Season 2

Risky People

Risky People

Risk has been at the top of mind for several episodes as of late.  So much so that it seems to show up in my Flipboard news feed and suddenly a LinkedIn post popped up by David Schultis, of Red Panda, talking about Risk to UNLV students.  Join us for a conversation around Risk and educatin...

Advisory Services

Advisory Services

Within every MSP we have roles that involve Account Management and in some cases have even evolved the title to vCIO or other name.  The challenge in many cases is how to charge for this role? Should it be a standalone service offering? Is it just the tip of the spear or the whole spear?  ...

Risk Management Plan

Risk Management Plan

In talking about risk we often don't address risk management plans at all.  In this episode I discuss with Jim Harryman of Kinetic Technology Group, all things risk.  It often starts with a Risk Assessment and we step through what that might look like and how to begin building out a plan w...

Monitoring Cloud Services

Monitoring Cloud Services

I always have wondered why we assume our end users know how to use the technology we provide them.  The age old argument of 10% of the product's capability is actually used.  I sit down with Charles Love to talk about all the interesting things that go on behind the scenes with end users. ...

Beyond Zero Trust My Browser

Beyond Zero Trust My Browser

I couldn't let it go... The browser or browsers have the potential to be the trojan horse.  I sit down with Jim Harryman of Kinetic Group to discuss what we can do within the browser to ensure a more secure posture with resources to protect the user experience.  If you remember in part one...

Four Truths of Cybersecurity

Four Truths of Cybersecurity

You can't secure others if you don't first secure yourself.  Security should be just as important at home as it is at work and you take responsibility for your actions.   I sit down with Scott Augenbaum to discuss what is in his book, "The Secret to Cybersecurity." Spoiler alert there...

Zero Trust Your Browser

Zero Trust Your Browser

Regardless of which browser(s) you use how often do you patch them.  Do you maintain the extensions and restrict what is and isn't sync'd.  I sit down with Kenneth May of Swift Chip to discuss how we need to do a better job creating whitelist/blacklist on apps within the browser. Educate t...

Onboarding and Offboarding

Onboarding and Offboarding

In cybersecurity we don't spend as much time as we probably should in the area of onboarding and offboarding.  Initiated by the HR department or in smaller companies perhaps handled by the company owner to bring in new employees and then of course when an employee exits the company what does th...

Going Beyond RMM and MDM

Going Beyond RMM and MDM

A continued discussion on RMM and MDM tools.  How they differ and how they overlap.  In this ever evolving threat landscape they are both extremely important.  In this episode Jim Harryman and I will review some of the historical reasons behind why we have them in our environments but...

Four Years Post Breach

Four Years Post Breach

Over the past two years I have gotten to know Brian Weiss and much of our conversation has revolved around how he continues to improve the security posture of his company.  This is largely tied to an event that took place back in March of 2018 that crippled 1/2 of his then client base.  In...

MDM, Not Just for Mobile Devices

MDM, Not Just for Mobile Devices

As solution providers we spend a lot of time with different tools and services to support our clients.  I sit down with Charles Love of ShowTech Solutions to discuss how RMM and MDM (DM) go hand in hand in managing the assets placed under our care.

Vulnerabilities and Exploits

Vulnerabilities and Exploits

Vulnerabilities and exploits happen to be very common in today's threat landscape and not all vulnerabilities are actionable.  I sit down with Wes Spencer, of Fifth Wall, to provide insights to solution providers on how to communicate with their vendors and their clients in a way that is action...

Data Protection, a Moral Obligation

Data Protection, a Moral Obligation

I think most of us would agree that protecting data is a very big part of the job as a Solution Provider.  Joshua Smith and I tackle this conversation when it comes to the costs associated with protecting that data and what it means to lead and follow in an ever evolving threat landscape.

What are Integrator Groups?

What are Integrator Groups?

As Solution providers (MSPs), a security first mindset can at times be difficult.  We know that our responsibilities to our staff and clients is about reducing the probability of being an easy target.  Cybersecurity isn't easy but it get's easier when you do it with others.  Chad Hols...

Recap of Channelcon22

Recap of Channelcon22

As we recover from a week in Chicago with our colleagues and friends I thought we should take a minute to recount some of the highlights. I sit down with Lenny Giller of Reliable Technology Services to get his perspective on MSP-Ignite Pre-day and some of the tracks we had an opportunity to attend. ...

Lessons from a CISO

Lessons from a CISO

The role of an MSP as trusted advisor or vCIO has evolved over the years and more recently it seems the added responsibility of security officer is added to the mix.  In my conversation with Craig Buesing who is the CISO to the Secretary of State of Colorado, we spent a lot of time talking abou...

Good, Better, Best

Good, Better, Best

One week until ChannelCon and MSP-Ignite Pre-day.  This week we have Dave Sobel, "Host of the Business of Tech Podcast." While Dave and I have been known to go down a few rabbit holes in past conversations, we manage in this episode to focus on three main points: Cyber Tax is a real thing and s...

Red Team + Blue Team = Purple Team

Red Team + Blue Team = Purple Team

Table top exercises, Security Awareness Training, and vulnerability management are all ways that we look to improve our security posture. Join me as I talk to Kevin Ireland of Hack The Box regarding teaching your team to participate in red team exercises.

Economy of Scale

Economy of Scale

ChannelCon is right around the corner and we are still discussing the culture shift to a cybersecurity first mindset.  I sit down with Joshua Smith of Varonis to talk about how culture shift and doing the right thing are same problem different scale. Whether you are a vendor or an MSP it still ...

Cybersecurity and Cannabis

Cybersecurity and Cannabis

With the theme of, "Doing the right thing," on our show I had the unique opportunity to sit down with Harry Brelsford to talk about the need for cybersecurity in the Cannabis dispensary vertical.  While this is a very specific niche and is definitely not as mature as many other verticals it was...