#
Title
1

The New Reality for MSP Security Operations Center Services

2

Guardrails, Drift, and Evidence: Cybersecurity Maturity is Continuous Improvements

3

Selling Cybersecurity to Skeptical Clients and Prospects

4

Compliance is the floor, not the ceiling

5

Cybersecurity Maturity Beyond Tools

6

E&O, Cyber Insurance, and the Illusion of Risk Transfer for MSPs

7

Why Communication, Not Cybersecurity, Is the Real ITSP Problem

8

Installing or Configuring Is Just Not Enough

9

GTIA On Location Interview: A Phishing Expedition and Cybersecurity Maturity

10

Suspended, Hacked, or Outbid - Cybersecurity and Marketing, Can They Co-exist?

11

Operational Maturity Meets Cybersecurity

12

AI Governance and the MSP Maturity Model

13

Governing AI in a High Risk World

14

Do Phishing Simulations Really Work?

15

Physical Safeguards and Process and Procedures

16

Data Privacy and Security Trends in 2026

17

Exploring AI Usage, Misconceptions, and of course Security Concerns

18

Human Behavior and Shifting from Security Awareness to Appreciation

19

ITSP Reslience in 2026

20

December Series 2025 Wrapup

21

Data, Security, and The Human Edge

22

Look Ahead Part 3

23

Risk Management In 2026?

24

Cybersecurity Spend Decisions For 2026

25

Just Sell Me The Minimum

26

Cybersecurity and Simplicity

27

DNS Records: Secure and Correct?

28

Biggest Challenge Facing MSPs

29

Value of Frameworks

30

Monologue with CJ

31

IR Games: With Clients and With Staff

32

Cybersecurity Month Events

33

Pax8 Beyond EMEA and AI...

34

Gap Assessments and Remediation

35

Insurance Perspectives on Cybersecurity Policies

36

Identity

37

Incident Response Planning and Table Top Exercises

38

Tools, Tools, Tools

39

Getting Clients To Take Cybersecurity Seriously

40

Compliance and GTIA Cybersecurity Trustmark

41

A Client's Journey Through Ransomware

42

Reflect on TD Community PreDay

43

Channelcon25: Preview of Preday and Cyber Track

44

BEC, AI, and Recent Events

45

Cyber Insurance vs Risk Management

46

GTIA Cybersecurity Trustmark - Assured

47

Challenges and Opportunities

48

Insights on Data Intelligence with Pedro Castillo

49

Practical Insights From Recovering MSPs

50

GRC Platforms and Other Tools

51

Positive and Productive Use of AI

52

Cybersecurity and Community

53

Industry Events & Community

54

Vendor Olympics

55

Do You Have The Right Cybersecurity Stack?

56

Gaming Not Shaming in Cybersecurity Education

57

Being An MSP In 2025

58

GRC Platforms: More Than Compliance

59

Balance of MSP and MSSP Together

60

Fireside Chat: Taxonomy, Prompts, and Paralysis

61

GTIA Communities & Councils Forums

62

Company Core

63

Human Risk

64

Fireside Chat - Taxonomy and Prompts

65

My Data Matters

66

When Technology Isn't Prioritized First

67

Traveling Secure

68

Speaking The Same Language

69

Fireside Chat - 2025, Natural Selection

70

Compliance Challenges 2025

71

The What's New At NetAlly

72

Cybersecurity Predictions for 2025

73

Looking Back on 2024

74

Fireside Chat - 2025 Predictions

75

Senteon Has A Big Announcement

76

Impact of AI on MSPs

77

FFIEC is Retiring CAT Assessment, What Does That Mean?

78

Fireside Chat - Physical & Environmental Security

79

Controls and Safeguard Paralysis

80

Data Recovery Challenges

81

Risk Management - People, Process, Technology

82

When To Pivot...

83

Fireside Chat - Governance & Leadership

84

Cybersecurity Month - Communities

85

Risk Down Under

86

Unintended Consequences of Good Technology

87

Fireside Chat - Control 18 Penetration Tests

88

Don't Forget About VoIP

89

Zero Trust, Password Managers, BCDR, Firewalls, and Asset Management

90

Technology Challenges: Then and Now

91

Fireside Chat: Control 17 Incident Response Plan

92

Runbooks & Playbooks

93

ChannelCon24 Highlights of Cybersecurity Track

94

Cyber Soldiers

95

Using Defined Standards to Manage Risk...

96

Fireside Chat Control 16

97

Cybersecurity Training Works

98

Email Automation Overload

99

Achieving the CompTIA Cybersecurity Trustmark

100

Fireside Chat Control 15

101

ITN Secure Session Recap

102

When do MSP Clients Call?

103

New Take on Cybersecurity

104

Fireside Chat: Control 14

105

MSP Perspective on Recruiters

106

Cybersecurity Perspective on Social Media

107

MSPs Need Recruiters Too

108

Where MSP and an MSSP Intersect

109

Fireside Chat Control 13 Network Monitoring & Defense

110

Collecting Evidence

111

Getting Started With Tabletop Exercises

112

Security Awareness and Skills Training

113

Fireside Chat CIS Control 12

114

Parting ways with a client or prospect

115

Vendor and Product Evaluation

116

Is Cyber Insurance Enough?

117

Fireside Chat: Control 11 Data Recovery

118

Data Protection

119

Risk of Risky AI...

120

ToDo or not ToDo

121

Selling Cybersecurity Services

122

Fireside Chat - Control 9 Email & Web Browser Protections

123

Hiring Security Resources

124

Data Backup and Air gapped?

125

2024 Outlook in Cyber

126

Fireside Chat - CIS Control 8 - Audit Logs

127

2023 Look back in Cyber

128

My Cell Phone's Been Cloned

129

Ideals vs Reality

130

Fireside Chat - Control 07 Continuous Vulnerability Mgmt.

131

ITN Connect Recap 2023

132

Business Email Compromise

133

Insider Threats

134

Industry Conference Overload

135

Fireside Chat - CIS Control 10 - Malware Defense

136

Getting an Assessment...

137

Should I Sell Compliance Services?

138

CompTIA Cybersecurity Trustmark Progress

139

Fireside Chat - CIS Control 6 Access Management

140

Do I know my assets (IoT, IIoT, and OT)?

141

Committing Fraud Through CMMC.

142

Preparing For A Storm.

143

Was I a victim?

144

Fireside Chat - CIS Control 5 Hurdles

145

Cybersecurity for Big and Small MSPs

146

MSPs Need Compliance

147

Showing Evidence

148

Fireside Chat - CIS Control 4 Hurdles

149

Policy Creation Involves Everyone!

150

Do You Know Who Your Users Are?

151

Fireside Chat - CIS Control 3 Hurdles

152

Counterintelligence and TikTok

153

Check Vendor's Security Posture

154

Cyber Insurance Industry Maturation

155

Do I need a PenTest?

156

Fireside Chat - CIS Control 2 Hurdles

157

One Man Shop to CISSP...

158

FTC Safeguard Rule and Opportunity

159

A Doozie of a Story

160

Fireside Chat - CIS Control 1 Hurdles

161

Suddenly Gone

162

Security Without Cybersecurity?

163

State of Cybersecurity

164

Protecting Friends and Family

165

Explaining Cybersecurity to a 5th Grader

166

Cybersecurity Maturity Without Technology?

167

MSPs, Controls & Safeguard Capabilities

168

Social Media and Threat Landscape

169

Frameworks and Privacy Updates

170

Emergency Response Team (eRT) is What?

171

Setting Expectations

172

I'm Too Small For a Firewall

173

Pig Butchering & Other Scams

174

Password Manager or nothing?

175

2023 What can we expect?

176

Looking Back on 2022

177

Policies and Controls, Compliance vs Security?

178

Preparing for an Audit.

179

The Aftermath

180

Building Confidence

181

What About My Backups?

182

Risky People

183

Advisory Services

184

Risk Management Plan

185

Monitoring Cloud Services

186

Beyond Zero Trust My Browser

187

Four Truths of Cybersecurity

188

Zero Trust Your Browser

189

Onboarding and Offboarding

190

Going Beyond RMM and MDM

191

Four Years Post Breach

192

MDM, Not Just for Mobile Devices

193

Vulnerabilities and Exploits

194

Data Protection, a Moral Obligation

195

What are Integrator Groups?

196

Recap of Channelcon22

197

Lessons from a CISO

198

Good, Better, Best

199

Red Team + Blue Team = Purple Team

200

Economy of Scale

201

Cybersecurity and Cannabis

202

Is 2FA The Right Thing?

203

Almost A Victim...

204

Cybersecurity Baseline

205

Do The Right Thing (see something, say something.)

206

Is Affordable Cybersecurity a Myth?

207

Cyber Insurance World Is Changing

208

I'm Responsible For What?

209

Configure and Implement Securely

210

Strategic Planning

211

Vendor Managment Challenges

212

Knee Jerk Reaction or Calculated Decision

213

Cybersecurity: I'm Stuck

214

Cybersecurity - How To Start.

215

Even Small Municipalities need MSPs

216

Why Are ISACs and ISAOs Important To Me?

217

Cybersecurity Maturity Starts With Leadership

218

Going Beyond Cyber Insurance

219

Encryption: At Rest & In Transit

220

Formerly vCIO?

221

No Magic Bullet

222

HIPAA Compliance And M&A

223

Drinking From A Fire Hose?

224

Tools with Intent

225

Back To Basics

226

New MSP Perspectives on Cybersecurity

227

Governance for SMB

228

Three Pillars of Cybersecurity

229

What To Do About Log4j

230

Security Layers

231

The Little Things

232

Why Peer Groups Matter

233

You Can Only Pick Three

234

Overcoming objections

235

MSP Relevant Framework Adoption

236

Getting Started

237

Ounce of Prevention = Pound of Cure

238

Pre/Post Boom

239

Cybersecurity for SMB MSP

240

Cyber Insurance. A no brainer!

241

Hoodies vs Suits

242

Power is out... now what?

243

Business Continuity (BCDR)

244

Adding an "s" to MSP (Compliance and Me)

245

Finger Pointing

246

Recent Breaches in the Media

247

O365 Cybersecurity Tips and Tricks

248

HIPAA Compliance?

249

Cyber Insurance. Am I Covered?

250

Prospect Scorecard

251

Risky Clients

252

Zero Trust

253

Imposter Syndrome

254

Communication Etiquette and Protocols

255

Gas Prices and Meat Shortages

256

Hope For Ransomware

257

Do you Know Your Client (KYC)

258

Performing Tabletop Exercises

259

Student Perspective on Cybersecurity

260

Privacy, Consumerism and SASE

261

Security Awareness Training

262

Evaluating Vendors (Part 2 of 2)

263

Evaluating Vendors (Part 1 of 2)

264

An Emerging Pattern.

265

Overcoming Policies

266

Protected and Secured

267

Vulnerability Assessment or Penetration Test?

268

Cybersecurity Comes Down To People

269

Cybersecurity Solutions Still Alienate The SMB

270

Transitioning to MSSP or MSsP

271

Defining The Why...

272

The Great America Recovery

273

NIST Domains: MSPs Strengths and Weaknesses Across The Five Domains

274

Evolution of an MSP: From Infrastructure to End Users

275

Navigating a Terrain Unlike Any Other

276

Don't Drink From The Same Cup

277

Getting Started with CIS Top 20

278

Cybersecurity in K12

279

Co-Managed IT and Educating the Unwilling

280

MSP, MSSP or MSsP...

281

Vendor and MSP Alignment

282

Ransomware and Insurance

283

Shiny Objects Part 2

284

Shiny Object Syndrome

285

Change Control

286

Asset Management

287

Secure Endpoints

288

Gone Phishing

289

Recovering From a Ransomware Breach

290

MSP 1337 | Cybersecurity Education & Security Guidance (Trailer)