60 episodes

If you’re a managed security provider (MSP), managed security service provider (MSSP), virtual CISO, or a cybersecurity professional looking for insights and advice on ways to build bridges with your clients (or vice versa), look no further than Cyber for Hire | The Managed Security Podcast! Presented in partnership with MSSP Alert and ChannelE2E, Cyber for Hire, is a weekly 60-minute podcast (in two 30-minute segments) hosted by Ryan Morris, Principal Consultant at Morris Management Partners, and Bradley Barth, Director of Multimedia Content Strategy at CyberRisk Alliance. It’s the podcast where MSPs, vCISOs, and end-users take a united stand against cybercrime.

Cyber for Hire (Video‪)‬ MSSP Alert

    • Technology

If you’re a managed security provider (MSP), managed security service provider (MSSP), virtual CISO, or a cybersecurity professional looking for insights and advice on ways to build bridges with your clients (or vice versa), look no further than Cyber for Hire | The Managed Security Podcast! Presented in partnership with MSSP Alert and ChannelE2E, Cyber for Hire, is a weekly 60-minute podcast (in two 30-minute segments) hosted by Ryan Morris, Principal Consultant at Morris Management Partners, and Bradley Barth, Director of Multimedia Content Strategy at CyberRisk Alliance. It’s the podcast where MSPs, vCISOs, and end-users take a united stand against cybercrime.

    • video
    Endpoint Security: Entering the Era of AI and XDR. - CFH #30

    Endpoint Security: Entering the Era of AI and XDR. - CFH #30

    Endpoints are everywhere and come in many forms, and especially in today’s BYOD environment, it’s becoming increasingly difficult to maintain visibility and control over all of them. Unfortunately, rouge endpoints represent an enticing attack vendor for adversaries who are always looking for a way inside your network. But according to an August 2023 Cybersecurity Buyer Intelligence survey of 200 security and IT leaders and executives, security professionals are hopeful that newer, more advanced tools such as AI and XDR could help minimize endpoint compromises going forward. This session will analyze this and other key findings from CRA’s Endpoint Security research, and what the results mean from a managed services provider perspective.
    Show Notes: https://securityweekly.com/cfh-30

    • 12 min
    • video
    Level Up: How Managed Services Providers Can Exceed Evolving SecOps Expectations - Christopher Fielder - CFH #30

    Level Up: How Managed Services Providers Can Exceed Evolving SecOps Expectations - Christopher Fielder - CFH #30

    The days of an MSSP or MSP being a security device babysitter are over. Clients expect more from your SOC, SIEM and SecOps offerings, and evolving attacks will demand more of you. It's time to level up -- but how does one upgrade from basic to top-tier services? According to our featured speaker, there are several key steps: more comprehensive, cross-industry threat data collection; more refined, contextual and meaningful analysis of threat telemetry data; and ample use of threat intelligence, data science and security research. This interview will examine the key challenges and opportunities associated with these critical objectives.
    Show Notes: https://securityweekly.com/cfh-30

    • 36 min
    • video
    Sign Language: How to Write Effective Security Services Contracts - CFH #29

    Sign Language: How to Write Effective Security Services Contracts - CFH #29

    There's a lot that goes into the creation of a managed services contract before the client ever puts their John Hancock on the dotted line. As an MSSP, you want to make sure that expectations, for both sides of the relationship are spelled out clearly and cogently. The language within must address key terms and stipulations related to payments, roles and responsibilities, scope and scale of services, liability, and plenty more. In this segment, we'll discuss some of the most important clauses to include in your MSSP contracts, and how to avoid unfortunate omissions or vagueness that can result in confusion or disputes down the line.
    Show Notes: https://securityweekly.com/cfh-29 

    • 26 min
    • video
    Supply Chain Security: How Moving Accountability Upstream Helps & Hurts MSSPs - Dave Sobel - CFH #29

    Supply Chain Security: How Moving Accountability Upstream Helps & Hurts MSSPs - Dave Sobel - CFH #29

    One of the most significant takeaways of the White House's recently unveiled National Cybersecurity Strategy is the assertion that software developers, OEMs, and technology service providers must bear the brunt of the responsibility -- rather than end-users -- for keeping cyber environments secure. With the looming prospect of further legislation and regulations looming that could impose greater liabilities on software products and services, MSSPs and other cyber services providers must understand where they fit into the overall scheme of things. Are MSSPs an extension of the end-user or are they one of the upstream providers who will be held accountable when cyberattacks occur? In what ways will the burdens on MSSPs be reduced or shifted due to federal efforts around coordinated vulnerability disclosure, SBOM use and other supply chain security strategies? This segment will explore these key issues.
    Show Notes: https://securityweekly.com/cfh-29 

    • 35 min
    • video
    Equal Time? Ensuring Each MSSP Client  Gets Their Fair Share of Attention - CFH #28

    Equal Time? Ensuring Each MSSP Client  Gets Their Fair Share of Attention - CFH #28

    Every MSSP customer is different in their own way. But they all deserve to remain secure from attacks. And so it's important that managed services providers don't play favorites to the point where certain clients eat up a disproportionate amount of time and resources. MSSPs must ensure that they are fairly and proportionally allocating their account reps, technicians, support specialists, consultants, security analysts, pentesters and a host of other employees across their entire customer base. This segment will examine recommendations on how to better accomplish this objective.
     
    Show Notes: https://securityweekly.com/cfh-28 

    • 19 min
    • video
    Patrolling the dark web: The challenges and opportunities of outsourced threat intel - Alex Holden - CFH #28

    Patrolling the dark web: The challenges and opportunities of outsourced threat intel - Alex Holden - CFH #28

    Our guest for this segment spends his days where others dare not tread: the deep dark web. Here he collects information on cybercriminal activity that could be a precursor to major attack or evidence that one has already occurred. For companies that can't or won't conduct dark-web recon for themselves, outsourcing this threat intelligence service is a valuable option. Still, this kind of contracted services relationship works only if the provider keeps its intel reports relevant, customized and timely. This discussion will cover how to make the most out of such an arrangement, as well as real some of the most prevalent threats swirling around the corners of the dark web today.
     
    Show Notes: https://securityweekly.com/cfh-28 

    • 36 min

Top Podcasts In Technology

No Priors: Artificial Intelligence | Technology | Startups
Conviction | Pod People
All-In with Chamath, Jason, Sacks & Friedberg
All-In Podcast, LLC
Lex Fridman Podcast
Lex Fridman
Acquired
Ben Gilbert and David Rosenthal
Hard Fork
The New York Times
TED Radio Hour
NPR