Home
Categories
EXPLORE
True Crime
Comedy
Society & Culture
Business
Sports
Technology
History
About Us
Contact Us
Copyright
© 2024 PodJoint
Podjoint Logo
US
00:00 / 00:00
Sign in

or

Don't have an account?
Sign up
Forgot password
https://is1-ssl.mzstatic.com/image/thumb/Podcasts211/v4/11/9b/56/119b5668-9517-eec8-03c3-d6b461d27d42/mza_7558889660544782488.jpg/600x600bb.jpg
The CyberCall Podcast
Andrew Morgan
26 episodes
3 months ago
This week, we’re diving into three huge shifts happening in the Microsoft ecosystem that every MSP should have on their radar: · Token Protection is now available for Entra ID P1 licenses — and it’s a game changer for securing identity tokens and stopping session hijacking. · GDAP — the move from legacy DAP to Granular Delegated Admin Privileges — is creating both confusion and opportunity for MSPs managing multiple tenants. · And fo...
Show more...
Technology
RSS
All content for The CyberCall Podcast is the property of Andrew Morgan and is served directly from their servers with no modification, redirects, or rehosting. The podcast is not affiliated with or endorsed by Podjoint in any way.
This week, we’re diving into three huge shifts happening in the Microsoft ecosystem that every MSP should have on their radar: · Token Protection is now available for Entra ID P1 licenses — and it’s a game changer for securing identity tokens and stopping session hijacking. · GDAP — the move from legacy DAP to Granular Delegated Admin Privileges — is creating both confusion and opportunity for MSPs managing multiple tenants. · And fo...
Show more...
Technology
Episodes (20/26)
The CyberCall Podcast
From Tokens to Trust: Microsoft’s Biggest Security Shift Yet
This week, we’re diving into three huge shifts happening in the Microsoft ecosystem that every MSP should have on their radar: · Token Protection is now available for Entra ID P1 licenses — and it’s a game changer for securing identity tokens and stopping session hijacking. · GDAP — the move from legacy DAP to Granular Delegated Admin Privileges — is creating both confusion and opportunity for MSPs managing multiple tenants. · And fo...
Show more...
3 months ago
1 hour 1 minute

The CyberCall Podcast
From Milestone to Mandate: What the Latest CMMC Update Means for Your MSP & Your Clients
Big news for the defense and MSP community: The 48 CFR CMMC final rule has officially reached OMB review. This is the second-to-last milestone before publication in the Federal Register — and we’re expecting to see the final rule land by October with no 60-day delay. Translation? The phased rollout begins Q4 2025. If you work with defense contractors, or your clients do, the countdown just got very real. This week on The CyberCall (1pm EDT - URL in comments), we’ve got Jacob Horne, on...
Show more...
3 months ago
1 hour

The CyberCall Podcast
What Makes a Good vCISO & Delivering at Scale
Last week, we tackled a big one: 'Risk, Revenue, Responsibility: The Real Job of the vCISO — and it sparked an incredible conversation around how vCISOs are no longer just about frameworks and firewalls, but about protecting business outcomes, navigating executive risk, and helping clients make strategic decisions. This week, we’re taking it a step further. Because if you're serious about offering vCISO services as part of your MSP, you’re probably asking: What actually makes a great vCISO? A...
Show more...
3 months ago
1 hour 1 minute

The CyberCall Podcast
Risk, Revenue, and Responsibility: The vCISO’s Real Job
In this episode of The CyberCall, we're cutting through the noise and rethinking the true purpose of the vCISO role. It’s not just about frameworks, policies, and tech stacks, it’s about tying risk to business outcomes (risk to revenue). The vCISO’s true value goes way beyond compliance checklists and technical jargon; it’s about being a business partner/enabler, protecting critical revenue streams, and building executive trust. Leading vCISOs start every client conversation by asking: How d...
Show more...
3 months ago
1 hour 1 minute

The CyberCall Podcast
The Ingram Micro Cyber Incident & Building Security Maturity - F12’s ISO 27001Journey
Supply chain attacks doubled according to the 2025 Verizon DBIR. This week the channel awakens to Ingram Micro being attacked by the SafePay Ransomware group. Incident Response (IR) expert, Chris Loehr, EVP of Solis joins The CyberCall, to share perspective on the GlobalProtect VPN compromise. That’s why today on today's CyberCall, we’re talking about what MSPs can do right now to get serious about third-party risk—and why ISO 27001 may be the most important next step for your business. We're...
Show more...
4 months ago
1 hour 3 minutes

The CyberCall Podcast
The Intersection of AI, RPA & Cyber - What Your MSP Needs to Know
In this must-listen episode of The CyberCall, hosts Andrew Morgan, Phyllis Lee & Gary Pica are joined by Aharon Chernin, Founder & CEO of Rewst — to explore how Artificial Intelligence (AI), Robotic Process Automation (RPA), and Cybersecurity are colliding in today’s MSP landscape. Tune in to learn what your MSP needs to know now to stay ahead! Connect with Right of Boom: Website & Conference: https://rightofboom.com/ LinkedIn: https://www.linkedin.com/company/right-of-boom/...
Show more...
4 months ago
59 minutes

The CyberCall Podcast
CIS Controls - Version 8.1 Update Overview
With the release of NIST Cybersecurity Framework 2.0, CIS felt strongly that an update to The Controls was necessary to crossmap to CSF 2.0. Specifically the strongest driver, was the release of the Govern function.Co-hosts:Phyllis Lee: https://www.linkedin.com/in/phyllis-lee-21b58a1a4/Brian Blakely: https://www.linkedin.com/in/bblakley/Eric Woodard: https://www.linkedin.com/in/eric-woodard/Sponsored by Right of Boom cybersecurity conference: https://www.rightofboom.com/
Show more...
1 year ago
52 minutes

The CyberCall Podcast
CIS Control 18 - Penetration Testing - Sponsored by Hacket Cyber
Penetration testing is something that more companies and organizations should be considering a necessary expense. Pen Testing is an important aspect of discovery and identifying potential critical vulnerabilities within your organizations external network, internal network, applications, or systems. They provide a valuable insight on how your digital and human assets perform.In this episode we review the criticality of scoping a Pen Test, along with differences between Pen Testing, Red ...
Show more...
2 years ago
1 hour 6 minutes

The CyberCall Podcast
CIS Control 17 - Incident Response Management - Sponsored by Exigence
The biggest takeaway from CIS Control 17 is that planning and communication are critical when responding to an incident. The longer an intruder has access to your network, the more time they’ve had to embed themselves into your systems. Communicating with everyone involved can help limit the duration between attack and clean-up.Establish a program to develop and maintain an incident response capability (e.g., policies, plans, procedures, defined roles, training, and communications) to prepare...
Show more...
2 years ago
53 minutes

The CyberCall Podcast
CIS Control 16 - Application Software Security - Sponsored by Manicode
CIS Control 16 - Application Software SecurityThe way in which we interact with applications has changed dramatically over years. Organizations use applications in day-to-day operations to manage their most sensitive data and control access to system resources. Instead of traversing a labyrinth of networks and systems, attackers today see an opening to turn an organizations applications against it to bypass network security controls and compromise sensitive data. NOTE: Crowdstrike notes...
Show more...
2 years ago
1 hour 6 minutes

The CyberCall Podcast
CIS Control 15 - Service Provider Management
LastPass and the recent Rackspace Exchange incident are two prime examples of "why" this Control is Critical!!Develop a process to evaluate service providers who hold sensitive data, or are responsible for critical IT platforms or processes, to ensure these providers are protecting those platforms and data appropriately.Identify your business needs and create a set of standards that can be used to grade services providers that are being proposed. Organize and monitor all services provide...
Show more...
2 years ago
1 hour 2 minutes

The CyberCall Podcast
CIS Control 14 - Security Awareness and Skills Training - sponsored by Phin Security
MSP/MSSPs should offer solutions to provide users with frequent security awareness training to increase its overall security posture. The information provided by the security awareness training should be relevant and provide insights into recent security incidents. Training should also reiterate the necessity of using strong passwords, spotting and reporting phishing attacks, as well as properly handling personal information. Security awareness training should include frequent phishing t...
Show more...
2 years ago
1 hour 17 minutes

The CyberCall Podcast
CIS Control 13 - Network Monitoring and Defense - sponsor by ConnectWise
Network monitoring and defense is one of only two controls that does not contain any Implementation Group 1 Safeguards in Controls version 8. This control is geared towards mature MSPs, MSSPs & organizations who have a mindset of continuous improvement that involves people, process, and technology. Service providers need a well-trained staff that executes on their network monitoring, detection, logging, correlation of events in order to thwart malicious attac...
Show more...
3 years ago
1 hour 6 minutes

The CyberCall Podcast
CIS Control 12 - Network Infrastructure Management - sponsored by Domotz!
Abstract: Network Infrastructure Management - Establish, implement, and actively manage network devices, in order to prevent attackers from exploiting vulnerable network services and access points. Network infrastructure devices can be physical or virtual and include things such as routers, switches, firewalls, and wireless access points. Unfortunately, many devices are shipped from manufacturers with “default” configuration settings and passwords that, if deployed as-is, can significant...
Show more...
3 years ago
57 minutes

The CyberCall Podcast
CIS Control 11 - Data Recovery - sponsored by Datto!
Abstract: Data loss can be a consequence of a variety of factors from malicious ransomware, threat actors using "Double Extortion" and exfiltration, human error and natural disasters like hurricanes. Regardless of the reason for data loss, we need to have a process established (RPO/RTO) to recover our data. Key Takeaways for Control 11Prioritize your data and come up with a data recovery plan.Protect your backed up data. (See Control 3: Data Protection.)Practice and Test restoring ...
Show more...
3 years ago
1 hour 4 minutes

The CyberCall Podcast
CIS Control 10 - Malware Defenses - sponsored by Malwarebytes!
Abstract: With the continuing rise of ransomware, malware defenses are more critical than ever before with regard to securing your MSP and clients. Malware defenses must be able to operate in a dynamic environment through automation, timely and rapid updating, and integrate with other processes like vulnerability management and incident response. Anti-Malware technologies have become an after thought in many organizations, a technology that they’ve always had, always used, and ne...
Show more...
3 years ago
48 minutes

The CyberCall Podcast
CIS Control 9 - Email & Web Browser Protections - sponsored by Cisco Secure MSP
Abstract: Web browsers and email clients are very common points of entry for attackers because of their direct interaction with users inside an organization. Content can be crafted to entice or spoof users into disclosing credentials, providing sensitive data, or providing an open channel to allow attackers to gain access, thus increasing risk to your MSP or client's business. Since email and web are the main means that users interact with external and untrusted users and environm...
Show more...
3 years ago
56 minutes

The CyberCall Podcast
CIS Control 8 - Audit Log Management - sponsored by Blackpoint Cyber
Abstract: Log collection and analysis is critical for an organization's ability to detect malicious activity quickly. Sometimes audit logs are the only evidence of a successful attack. Attackers know that many organizations keep audit logs for compliance purposes, but rarely analyze them. Due to poor log analysis processes, attackers sometimes control victim machines for months or years without anyone in the target organization knowing. In this episode, learn about us...
Show more...
3 years ago
59 minutes

The CyberCall Podcast
CIS Control 7 - Continuous Vulnerability Management - sponsored by CyberCNS
Note we discuss Log4j as this is a very timely topic to this control. Abstract: Cyber defenders are constantly being challenged from attackers who are looking for vulnerabilities within their infrastructure to exploit and gain access. Defenders must have timely threat information available to them about: software updates, patches, security advisories, threat bulletins, etc., and they should regularly review their environment to identify these vulnerabilities before the attackers do. Understan...
Show more...
3 years ago
54 minutes

The CyberCall Podcast
CIS Control 6 - Access Control Management - sponsored by Appgate
Abstract: It is easier for an external or internal threat actor to gain unauthorized access to assets or data through using valid user credentials than through "hacking" the environment. There are many ways to covertly obtain access to user accounts, including: week passwords, accounts still valid after a user leaves the organization, dormant or lingering test accounts, shared accounts that have not been changed in months or years, service accounts embedded in applications for scripts, ...
Show more...
3 years ago
52 minutes

The CyberCall Podcast
This week, we’re diving into three huge shifts happening in the Microsoft ecosystem that every MSP should have on their radar: · Token Protection is now available for Entra ID P1 licenses — and it’s a game changer for securing identity tokens and stopping session hijacking. · GDAP — the move from legacy DAP to Granular Delegated Admin Privileges — is creating both confusion and opportunity for MSPs managing multiple tenants. · And fo...