<?xml version="1.0" encoding="UTF-8"?>
<?xml-stylesheet type="text/xsl" href="https://morrismp.com/wp-content/plugins/seriously-simple-podcasting/templates/feed-stylesheet.xsl"?><rss version="2.0"
	 xmlns:content="http://purl.org/rss/1.0/modules/content/"
	 xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	 xmlns:dc="http://purl.org/dc/elements/1.1/"
	 xmlns:atom="http://www.w3.org/2005/Atom"
	 xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	 xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	 xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd"
	 xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0"
	 xmlns:podcast="https://podcastindex.org/namespace/1.0"
	>
		<channel>
		<title>IoTSSA</title>
		<atom:link href="https://morrismp.com/feed/podcast/iotssa/" rel="self" type="application/rss+xml"/>
		<link>https://morrismp.com/series/iotssa/</link>
		<description></description>
		<lastBuildDate>Mon, 28 Nov 2022 22:39:00 +0000</lastBuildDate>
		<language>en-US</language>
		<copyright>© 2021 Morris Management Partners</copyright>
		<itunes:subtitle></itunes:subtitle>
		<itunes:author>No Blog Title Set</itunes:author>
		<itunes:type>episodic</itunes:type>
		<itunes:summary></itunes:summary>
		<itunes:owner>
			<itunes:name>No Blog Title Set</itunes:name>
			<itunes:email>info@morrismp.com</itunes:email>
		</itunes:owner>
		<itunes:explicit>false</itunes:explicit>
		<podcast:guid>ed4df941-8eb1-5144-9bd7-20ac39e23186</podcast:guid>
		
		<!-- podcast_generator="SSP by Castos/2.25.3" Seriously Simple Podcasting plugin for WordPress (https://wordpress.org/plugins/seriously-simple-podcasting/) -->
		<generator>https://wordpress.org/?v=6.4.8</generator>

<item>
	<title>Cybersecurity Talent</title>
	<link>https://morrismp.com/podcast/cybersecurity-talent/</link>
	<pubDate>Thu, 20 Jan 2022 02:52:12 +0000</pubDate>
	<dc:creator><![CDATA[No Blog Title Set]]></dc:creator>
	<guid isPermaLink="false">http://morrismp.com/podcast/cybersecurity-talent/</guid>
	<description><![CDATA[<p><a href="https://www.linkedin.com/in/ryanmorris303/">Ryan</a> talks with <a href= "https://www.linkedin.com/in/guillaume-boisvert-39294233/">Guillaume Boisvert</a>, Director of Product Innovation at <a href= "https://www.iotssa.com/sherweb/">Sherweb</a> about tackling the HR Challenge for IT Service Providers. Finding cybersecurity talent is at the top of the list for MSPs trying to scale their business. Guillaume tells us that adding headcount is not necessarily the answer…Objectives can be accomplished by balancing out job functions, training from within or adding new tools to make you more efficient.</p> <p>To learn more about Office Protect by Sherweb and to connect with Guillaume you can find him on linkedin and their website at <a href="https://www.sherweb.com/">https://www.sherweb.com/</a></p>]]></description>
	<itunes:subtitle><![CDATA[Ryan talks with Guillaume Boisvert, Director of Product Innovation at Sherweb about tackling the HR Challenge for IT Service Providers. Finding cybersecurity talent is at the top of the list for MSPs trying to scale their business. Guillaume tells us tha]]></itunes:subtitle>
	<content:encoded><![CDATA[<p><a href="https://www.linkedin.com/in/ryanmorris303/">Ryan</a> talks with <a href= "https://www.linkedin.com/in/guillaume-boisvert-39294233/">Guillaume Boisvert</a>, Director of Product Innovation at <a href= "https://www.iotssa.com/sherweb/">Sherweb</a> about tackling the HR Challenge for IT Service Providers. Finding cybersecurity talent is at the top of the list for MSPs trying to scale their business. Guillaume tells us that adding headcount is not necessarily the answer…Objectives can be accomplished by balancing out job functions, training from within or adding new tools to make you more efficient.</p> <p>To learn more about Office Protect by Sherweb and to connect with Guillaume you can find him on linkedin and their website at <a href="https://www.sherweb.com/">https://www.sherweb.com/</a></p>]]></content:encoded>
	<enclosure url="https://morrismp.com/podcast-download/3412/cybersecurity-talent.m4a?dest-id=592132" length="107" type="audio/mpeg"></enclosure>
	<itunes:summary><![CDATA[Ryan talks with Guillaume Boisvert, Director of Product Innovation at Sherweb about tackling the HR Challenge for IT Service Providers. Finding cybersecurity talent is at the top of the list for MSPs trying to scale their business. Guillaume tells us that adding headcount is not necessarily the answer…Objectives can be accomplished by balancing out job functions, training from within or adding new tools to make you more efficient. To learn more about Office Protect by Sherweb and to connect with Guillaume you can find him on linkedin and their website at https://www.sherweb.com/]]></itunes:summary>
	<itunes:explicit>false</itunes:explicit>
	<itunes:block>no</itunes:block>
	<itunes:duration>0:00</itunes:duration>
	<itunes:author><![CDATA[No Blog Title Set]]></itunes:author>	<googleplay:description><![CDATA[Ryan talks with Guillaume Boisvert, Director of Product Innovation at Sherweb about tackling the HR Challenge for IT Service Providers. Finding cybersecurity talent is at the top of the list for MSPs trying to scale their business. Guillaume tells us that adding headcount is not necessarily the answer…Objectives can be accomplished by balancing out job functions, training from within or adding new tools to make you more efficient. To learn more about Office Protect by Sherweb and to connect with Guillaume you can find him on linkedin and their website at https://www.sherweb.com/]]></googleplay:description>
	<googleplay:explicit>No</googleplay:explicit>
	<googleplay:block>no</googleplay:block>
</item>

<item>
	<title>The Cybersecurity Conversation</title>
	<link>https://morrismp.com/podcast/the-cybersecurity-conversation/</link>
	<pubDate>Thu, 13 Jan 2022 00:27:15 +0000</pubDate>
	<dc:creator><![CDATA[No Blog Title Set]]></dc:creator>
	<guid isPermaLink="false">http://morrismp.com/podcast/the-cybersecurity-conversation/</guid>
	<description><![CDATA[<p>Cybersecurity in 2022 looks to be an even hotter button than years past. Cybercriminals are becoming more persistent and devious than ever…This needs to be top of mind with business this year and moving forward.</p> <p><a href="https://www.iotssa.com/ryan-morris/">Ryan</a> catches up with <a href="https://www.linkedin.com/in/ameliaparo/">Amelia Paro</a>, Business Development Manager with <a href= "https://www.idagent.com/partners-program/">ID Agent</a> to discuss the Sales Conversation and breaking through the SMB. ‘Tell a story to sell without selling’, Amelia tells us. Move the needle by invoking an emotional response from your prospects.</p>]]></description>
	<itunes:subtitle><![CDATA[Cybersecurity in 2022 looks to be an even hotter button than years past. Cybercriminals are becoming more persistent and devious than ever…This needs to be top of mind with business this year and moving forward. Ryan catches up with Amelia Paro, Business]]></itunes:subtitle>
	<content:encoded><![CDATA[<p>Cybersecurity in 2022 looks to be an even hotter button than years past. Cybercriminals are becoming more persistent and devious than ever…This needs to be top of mind with business this year and moving forward.</p> <p><a href="https://www.iotssa.com/ryan-morris/">Ryan</a> catches up with <a href="https://www.linkedin.com/in/ameliaparo/">Amelia Paro</a>, Business Development Manager with <a href= "https://www.idagent.com/partners-program/">ID Agent</a> to discuss the Sales Conversation and breaking through the SMB. ‘Tell a story to sell without selling’, Amelia tells us. Move the needle by invoking an emotional response from your prospects.</p>]]></content:encoded>
	<enclosure url="https://morrismp.com/podcast-download/3413/the-cybersecurity-conversation.m4a?dest-id=592132" length="1" type="audio/mpeg"></enclosure>
	<itunes:summary><![CDATA[Cybersecurity in 2022 looks to be an even hotter button than years past. Cybercriminals are becoming more persistent and devious than ever…This needs to be top of mind with business this year and moving forward. Ryan catches up with Amelia Paro, Business Development Manager with ID Agent to discuss the Sales Conversation and breaking through the SMB. ‘Tell a story to sell without selling’, Amelia tells us. Move the needle by invoking an emotional response from your prospects.]]></itunes:summary>
	<itunes:explicit>false</itunes:explicit>
	<itunes:block>no</itunes:block>
	<itunes:duration>0:00</itunes:duration>
	<itunes:author><![CDATA[No Blog Title Set]]></itunes:author>	<googleplay:description><![CDATA[Cybersecurity in 2022 looks to be an even hotter button than years past. Cybercriminals are becoming more persistent and devious than ever…This needs to be top of mind with business this year and moving forward. Ryan catches up with Amelia Paro, Business Development Manager with ID Agent to discuss the Sales Conversation and breaking through the SMB. ‘Tell a story to sell without selling’, Amelia tells us. Move the needle by invoking an emotional response from your prospects.]]></googleplay:description>
	<googleplay:explicit>No</googleplay:explicit>
	<googleplay:block>no</googleplay:block>
</item>

<item>
	<title>2022 Cybersecurity Responsibilities</title>
	<link>https://morrismp.com/podcast/2022-cybersecurity-responsibilities/</link>
	<pubDate>Thu, 30 Dec 2021 20:33:29 +0000</pubDate>
	<dc:creator><![CDATA[No Blog Title Set]]></dc:creator>
	<guid isPermaLink="false">http://morrismp.com/podcast/2022-cybersecurity-responsibilities/</guid>
	<description><![CDATA[<p><a href="https://www.linkedin.com/in/bradleygross/">Brad Gross</a>, Technology Legal Expert, looks into the crystal ball with <a href="https://www.iotssa.com/ryan-morris/">Ryan</a> to discuss what lies ahead for IT Service Providers in 2022 and beyond. High points that are going to affect providers and how these can affect services and your business moving forward.</p> <ul> <li>Microsoft NCE Pricing</li> <li>Implied Fiduciary Duties</li> <li>Co-Managed Services</li> <li>Quoting Software</li> <li>Regulations (From Cyber Insurance Companies)</li> </ul> <p>Always very valuable information from Brad and a great perspective from customers perspective and what MSPs need to do in order to effectively manage expectations.</p> <p>You can contact Brad at <a href= "mailto:info@bradleygross.com">info@bradleygross.com</a> or check out his Podcast, sorry, Bradcast…at technologybradcast.com</p> <p>Please Note: There are a few mentions in this episode of our upcoming Cybersecurity Expo in Phoenix.</p> <p>As we’re sure you’re already aware, the coronavirus (COVID-19) pandemic has meant that it’s now vital to limit social contact and avoid gathering. For that reason, out of an abundance of caution, we’ve made the difficult decision to postpone our Live In Person Cybersecurity Expo in Phoenix to September 14 & 15, 2022. While we know this is disappointing, we hope you can understand the steps we’re taking to help keep our staff and attendees safe.</p> <p>What happens next?</p> <p>All registered attendees will be contacted by Robin Miller in the coming week so that she can facilitate moving your registration to the new September dates.</p> <p>For those who have not yet registered, great news…we will be announcing in the coming week our next live in person event at the end of March this year. We are finalizing locations and dates as we speak…stay tuned!</p>]]></description>
	<itunes:subtitle><![CDATA[Brad Gross, Technology Legal Expert, looks into the crystal ball with Ryan to discuss what lies ahead for IT Service Providers in 2022 and beyond. High points that are going to affect providers and how these can affect services and your business moving f]]></itunes:subtitle>
	<content:encoded><![CDATA[<p><a href="https://www.linkedin.com/in/bradleygross/">Brad Gross</a>, Technology Legal Expert, looks into the crystal ball with <a href="https://www.iotssa.com/ryan-morris/">Ryan</a> to discuss what lies ahead for IT Service Providers in 2022 and beyond. High points that are going to affect providers and how these can affect services and your business moving forward.</p> <ul> <li>Microsoft NCE Pricing</li> <li>Implied Fiduciary Duties</li> <li>Co-Managed Services</li> <li>Quoting Software</li> <li>Regulations (From Cyber Insurance Companies)</li> </ul> <p>Always very valuable information from Brad and a great perspective from customers perspective and what MSPs need to do in order to effectively manage expectations.</p> <p>You can contact Brad at <a href= "mailto:info@bradleygross.com">info@bradleygross.com</a> or check out his Podcast, sorry, Bradcast…at technologybradcast.com</p> <p>Please Note: There are a few mentions in this episode of our upcoming Cybersecurity Expo in Phoenix.</p> <p>As we’re sure you’re already aware, the coronavirus (COVID-19) pandemic has meant that it’s now vital to limit social contact and avoid gathering. For that reason, out of an abundance of caution, we’ve made the difficult decision to postpone our Live In Person Cybersecurity Expo in Phoenix to September 14 & 15, 2022. While we know this is disappointing, we hope you can understand the steps we’re taking to help keep our staff and attendees safe.</p> <p>What happens next?</p> <p>All registered attendees will be contacted by Robin Miller in the coming week so that she can facilitate moving your registration to the new September dates.</p> <p>For those who have not yet registered, great news…we will be announcing in the coming week our next live in person event at the end of March this year. We are finalizing locations and dates as we speak…stay tuned!</p>]]></content:encoded>
	<enclosure url="https://morrismp.com/podcast-download/3414/2022-cybersecurity-responsibilities.m4a?dest-id=592132" length="1" type="audio/mpeg"></enclosure>
	<itunes:summary><![CDATA[Brad Gross, Technology Legal Expert, looks into the crystal ball with Ryan to discuss what lies ahead for IT Service Providers in 2022 and beyond. High points that are going to affect providers and how these can affect services and your business moving forward.  Microsoft NCE Pricing Implied Fiduciary Duties Co-Managed Services Quoting Software Regulations (From Cyber Insurance Companies)  Always very valuable information from Brad and a great perspective from customers perspective and what MSPs need to do in order to effectively manage expectations. You can contact Brad at info@bradleygross.com or check out his Podcast, sorry, Bradcast…at technologybradcast.com Please Note: There are a few mentions in this episode of our upcoming Cybersecurity Expo in Phoenix. As we’re sure you’re already aware, the coronavirus (COVID-19) pandemic has meant that it’s now vital to limit social contact and avoid gathering. For that reason, out of an abundance of caution, we’ve made the difficult decision to postpone our Live In Person Cybersecurity Expo in Phoenix to September 14 & 15, 2022. While we know this is disappointing, we hope you can understand the steps we’re taking to help keep our staff and attendees safe. What happens next? All registered attendees will be contacted by Robin Miller in the coming week so that she can facilitate moving your registration to the new September dates. For those who have not yet registered, great news…we will be announcing in the coming week our next live in person event at the end of March this year. We are finalizing locations and dates as we speak…stay tuned!]]></itunes:summary>
	<itunes:explicit>false</itunes:explicit>
	<itunes:block>no</itunes:block>
	<itunes:duration>0:00</itunes:duration>
	<itunes:author><![CDATA[No Blog Title Set]]></itunes:author>	<googleplay:description><![CDATA[Brad Gross, Technology Legal Expert, looks into the crystal ball with Ryan to discuss what lies ahead for IT Service Providers in 2022 and beyond. High points that are going to affect providers and how these can affect services and your business moving forward.  Microsoft NCE Pricing Implied Fiduciary Duties Co-Managed Services Quoting Software Regulations (From Cyber Insurance Companies)  Always very valuable information from Brad and a great perspective from customers perspective and what MSPs need to do in order to effectively manage expectations. You can contact Brad at info@bradleygross.com or check out his Podcast, sorry, Bradcast…at technologybradcast.com Please Note: There are a few mentions in this episode of our upcoming Cybersecurity Expo in Phoenix. As we’re sure you’re already aware, the coronavirus (COVID-19) pandemic has meant that it’s now vital to limit social contact and avoid gathering. For that reason, out of an abundance of caution, we’ve made the difficult decisi]]></googleplay:description>
	<googleplay:explicit>No</googleplay:explicit>
	<googleplay:block>no</googleplay:block>
</item>

<item>
	<title>Assume Everything is Dirty</title>
	<link>https://morrismp.com/podcast/assume-everything-is-dirty/</link>
	<pubDate>Thu, 09 Dec 2021 01:34:15 +0000</pubDate>
	<dc:creator><![CDATA[No Blog Title Set]]></dc:creator>
	<guid isPermaLink="false">http://morrismp.com/podcast/assume-everything-is-dirty/</guid>
	<description><![CDATA[<p>‘Assume everything is dirty’ states <a href= "https://www.pcmatic.com/">PC Matic</a> Vice President <a href= "https://www.linkedin.com/in/corey-munson/">Corey Munson</a> when he catches up with <a href= "https://www.iotssa.com/ryan-morris/">Ryan</a> to talk Application White Listing. Adoption of a Zero Trust architecture provides users with essential security that fills gaps left by reactive endpoint protection software solutions, and provides an additional layer of protection from increasingly complex cyber threats.</p> <p>For more information on <a href= "https://www.pcmatic.com/pro/?utm_source=PC_Matic%20Inc&utm_medium=Text&utm_campaign=IoTSSA_Onboarding&ad_id=510443&share-ad-id=1"> PC Matic</a> or to contact <a href= "https://www.linkedin.com/in/corey-munson/">Corey</a>, you can visit them in our <a href= "https://www.iotssa.com/pcmatic/">Security Solutions Showcase</a>.</p>]]></description>
	<itunes:subtitle><![CDATA[‘Assume everything is dirty’ states PC Matic Vice President Corey Munson when he catches up with Ryan to talk Application White Listing. Adoption of a Zero Trust architecture provides users with essential security that fills gaps left by reactive endpoin]]></itunes:subtitle>
	<content:encoded><![CDATA[<p>‘Assume everything is dirty’ states <a href= "https://www.pcmatic.com/">PC Matic</a> Vice President <a href= "https://www.linkedin.com/in/corey-munson/">Corey Munson</a> when he catches up with <a href= "https://www.iotssa.com/ryan-morris/">Ryan</a> to talk Application White Listing. Adoption of a Zero Trust architecture provides users with essential security that fills gaps left by reactive endpoint protection software solutions, and provides an additional layer of protection from increasingly complex cyber threats.</p> <p>For more information on <a href= "https://www.pcmatic.com/pro/?utm_source=PC_Matic%20Inc&utm_medium=Text&utm_campaign=IoTSSA_Onboarding&ad_id=510443&share-ad-id=1"> PC Matic</a> or to contact <a href= "https://www.linkedin.com/in/corey-munson/">Corey</a>, you can visit them in our <a href= "https://www.iotssa.com/pcmatic/">Security Solutions Showcase</a>.</p>]]></content:encoded>
	<enclosure url="https://morrismp.com/podcast-download/3415/assume-everything-is-dirty.m4a?dest-id=592132" length="1" type="audio/mpeg"></enclosure>
	<itunes:summary><![CDATA[‘Assume everything is dirty’ states PC Matic Vice President Corey Munson when he catches up with Ryan to talk Application White Listing. Adoption of a Zero Trust architecture provides users with essential security that fills gaps left by reactive endpoint protection software solutions, and provides an additional layer of protection from increasingly complex cyber threats. For more information on  PC Matic or to contact Corey, you can visit them in our Security Solutions Showcase.]]></itunes:summary>
	<itunes:explicit>false</itunes:explicit>
	<itunes:block>no</itunes:block>
	<itunes:duration>0:00</itunes:duration>
	<itunes:author><![CDATA[No Blog Title Set]]></itunes:author>	<googleplay:description><![CDATA[‘Assume everything is dirty’ states PC Matic Vice President Corey Munson when he catches up with Ryan to talk Application White Listing. Adoption of a Zero Trust architecture provides users with essential security that fills gaps left by reactive endpoint protection software solutions, and provides an additional layer of protection from increasingly complex cyber threats. For more information on  PC Matic or to contact Corey, you can visit them in our Security Solutions Showcase.]]></googleplay:description>
	<googleplay:explicit>No</googleplay:explicit>
	<googleplay:block>no</googleplay:block>
</item>

<item>
	<title>Satisfying Regulation</title>
	<link>https://morrismp.com/podcast/satisfying-regulation/</link>
	<pubDate>Wed, 01 Dec 2021 23:37:13 +0000</pubDate>
	<dc:creator><![CDATA[No Blog Title Set]]></dc:creator>
	<guid isPermaLink="false">http://morrismp.com/podcast/satisfying-regulation/</guid>
	<description><![CDATA[<p><a href="https://www.linkedin.com/in/alperal/">Al Alper</a>, CEO at <a href="https://cyberguard360.com/">CyberGuard 360</a> takes a 10,000 foot view with <a href= "https://www.iotssa.com/ryan-morris/">Ryan</a> and a look at the mindset of our customers and regulators. As Al states, ‘They don’t want War and Peace…just tell them what they want and need to know in plain English’. Visibility – Documentation – Audit Trail…The CyberGuard 360 roadmap to winning new business at incredible margins!</p> <p>For more information on <a href= "https://cyberguard360.com/">CyberGuard 360</a> or to contact <a href="https://www.linkedin.com/in/alperal/">Al</a>, you can visit them in our <a href= "https://www.iotssa.com/cyberguard-360/">Security Solutions Showcase</a>.</p>]]></description>
	<itunes:subtitle><![CDATA[Al Alper, CEO at CyberGuard 360 takes a 10,000 foot view with Ryan and a look at the mindset of our customers and regulators. As Al states, ‘They don’t want War and Peace…just tell them what they want and need to know in plain English’. Visibility – Docu]]></itunes:subtitle>
	<content:encoded><![CDATA[<p><a href="https://www.linkedin.com/in/alperal/">Al Alper</a>, CEO at <a href="https://cyberguard360.com/">CyberGuard 360</a> takes a 10,000 foot view with <a href= "https://www.iotssa.com/ryan-morris/">Ryan</a> and a look at the mindset of our customers and regulators. As Al states, ‘They don’t want War and Peace…just tell them what they want and need to know in plain English’. Visibility – Documentation – Audit Trail…The CyberGuard 360 roadmap to winning new business at incredible margins!</p> <p>For more information on <a href= "https://cyberguard360.com/">CyberGuard 360</a> or to contact <a href="https://www.linkedin.com/in/alperal/">Al</a>, you can visit them in our <a href= "https://www.iotssa.com/cyberguard-360/">Security Solutions Showcase</a>.</p>]]></content:encoded>
	<enclosure url="https://morrismp.com/podcast-download/3416/satisfying-regulation.m4a?dest-id=592132" length="1" type="audio/mpeg"></enclosure>
	<itunes:summary><![CDATA[Al Alper, CEO at CyberGuard 360 takes a 10,000 foot view with Ryan and a look at the mindset of our customers and regulators. As Al states, ‘They don’t want War and Peace…just tell them what they want and need to know in plain English’. Visibility – Documentation – Audit Trail…The CyberGuard 360 roadmap to winning new business at incredible margins! For more information on CyberGuard 360 or to contact Al, you can visit them in our Security Solutions Showcase.]]></itunes:summary>
	<itunes:explicit>false</itunes:explicit>
	<itunes:block>no</itunes:block>
	<itunes:duration>0:00</itunes:duration>
	<itunes:author><![CDATA[No Blog Title Set]]></itunes:author>	<googleplay:description><![CDATA[Al Alper, CEO at CyberGuard 360 takes a 10,000 foot view with Ryan and a look at the mindset of our customers and regulators. As Al states, ‘They don’t want War and Peace…just tell them what they want and need to know in plain English’. Visibility – Documentation – Audit Trail…The CyberGuard 360 roadmap to winning new business at incredible margins! For more information on CyberGuard 360 or to contact Al, you can visit them in our Security Solutions Showcase.]]></googleplay:description>
	<googleplay:explicit>No</googleplay:explicit>
	<googleplay:block>no</googleplay:block>
</item>

<item>
	<title>Controls vs. Redundancy</title>
	<link>https://morrismp.com/podcast/controls-vs-redundancy/</link>
	<pubDate>Wed, 24 Nov 2021 18:50:09 +0000</pubDate>
	<dc:creator><![CDATA[No Blog Title Set]]></dc:creator>
	<guid isPermaLink="false">http://morrismp.com/podcast/controls-vs-redundancy/</guid>
	<description><![CDATA[<p><a href="https://www.linkedin.com/in/dannyjenkinscyber/">Danny Jenkins</a>, CEO at <a href= "https://www.threatlocker.com/">ThreatLocker</a> breaks down security stacks with <a href= "https://www.iotssa.com/ryan-morris/">Ryan</a>. Controls, Detection and Training being the three main pillars. Where some go heavy with multiple layers of detection, controls can often time get over looked. Danny gives us a scenario where hackers can actually use a compromised customer environment as recon against you the MSP to get around detection tools, where controls like Zero Trust and MFA can prevent these attacks and ultimate breach.</p>]]></description>
	<itunes:subtitle><![CDATA[Danny Jenkins, CEO at ThreatLocker breaks down security stacks with Ryan. Controls, Detection and Training being the three main pillars. Where some go heavy with multiple layers of detection, controls can often time get over looked. Danny gives us a scen]]></itunes:subtitle>
	<content:encoded><![CDATA[<p><a href="https://www.linkedin.com/in/dannyjenkinscyber/">Danny Jenkins</a>, CEO at <a href= "https://www.threatlocker.com/">ThreatLocker</a> breaks down security stacks with <a href= "https://www.iotssa.com/ryan-morris/">Ryan</a>. Controls, Detection and Training being the three main pillars. Where some go heavy with multiple layers of detection, controls can often time get over looked. Danny gives us a scenario where hackers can actually use a compromised customer environment as recon against you the MSP to get around detection tools, where controls like Zero Trust and MFA can prevent these attacks and ultimate breach.</p>]]></content:encoded>
	<enclosure url="https://morrismp.com/podcast-download/3417/controls-vs-redundancy.m4a?dest-id=592132" length="1" type="audio/mpeg"></enclosure>
	<itunes:summary><![CDATA[Danny Jenkins, CEO at ThreatLocker breaks down security stacks with Ryan. Controls, Detection and Training being the three main pillars. Where some go heavy with multiple layers of detection, controls can often time get over looked. Danny gives us a scenario where hackers can actually use a compromised customer environment as recon against you the MSP to get around detection tools, where controls like Zero Trust and MFA can prevent these attacks and ultimate breach.]]></itunes:summary>
	<itunes:explicit>false</itunes:explicit>
	<itunes:block>no</itunes:block>
	<itunes:duration>0:00</itunes:duration>
	<itunes:author><![CDATA[No Blog Title Set]]></itunes:author>	<googleplay:description><![CDATA[Danny Jenkins, CEO at ThreatLocker breaks down security stacks with Ryan. Controls, Detection and Training being the three main pillars. Where some go heavy with multiple layers of detection, controls can often time get over looked. Danny gives us a scenario where hackers can actually use a compromised customer environment as recon against you the MSP to get around detection tools, where controls like Zero Trust and MFA can prevent these attacks and ultimate breach.]]></googleplay:description>
	<googleplay:explicit>No</googleplay:explicit>
	<googleplay:block>no</googleplay:block>
</item>

<item>
	<title>Protecting You Against You</title>
	<link>https://morrismp.com/podcast/protecting-you-against-you/</link>
	<pubDate>Wed, 10 Nov 2021 22:28:22 +0000</pubDate>
	<dc:creator><![CDATA[No Blog Title Set]]></dc:creator>
	<guid isPermaLink="false">http://morrismp.com/podcast/protecting-you-against-you/</guid>
	<description><![CDATA[<p><a href= "https://www.linkedin.com/in/matt-scullymailprotector/">Matt Scully</a>, Channel Chief with <a href= "https://mailprotector.com/">Mailprotector</a> goes beyond with <a href="https://www.iotssa.com/ryan-morris/">Ryan</a> to discuss email extortion and bad guys exploiting the psychographics of human behaviour. How private is electronic communication? From trade secrets to personal matters we all have communications that we don’t want in the public realm…As <a href= "https://www.linkedin.com/in/matt-scullymailprotector/">Matt</a> says ‘Protecting you against you’ is a perfect way to describe cybersecurity leading into 2022.</p>]]></description>
	<itunes:subtitle><![CDATA[Matt Scully, Channel Chief with Mailprotector goes beyond with Ryan to discuss email extortion and bad guys exploiting the psychographics of human behaviour. How private is electronic communication? From trade secrets to personal matters we all have comm]]></itunes:subtitle>
	<content:encoded><![CDATA[<p><a href= "https://www.linkedin.com/in/matt-scullymailprotector/">Matt Scully</a>, Channel Chief with <a href= "https://mailprotector.com/">Mailprotector</a> goes beyond with <a href="https://www.iotssa.com/ryan-morris/">Ryan</a> to discuss email extortion and bad guys exploiting the psychographics of human behaviour. How private is electronic communication? From trade secrets to personal matters we all have communications that we don’t want in the public realm…As <a href= "https://www.linkedin.com/in/matt-scullymailprotector/">Matt</a> says ‘Protecting you against you’ is a perfect way to describe cybersecurity leading into 2022.</p>]]></content:encoded>
	<enclosure url="https://morrismp.com/podcast-download/3418/protecting-you-against-you.m4a?dest-id=592132" length="1" type="audio/mpeg"></enclosure>
	<itunes:summary><![CDATA[Matt Scully, Channel Chief with Mailprotector goes beyond with Ryan to discuss email extortion and bad guys exploiting the psychographics of human behaviour. How private is electronic communication? From trade secrets to personal matters we all have communications that we don’t want in the public realm…As Matt says ‘Protecting you against you’ is a perfect way to describe cybersecurity leading into 2022.]]></itunes:summary>
	<itunes:explicit>false</itunes:explicit>
	<itunes:block>no</itunes:block>
	<itunes:duration>0:00</itunes:duration>
	<itunes:author><![CDATA[No Blog Title Set]]></itunes:author>	<googleplay:description><![CDATA[Matt Scully, Channel Chief with Mailprotector goes beyond with Ryan to discuss email extortion and bad guys exploiting the psychographics of human behaviour. How private is electronic communication? From trade secrets to personal matters we all have communications that we don’t want in the public realm…As Matt says ‘Protecting you against you’ is a perfect way to describe cybersecurity leading into 2022.]]></googleplay:description>
	<googleplay:explicit>No</googleplay:explicit>
	<googleplay:block>no</googleplay:block>
</item>

<item>
	<title>Pulling Back the Curtain</title>
	<link>https://morrismp.com/podcast/pulling-back-the-curtain/</link>
	<pubDate>Wed, 03 Nov 2021 22:40:53 +0000</pubDate>
	<dc:creator><![CDATA[No Blog Title Set]]></dc:creator>
	<guid isPermaLink="false">http://morrismp.com/podcast/pulling-back-the-curtain/</guid>
	<description><![CDATA[<p>IoTSSA has always been strong advocates of cybersecurity education…its been our mantra since we started back in 2017. <a href="https://www.huntress.com/">Huntress</a> have taken cybersecurity training for MSPs to the next level with their <a href="https://www.huntress.com/hack-it-2021-2">HackIT</a> events which they started in 2020 and continued to evolve this year.</p> <p><a href="https://www.iotssa.com/ryan-morris/">Ryan</a> sits down with <a href="https://www.iotssa.com/huntress/">Huntress</a>, Sr. Security Researcher, <a href= "https://www.linkedin.com/in/johnhammond010/">John Hammond</a> to unpack the <a href= "https://www.huntress.com/hack-it-2021-2">event</a> and the benefit to you the IT Service Provider. Hands on training and demos that really illustrate the anatomy of a hack and the mindset of cyber criminals. A clear understanding of the threats and offense coming at you, best prepares you to defend and shore up your stack and security offerings.</p> <p>For a recording of the most current event which concluded last week you can get a copy at hackitmsp.com  </p>]]></description>
	<itunes:subtitle><![CDATA[IoTSSA has always been strong advocates of cybersecurity education…its been our mantra since we started back in 2017. Huntress have taken cybersecurity training for MSPs to the next level with their HackIT events which they started in 2020 and continued ]]></itunes:subtitle>
	<content:encoded><![CDATA[<p>IoTSSA has always been strong advocates of cybersecurity education…its been our mantra since we started back in 2017. <a href="https://www.huntress.com/">Huntress</a> have taken cybersecurity training for MSPs to the next level with their <a href="https://www.huntress.com/hack-it-2021-2">HackIT</a> events which they started in 2020 and continued to evolve this year.</p> <p><a href="https://www.iotssa.com/ryan-morris/">Ryan</a> sits down with <a href="https://www.iotssa.com/huntress/">Huntress</a>, Sr. Security Researcher, <a href= "https://www.linkedin.com/in/johnhammond010/">John Hammond</a> to unpack the <a href= "https://www.huntress.com/hack-it-2021-2">event</a> and the benefit to you the IT Service Provider. Hands on training and demos that really illustrate the anatomy of a hack and the mindset of cyber criminals. A clear understanding of the threats and offense coming at you, best prepares you to defend and shore up your stack and security offerings.</p> <p>For a recording of the most current event which concluded last week you can get a copy at hackitmsp.com  </p>]]></content:encoded>
	<enclosure url="https://morrismp.com/podcast-download/3419/pulling-back-the-curtain.m4a?dest-id=592132" length="1" type="audio/mpeg"></enclosure>
	<itunes:summary><![CDATA[IoTSSA has always been strong advocates of cybersecurity education…its been our mantra since we started back in 2017. Huntress have taken cybersecurity training for MSPs to the next level with their HackIT events which they started in 2020 and continued to evolve this year. Ryan sits down with Huntress, Sr. Security Researcher, John Hammond to unpack the event and the benefit to you the IT Service Provider. Hands on training and demos that really illustrate the anatomy of a hack and the mindset of cyber criminals. A clear understanding of the threats and offense coming at you, best prepares you to defend and shore up your stack and security offerings. For a recording of the most current event which concluded last week you can get a copy at hackitmsp.com]]></itunes:summary>
	<itunes:explicit>false</itunes:explicit>
	<itunes:block>no</itunes:block>
	<itunes:duration>0:00</itunes:duration>
	<itunes:author><![CDATA[No Blog Title Set]]></itunes:author>	<googleplay:description><![CDATA[IoTSSA has always been strong advocates of cybersecurity education…its been our mantra since we started back in 2017. Huntress have taken cybersecurity training for MSPs to the next level with their HackIT events which they started in 2020 and continued to evolve this year. Ryan sits down with Huntress, Sr. Security Researcher, John Hammond to unpack the event and the benefit to you the IT Service Provider. Hands on training and demos that really illustrate the anatomy of a hack and the mindset of cyber criminals. A clear understanding of the threats and offense coming at you, best prepares you to defend and shore up your stack and security offerings. For a recording of the most current event which concluded last week you can get a copy at hackitmsp.com]]></googleplay:description>
	<googleplay:explicit>No</googleplay:explicit>
	<googleplay:block>no</googleplay:block>
</item>

<item>
	<title>Cybersecurity Deployment</title>
	<link>https://morrismp.com/podcast/cybersecurity-deployment/</link>
	<pubDate>Wed, 27 Oct 2021 20:47:37 +0000</pubDate>
	<dc:creator><![CDATA[No Blog Title Set]]></dc:creator>
	<guid isPermaLink="false">http://morrismp.com/podcast/cybersecurity-deployment/</guid>
	<description><![CDATA[<p><a href="https://www.iotssa.com/ryan-morris/">Ryan</a> and <a href="https://www.linkedin.com/in/vincecrisler/">Vince Crisler</a>, Founder and CEO at <a href= "https://www.iotssa.com/dark3/">Dark Cubed</a> have a great re-cap discussion of the IoTSSA Cybersecurity Expo in Charlotte late last month. From getting started to evolving your current security stack, no matter your cybersecurity maturity level. Vince lays out that different customers have different needs and you need to deploy solutions that best fit a specific client or situation. Too often the fundamentals are overlooked when deploying cybersecurity and managing client risk.</p> <p>Our next live event is coming up in <a href= "https://www.iotssa.com/cybersecurity-expo-phoenix/">Phoenix, January 18 – 20</a>. You can catch up with Vince and <a href= "https://darkcubed.com/">Dark Cubed</a> in person. He is looking forward to continuing these conversations and meeting you all.  </p>]]></description>
	<itunes:subtitle><![CDATA[Ryan and Vince Crisler, Founder and CEO at Dark Cubed have a great re-cap discussion of the IoTSSA Cybersecurity Expo in Charlotte late last month. From getting started to evolving your current security stack, no matter your cybersecurity maturity level.]]></itunes:subtitle>
	<content:encoded><![CDATA[<p><a href="https://www.iotssa.com/ryan-morris/">Ryan</a> and <a href="https://www.linkedin.com/in/vincecrisler/">Vince Crisler</a>, Founder and CEO at <a href= "https://www.iotssa.com/dark3/">Dark Cubed</a> have a great re-cap discussion of the IoTSSA Cybersecurity Expo in Charlotte late last month. From getting started to evolving your current security stack, no matter your cybersecurity maturity level. Vince lays out that different customers have different needs and you need to deploy solutions that best fit a specific client or situation. Too often the fundamentals are overlooked when deploying cybersecurity and managing client risk.</p> <p>Our next live event is coming up in <a href= "https://www.iotssa.com/cybersecurity-expo-phoenix/">Phoenix, January 18 – 20</a>. You can catch up with Vince and <a href= "https://darkcubed.com/">Dark Cubed</a> in person. He is looking forward to continuing these conversations and meeting you all.  </p>]]></content:encoded>
	<enclosure url="https://morrismp.com/podcast-download/3420/cybersecurity-deployment.m4a?dest-id=592132" length="1" type="audio/mpeg"></enclosure>
	<itunes:summary><![CDATA[Ryan and Vince Crisler, Founder and CEO at Dark Cubed have a great re-cap discussion of the IoTSSA Cybersecurity Expo in Charlotte late last month. From getting started to evolving your current security stack, no matter your cybersecurity maturity level. Vince lays out that different customers have different needs and you need to deploy solutions that best fit a specific client or situation. Too often the fundamentals are overlooked when deploying cybersecurity and managing client risk. Our next live event is coming up in Phoenix, January 18 – 20. You can catch up with Vince and Dark Cubed in person. He is looking forward to continuing these conversations and meeting you all.]]></itunes:summary>
	<itunes:explicit>false</itunes:explicit>
	<itunes:block>no</itunes:block>
	<itunes:duration>0:00</itunes:duration>
	<itunes:author><![CDATA[No Blog Title Set]]></itunes:author>	<googleplay:description><![CDATA[Ryan and Vince Crisler, Founder and CEO at Dark Cubed have a great re-cap discussion of the IoTSSA Cybersecurity Expo in Charlotte late last month. From getting started to evolving your current security stack, no matter your cybersecurity maturity level. Vince lays out that different customers have different needs and you need to deploy solutions that best fit a specific client or situation. Too often the fundamentals are overlooked when deploying cybersecurity and managing client risk. Our next live event is coming up in Phoenix, January 18 – 20. You can catch up with Vince and Dark Cubed in person. He is looking forward to continuing these conversations and meeting you all.]]></googleplay:description>
	<googleplay:explicit>No</googleplay:explicit>
	<googleplay:block>no</googleplay:block>
</item>

<item>
	<title>The Cybersecurity Story</title>
	<link>https://morrismp.com/podcast/the-cybersecurity-story/</link>
	<pubDate>Wed, 20 Oct 2021 23:57:41 +0000</pubDate>
	<dc:creator><![CDATA[No Blog Title Set]]></dc:creator>
	<guid isPermaLink="false">http://morrismp.com/podcast/the-cybersecurity-story/</guid>
	<description><![CDATA[<p>Communicating the threat landscape to the SMB has always been a challenge and customers simply don’t believe, it can and will happen to them. <a href= "https://www.iotssa.com/ryan-morris/">Ryan</a> talks with <a href= "https://www.curricula.com/partners">Curricula</a>, Founder and CEO, <a href="https://www.linkedin.com/in/nicholassantora/">Nick Santora</a> about how they are using the power of story telling to penetrate and educate the single largest threat to organizations…the users themselves.</p> <p>For National Cybersecurity Awareness Month, the team at <a href= "https://www.iotssa.com/curricula/">Curricula</a> are hosting a series of webinars every Friday in October, broadcasting live at 2 p.m. EST / 11 a.m. PST. <a href= "https://www.curricula.com/curriculaville">https://www.curricula.com/curriculaville</a></p>]]></description>
	<itunes:subtitle><![CDATA[Communicating the threat landscape to the SMB has always been a challenge and customers simply don’t believe, it can and will happen to them. Ryan talks with Curricula, Founder and CEO, Nick Santora about how they are using the power of story telling to ]]></itunes:subtitle>
	<content:encoded><![CDATA[<p>Communicating the threat landscape to the SMB has always been a challenge and customers simply don’t believe, it can and will happen to them. <a href= "https://www.iotssa.com/ryan-morris/">Ryan</a> talks with <a href= "https://www.curricula.com/partners">Curricula</a>, Founder and CEO, <a href="https://www.linkedin.com/in/nicholassantora/">Nick Santora</a> about how they are using the power of story telling to penetrate and educate the single largest threat to organizations…the users themselves.</p> <p>For National Cybersecurity Awareness Month, the team at <a href= "https://www.iotssa.com/curricula/">Curricula</a> are hosting a series of webinars every Friday in October, broadcasting live at 2 p.m. EST / 11 a.m. PST. <a href= "https://www.curricula.com/curriculaville">https://www.curricula.com/curriculaville</a></p>]]></content:encoded>
	<enclosure url="https://morrismp.com/podcast-download/3421/the-cybersecurity-story.m4a?dest-id=592132" length="1" type="audio/mpeg"></enclosure>
	<itunes:summary><![CDATA[Communicating the threat landscape to the SMB has always been a challenge and customers simply don’t believe, it can and will happen to them. Ryan talks with Curricula, Founder and CEO, Nick Santora about how they are using the power of story telling to penetrate and educate the single largest threat to organizations…the users themselves. For National Cybersecurity Awareness Month, the team at Curricula are hosting a series of webinars every Friday in October, broadcasting live at 2 p.m. EST / 11 a.m. PST. https://www.curricula.com/curriculaville]]></itunes:summary>
	<itunes:explicit>false</itunes:explicit>
	<itunes:block>no</itunes:block>
	<itunes:duration>0:00</itunes:duration>
	<itunes:author><![CDATA[No Blog Title Set]]></itunes:author>	<googleplay:description><![CDATA[Communicating the threat landscape to the SMB has always been a challenge and customers simply don’t believe, it can and will happen to them. Ryan talks with Curricula, Founder and CEO, Nick Santora about how they are using the power of story telling to penetrate and educate the single largest threat to organizations…the users themselves. For National Cybersecurity Awareness Month, the team at Curricula are hosting a series of webinars every Friday in October, broadcasting live at 2 p.m. EST / 11 a.m. PST. https://www.curricula.com/curriculaville]]></googleplay:description>
	<googleplay:explicit>No</googleplay:explicit>
	<googleplay:block>no</googleplay:block>
</item>
	</channel>
</rss>
