Preview Mode Links will not work in preview mode

Secure Connections Podcast

Cyber Security represents both a challenge and opportunity for the IT Service Providers as their SMB and mid-market customers rely on them to keep their business operating and secure. As security threats continue to evolve, it’s imperative that ITSP’s strive to remain at the forefront of knowledge and education so they’re able to effectively service and protect their customers. The IoTSSA Editorial Team and Vendor Partners will deliver the content and solutions that members require to keep their clients protected.

Jan 12, 2022

Cybersecurity in 2022 looks to be an even hotter button than years past. Cybercriminals are becoming more persistent and devious than ever…This needs to be top of mind with business this year and moving forward.

Ryan catches up with Amelia Paro, Business Development Manager with ID Agent to discuss the Sales...


Dec 30, 2021

Brad Gross, Technology Legal Expert, looks into the crystal ball with Ryan to discuss what lies ahead for IT Service Providers in 2022 and beyond. High points that are going to affect providers and how these can affect services and your business moving forward.

  • Microsoft NCE Pricing
  • Implied Fiduciary Duties
  • Co-Managed...


Dec 8, 2021

‘Assume everything is dirty’ states PC Matic Vice President Corey Munson when he catches up with Ryan to talk Application White Listing. Adoption of a Zero Trust architecture provides users with essential security that fills gaps left by reactive endpoint protection software solutions, and provides an additional...


Dec 1, 2021

Al Alper, CEO at CyberGuard 360 takes a 10,000 foot view with Ryan and a look at the mindset of our customers and regulators. As Al states, ‘They don’t want War and Peace…just tell them what they want and need to know in plain English’. Visibility – Documentation – Audit Trail…The CyberGuard 360 roadmap to...


Nov 24, 2021

Danny Jenkins, CEO at ThreatLocker breaks down security stacks with Ryan. Controls, Detection and Training being the three main pillars. Where some go heavy with multiple layers of detection, controls can often time get over looked. Danny gives us a scenario where hackers can actually use a compromised customer...