loader from loading.io

CFH #10 - Remote Monitoring & Management Hijackings

Cyber For Hire (Audio)

Release Date: 02/28/2023

How Managed Services Providers Can Exceed Evolving SecOps Expectations - Christopher Fielder - CFH #30 show art How Managed Services Providers Can Exceed Evolving SecOps Expectations - Christopher Fielder - CFH #30

Cyber For Hire (Audio)

The days of an MSSP or MSP being a security device babysitter are over. Clients expect more from your SOC, SIEM and SecOps offerings, and evolving attacks will demand more of you. It's time to level up -- but how does one upgrade from basic to top-tier services? According to our featured speaker, there are several key steps: more comprehensive, cross-industry threat data collection; more refined, contextual and meaningful analysis of threat telemetry data; and ample use of threat intelligence, data science and security research. This interview will examine the key challenges and opportunities...

info_outline
Supply Chain Security: How Moving Accountability Upstream Helps & Hurts MSSPs - Dave Sobel - CFH #29 show art Supply Chain Security: How Moving Accountability Upstream Helps & Hurts MSSPs - Dave Sobel - CFH #29

Cyber For Hire (Audio)

One of the most significant takeaways of the White House's recently unveiled National Cybersecurity Strategy is the assertion that software developers, OEMs, and technology service providers must bear the brunt of the responsibility -- rather than end-users -- for keeping cyber environments secure. With the looming prospect of further legislation and regulations looming that could impose greater liabilities on software products and services, MSSPs and other cyber services providers must understand where they fit into the overall scheme of things. Are MSSPs an extension of the end-user or are...

info_outline
Balancing Dark Web Threat Intel: Fair Attention for MSSPs - Alex Holden - CFH #28 show art Balancing Dark Web Threat Intel: Fair Attention for MSSPs - Alex Holden - CFH #28

Cyber For Hire (Audio)

Our guest for this segment spends his days where others dare not tread: the deep dark web. Here he collects information on cybercriminal activity that could be a precursor to major attack or evidence that one has already occurred. For companies that can't or won't conduct dark-web recon for themselves, outsourcing this threat intelligence service is a valuable option. Still, this kind of contracted services relationship works only if the provider keeps its intel reports relevant, customized and timely. This discussion will cover how to make the most out of such an arrangement, as well as real...

info_outline
Brian Johnson - CFH #27 show art Brian Johnson - CFH #27

Cyber For Hire (Audio)

Try as they might to keep their clients in compliance with privacy and security regulations, managed services providers are still at the mercy of the organizations they serve. Unfortunately, companies don't always follow the MSSP's or vCISO's advice on items like responsible data stewardship, privacy policies and breach notification. If an attack does transpire and the company draws the ire of regulators, the security services provider could even end up a scapegoat, or even embroiled in a liability case. This Q&A discussion will look at what resource an MSSP or vCISO service has when their...

info_outline
M&A Integration Challenges & Alert Fatigue: MSSP Strategies for Client Escalation - Jim Broome - CFH #26 show art M&A Integration Challenges & Alert Fatigue: MSSP Strategies for Client Escalation - Jim Broome - CFH #26

Cyber For Hire (Audio)

Last year, ChannelE2E listed more than 1,000 merger and acquisition deals involving MSPs, MSSPs and other similar service provider organizations. Typically when any M&A deal occurs, there are bound to be redundancies and overlaps in services, tools and personnel. For MSSPs that find themselves in this situation, it's important to consolidate and integrate the best of their assets across multiple entities, while maintaining operational consistency. This is no small task, but this segment will offer examples and tips to help move in the right direction. MSSP SOC analysts are often barraged...

info_outline
Quantifying Risk & Optimizing Responses: Scaling Your MSSP for Reduced Randomness - Ira Winkler - CFH #25 show art Quantifying Risk & Optimizing Responses: Scaling Your MSSP for Reduced Randomness - Ira Winkler - CFH #25

Cyber For Hire (Audio)

Risk isn't a static measurement. Threats like malware campaigns, vulnerabilities, human error and unreliable third-party partners can fluctuate in their severity depending on ever-changing circumstances. That's why knowing which risk is of highest priority at any given time can allow MSSPs to dynamically adjust their prevention and mitigation efforts, for both themselves and their clients. But which sources of risk do you measure, and what factors go into such a calculation? How frequently do you remeasure? And upon learning the latest risk scores, what are sound tactics for prioritization,...

info_outline
Going Passwordless: Preparing Your Clients for a Credentials-Free Future - Christine Owen - CFH #24 show art Going Passwordless: Preparing Your Clients for a Credentials-Free Future - Christine Owen - CFH #24

Cyber For Hire (Audio)

It's been a big year for the passwordless movement, with tech giants Apple, Google and Microsoft supporting the FIDO Alliance's efforts to replace conventional credentials with passkey technology. Still, passwords have long been engrained into people's daily routines, so users may need some convincing to change their behaviors. And likewise, managed security services providers may need to persuade their own corporate clients that passwordless is the future. This segment will examine some of the key breakthroughs and remaining challenges surrounding passwordless technologies from an MSSP...

info_outline
CFH #23 - Bill Brenner show art CFH #23 - Bill Brenner

Cyber For Hire (Audio)

Today marks the beginning of the Identiverse conference in Las Vegas, where leaders in security gather to discuss advancements in the world of identity and access management. For MSSPs that specialize in managed IAM services, it's important to stay on top of the latest trends, including those revealed in a series of reports and articles that CyberRisk Alliance has published as part of its overall Identiverse pre-show coverage. For starters, CRA's Security Buyer Intelligence Report on IAM looks at the progress organizations have made toward implementing user-friendly IAM, the biggest pain...

info_outline
CFH #22 - Don Pecha show art CFH #22 - Don Pecha

Cyber For Hire (Audio)

Infosec leaders shouldn't just be reporting to the board room to explain themselves when things go wrong. They should be a regular part of the strategic business discussions that take place inside a company's executive halls. That's true whether they're directly employed by the company or they're a contracted vCISO provided by an external managed services provider. In this segment, we'll discuss how managed service security leaders can land themselves a coveted spot in the board room and assert their influence on future business decisions.   It's understandable why many organizations'...

info_outline
CFH #21 - Merike Kaeo show art CFH #21 - Merike Kaeo

Cyber For Hire (Audio)

Risk assessment questionnaires are a standard practice when evaluating current or prospective third-party partners. And yet some folks may justifiably ask: How valuable are these questionnaires if there are no consequences for fudging your answers, or even outright lying? This session will examine common weaknesses and oversights in the third-party assessment process, while recommending how to improve vendor transparency by obtaining key documentation, asking the right questions, and enforcing regulations.   A great many MSSP security professionals are truly passionate about making the...

info_outline
 
More Episodes

In late January, CISA, the NSA and the MS-ISAC released an advisory warning about the malicious the use of legitimate remote monitoring and management software, after uncovering illegal hacking activity on two federal civilian executive branch networks. Whether compromised via social engineering or through exploits, RMM tools can grant unauthorized users potentially unfettered access to your MSP clients. So the question must be asked: Are you using RMM responsibly?

 

Network difficulties can crop up at any time, as can possible attacks. And companies like having the reassurance that at a moment's notice they can reach out to their MSSP for help. This segment will look at how managed security services providers can operate a top-notch, responsive support desk that meets or exceeds their clients' needs through best practices and policies, optimal workflows and automated tools. 

 

Show Notes: https://securityweekly.com/cfh10