Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo

MSSP Podcasts

show episodes
 
Artwork

1
The Growth Guild: Inside the Minds of IT CEOs

Christopher Larcade - Synergy Advisory

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Daily+
 
“Behind every thriving MSP/MSSP is a founder who cracked the growth code—these are their stories.” Founder-led IT leaders share exactly what it takes to break revenue plateaus, eliminate bottlenecks, and build MSP/MSSPs and other companies in the IT space that scale without founder burnout. Hosted by Chris Larcade, fractional CRO and growth strategist, each episode delivers actionable insights, battle-tested strategies, and unfiltered stories from the IT CEOs shaping the industry’s future.
  continue reading
 
If you’re a managed security provider (MSP), managed security service provider (MSSP), virtual CISO, or a cybersecurity professional looking for insights and advice on ways to build bridges with your clients (or vice versa), look no further than Cyber for Hire | The Managed Security Podcast! Presented in partnership with MSSP Alert and ChannelE2E, Cyber for Hire, is a weekly 60-minute podcast (in two 30-minute segments) hosted by Ryan Morris, Principal Consultant at Morris Management Partner ...
  continue reading
 
If you’re a managed security provider (MSP), managed security service provider (MSSP), virtual CISO, or a cybersecurity professional looking for insights and advice on ways to build bridges with your clients (or vice versa), look no further than Cyber for Hire | The Managed Security Podcast! Presented in partnership with MSSP Alert and ChannelE2E, Cyber for Hire, is a weekly 60-minute podcast (in two 30-minute segments) hosted by Ryan Morris, Principal Consultant at Morris Management Partner ...
  continue reading
 
The Defender’s Log Podcast: Stories from the Cybersecurity Frontlines The Defender’s Log is your front-row seat to the real-world battles shaping today’s cybersecurity landscape. Hosted by seasoned professionals, each episode brings you face-to-face with the sharpest minds in digital defense, MSP/MSSP founders, CISOs, threat researchers, and architects, who are redefining what it means to secure our connected world. From zero-trust frameworks to ransomware takedowns, from DNS hardening to in ...
  continue reading
 
Artwork

1
SkyTerra Podcast

Danny Joseph Bergeron

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Join Ross Jordan in discussions with IT and Business Professionals facing the challenges of navigating an ever changing IT environment. These conversations will be from a leadership level to ensure understanding of the technologies, and the impacts to your organization. This podcast will help you gain knowledge on leading edge technologies, practical knowledge, and help you identify ways to keep your team ahead of the technological curve, and ensure the challenges around technology are addre ...
  continue reading
 
Loading …
show series
 
In today's episode of the Defender's Log, we welcome special guest Tommy Jensen, an internet technologist with expertise in IPv6, Zero Trust, and standards. The episode covers Jensen's career journey from an AppleCare contractor to a pivotal role in advancing internet technologies. The discussion delves into the importance and challenges of migrati…
  continue reading
 
What happens when your company’s most valuable asset starts holding you back? In this episode of The Growth Guild, Chris Larcade talks with Nathan Flood, CEO of Kinber, about leading through massive business pivots — from selling a multi-million-dollar infrastructure asset to redefining the organization’s mission. Whether you run an MSP, MSSP, or I…
  continue reading
 
Husam Shbib is a cybersecurity consultant specializing in penetration testing, digital forensics, malware analysis, programming, and OSINT. He holds multiple certifications, including ICMDE, CCE, CCD, CCDFA, IWM, 3CE/I, eCDFP, etc. He spoke at conferences and events such as BlackHat MEA, ASFSFM, 3D Forensics and others. He is committed to cybersecu…
  continue reading
 
In this episode of 'The Defender's Log,' host David engages in a comprehensive discussion with John Todd, an influential figure in the defense technology space and a key player at Quad9. The conversation covers John's career journey, starting from the early days of commercial internet services to his current role at Quad9. They delve into the impor…
  continue reading
 
Husam Shbib is a cybersecurity consultant specializing in penetration testing, digital forensics, malware analysis, programming, and OSINT. He holds multiple certifications, including ICMDE, CCE, CCD, CCDFA, IWM, 3CE/I, eCDFP, etc. He spoke at conferences and events such as BlackHat MEA, ASFSFM, 3D Forensics and others. He is committed to cybersecu…
  continue reading
 
In the inaugural episode of 'The Defender’s Log,' host David Redekop converses with cybersecurity veteran Chester Wisniewski to explore the dynamic field of cybersecurity. They discuss the differentiation between privacy and security, the evolution of hacking from the 1980s to the present, and pivotal moments that reshaped information security. Che…
  continue reading
 
------------------------------------------------------------To learn more about Dark Rhiino Security visit https://www.darkrhiinosecurity.com------------------------------------------------------------SOCIAL MEDIA:Stay connected with us on our social media pages where we'll give you snippets, alerts for new podcasts, and even behind the scenes of o…
  continue reading
 
#SecurityConfidential #DarkRhiinoSecurityEd Gaudet is a thought leader on enterprise risk, third-party risk management, and the future of cyber governance in the age of AI. He brings over 25 years of software leadership experience in cybersecurity, risk management, and healthcare IT. Known for driving innovation at companies like Imprivata and Liqu…
  continue reading
 
#SecurityConfidential #DarkRhiinoSecurityEd Gaudet is a thought leader on enterprise risk, third-party risk management, and the future of cyber governance in the age of AI. He brings over 25 years of software leadership experience in cybersecurity, risk management, and healthcare IT. Known for driving innovation at companies like Imprivata and Liqu…
  continue reading
 
Bob Burke is the Chief Information Security Officer at Beyond Identity, where he plays a key role in building and securing the company’s identity-first access management platform. He has over 20 years of experience in cybersecurity and engineering leadership and brings deep expertise in identity, cloud infrastructure, compliance, and protecting mis…
  continue reading
 
Bob Burke is the Chief Information Security Officer at Beyond Identity, where he plays a key role in building and securing the company’s identity-first access management platform. He has over 20 years of experience in cybersecurity and engineering leadership and brings deep expertise in identity, cloud infrastructure, compliance, and protecting mis…
  continue reading
 
Santosh Kaveti is the CEO and Founder of ProArch. He has over 18 years of experience as a technologist, entrepreneur, investor, and advisor. Santosh’s vision and leadership have propelled ProArch to become a dominant force in key industry verticals, such as Energy, Healthcare & Lifesciences, and Manufacturing, where he leverages his expertise in ma…
  continue reading
 
Santosh Kaveti is the CEO and Founder of ProArch. He has over 18 years of experience as a technologist, entrepreneur, investor, and advisor. Santosh’s vision and leadership have propelled ProArch to become a dominant force in key industry verticals, such as Energy, Healthcare & Lifesciences, and Manufacturing, where he leverages his expertise in ma…
  continue reading
 
Alex Sharpe is a Security Confidential Alumni, board member, practitioner, speaker, and author. He started his career in the intelligence community, built two startups, recognized as a top thought leader in cybersecurity, risk management, cloud, and digital assets. 00:00 Intro02:20 Cybersecurity Imposters05:50 How do we prepare for the future?12:40…
  continue reading
 
Alex Sharpe is a Security Confidential Alumni, board member, practitioner, speaker, and author. He started his career in the intelligence community, built two startups, recognized as a top thought leader in cybersecurity, risk management, cloud, and digital assets. 00:00 Intro02:20 Cybersecurity Imposters05:50 How do we prepare for the future?12:40…
  continue reading
 
Henrik Parkkinen is a globally recognized security leader from Sweden with over 20 years in the cybersecurity field. His experience spans both offensive and defensive security, developed through a combination of hands-on technical roles, management and leadership positions. Henrik is known for his strategic thinking, strong leadership, and ability …
  continue reading
 
Henrik Parkkinen is a globally recognized security leader from Sweden with over 20 years in the cybersecurity field. His experience spans both offensive and defensive security, developed through a combination of hands-on technical roles, management and leadership positions. Henrik is known for his strategic thinking, strong leadership, and ability …
  continue reading
 
Chuck Brooks is a globally recognized cybersecurity thought leader, two-time Presidential appointee, Forbes contributor, and Adjunct Faculty at Georgetown University. Named a "Top 5 Tech Person to Follow" by LinkedIn and a "Top 50 Global Influencer in Risk and Compliance" by Thomson Reuters, Chuck has served in senior roles across government, indus…
  continue reading
 
Chuck Brooks is a globally recognized cybersecurity thought leader, two-time Presidential appointee, Forbes contributor, and Adjunct Faculty at Georgetown University. Named a "Top 5 Tech Person to Follow" by LinkedIn and a "Top 50 Global Influencer in Risk and Compliance" by Thomson Reuters, Chuck has served in senior roles across government, indus…
  continue reading
 
#SecurityConfidential #DarkRhiinoSecurityAlex Sharpe is a board member, practitioner, speaker, and author known for driving value while managing cyber risk. With a career that began in the intelligence community, Alex has since led strategic transformations across global enterprises, built two startups (including one with a successful IPO), and par…
  continue reading
 
Alex Sharpe is a board member, practitioner, speaker, and author known for driving value while managing cyber risk. With a career that began in the intelligence community, Alex has since led strategic transformations across global enterprises, built two startups (including one with a successful IPO), and participated in over 20 M&A transactions. Re…
  continue reading
 
#SecurityConfidential #DarkRhiinoSecurityJohn Carse is the Field CISO at SquareX and a seasoned cybersecurity leader with over 20 years of experience spanning the U.S. Navy, JPMorgan, Expedia, Dyson, and Rakuten. With a background in securing critical naval systems during his 14 years in the Navy, John has since built and led global security progra…
  continue reading
 
John Carse is the Field CISO at SquareX and a seasoned cybersecurity leader with over 20 years of experience spanning the U.S. Navy, JPMorgan, Expedia, Dyson, and Rakuten. With a background in securing critical naval systems during his 14 years in the Navy, John has since built and led global security programs across finance, tech, and e-commerce. …
  continue reading
 
Jon DiMaggio is the Chief Security Strategist at Analyst1 with over 15 years of experience tracking cyber threats. Specializing in enterprise ransomware and nation-state attacks, Jon is best known for infiltrating the LockBit ransomware gang during a two-year undercover operation. His research, including Ransomware Diaries and The Art of Cyberwarfa…
  continue reading
 
Jon DiMaggio is the Chief Security Strategist at Analyst1 with over 15 years of experience tracking cyber threats. Specializing in enterprise ransomware and nation-state attacks, Jon is best known for infiltrating the LockBit ransomware gang during a two-year undercover operation. His research, including Ransomware Diaries and The Art of Cyberwarfa…
  continue reading
 
Chris is a professional information technologist, author, trainer, manager, a lifelong learner, and Former Law Enforcement Officer. He has been creating courses for over 25 years and has been working as an author on Plurasight for 11 years. He has created over 80 IT Certification training courses (52 or so with Pluralsight) and his students have wa…
  continue reading
 
Chris is a professional information technologist, author, trainer, manager, a lifelong learner, and Former Law Enforcement Officer. He has been creating courses for over 25 years and has been working as an author on Plurasight for 11 years. He has created over 80 IT Certification training courses (52 or so with Pluralsight) and his students have wa…
  continue reading
 
Craig Taylor is a seasoned cybersecurity expert and entrepreneur with nearly 30 years of experience managing risk across industries—from Fortune 500 corporations to SMBs. As the Co-Founder and CEO of CyberHoot, he has pioneered a positive reinforcement approach to cybersecurity education, helping businesses eliminate risky behaviors and build a pos…
  continue reading
 
Craig Taylor is a seasoned cybersecurity expert and entrepreneur with nearly 30 years of experience managing risk across industries—from Fortune 500 corporations to SMBs. As the Co-Founder and CEO of CyberHoot, he has pioneered a positive reinforcement approach to cybersecurity education, helping businesses eliminate risky behaviors and build a pos…
  continue reading
 
#SecurityConfidential #DarkRhiinoSecurity Stacey Champagne is the Founder & CEO of Hacker in Heels, a community dedicated to advancing women in cybersecurity through coaching, courses, and events. With over a decade of experience leading cybersecurity programs at Fortune 500 companies and startups, she specializes in insider risk management, securi…
  continue reading
 
#SecurityConfidential #DarkRhiinoSecurity Stacey Champagne is the Founder & CEO of Hacker in Heels, a community dedicated to advancing women in cybersecurity through coaching, courses, and events. With over a decade of experience leading cybersecurity programs at Fortune 500 companies and startups, she specializes in insider risk management, securi…
  continue reading
 
#SecurityConfidential #darkrhiinosecurity Darren Mott, author of "Get Cyber Smart", is a retired FBI agent with 20 years of experience in cyber and counterintelligence investigations. He played a key role in strengthening FBI-Russian collaboration on cyber threats and created the FBI’s first program blending counterintelligence and cyber discipline…
  continue reading
 
#SecurityConfidential #darkrhiinosecurity Darren Mott, author of "Get Cyber Smart", is a retired FBI agent with 20 years of experience in cyber and counterintelligence investigations. He played a key role in strengthening FBI-Russian collaboration on cyber threats and created the FBI’s first program blending counterintelligence and cyber discipline…
  continue reading
 
#SecurityConfidential #DarkRhiinoSecurityFormer US Most Wanted turned Good Guy, Brett Johnson, also known as “The Original Internet Godfather,” was a key figure in the cybercrime world for over 20 years, founding ShadowCrew—the first organized cybercrime community. Brett was Convicted of 39 felonies and placed on the U.S. Most Wanted List, his expe…
  continue reading
 
#SecurityConfidential #DarkRhiinoSecurityFormer US Most Wanted turned Good Guy, Brett Johnson, also known as “The Original Internet Godfather,” was a key figure in the cybercrime world for over 20 years, founding ShadowCrew—the first organized cybercrime community. Brett was Convicted of 39 felonies and placed on the U.S. Most Wanted List, his expe…
  continue reading
 
#IECBusinessSummit #DarkRhiinoSecurityTest out our FREE CISO Bot :https://www.darkrhiinosecurity.com------------------------------------------------------------Music by Mykola Sosin from Pixabay------------------------------------------------------------SOCIAL MEDIA:Stay connected with us on our social media pages where we'll give you snippets, ale…
  continue reading
 
Sandra has over 25 years of experience in Cybersecurity, IT, and Data Privacy. She transformed her personal nightmare of identity theft into inspiration, helping individuals and businesses protect what matters most from hackers, scammers, and Cybermonsters®. She is a TEDx speaker, podcast host, corporate trainer, and international bestselling autho…
  continue reading
 
Tammy Klotz is a cybersecurity leader with over 20 years in IT and a decade as a CISO for global manufacturing firms. She has transformed cybersecurity programs, driven cultural change, and championed women in technology through mentorship and active involvement in groups like WiCyS and the Cloud Security Alliance. At Versum Materials, she develope…
  continue reading
 
#SecurityConfidential #DarkRhiinoSecurityKen Foster is a highly accomplished Security Expert with over 25 years of leadership experience in cybersecurity, infrastructure, and risk management. As a former CISO, technology leader, and US Navy Veteran, he brings a unique blend of strategic and operational expertise in information risk governance, IT e…
  continue reading
 
Join your host, Ross Jordan, for an introduction to the earliest days of SkyTerra with co-founder, Darren Schriever. Learn about the reasons for founding the compny and highlights from the early years. Let's get started! To view more about SkyTerra Technologies, check out: https://skyterratech.com/ or https://www.linkedin.com/company/skyterra-techn…
  continue reading
 
Join Ross Jordan in discussions with IT and Business Professionals facing the challenges of navigating an ever changing IT environment. The conversations will be from a leadership level to ensure understanding of the technologies, and the impacts to your organization. This podcast will help you gain knowledge on leading edge technologies, practical…
  continue reading
 
Allie Hunter is a cybersecurity advocate and the author of Mothers Against Cyber Crime, a book that addresses the challenges parents face in protecting their families online. With a background in psychology, behavioral science, cybersecurity, and marketing, Allie weaves together real-life cyber incidents into compelling stories that offer practical…
  continue reading
 
#SecurityConfidential #DarkRhiinoSecurity Ken is the former CEO, Executive Producer, and Television Host at Cyber Life. He is the Best-Selling Author of “Hack the Cybersecurity Interview: A complete interview preparation guide for jumpstarting your cybersecurity career”. He has been featured in Forbes, Reader's Digest, Tech Republic, Fox, NBC, Dark…
  continue reading
 
Jim Love is a strategic consultant and corporate advisor specializing in AI, technology, marketing, and business strategy. He is an accomplished author, journalist, professor, and podcast host, known for producing the popular shows Hashtag Trending and Cybersecurity Today, and is the publisher of Tech Newsday. Jim served as CIO and Chief Content Of…
  continue reading
 
Loading …
Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play