IoTSSA

IotSSA
IoTSSA
IoTSSA
Cybersecurity Talent
/
  • Cybersecurity Talent

    Cybersecurity Talent

    Jan 19, 2022 •

    Adding headcount is not necessarily the answer

  • The Cybersecurity Conversation

    The Cybersecurity Conversation

    Jan 12, 2022 •

    Tell a story to sell without selling

  • 2022 Cybersecurity Responsibilities

    2022 Cybersecurity Responsibilities

    Dec 30, 2021 •

    Implied fiduciary duties for IT Service Providers will become even more prevalent in 2022 and beyond as cyber risks continue to grow and evolve.

  • Assume Everything is Dirty

    Assume Everything is Dirty

    Dec 8, 2021 •

    Adoption of a Zero Trust architecture

  • Satisfying Regulation

    Satisfying Regulation

    Dec 1, 2021 •

    Visibility – Documentation – Audit Trail…The CyberGuard 360 roadmap to winning new business at incredible margins!

  • Controls vs. Redundancy

    Controls vs. Redundancy

    Nov 24, 2021 •

    Controls, Detection and Training are your three main pillars when building out your security stack

  • Protecting You Against You

    Protecting You Against You

    Nov 10, 2021 •

    As Matt says ‘Protecting you against you’ is a perfect way to describe cybersecurity leading into 2022

  • Pulling Back the Curtain

    Pulling Back the Curtain

    Nov 3, 2021 •

    Huntress have taken cybersecurity training for MSPs to the next level with their HackIT events which they started in 2020 and continued to evolve this year.

  • Cybersecurity Deployment

    Cybersecurity Deployment

    Oct 27, 2021 •

    Different customers have different needs. Deployment strategy is critical

  • The Cybersecurity Story

    The Cybersecurity Story

    Oct 20, 2021 •

    Communicating the threat landscape to the SMB

  • Hardening the Endpoint

    Hardening the Endpoint

    Oct 6, 2021 •

    With the evaporation of perimeters are we effectively securing all the endpoints?

  • Cybersecurity Dynamics

    Cybersecurity Dynamics

    Sep 15, 2021 •

    Ryan gets into the weeds with Mav Turner, Head of Product with N-able talking about the complex dynamics of cybersecurity

  • Hell Fire is Avoidable

    Hell Fire is Avoidable

    Sep 8, 2021 •

    ‘Hell Fire is in the forecast’ states Tyler Moffitt, Senior Threat Research Analyst with Webroot, however it is also avoidable

  • The Business of Cybersecurity

    The Business of Cybersecurity

    Sep 1, 2021 •

    Marketing and Business Development has always been a challenge with selling IT Services. The business of cybersecurity is no different

  • Password Hygiene

    Password Hygiene

    Aug 25, 2021 •

    With all the different tools and layers that comprise our security stacks, so many times the fundamentals are overlooked

  • Security Alert Fatigue

    Security Alert Fatigue

    Aug 18, 2021 •

    Alerts should be used as an opportunity to advance customer environments

  • Breaking Down Your Cybersecurity Stack

    Breaking Down Your Cybersecurity Stack

    Aug 12, 2021 •

    A fortified perimeter buttresses our stack, however the importance of a defense in depth approach is still critical.

  • Momentum is with the Attackers

    Momentum is with the Attackers

    Jul 21, 2021 •

    ‘Offence always wins and defense always loses’ states Vince Crisler, Founder & CEO of Dark Cubed when he talks with Ryan about attackers forcing change with cybersecurity.

  • Cybersecurity Adoption

    Cybersecurity Adoption

    Jun 30, 2021 •

    Cybersecurity can be overwhelming leaving many IT Service Providers wondering ‘Have I done enough?’ or even ‘Where do I start?’.

  • Email Encryption

    Email Encryption

    Jun 23, 2021 •

    One from the vault, Brian talks with Trustifi CEO, Rom Hendler about the importance of email encryption to protect against Business Email Compromise.

  • Cybersecurity Standard of Care

    Cybersecurity Standard of Care

    Jun 16, 2021 •

    In the event of a breach, can it equate to that of medical malpractice? Are you providing an appropriate cybersecurity standard of care?

  • Cybersecurity Infrastructure to Insurance

    Cybersecurity Infrastructure to Insurance

    Jun 9, 2021 •

    IT Service Providers need to take a holistic cybersecurity approach with clients beyond the tools themselves from infrastructure to cyber insurance.

  • Configuration is Vital

    Configuration is Vital

    May 26, 2021 •

    Without proper configuration, even the most secure tools in your stack won’t be effective

  • Protect the Data

    Protect the Data

    May 19, 2021 •

    We need to be focusing on protecting the data and the end point and network security will naturally follow

  • Deny by Default

    Deny by Default

    May 12, 2021 •

    Adopting zero trust or a deny by default approach is about applying controls with your cybersecurity stack

  • The Value of Collaboration

    The Value of Collaboration

    May 6, 2021 •

    The value of collaboration and how both IT Service Providers and Channel Vendors can leverage communication and engagement in order to succeed and grow

  • Standing the Workforce Back Up

    Standing the Workforce Back Up

    May 4, 2021 •

    Don’t forget about the fundamentals when standing our workforce back up, states Michael Crean, CEO at Solutions Granted

  • Buffalo Jumping

    Buffalo Jumping

    Apr 28, 2021 •

    Wes talks about the focus on Ransomware when really the focus needs to be on the breach itself, where Ransomware is simply the result.

  • Pandemic Patching

    Pandemic Patching

    Apr 21, 2021 •

    Workstation patching during a pandemic with a remote workforce has been a pain point and hurdle for IT Service Providers over the past year

  • Malware to Ransomware

    Malware to Ransomware

    Apr 15, 2021 •

    The evolution of Malware to Ransomware requires that systems need to be completely sanitized in order to prevent an attack

  • Five Cybersecurity Recommendations

    Five Cybersecurity Recommendations

    Apr 13, 2021 •

    Jason Norton with Vipre gives us five cybersecurity recommendations to look at when analyzing your cybersecurity posture.

  • IT Psychics

    IT Psychics

    Apr 8, 2021 •

    Very passionate about her IT Services business, Barb refers to CDN Technologies as IT Psychics for their customers.

  • Zero Trust Architecture

    Zero Trust Architecture

    Apr 6, 2021 •

    Adoption of a Zero Trust Architecture is critical when upgrading your cybersecurity posture with a remote workforce.

  • Exchange Drive By Hack

    Exchange Drive By Hack

    Apr 1, 2021 •

    The Microsoft Exchange vulnerability is looking to be a far more wide spread threat that John describes as a Drive By Hack.

  • Blockchain & Crypto Mining

    Blockchain & Crypto Mining

    Mar 31, 2021 •

    Does cryptocurrency pose a cybersecurity threat and how to detect if you have been hijacked for crypto mining.

  • The Move to Hybrid Work Force

    The Move to Hybrid Work Force

    Mar 23, 2021 •

    Business adoption of a hybrid workforce is already well underway and MSPs call to arms has never been greater in order to ensure environments are secure.

  • Governance, Risk & Compliance

    Governance, Risk & Compliance

    Mar 9, 2021 •

    Take the 10,000 ft. view and break down risk, both quantitatively and qualitatively to assess where you are at and plot your next steps

  • Cybersecurity Efficiencies

    Cybersecurity Efficiencies

    Mar 4, 2021 •

    The panel talks addressing the big picture and give some great insights on building an efficient and effective cybersecurity offering

  • Cybersecurity Configuration

    Cybersecurity Configuration

    Mar 3, 2021 •

    With Machine Learning and Artificial Intelligence at the crux of our security tools conversations, it needs to start with solid cybersecurity configuration.

  • Distribution & Cybersecurity

    Distribution & Cybersecurity

    Feb 24, 2021 •

    Channel veteran and Vice President of the Cloud Business Unit at D&H Distributing, Jason Bystrak, chats with Brian about the role distribution plays in cybersecurity

  • Five Signs You’re About to be Attacked

    Five Signs You’re About to be Attacked

    Feb 18, 2021 •

    Replay from our January Beyond the Curve Virtual Event John gives you an overview of the current attack surface and signs you are about to be attacked

  • Marketing in a Virtual World

    Marketing in a Virtual World

    Feb 17, 2021 •

    The old adage, you can’t manage what you can’t measure has never been more prevalent than in today’s Virtual Marketing efforts

  • 2021 Cybersecurity Paradigm Shift

    2021 Cybersecurity Paradigm Shift

    Feb 11, 2021 •

    MJ Shoer, of the CompTIA ISAO, moderates this Cyber Expert Panel Session unpacking the Solarwinds event and the massive paradigm shift its driving

  • Having the Risk Conversation

    Having the Risk Conversation

    Feb 10, 2021 •

    Add Underwriter to the many hats that IT Service Providers need to be wearing when securing their clients’ environments.

  • Making Deliberate Decisions

    Making Deliberate Decisions

    Feb 3, 2021 •

    Scale your business with transparency and control while making deliberate service offering decisions.

  • Partnering in Cybersecurity

    Partnering in Cybersecurity

    Jan 27, 2021 •

    Is it time to partner your cybersecurity offering so that you can focus on your core business, digital transformation?

  • Lock the Front Door…

    Lock the Front Door…

    Jan 14, 2021 •

    We are in the wild west of the digital age with security tools at the ready, yet so many out there still are not locking their front doors.

  • Women in the IT Channel

    Women in the IT Channel

    Jan 12, 2021 •

    Women looking to grow their career in the IT Channel or pivot into a new career in Technology, great insights and support is available.

  • The Everywhere Organization

    The Everywhere Organization

    Jan 6, 2021 •

    Everything about ‘The Everywhere Organization’ is built on technology, however needs to be focused on people and workforces

  • Secure the Data

    Secure the Data

    Dec 30, 2020 •

    With so many now open to the cloud through necessity, the conversation needs to shift back to securing the data. Is O365 backing up?

  • On Thin Ice

    On Thin Ice

    Dec 23, 2020 •

    The Book

  • 2021…The Year of Cyber Fitness

    2021…The Year of Cyber Fitness

    Dec 16, 2020 •

    Amy Luby, Channel Chief Evangelist with Acronis tells us, ‘Lets make 2021 the year of cyber fitness’.

  • MFA and the SMB

    MFA and the SMB

    Dec 9, 2020 •

    We continue to hear challenges from IT Service Providers getting their SMB clients to adopt MFA practices

  • Phishing Lures

    Phishing Lures

    Dec 2, 2020 •

    Current Phishing Lure threats, Disabling Macros and the re-emergence of Crypto Jacking on the horizon

  • Women in Technology

    Women in Technology

    Nov 24, 2020 •

    Some great insights and advice for young women (and men for that matter) looking to build a career in technology and it starts with ‘just be yourself’, states Amy.

  • Cybersecurity is a Shared Responsibility

    Cybersecurity is a Shared Responsibility

    Nov 18, 2020 •

    Cybersecurity Training has many tentacles and is a lot more than just teaching your customers employees what Ransomware is or a Phishing attack.

  • Evolution of the MSP

    Evolution of the MSP

    Nov 11, 2020 •

    Technology is properly recognized as an essential service and MSPs have evolved into trusted technology consultants.

  • Compliance and the SMB

    Compliance and the SMB

    Nov 4, 2020 •

    The drive to digital transformation for business in 2020 has pushed compliance front and center for IT Service Providers

  • ScalePad Evolves

    ScalePad Evolves

    Oct 28, 2020 •

    Evolving asset management to include software provides clarity for IT Service Providers and their customer environments.

  • Think About the End at the Beginning

    Think About the End at the Beginning

    Oct 21, 2020 •

    Brad Gross has an innate ability to force us to take that 10,000 FT view of our business and potential trap doors.

  • A Collective Force Against the Bad Actors

    A Collective Force Against the Bad Actors

    Oct 14, 2020 •

    The CompTIA ISAO (Information Sharing & Analysis Organization) is a cybersecurity early warning system for everyone working in technology, from MSP’s to VAR’s to Software Companies

  • Adding Services without Headcount

    Adding Services without Headcount

    Oct 7, 2020 •

    Establishing foundational security allows MSPs to add services, buttress their stack and grow their business without adding headcount

  • Cybersecurity Nightmares

    Cybersecurity Nightmares

    Oct 1, 2020 •

    Kicking off Cybersecurity Month, our expert panel discusses the current cybersecurity nightmares IT Service Providers and the SMB are facing today.

  • Managing Threat Response

    Managing Threat Response

    Sep 30, 2020 •

    Cyber Insurance is driving a lot of change with service offerings and making services such 24 X 7 network threat monitoring mandatory

  • Selling in Uncertain Times

    Selling in Uncertain Times

    Sep 24, 2020 •

    New opportunities in pivoting toward the Co-Managed Services offering, leveraging our Solution Providers skill set and tools to support internal IT Departments.

  • Accelerated Change

    Accelerated Change

    Sep 22, 2020 •

    This is technology and providers time to shine. We have seen IT Service Providers rapid migration from supplier to trusted business advisor.

  • Zero Trust

    Zero Trust

    Sep 16, 2020 •

    With remote work forces deployed, identity management is critical to effectively secure our networks

  • Hybrid Networks

    Hybrid Networks

    Sep 9, 2020 •

    Hybrid Networks are here to stay, however it isn’t just working from home…. its remote workers operating wherever they are.

  • Navigating Supply Chain Strains

    Navigating Supply Chain Strains

    Sep 2, 2020 •

    We saw supply chains dry up almost overnight back in March and they continue to be strained today….6 months later

  • Today, Tomorrow & Beyond

    Today, Tomorrow & Beyond

    Aug 26, 2020 •

    Explosive growth of Co-Managed Services and MSPs moving up market is a trend that will only continue as the landscape rapidly evolves

  • Marketing During a Pandemic

    Marketing During a Pandemic

    Aug 19, 2020 •

    Be deliberate and consistent in your marketing efforts, not only during the pandemic, but long after this is over

  • Security Stack Visibility

    Security Stack Visibility

    Aug 12, 2020 •

    As we build out our layered security defences, how good is our visibility of the complete stack and its deployment to our customers?

  • Ransomware Canaries

    Ransomware Canaries

    Aug 5, 2020 •

    Brian catches up with Huntress Labs to talk Ransomware Canaries and deploying them into your networks for both protection and remediation.

  • Click Time Protection

    Click Time Protection

    Jul 29, 2020 •

    Protect against links that are weaponized after they have penetrated your perimeter with Click Time Protection

  • Scaling your Stack

    Scaling your Stack

    Jul 22, 2020 •

    Future proof your security stack and make it scalable for all size clients and requirements.

  • Compliance ‘n Covid

    Compliance ‘n Covid

    Jul 17, 2020 •

    There has been no change in compliance because of Covid, the rules remain the same and managing data sprawl has never been more critical

  • Evolving your Stack

    Evolving your Stack

    Jul 15, 2020 •

    Head Security Nerd at Solarwinds MSP, Gill Langston provides us some clarity on evolving our security stack and offerings.

  • Patching the Human Factor

    Patching the Human Factor

    Jul 1, 2020 •

    We can all practice good cyber hygiene and stay on top of our end point patching, however how do we patch the human factor?

  • Assessing the Value of Customer Data

    Assessing the Value of Customer Data

    Jun 24, 2020 •

    Assessing the value of customer data and translating for them can be a real challenge when securing our clients.

  • Restructuring your MSP

    Restructuring your MSP

    Jun 10, 2020 •

    No business is going untouched in some way and this directly affects IT Service Providers who service these businesses.

  • Segregating Home Networks

    Segregating Home Networks

    Jun 3, 2020 •

    Home network infrastructure is needed in order to effectively secure the SMB with workforces that very quickly deployed remotely.

  • Impact of a Remote Workforce

    Impact of a Remote Workforce

    May 21, 2020 •

    With hacker dwell times averaging six to nine months, what impacts from unsecure remote work forces will be felt once this pandemic is over?

  • Emerging Technology

    Emerging Technology

    May 13, 2020 •

    Adding on and integrating emerging technologies into your MSP services offering could start with fleet management services through GPS Insight channel program

  • Covid Clickbait

    Covid Clickbait

    May 5, 2020 •

    Conversations you need to be having with your customers in order to protect them and their business against hackers.

  • Importance of Log Monitoring for MSPs

    Importance of Log Monitoring for MSPs

    Apr 29, 2020 •

    Log Monitoring is one of the largest pain points for MSPs securing their clients while maintaining compliance.

  • Trends in Managed Services

    Trends in Managed Services

    Apr 21, 2020 •

    Exciting to see the movement toward a Managed IoT model for SMB’s in this latest Trends in Managed Services report from CompTIA

  • Align with your Clients

    Align with your Clients

    Apr 15, 2020 •

    Get your clients prepared with effective and tested Disaster Recovery plans should we be faced with a second round of this pandemic in the fall.

  • Navigating the CARES Act

    Navigating the CARES Act

    Apr 10, 2020 •

    While navigating the CARES Act, the largest financial relief package since the great depression, what does your business qualify for and what doesn’t.

  • Pandemics are not Force Majeure

    Pandemics are not Force Majeure

    Apr 7, 2020 •

    Have a pen ready when watching/listening as Brad generously extends a free offer to IoTSSA members and our podcast audience!

  • Gut Check Time

    Gut Check Time

    Apr 2, 2020 •

    In the face of today’s challenges it’s clear that we truly are better together. As the saying goes ‘It takes a village’.

  • No More Perimeters

    No More Perimeters

    Mar 31, 2020 •

    With the rapid dissolution of network perimeters, MSP’s are tasked with securing their clients on the other side of the firewall.

  • Beyond the Curve

    Beyond the Curve

    Mar 26, 2020 •

    While trying to adjust and adapt through this difficult time we need to look beyond today. What will the landscape look like when we come out the other side?

  • IoT – Cost Recovery to Profit Center

    IoT – Cost Recovery to Profit Center

    Mar 24, 2020 •

    The flip from cost center to profit generator flips the conversation you are having with customers from budget request to ROI on Capital Investment.

  • Slow down!

    Slow down!

    Mar 19, 2020 •

    Slow down if you can. MSP’s working hard to support SMB clients moving to a mobile workforce, need to work smart and safe not fast.

  • IT is a Vital Service

    IT is a Vital Service

    Mar 18, 2020 •

    IT is has never been as vital a service as today while we deal with the Covid-19 pandemic

  • Turn on Your MFA!

    Turn on Your MFA!

    Mar 11, 2020 •

    ‘Turn on your MFA for the love of everything that is holy’ states Bobby Kuzma with Herjavec Group

  • Cybersecurity Culture

    Cybersecurity Culture

    Mar 4, 2020 •

    ‘Cybersecurity is not a bolt on service, rather an integration into your company culture’ states Eric Rieger

  • Security is Mandatory

    Security is Mandatory

    Feb 26, 2020 •

    Head Security Nerd at Solarwinds MSP, Gill Langston talks about making security mandatory and ingraining it into your MSP culture.

  • Are Phone Systems Secure?

    Are Phone Systems Secure?

    Feb 19, 2020 •

    As many experts have predicted in early 2020, the next big vulnerability on the horizon is phone security and how this will greatly increase the attack surface for the bad guys.

  • MSP to IoT Practice

    MSP to IoT Practice

    Feb 12, 2020 •

    Identifying the opportunities in IoT starts with getting yourself educated on not only the technologies but also your client’s businesses and how they operate.