MSP 1337 | Cybersecurity Education & Security Guidance

By Chris Johnson - Cybersecurity Maturity Enabler

Listen to a podcast, please open Podcast Republic app. Available on Google Play Store and Apple App Store.


Category: Tech News

Open in Apple Podcasts


Open RSS feed


Open Website


Rate for this podcast

Subscribers: 3
Reviews: 0
Episodes: 286

Description

Educational sound bytes to help MSPs and their clients navigate Cybersecurity. Cybersecurity maturity is a journey; don't go it alone. Interviews and guidance from fellow MSPs and other Industry experts. Our goal is Secure Outcomes, and together we can make a difference.

Episode Date
Cybersecurity Maturity Beyond Tools
Apr 14, 2026
E&O, Cyber Insurance, and the Illusion of Risk Transfer for MSPs
Apr 07, 2026
Why Communication, Not Cybersecurity, Is the Real ITSP Problem
Mar 31, 2026
Installing or Configuring Is Just Not Enough
Mar 24, 2026
GTIA On Location Interview: A Phishing Expedition and Cybersecurity Maturity
Mar 18, 2026
Suspended, Hacked, or Outbid - Cybersecurity and Marketing, Can They Co-exist?
Mar 10, 2026
Operational Maturity Meets Cybersecurity
Mar 03, 2026
AI Governance and the MSP Maturity Model
Feb 24, 2026
Governing AI in a High Risk World
Feb 17, 2026
Do Phishing Simulations Really Work?
Feb 10, 2026
Physical Safeguards and Process and Procedures
Feb 03, 2026
Data Privacy and Security Trends in 2026
Jan 27, 2026
Exploring AI Usage, Misconceptions, and of course Security Concerns
Jan 20, 2026
Human Behavior and Shifting from Security Awareness to Appreciation
Jan 13, 2026
ITSP Reslience in 2026
Jan 07, 2026
December Series 2025 Wrapup
Dec 30, 2025
Data, Security, and The Human Edge
Dec 23, 2025
Look Ahead Part 3
Dec 16, 2025
Risk Management In 2026?
Dec 09, 2025
Cybersecurity Spend Decisions For 2026
Dec 02, 2025
Just Sell Me The Minimum
Nov 25, 2025
Cybersecurity and Simplicity
Nov 18, 2025
DNS Records: Secure and Correct?
Nov 11, 2025
Biggest Challenge Facing MSPs
Nov 04, 2025
Value of Frameworks
Oct 28, 2025
Monologue with CJ
Oct 21, 2025
IR Games: With Clients and With Staff
Oct 14, 2025
Cybersecurity Month Events
Oct 07, 2025
Pax8 Beyond EMEA and AI...
Sep 30, 2025
Gap Assessments and Remediation
Sep 23, 2025
Insurance Perspectives on Cybersecurity Policies
Sep 16, 2025
Identity
Sep 09, 2025
Incident Response Planning and Table Top Exercises
Sep 02, 2025
Tools, Tools, Tools
Aug 27, 2025
Getting Clients To Take Cybersecurity Seriously
Aug 19, 2025
Compliance and GTIA Cybersecurity Trustmark
Aug 12, 2025
A Client's Journey Through Ransomware
Aug 05, 2025
Reflect on TD Community PreDay
Jul 29, 2025
Channelcon25: Preview of Preday and Cyber Track
Jul 22, 2025
BEC, AI, and Recent Events
Jul 15, 2025
Cyber Insurance vs Risk Management
Jul 08, 2025
GTIA Cybersecurity Trustmark - Assured
Jul 01, 2025
Challenges and Opportunities
Jun 24, 2025
Insights on Data Intelligence with Pedro Castillo
Jun 18, 2025
Practical Insights From Recovering MSPs
Jun 10, 2025
GRC Platforms and Other Tools
Jun 02, 2025
Positive and Productive Use of AI
May 27, 2025
Cybersecurity and Community
May 20, 2025
Industry Events & Community
May 13, 2025
Vendor Olympics
May 06, 2025
Do You Have The Right Cybersecurity Stack?
Apr 28, 2025
Gaming Not Shaming in Cybersecurity Education
Apr 22, 2025
Being An MSP In 2025
Apr 15, 2025
GRC Platforms: More Than Compliance
Apr 08, 2025
Balance of MSP and MSSP Together
Apr 01, 2025
Fireside Chat: Taxonomy, Prompts, and Paralysis
Mar 25, 2025
GTIA Communities & Councils Forums
Mar 18, 2025
Company Core
Mar 11, 2025
Human Risk
Mar 04, 2025
Fireside Chat - Taxonomy and Prompts
Feb 25, 2025
My Data Matters
Feb 18, 2025
When Technology Isn't Prioritized First
Feb 11, 2025
Traveling Secure
Feb 04, 2025
Speaking The Same Language
Jan 28, 2025
Fireside Chat - 2025, Natural Selection
Jan 21, 2025
Compliance Challenges 2025
Jan 14, 2025
The What's New At NetAlly
Jan 07, 2025
Cybersecurity Predictions for 2025
Dec 31, 2024
Looking Back on 2024
Dec 24, 2024
Fireside Chat - 2025 Predictions
Dec 17, 2024
Senteon Has A Big Announcement
Dec 10, 2024
Impact of AI on MSPs
Dec 03, 2024
FFIEC is Retiring CAT Assessment, What Does That Mean?
Nov 26, 2024
Fireside Chat - Physical & Environmental Security
Nov 19, 2024
Controls and Safeguard Paralysis
Nov 12, 2024
Data Recovery Challenges
Nov 05, 2024
Risk Management - People, Process, Technology
Oct 29, 2024
When To Pivot...
Oct 22, 2024
Fireside Chat - Governance & Leadership
Oct 15, 2024
Cybersecurity Month - Communities
Oct 08, 2024
Risk Down Under
Oct 01, 2024
Unintended Consequences of Good Technology
Sep 24, 2024
Fireside Chat - Control 18 Penetration Tests
Sep 17, 2024
Don't Forget About VoIP
Sep 10, 2024
Zero Trust, Password Managers, BCDR, Firewalls, and Asset Management
Sep 03, 2024
Technology Challenges: Then and Now
Aug 27, 2024
Fireside Chat: Control 17 Incident Response Plan
Aug 20, 2024
Runbooks & Playbooks
Aug 13, 2024
ChannelCon24 Highlights of Cybersecurity Track
Aug 06, 2024
Cyber Soldiers
Jul 30, 2024
Using Defined Standards to Manage Risk...
Jul 23, 2024
Fireside Chat Control 16
Jul 16, 2024
Cybersecurity Training Works
Jul 09, 2024
Email Automation Overload
Jul 02, 2024
Achieving the CompTIA Cybersecurity Trustmark
Jun 25, 2024
Fireside Chat Control 15
Jun 18, 2024
ITN Secure Session Recap
Jun 11, 2024
When do MSP Clients Call?
Jun 05, 2024
New Take on Cybersecurity
May 28, 2024
Fireside Chat: Control 14
May 21, 2024
MSP Perspective on Recruiters
May 14, 2024
Cybersecurity Perspective on Social Media
May 07, 2024
MSPs Need Recruiters Too
Apr 30, 2024
Where MSP and an MSSP Intersect
Apr 23, 2024
Fireside Chat Control 13 Network Monitoring & Defense
Apr 16, 2024
Collecting Evidence
Apr 09, 2024
Getting Started With Tabletop Exercises
Apr 03, 2024
Security Awareness and Skills Training
Mar 26, 2024
Fireside Chat CIS Control 12
Mar 19, 2024
Parting ways with a client or prospect
Mar 12, 2024
Vendor and Product Evaluation
Mar 05, 2024
Is Cyber Insurance Enough?
Feb 27, 2024
Fireside Chat: Control 11 Data Recovery
Feb 20, 2024
Data Protection
Feb 13, 2024
Risk of Risky AI...
Feb 06, 2024
ToDo or not ToDo
Jan 30, 2024
Selling Cybersecurity Services
Jan 23, 2024
Fireside Chat - Control 9 Email & Web Browser Protections
Jan 16, 2024
Hiring Security Resources
Jan 09, 2024
Data Backup and Air gapped?
Jan 02, 2024
2024 Outlook in Cyber
Dec 26, 2023
Fireside Chat - CIS Control 8 - Audit Logs
Dec 19, 2023
2023 Look back in Cyber
Dec 12, 2023
My Cell Phone's Been Cloned
Dec 05, 2023
Ideals vs Reality
Nov 28, 2023
Fireside Chat - Control 07 Continuous Vulnerability Mgmt.
Nov 21, 2023
ITN Connect Recap 2023
Nov 14, 2023
Business Email Compromise
Nov 07, 2023
Insider Threats
Oct 31, 2023
Industry Conference Overload
Oct 24, 2023
Fireside Chat - CIS Control 10 - Malware Defense
Oct 17, 2023
Getting an Assessment...
Oct 10, 2023
Should I Sell Compliance Services?
Oct 03, 2023
CompTIA Cybersecurity Trustmark Progress
Sep 26, 2023
Fireside Chat - CIS Control 6 Access Management
Sep 19, 2023
Do I know my assets (IoT, IIoT, and OT)?
Sep 12, 2023
Committing Fraud Through CMMC.
Sep 05, 2023
Preparing For A Storm.
Aug 29, 2023
Was I a victim?
Aug 22, 2023
Fireside Chat - CIS Control 5 Hurdles
Aug 15, 2023
Cybersecurity for Big and Small MSPs
Aug 08, 2023
MSPs Need Compliance
Aug 01, 2023
Showing Evidence
Jul 25, 2023
Fireside Chat - CIS Control 4 Hurdles
Jul 19, 2023
Policy Creation Involves Everyone!
Jul 04, 2023
Do You Know Who Your Users Are?
Jun 27, 2023
Fireside Chat - CIS Control 3 Hurdles
Jun 20, 2023
Counterintelligence and TikTok
Jun 13, 2023
Check Vendor's Security Posture
Jun 06, 2023
Cyber Insurance Industry Maturation
May 30, 2023
Do I need a PenTest?
May 23, 2023
Fireside Chat - CIS Control 2 Hurdles
May 16, 2023
One Man Shop to CISSP...
May 09, 2023
FTC Safeguard Rule and Opportunity
May 02, 2023
A Doozie of a Story
Apr 25, 2023
Fireside Chat - CIS Control 1 Hurdles
Apr 18, 2023
Suddenly Gone
Apr 11, 2023
Security Without Cybersecurity?
Apr 04, 2023
State of Cybersecurity
Mar 28, 2023
Protecting Friends and Family
Mar 21, 2023
Explaining Cybersecurity to a 5th Grader
Mar 14, 2023
Cybersecurity Maturity Without Technology?
Mar 07, 2023
MSPs, Controls & Safeguard Capabilities
Feb 28, 2023
Social Media and Threat Landscape
Feb 21, 2023
Frameworks and Privacy Updates
Feb 14, 2023
Emergency Response Team (eRT) is What?
Feb 07, 2023
Setting Expectations
Jan 31, 2023
I'm Too Small For a Firewall
Jan 24, 2023
Pig Butchering & Other Scams
Jan 17, 2023
Password Manager or nothing?
Jan 10, 2023
2023 What can we expect?
Jan 03, 2023
Looking Back on 2022
Dec 27, 2022
Policies and Controls, Compliance vs Security?
Dec 20, 2022
Preparing for an Audit.
Dec 13, 2022
The Aftermath
Dec 06, 2022
Building Confidence
Nov 29, 2022
What About My Backups?
Nov 22, 2022
Risky People
Nov 15, 2022
Advisory Services
Nov 08, 2022
Risk Management Plan
Nov 01, 2022
Monitoring Cloud Services
Oct 25, 2022
Beyond Zero Trust My Browser
Oct 18, 2022
Four Truths of Cybersecurity
Oct 11, 2022
Zero Trust Your Browser
Oct 04, 2022
Onboarding and Offboarding
Sep 27, 2022
Going Beyond RMM and MDM
Sep 20, 2022
Four Years Post Breach
Sep 13, 2022
MDM, Not Just for Mobile Devices
Sep 07, 2022
Vulnerabilities and Exploits
Aug 30, 2022
Data Protection, a Moral Obligation
Aug 23, 2022
What are Integrator Groups?
Aug 16, 2022
Recap of Channelcon22
Aug 09, 2022
Lessons from a CISO
Aug 02, 2022
Good, Better, Best
Jul 26, 2022
Red Team + Blue Team = Purple Team
Jul 19, 2022
Economy of Scale
Jul 12, 2022
Cybersecurity and Cannabis
Jul 05, 2022
Is 2FA The Right Thing?
Jun 28, 2022
Almost A Victim...
Jun 21, 2022
Cybersecurity Baseline
Jun 14, 2022
Do The Right Thing (see something, say something.)
Jun 08, 2022
Is Affordable Cybersecurity a Myth?
May 31, 2022
Cyber Insurance World Is Changing
May 24, 2022
I'm Responsible For What?
May 17, 2022
Configure and Implement Securely
May 11, 2022
Strategic Planning
May 03, 2022
Vendor Managment Challenges
Apr 26, 2022
Knee Jerk Reaction or Calculated Decision
Apr 19, 2022
Cybersecurity: I'm Stuck
Apr 12, 2022
Cybersecurity - How To Start.
Apr 05, 2022
Even Small Municipalities need MSPs
Mar 29, 2022
Why Are ISACs and ISAOs Important To Me?
Mar 22, 2022
Cybersecurity Maturity Starts With Leadership
Mar 15, 2022
Going Beyond Cyber Insurance
Mar 08, 2022
Encryption: At Rest & In Transit
Mar 01, 2022
Formerly vCIO?
Feb 22, 2022
No Magic Bullet
Feb 16, 2022
HIPAA Compliance And M&A
Feb 09, 2022
Drinking From A Fire Hose?
Feb 01, 2022
Tools with Intent
Jan 27, 2022
Back To Basics
Jan 18, 2022
New MSP Perspectives on Cybersecurity
Jan 11, 2022
Governance for SMB
Jan 05, 2022
Three Pillars of Cybersecurity
Dec 28, 2021
What To Do About Log4j
Dec 21, 2021
Security Layers
Dec 15, 2021
The Little Things
Dec 07, 2021
Why Peer Groups Matter
Nov 30, 2021
You Can Only Pick Three
Nov 23, 2021
Overcoming objections
Nov 16, 2021
MSP Relevant Framework Adoption
Nov 10, 2021
Getting Started
Nov 02, 2021
Ounce of Prevention = Pound of Cure
Oct 26, 2021
Pre/Post Boom
Oct 19, 2021
Cybersecurity for SMB MSP
Oct 12, 2021
Cyber Insurance. A no brainer!
Oct 05, 2021
Hoodies vs Suits
Sep 28, 2021
Power is out... now what?
Sep 21, 2021
Business Continuity (BCDR)
Sep 18, 2021
Adding an "s" to MSP (Compliance and Me)
Sep 07, 2021
Finger Pointing
Aug 31, 2021
Recent Breaches in the Media
Aug 24, 2021
O365 Cybersecurity Tips and Tricks
Aug 18, 2021
HIPAA Compliance?
Aug 11, 2021
Cyber Insurance. Am I Covered?
Aug 03, 2021
Prospect Scorecard
Jul 27, 2021
Risky Clients
Jul 21, 2021
Zero Trust
Jul 13, 2021
Imposter Syndrome
Jul 06, 2021
Communication Etiquette and Protocols
Jun 29, 2021
Gas Prices and Meat Shortages
Jun 22, 2021
Hope For Ransomware
Jun 15, 2021
Do you Know Your Client (KYC)
Jun 08, 2021
Performing Tabletop Exercises
Jun 01, 2021
Student Perspective on Cybersecurity
May 26, 2021
Privacy, Consumerism and SASE
May 18, 2021
Security Awareness Training
May 11, 2021
Evaluating Vendors (Part 2 of 2)
May 04, 2021
Evaluating Vendors (Part 1 of 2)
Apr 27, 2021
An Emerging Pattern.
Apr 20, 2021
Overcoming Policies
Apr 13, 2021
Protected and Secured
Apr 06, 2021
Vulnerability Assessment or Penetration Test?
Mar 30, 2021
Cybersecurity Comes Down To People
Mar 23, 2021
Cybersecurity Solutions Still Alienate The SMB
Mar 16, 2021
Transitioning to MSSP or MSsP
Mar 09, 2021
Defining The Why...
Mar 02, 2021
The Great America Recovery
Feb 23, 2021
NIST Domains: MSPs Strengths and Weaknesses Across The Five Domains
Feb 16, 2021
Evolution of an MSP: From Infrastructure to End Users
Feb 09, 2021
Navigating a Terrain Unlike Any Other
Feb 03, 2021
Don't Drink From The Same Cup
Jan 26, 2021
Getting Started with CIS Top 20
Jan 20, 2021
Cybersecurity in K12
Jan 12, 2021
Co-Managed IT and Educating the Unwilling
Jan 05, 2021
MSP, MSSP or MSsP...
Dec 22, 2020
Vendor and MSP Alignment
Dec 15, 2020
Ransomware and Insurance
Dec 08, 2020
Shiny Objects Part 2
Dec 02, 2020
Shiny Object Syndrome
Nov 24, 2020
Change Control
Nov 18, 2020
Asset Management
Nov 10, 2020
Secure Endpoints
Nov 04, 2020
Gone Phishing
Oct 27, 2020
Recovering From a Ransomware Breach
Oct 20, 2020
MSP 1337 | Cybersecurity Education & Security Guidance (Trailer)
Oct 19, 2020