilities
Feb 28, 2023
Social Media and Threat Landscape
Feb 21, 2023
Frameworks and Privacy Updates
Feb 14, 2023
Emergency Response Team (eRT) is What?
Feb 07, 2023
Setting Expectations
Jan 31, 2023
I'm Too Small For a Firewall
Jan 24, 2023
Pig Butchering & Other Scams
Jan 17, 2023
Password Manager or nothing?
Jan 10, 2023
2023 What can we expect?
Jan 03, 2023
Looking Back on 2022
Dec 27, 2022
Policies and Controls, Compliance vs Security?
Dec 20, 2022
Preparing for an Audit.
Dec 13, 2022
The Aftermath
Dec 06, 2022
Building Confidence
Nov 29, 2022
What About My Backups?
Nov 22, 2022
Risky People
Nov 15, 2022
Advisory Services
Nov 08, 2022
Risk Management Plan
Nov 01, 2022
Monitoring Cloud Services
Oct 25, 2022
Beyond Zero Trust My Browser
Oct 18, 2022
Four Truths of Cybersecurity
Oct 11, 2022
Zero Trust Your Browser
Oct 04, 2022
Onboarding and Offboarding
Sep 27, 2022
Going Beyond RMM and MDM
Sep 20, 2022
Four Years Post Breach
Sep 13, 2022
MDM, Not Just for Mobile Devices
Sep 07, 2022
Vulnerabilities and Exploits
Aug 30, 2022
Data Protection, a Moral Obligation
Aug 23, 2022
What are Integrator Groups?
Aug 16, 2022
Recap of Channelcon22
Aug 09, 2022
Lessons from a CISO
Aug 02, 2022
Good, Better, Best
Jul 26, 2022
Red Team + Blue Team = Purple Team
Jul 19, 2022
Economy of Scale
Jul 12, 2022
Cybersecurity and Cannabis
Jul 05, 2022
Is 2FA The Right Thing?
Jun 28, 2022
Almost A Victim...
Jun 21, 2022
Cybersecurity Baseline
Jun 14, 2022
Do The Right Thing (see something, say something.)
Jun 08, 2022
Is Affordable Cybersecurity a Myth?
May 31, 2022
Cyber Insurance World Is Changing
May 24, 2022
I'm Responsible For What?
May 17, 2022
Configure and Implement Securely
May 11, 2022
Strategic Planning
May 03, 2022
Vendor Managment Challenges
Apr 26, 2022
Knee Jerk Reaction or Calculated Decision
Apr 19, 2022
Cybersecurity: I'm Stuck
Apr 12, 2022
Cybersecurity - How To Start.
Apr 05, 2022
Even Small Municipalities need MSPs
Mar 29, 2022
Why Are ISACs and ISAOs Important To Me?
Mar 22, 2022
Cybersecurity Maturity Starts With Leadership
Mar 15, 2022
Going Beyond Cyber Insurance
Mar 08, 2022
Encryption: At Rest & In Transit
Mar 01, 2022
Formerly vCIO?
Feb 22, 2022
No Magic Bullet
Feb 16, 2022
HIPAA Compliance And M&A
Feb 09, 2022
Drinking From A Fire Hose?
Feb 01, 2022
Tools with Intent
Jan 27, 2022
Back To Basics
Jan 18, 2022
New MSP Perspectives on Cybersecurity
Jan 11, 2022
Governance for SMB
Jan 05, 2022
Three Pillars of Cybersecurity
Dec 28, 2021
What To Do About Log4j
Dec 21, 2021
Security Layers
Dec 15, 2021
The Little Things
Dec 07, 2021
Why Peer Groups Matter
Nov 30, 2021
You Can Only Pick Three
Nov 23, 2021
Overcoming objections
Nov 16, 2021
MSP Relevant Framework Adoption
Nov 10, 2021
Getting Started
Nov 02, 2021
Ounce of Prevention = Pound of Cure
Oct 26, 2021
Pre/Post Boom
Oct 19, 2021
Cybersecurity for SMB MSP
Oct 12, 2021
Cyber Insurance. A no brainer!
Oct 05, 2021
Hoodies vs Suits
Sep 28, 2021
Power is out... now what?
Sep 21, 2021
Business Continuity (BCDR)
Sep 18, 2021
Adding an "s" to MSP (Compliance and Me)
Sep 07, 2021
Finger Pointing
Aug 31, 2021
Recent Breaches in the Media
Aug 24, 2021
O365 Cybersecurity Tips and Tricks
Aug 18, 2021
HIPAA Compliance?
Aug 11, 2021
Cyber Insurance. Am I Covered?
Aug 03, 2021
Prospect Scorecard
Jul 27, 2021
Risky Clients
Jul 21, 2021
Zero Trust
Jul 13, 2021
Imposter Syndrome
Jul 06, 2021
Communication Etiquette and Protocols
Jun 29, 2021
Gas Prices and Meat Shortages
Jun 22, 2021
Hope For Ransomware
Jun 15, 2021
Do you Know Your Client (KYC)
Jun 08, 2021
Performing Tabletop Exercises
Jun 01, 2021
Student Perspective on Cybersecurity
May 26, 2021
Privacy, Consumerism and SASE
May 18, 2021
Security Awareness Training
May 11, 2021
Evaluating Vendors (Part 2 of 2)
May 04, 2021
Evaluating Vendors (Part 1 of 2)
Apr 27, 2021
An Emerging Pattern.
Apr 20, 2021
Overcoming Policies
Apr 13, 2021
Protected and Secured
Apr 06, 2021
Vulnerability Assessment or Penetration Test?
Mar 30, 2021
Cybersecurity Comes Down To People
Mar 23, 2021
Cybersecurity Solutions Still Alienate The SMB
Mar 16, 2021
Transitioning to MSSP or MSsP
Mar 09, 2021
Defining The Why...
Mar 02, 2021
The Great America Recovery
Feb 23, 2021
NIST Domains: MSPs Strengths and Weaknesses Across The Five Domains
Feb 16, 2021
Evolution of an MSP: From Infrastructure to End Users
Feb 09, 2021
Navigating a Terrain Unlike Any Other
Feb 03, 2021
Don't Drink From The Same Cup
Jan 26, 2021
Getting Started with CIS Top 20
Jan 20, 2021
Cybersecurity in K12
Jan 12, 2021
Co-Managed IT and Educating the Unwilling
Jan 05, 2021
MSP, MSSP or MSsP...
Dec 22, 2020
Vendor and MSP Alignment
Dec 15, 2020
Ransomware and Insurance
Dec 08, 2020
Shiny Objects Part 2
Dec 02, 2020
Shiny Object Syndrome
Nov 24, 2020
Change Control
Nov 18, 2020
Asset Management
Nov 10, 2020
Secure Endpoints
Nov 04, 2020
Gone Phishing
Oct 27, 2020
Recovering From a Ransomware Breach
Oct 20, 2020
MSP 1337 (Trailer)
Oct 19, 2020