Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo
show episodes
 
If you’re a managed security provider (MSP), managed security service provider (MSSP), virtual CISO, or a cybersecurity professional looking for insights and advice on ways to build bridges with your clients (or vice versa), look no further than Cyber for Hire | The Managed Security Podcast! Presented in partnership with MSSP Alert and ChannelE2E, Cyber for Hire, is a weekly 60-minute podcast (in two 30-minute segments) hosted by Ryan Morris, Principal Consultant at Morris Management Partner ...
  continue reading
 
If you’re a managed security provider (MSP), managed security service provider (MSSP), virtual CISO, or a cybersecurity professional looking for insights and advice on ways to build bridges with your clients (or vice versa), look no further than Cyber for Hire | The Managed Security Podcast! Presented in partnership with MSSP Alert and ChannelE2E, Cyber for Hire, is a weekly 60-minute podcast (in two 30-minute segments) hosted by Ryan Morris, Principal Consultant at Morris Management Partner ...
  continue reading
 
Artwork

1
MSP 1337

Chris Johnson

icon
Unsubscribe
icon
Unsubscribe
Weekly
 
Educational sound bytes to help MSPs and their clients navigate Cyber Security. Cybersecurity maturity is a journey, don't go it alone. Interviews and guidance from fellow MSPs and other Industry experts. Our goal is Secure Outcomes and together we can make a difference.
  continue reading
 
Artwork

1
SkyTerra Podcast

Danny Joseph Bergeron

icon
Unsubscribe
icon
Unsubscribe
Monthly+
 
Join Ross Jordan in discussions with IT and Business Professionals facing the challenges of navigating an ever changing IT environment. These conversations will be from a leadership level to ensure understanding of the technologies, and the impacts to your organization. This podcast will help you gain knowledge on leading edge technologies, practical knowledge, and help you identify ways to keep your team ahead of the technological curve, and ensure the challenges around technology are addre ...
  continue reading
 
Loading …
show series
 
#SecurityConfidential #DarkRhiinoSecurityAlex Sharpe is a board member, practitioner, speaker, and author known for driving value while managing cyber risk. With a career that began in the intelligence community, Alex has since led strategic transformations across global enterprises, built two startups (including one with a successful IPO), and par…
  continue reading
 
Alex Sharpe is a board member, practitioner, speaker, and author known for driving value while managing cyber risk. With a career that began in the intelligence community, Alex has since led strategic transformations across global enterprises, built two startups (including one with a successful IPO), and participated in over 20 M&A transactions. Re…
  continue reading
 
Tools galore, shiny object syndrome, must there be a tool for that? Then we get caught up in our day-to-day, and perhaps we forget about a tool or a tool feature, and we begin looking to solve another challenge. I get to sit down with Augie Staab of TD Synnex. We have a great discussion around right sizing your tech stack as an MSP and what it mean…
  continue reading
 
#SecurityConfidential #DarkRhiinoSecurityJohn Carse is the Field CISO at SquareX and a seasoned cybersecurity leader with over 20 years of experience spanning the U.S. Navy, JPMorgan, Expedia, Dyson, and Rakuten. With a background in securing critical naval systems during his 14 years in the Navy, John has since built and led global security progra…
  continue reading
 
John Carse is the Field CISO at SquareX and a seasoned cybersecurity leader with over 20 years of experience spanning the U.S. Navy, JPMorgan, Expedia, Dyson, and Rakuten. With a background in securing critical naval systems during his 14 years in the Navy, John has since built and led global security programs across finance, tech, and e-commerce. …
  continue reading
 
How many videos and quizzes have you taken to show your skills at avoiding phishing emails and other types of Business Email Compromise? Have you been shamed or had to watch additional training videos? I know that in our world of email overload, it isn't a matter of if, it is a matter of when we might fall for one of the masterfully crafted phishin…
  continue reading
 
Jon DiMaggio is the Chief Security Strategist at Analyst1 with over 15 years of experience tracking cyber threats. Specializing in enterprise ransomware and nation-state attacks, Jon is best known for infiltrating the LockBit ransomware gang during a two-year undercover operation. His research, including Ransomware Diaries and The Art of Cyberwarfa…
  continue reading
 
Jon DiMaggio is the Chief Security Strategist at Analyst1 with over 15 years of experience tracking cyber threats. Specializing in enterprise ransomware and nation-state attacks, Jon is best known for infiltrating the LockBit ransomware gang during a two-year undercover operation. His research, including Ransomware Diaries and The Art of Cyberwarfa…
  continue reading
 
I recently had a chance to chat with Robert Smith of Intellisystems on what it means to be an MSP in today's Threat Landscape. Gone are the days of installation, configuration, and watching. Today, it is patch, patch again, be proactive, investigate, and educate. It is a 24/7/365. Take a trip with us down memory lane as Robert sets us up for what i…
  continue reading
 
GRC Tools seem to be coming out of the woodwork continuously. A few of them have been finalists in ConnectWise PitchIt over the past few years, and they are all unique in their own way. Recently, GTIA announced the addition of ControlMap, ComplianceScorecard, Sure-Shield, and others coming in to host the Trustmark. I wanted to get some perspective …
  continue reading
 
Chris is a professional information technologist, author, trainer, manager, a lifelong learner, and Former Law Enforcement Officer. He has been creating courses for over 25 years and has been working as an author on Plurasight for 11 years. He has created over 80 IT Certification training courses (52 or so with Pluralsight) and his students have wa…
  continue reading
 
Chris is a professional information technologist, author, trainer, manager, a lifelong learner, and Former Law Enforcement Officer. He has been creating courses for over 25 years and has been working as an author on Plurasight for 11 years. He has created over 80 IT Certification training courses (52 or so with Pluralsight) and his students have wa…
  continue reading
 
MSSPs in the Healthcare vertical face many challenges and opportunities. I sat down with Russell Teague of Fortified Health Security to discuss providing Cybersecurity services in the healthcare space and how it stands out from other verticals. If you are an MSP or MSSP, this is a great opportunity to further explore unique service offerings.…
  continue reading
 
Craig Taylor is a seasoned cybersecurity expert and entrepreneur with nearly 30 years of experience managing risk across industries—from Fortune 500 corporations to SMBs. As the Co-Founder and CEO of CyberHoot, he has pioneered a positive reinforcement approach to cybersecurity education, helping businesses eliminate risky behaviors and build a pos…
  continue reading
 
Craig Taylor is a seasoned cybersecurity expert and entrepreneur with nearly 30 years of experience managing risk across industries—from Fortune 500 corporations to SMBs. As the Co-Founder and CEO of CyberHoot, he has pioneered a positive reinforcement approach to cybersecurity education, helping businesses eliminate risky behaviors and build a pos…
  continue reading
 
Navigating Frameworks and implementing the controls and safeguards within can be quite daunting. I sit down with Matt Lee to talk through the taxonomy project that so many have worked on and how it helps break down expectations so that one can be successful. Without visuals, as this is a podcast, join us as we try to articulate verbally what this a…
  continue reading
 
#SecurityConfidential #DarkRhiinoSecurity Stacey Champagne is the Founder & CEO of Hacker in Heels, a community dedicated to advancing women in cybersecurity through coaching, courses, and events. With over a decade of experience leading cybersecurity programs at Fortune 500 companies and startups, she specializes in insider risk management, securi…
  continue reading
 
#SecurityConfidential #DarkRhiinoSecurity Stacey Champagne is the Founder & CEO of Hacker in Heels, a community dedicated to advancing women in cybersecurity through coaching, courses, and events. With over a decade of experience leading cybersecurity programs at Fortune 500 companies and startups, she specializes in insider risk management, securi…
  continue reading
 
Attending my first Communities and Councils Forums (CCF) under the new brand Global Technology Industria Association was easily the best ever. An annual event with polos and no logos. I sit down with Charles love of Showtech Solutions to go down memory lane and reflect on why CCF is so important to our Channel Community. "If you want to go somewher…
  continue reading
 
#SecurityConfidential #darkrhiinosecurity Darren Mott, author of "Get Cyber Smart", is a retired FBI agent with 20 years of experience in cyber and counterintelligence investigations. He played a key role in strengthening FBI-Russian collaboration on cyber threats and created the FBI’s first program blending counterintelligence and cyber discipline…
  continue reading
 
#SecurityConfidential #darkrhiinosecurity Darren Mott, author of "Get Cyber Smart", is a retired FBI agent with 20 years of experience in cyber and counterintelligence investigations. He played a key role in strengthening FBI-Russian collaboration on cyber threats and created the FBI’s first program blending counterintelligence and cyber discipline…
  continue reading
 
Cybersecurity doesn't happen overnight. It is a maturity process that often struggles with forward progress when the business core values are unclear or no longer aligned. I sit down with Jessica Millhiser of JMills Consulting to talk about the health of a business and the things that need to be in place for growth. We talk Policy, Process, and Pro…
  continue reading
 
#SecurityConfidential #DarkRhiinoSecurityFormer US Most Wanted turned Good Guy, Brett Johnson, also known as “The Original Internet Godfather,” was a key figure in the cybercrime world for over 20 years, founding ShadowCrew—the first organized cybercrime community. Brett was Convicted of 39 felonies and placed on the U.S. Most Wanted List, his expe…
  continue reading
 
#SecurityConfidential #DarkRhiinoSecurityFormer US Most Wanted turned Good Guy, Brett Johnson, also known as “The Original Internet Godfather,” was a key figure in the cybercrime world for over 20 years, founding ShadowCrew—the first organized cybercrime community. Brett was Convicted of 39 felonies and placed on the U.S. Most Wanted List, his expe…
  continue reading
 
Human risk within any organization is often not given enough attention when it comes to monitoring and tracking the behavior of employees, such as phishing attempts, security training, etc. I sat down with Mathias Zeumer, North America Channel Manager at usecure, to talk about their approach to security awareness training, share a few horror storie…
  continue reading
 
In recent weeks, we have seen the drama surrounding TicTok, Red Note, DeepSeek, and many other technologies that, in many cases, are used without any regard for the repercussions of using them for good or bad. I sit down with Charles Love of ShowTech Solutions to talk about where we are today after hearing his projections for 2025... is it too soon…
  continue reading
 
If you have ever worked with Construction Management, Manufacturing, Healthcare, and others where the technology that is in place is no longer supported. How do you help them move forward and when is it appropriate to continue to use legacy technology? Join me as I sit with Jeff Borello of Andromeda Technology Solutions to chat about successful app…
  continue reading
 
#IECBusinessSummit #DarkRhiinoSecurityTest out our FREE CISO Bot :https://www.darkrhiinosecurity.com------------------------------------------------------------Music by Mykola Sosin from Pixabay------------------------------------------------------------SOCIAL MEDIA:Stay connected with us on our social media pages where we'll give you snippets, ale…
  continue reading
 
Whether you travel domestically or internationally, there are things you can do to protect yourself. VPNs, Public Wi-Fi, and other considerations as you travel for work or life are some of the topics I discuss with my friend Clay Johnson. You might find that this episode is worth sharing with clients, friends, and family as we tackle security at a …
  continue reading
 
So many words in the English language have more than one meaning. Some words are pronounced the same but are spelled differently. All of these are challenges in their own right, but what happens when you talk to someone who doesn't speak English as a first language? Now, take those challenges and apply them to cybersecurity. I sit down with Paul Cr…
  continue reading
 
Sandra has over 25 years of experience in Cybersecurity, IT, and Data Privacy. She transformed her personal nightmare of identity theft into inspiration, helping individuals and businesses protect what matters most from hackers, scammers, and Cybermonsters®. She is a TEDx speaker, podcast host, corporate trainer, and international bestselling autho…
  continue reading
 
Will 2025 be the year of natural selection for MSPs? I sit down with Matt Lee of Pax8 to chat about the cybersecurity picture for 2025 and it comes down to those that choose to make changes in their company to mature their cybersecurity posture and those that do not... Those that do not are the MSPs that use excuses like, I'm to small, We don't hav…
  continue reading
 
Tammy Klotz is a cybersecurity leader with over 20 years in IT and a decade as a CISO for global manufacturing firms. She has transformed cybersecurity programs, driven cultural change, and championed women in technology through mentorship and active involvement in groups like WiCyS and the Cloud Security Alliance. At Versum Materials, she develope…
  continue reading
 
Actual compliance challenges in 2025 are heating up with clients now asking for evidence and proof on how their MSP is helping them meet certain safeguards for regulatory requirements and insurance. Join Josh Hohbein of CentrexIT and I as we discuss the opportunities and challenges surrounding compliance and roles and responsibilities pertaining to…
  continue reading
 
#SecurityConfidential #DarkRhiinoSecurityKen Foster is a highly accomplished Security Expert with over 25 years of leadership experience in cybersecurity, infrastructure, and risk management. As a former CISO, technology leader, and US Navy Veteran, he brings a unique blend of strategic and operational expertise in information risk governance, IT e…
  continue reading
 
I had the opportunity to sit down with Jeff McCullough and Brad Reinboldt of NetAlly to find out what is new. Having spent many years with my trusty Link Sprinter, I was keen to hear what evolutions of products and services they might offer to help MSPs and MSSPs in troubleshooting networks, scanning for vulnerabilities, mapping to common framework…
  continue reading
 
Join your host, Ross Jordan, for an introduction to the earliest days of SkyTerra with co-founder, Darren Schriever. Learn about the reasons for founding the compny and highlights from the early years. Let's get started! To view more about SkyTerra Technologies, check out: https://skyterratech.com/ or https://www.linkedin.com/company/skyterra-techn…
  continue reading
 
Join Ross Jordan in discussions with IT and Business Professionals facing the challenges of navigating an ever changing IT environment. The conversations will be from a leadership level to ensure understanding of the technologies, and the impacts to your organization. This podcast will help you gain knowledge on leading edge technologies, practical…
  continue reading
 
Allie Hunter is a cybersecurity advocate and the author of Mothers Against Cyber Crime, a book that addresses the challenges parents face in protecting their families online. With a background in psychology, behavioral science, cybersecurity, and marketing, Allie weaves together real-life cyber incidents into compelling stories that offer practical…
  continue reading
 
Loading …
Listen to this show while you explore
Play