All Episodes
MSP 1337 | Cybersecurity Education & Security Guidance — 290 episodes
The New Reality for MSP Security Operations Center Services
Guardrails, Drift, and Evidence: Cybersecurity Maturity is Continuous Improvements
Selling Cybersecurity to Skeptical Clients and Prospects
Compliance is the floor, not the ceiling
Cybersecurity Maturity Beyond Tools
E&O, Cyber Insurance, and the Illusion of Risk Transfer for MSPs
Why Communication, Not Cybersecurity, Is the Real ITSP Problem
Installing or Configuring Is Just Not Enough
GTIA On Location Interview: A Phishing Expedition and Cybersecurity Maturity
Suspended, Hacked, or Outbid - Cybersecurity and Marketing, Can They Co-exist?
Operational Maturity Meets Cybersecurity
AI Governance and the MSP Maturity Model
Governing AI in a High Risk World
Do Phishing Simulations Really Work?
Physical Safeguards and Process and Procedures
Data Privacy and Security Trends in 2026
Exploring AI Usage, Misconceptions, and of course Security Concerns
Human Behavior and Shifting from Security Awareness to Appreciation
ITSP Reslience in 2026
December Series 2025 Wrapup
Data, Security, and The Human Edge
Look Ahead Part 3
Risk Management In 2026?
Cybersecurity Spend Decisions For 2026
Just Sell Me The Minimum
Cybersecurity and Simplicity
DNS Records: Secure and Correct?
Biggest Challenge Facing MSPs
Value of Frameworks
Monologue with CJ
IR Games: With Clients and With Staff
Cybersecurity Month Events
Pax8 Beyond EMEA and AI...
Gap Assessments and Remediation
Insurance Perspectives on Cybersecurity Policies
Identity
Incident Response Planning and Table Top Exercises
Tools, Tools, Tools
Getting Clients To Take Cybersecurity Seriously
Compliance and GTIA Cybersecurity Trustmark
A Client's Journey Through Ransomware
Reflect on TD Community PreDay
Channelcon25: Preview of Preday and Cyber Track
BEC, AI, and Recent Events
Cyber Insurance vs Risk Management
GTIA Cybersecurity Trustmark - Assured
Challenges and Opportunities
Insights on Data Intelligence with Pedro Castillo
Practical Insights From Recovering MSPs
GRC Platforms and Other Tools
Positive and Productive Use of AI
Cybersecurity and Community
Industry Events & Community
Vendor Olympics
Do You Have The Right Cybersecurity Stack?
Gaming Not Shaming in Cybersecurity Education
Being An MSP In 2025
GRC Platforms: More Than Compliance
Balance of MSP and MSSP Together
Fireside Chat: Taxonomy, Prompts, and Paralysis
GTIA Communities & Councils Forums
Company Core
Human Risk
Fireside Chat - Taxonomy and Prompts
My Data Matters
When Technology Isn't Prioritized First
Traveling Secure
Speaking The Same Language
Fireside Chat - 2025, Natural Selection
Compliance Challenges 2025
The What's New At NetAlly
Cybersecurity Predictions for 2025
Looking Back on 2024
Fireside Chat - 2025 Predictions
Senteon Has A Big Announcement
Impact of AI on MSPs
FFIEC is Retiring CAT Assessment, What Does That Mean?
Fireside Chat - Physical & Environmental Security
Controls and Safeguard Paralysis
Data Recovery Challenges
Risk Management - People, Process, Technology
When To Pivot...
Fireside Chat - Governance & Leadership
Cybersecurity Month - Communities
Risk Down Under
Unintended Consequences of Good Technology
Fireside Chat - Control 18 Penetration Tests
Don't Forget About VoIP
Zero Trust, Password Managers, BCDR, Firewalls, and Asset Management
Technology Challenges: Then and Now
Fireside Chat: Control 17 Incident Response Plan
Runbooks & Playbooks
ChannelCon24 Highlights of Cybersecurity Track
Cyber Soldiers
Using Defined Standards to Manage Risk...
Fireside Chat Control 16
Cybersecurity Training Works
Email Automation Overload
Achieving the CompTIA Cybersecurity Trustmark
Fireside Chat Control 15
ITN Secure Session Recap
When do MSP Clients Call?
New Take on Cybersecurity
Fireside Chat: Control 14
MSP Perspective on Recruiters
Cybersecurity Perspective on Social Media
MSPs Need Recruiters Too
Where MSP and an MSSP Intersect
Fireside Chat Control 13 Network Monitoring & Defense
Collecting Evidence
Getting Started With Tabletop Exercises
Security Awareness and Skills Training
Fireside Chat CIS Control 12
Parting ways with a client or prospect
Vendor and Product Evaluation
Is Cyber Insurance Enough?
Fireside Chat: Control 11 Data Recovery
Data Protection
Risk of Risky AI...
ToDo or not ToDo
Selling Cybersecurity Services
Fireside Chat - Control 9 Email & Web Browser Protections
Hiring Security Resources
Data Backup and Air gapped?
2024 Outlook in Cyber
Fireside Chat - CIS Control 8 - Audit Logs
2023 Look back in Cyber
My Cell Phone's Been Cloned
Ideals vs Reality
Fireside Chat - Control 07 Continuous Vulnerability Mgmt.
ITN Connect Recap 2023
Business Email Compromise
Insider Threats
Industry Conference Overload
Fireside Chat - CIS Control 10 - Malware Defense
Getting an Assessment...
Should I Sell Compliance Services?
CompTIA Cybersecurity Trustmark Progress
Fireside Chat - CIS Control 6 Access Management
Do I know my assets (IoT, IIoT, and OT)?
Committing Fraud Through CMMC.
Preparing For A Storm.
Was I a victim?
Fireside Chat - CIS Control 5 Hurdles
Cybersecurity for Big and Small MSPs
MSPs Need Compliance
Showing Evidence
Fireside Chat - CIS Control 4 Hurdles
Policy Creation Involves Everyone!
Do You Know Who Your Users Are?
Fireside Chat - CIS Control 3 Hurdles
Counterintelligence and TikTok
Check Vendor's Security Posture
Cyber Insurance Industry Maturation
Do I need a PenTest?
Fireside Chat - CIS Control 2 Hurdles
One Man Shop to CISSP...
FTC Safeguard Rule and Opportunity
A Doozie of a Story
Fireside Chat - CIS Control 1 Hurdles
Suddenly Gone
Security Without Cybersecurity?
State of Cybersecurity
Protecting Friends and Family
Explaining Cybersecurity to a 5th Grader
Cybersecurity Maturity Without Technology?
MSPs, Controls & Safeguard Capabilities
Social Media and Threat Landscape
Frameworks and Privacy Updates
Emergency Response Team (eRT) is What?
Setting Expectations
I'm Too Small For a Firewall
Pig Butchering & Other Scams
Password Manager or nothing?
2023 What can we expect?
Looking Back on 2022
Policies and Controls, Compliance vs Security?
Preparing for an Audit.
The Aftermath
Building Confidence
What About My Backups?
Risky People
Advisory Services
Risk Management Plan
Monitoring Cloud Services
Beyond Zero Trust My Browser
Four Truths of Cybersecurity
Zero Trust Your Browser
Onboarding and Offboarding
Going Beyond RMM and MDM
Four Years Post Breach
MDM, Not Just for Mobile Devices
Vulnerabilities and Exploits
Data Protection, a Moral Obligation
What are Integrator Groups?
Recap of Channelcon22
Lessons from a CISO
Good, Better, Best
Red Team + Blue Team = Purple Team
Economy of Scale
Cybersecurity and Cannabis
Is 2FA The Right Thing?
Almost A Victim...
Cybersecurity Baseline
Do The Right Thing (see something, say something.)
Is Affordable Cybersecurity a Myth?
Cyber Insurance World Is Changing
I'm Responsible For What?
Configure and Implement Securely
Strategic Planning
Vendor Managment Challenges
Knee Jerk Reaction or Calculated Decision
Cybersecurity: I'm Stuck
Cybersecurity - How To Start.
Even Small Municipalities need MSPs
Why Are ISACs and ISAOs Important To Me?
Cybersecurity Maturity Starts With Leadership
Going Beyond Cyber Insurance
Encryption: At Rest & In Transit
Formerly vCIO?
No Magic Bullet
HIPAA Compliance And M&A
Drinking From A Fire Hose?
Tools with Intent
Back To Basics
New MSP Perspectives on Cybersecurity
Governance for SMB
Three Pillars of Cybersecurity
What To Do About Log4j
Security Layers
The Little Things
Why Peer Groups Matter
You Can Only Pick Three
Overcoming objections
MSP Relevant Framework Adoption
Getting Started
Ounce of Prevention = Pound of Cure
Pre/Post Boom
Cybersecurity for SMB MSP
Cyber Insurance. A no brainer!
Hoodies vs Suits
Power is out... now what?
Business Continuity (BCDR)
Adding an "s" to MSP (Compliance and Me)
Finger Pointing
Recent Breaches in the Media
O365 Cybersecurity Tips and Tricks
HIPAA Compliance?
Cyber Insurance. Am I Covered?
Prospect Scorecard
Risky Clients
Zero Trust
Imposter Syndrome
Communication Etiquette and Protocols
Gas Prices and Meat Shortages
Hope For Ransomware
Do you Know Your Client (KYC)
Performing Tabletop Exercises
Student Perspective on Cybersecurity
Privacy, Consumerism and SASE
Security Awareness Training
Evaluating Vendors (Part 2 of 2)
Evaluating Vendors (Part 1 of 2)
An Emerging Pattern.
Overcoming Policies
Protected and Secured
Vulnerability Assessment or Penetration Test?
Cybersecurity Comes Down To People
Cybersecurity Solutions Still Alienate The SMB
Transitioning to MSSP or MSsP
Defining The Why...
The Great America Recovery
NIST Domains: MSPs Strengths and Weaknesses Across The Five Domains
Evolution of an MSP: From Infrastructure to End Users
Navigating a Terrain Unlike Any Other
Don't Drink From The Same Cup
Getting Started with CIS Top 20
Cybersecurity in K12
Co-Managed IT and Educating the Unwilling
MSP, MSSP or MSsP...
Vendor and MSP Alignment
Ransomware and Insurance
Shiny Objects Part 2
Shiny Object Syndrome
Change Control
Asset Management
Secure Endpoints
Gone Phishing
Recovering From a Ransomware Breach
MSP 1337 | Cybersecurity Education & Security Guidance (Trailer)