1. EachPod
EachPod
MSP 1337 - Podcast

MSP 1337

Educational sound bytes to help MSPs and their clients navigate Cyber Security. Cybersecurity maturity is a journey, don't go it alone. Interviews and guidance from fellow MSPs and other Industry experts.

Our goal is Secure Outcomes and together we can make a difference.

News Tech News
Update frequency
every 7 days
Average duration
33 minutes
Episodes
255
Years Active
2020 - 2025
Share to:
Getting an Assessment...

Getting an Assessment...

We talk about frameworks, compliance, cybersecurity, and many things in between but we haven't discussed getting assessed against a framework or even the new CompTIA Cybersecurity Trustmark. I sat do…

00:26:49  |   Tue 10 Oct 2023
Should I Sell Compliance Services?

Should I Sell Compliance Services?

In recent years we have seen Solution Providers begin offering services that are showing a shift in our industry around our client and client prospect needs. Five years ago very few solution provider…

00:31:39  |   Tue 03 Oct 2023
CompTIA Cybersecurity Trustmark Progress

CompTIA Cybersecurity Trustmark Progress

From the trenches... I sit down with Jim Harryman of Kinetic Technology Group to discuss their progress through the new CompTIA Cybersecurity Trustmark. What are the significant challenges and what a…

00:33:53  |   Tue 26 Sep 2023
Fireside Chat - CIS Control 6 Access Management

Fireside Chat - CIS Control 6 Access Management

Fireside chat with Matt Lee brings us control 6. Access Management goes hand in hand with Account Management but if you have been following along we coverd control 5 last month. Join Matt Lee and I a…

00:32:06  |   Tue 19 Sep 2023
Do I know my assets (IoT, IIoT, and OT)?

Do I know my assets (IoT, IIoT, and OT)?

Each day we are bombarded by cybersecurity threats and this episode adds another vector you should be looking at as you address your asset inventory. Are you looking at the asset that controls your t…

00:34:18  |   Tue 12 Sep 2023
Committing Fraud Through CMMC.

Committing Fraud Through CMMC.

There is no question that CMMC is here to stay. It is a much-needed maturity model for measuring companies that cater to the Defense space and are doing what is needed to protect Confidential Unclass…

00:33:53  |   Tue 05 Sep 2023
Preparing For A Storm.

Preparing For A Storm.

In Cyber we often focus only on the events that come from the ether, the dark web, and we forget that disasters can come from all sorts of events. With a hurricane less than 24 hours from making land…

00:36:39  |   Tue 29 Aug 2023
Was I a victim?

Was I a victim?

I am a big fan of Scott Augenbaum's book, "The Secret to Cybersecurity." Specifically, the 4 truths that we talk about with Tye Male, Senior Pastor of Wellspring church. Suspicious email, inconvenien…

00:30:32  |   Tue 22 Aug 2023
Fireside Chat - CIS Control 5 Hurdles

Fireside Chat - CIS Control 5 Hurdles

We are 1/3 of the way through the CIS Top 18 and I think Control 5 might be my favorite. Matt Lee joins me as we dive into all six safeguards and how important they are in the journey toward cyber re…

00:36:09  |   Tue 15 Aug 2023
Cybersecurity for Big and Small MSPs

Cybersecurity for Big and Small MSPs

I remember the days when Joshua Smith and I decided we should build our own MSP. It was simpler times and Cybersecurity was defined largely by firewalls and antivirus. Today starting an MSP or even b…

00:29:25  |   Tue 08 Aug 2023
MSPs Need Compliance

MSPs Need Compliance

There are lots of frameworks to choose from and some are more complicated than others. What is important is that you use some set of controls/safeguards or standards that are measurable and can be al…

00:23:44  |   Tue 01 Aug 2023
Showing Evidence

Showing Evidence

Over the past few months we have spent time on policies, how to tackle controls and safeguards in CIS Top 18, and we have even pointed out cybersecurity areas that might be overlooked. In this episod…

00:31:19  |   Tue 25 Jul 2023
Fireside Chat - CIS Control 4 Hurdles

Fireside Chat - CIS Control 4 Hurdles

It is the 3rd Tuesday of the month and it is time for Control 4 With Mat Lee. This is a shorter episode but we get it done and got great insights on how to go about addressing CIS Control 4.

00:25:53  |   Wed 19 Jul 2023
Policy Creation Involves Everyone!

Policy Creation Involves Everyone!

Policies are the one thing no company wants to create but everyone has to have. We see them show up in employee handbooks, Written Information Security Plans (WISP), and System Security Plans (SSP), …

00:38:02  |   Tue 04 Jul 2023
Do You Know Who Your Users Are?

Do You Know Who Your Users Are?

I don't often have vendors as guests on the show and so when there is an exception made it is because they are bringing something to the table that is exceptional. Discussing Single Sign-on with Nick…

00:27:44  |   Tue 27 Jun 2023
Fireside Chat - CIS Control 3 Hurdles

Fireside Chat - CIS Control 3 Hurdles

A little Chutes and Ladders, a little Yellow Brick Road. In this episode, I think you will find that Data Protection is a rather complex beast but through the guidance of Matt Lee of Pax8 you will ha…

00:41:14  |   Tue 20 Jun 2023
Counterintelligence and TikTok

Counterintelligence and TikTok

This week we put a thought towards adding counterintelligence as something that should be part of your Business Continuity, Disaster Recover, and Incident Response. It makes sense when you hear what …

00:39:02  |   Tue 13 Jun 2023
Check Vendor's Security Posture

Check Vendor's Security Posture

After we did, "A Doozy of a Story." I was presented with this Gem. It almost feels like a perfect storm but in fact it is a legitimate business and as I discuss the details with Eric Hanson, I want y…

00:32:40  |   Tue 06 Jun 2023
Cyber Insurance Industry Maturation

Cyber Insurance Industry Maturation

When cybersecurity insurance first came on the scene it was a new frontier. Everyone seemed to be selling it and everyone seemed to qualify for it. That was then... Sitting down with Reid Wellock of …

00:22:52  |   Tue 30 May 2023
Do I need a PenTest?

Do I need a PenTest?

What is a PenTest? What if I can't afford a PenTest? How is a pentest different from a vulnerability assessment? These questions and many more Matt Lang and I attempt to give some direction. Perhaps …

00:36:09  |   Tue 23 May 2023
Disclaimer: The podcast and artwork embedded on this page are the property of Chris Johnson. This content is not affiliated with or endorsed by eachpod.com.