The CyberCall Podcast
Episodes
Is AI “Poisoning” Your MSPs Marketing?
31 Mar 2026
Contributed by Lukas
Last week, a supply chain attack hit LiteLLM the open-source AI gateway that sits inside 36% of cloud environment and for about six hours, anyone who ...
AI Installed the Backdoor. Now What?
23 Mar 2026
Contributed by Lukas
Imagine this. A developer opens their laptop. Gets a routine VS Code update notification. Clicks install. Goes back to work.What they don't know ...
Code Wars: How Nation-States Really Launch Cyberattacks
17 Mar 2026
Contributed by Lukas
For years, many of us have thought about cyberattacks as criminals chasing money. But when you zoom out, you realize something much bigger is happenin...
Iran Knocked Out AWS. Your Clients' Business Continuity Plan Wasn't Built for This
09 Mar 2026
Contributed by Lukas
On February 28th, the United States and Israel launched coordinated strikes on Iran. Most people know that part.What most people don't know is th...
From Tech Talk to Table Talk
03 Mar 2026
Contributed by Lukas
There’s a conversation happening in boardrooms right now that most security professionals aren’t equipped to lead. Not because they don’t unders...
Incident Response Simplified
24 Feb 2026
Contributed by Lukas
There's a concept in military and emergency response called the fog of war — that moment when everything is happening at once, information is i...
The Hard Truths About M365 Security
17 Feb 2026
Contributed by Lukas
Last week at Right of Boom, something interesting happened.In a conference full of great sessions, one stood out — not because of hype, but because ...
Beyond Zero-Days: What Real Threat Hunting Is Actually Finding
27 Jan 2026
Contributed by Lukas
Every week there’s a new zero-day, a new CVE, a new headline. But what rarely gets talked about is what real threat hunting is uncovering when you a...
AI & Third Party Risk
21 Jan 2026
Contributed by Lukas
Welcome back to The CyberCall. Today we’re tackling one of the fastest-growing risks MSPs face: third-party exposure in the age of AI.Our guest is G...
John Strand & the BHIS Team at RoB26
14 Jan 2026
Contributed by Lukas
Today’s conversation is all about how MSPs actually win in the modern threat landscape — before, during, and after an attack.We’re joined by thr...
The Year of Identity Based Attacks
08 Jan 2026
Contributed by Lukas
In 2025, attackers aren’t breaking in through zero-days — they’re logging in. Identity has become the primary attack surface, and once access is...
ISO & CMMC – Lessons Learned During Audits
29 Dec 2025
Contributed by Lukas
Welcome back to The CyberCall. Our guest, Joy Beland from Summit7, helps lead security and compliance at the largest MSP serving the Defense Industria...
Your 2026 Business Plan – Impacts of AI, Cyber & Automation on MSPs.
09 Dec 2025
Contributed by Lukas
Most MSPs don’t fail because of ransomware. They fail because they drift. They chase revenue without direction. They stack tools without a strategy....
Faster, Smarter, Scalable: The Future of M365 Management
25 Nov 2025
Contributed by Lukas
Today’s conversation is all about what comes next for Microsoft 365 — because after Ignite, it’s clear that we’re entering a brand-new era. AI...
The Ulimate Partner – Building an MSP Growth Engine with Microsoft
18 Nov 2025
Contributed by Lukas
Today we’re talking about what it really takes to partner with a giant.Every MSP wants to grow alongside hyperscalers like Microsoft — but few tru...
From Bouncer to MSP Baller – How to Make Microsoft Notice Your MSP
11 Nov 2025
Contributed by Lukas
Today’s guest has one of the most unconventional origin stories in the MSP world. Nabil Aitoumeziane started his career not behind a keyboard—but ...
The State of Pen Testing in 2025 & the Role of AI & Autonomous Solutions (with John Strand)
03 Nov 2025
Contributed by Lukas
Today we’re talking about one of the biggest shifts in offensive security that MSPs, CISOs, and defenders cannot ignore.For years, pen testing was a...
ZTNA & SASE, the Next Era for MSPs
27 Oct 2025
Contributed by Lukas
Today we’re tackling one of the biggest shifts in modern network security. VPNs are breaking under the weight of hybrid work, SaaS sprawl, and const...
The Human Lag: Why AI Outpaces Operational Readiness
14 Oct 2025
Contributed by Lukas
Artificial intelligence is evolving faster than most organizations can operationally absorb. We’ve automated analysis, accelerated response, and eve...
Disinformation Security – Deepfakes & Social Deception
06 Oct 2025
Contributed by Lukas
This week on The CyberCall, we’re turning up the heat on deepfakes & disinformation—why they’re no longer sci-fi, and how they’re already ...
NIST Small Business Primer and Quick Start Guides
30 Sep 2025
Contributed by Lukas
Today we’re talking about something that may sound government-heavy but is actually critical for MSPs and the SMBs they serve: the new NIST Small Bu...
Microsegmentation Demystified: What Every MSP & Client Should Know
23 Sep 2025
Contributed by Lukas
Today we’re tackling microsegmentation—a solution that could change the game against ransomware.Ransomware thrives on lateral movement: one compro...
AI’s Evolving Role in Attacks & Incident Reponse
16 Sep 2025
Contributed by Lukas
Over the past couple of days, I was digging into the latest Anthropic Threat Report and one section really hit me.They wrote: ‘We’ve developed sop...
Encryption to Extortion, the Evolution of Cloud Based Attacks
08 Sep 2025
Contributed by Lukas
In this session we talk about Salesloft Drift and the implications of OAuth based attacks. Companies use Drift with Salesloft to automate lead capture...
When Cyber Hits the Fan: How Your Contracts Protect or Expose You
25 Aug 2025
Contributed by Lukas
Last week, we dug into the surge of SonicWall VPN compromises. At first, there was speculation about a possible new zero day — but as the dust settl...
Akira Ransomware’s Relentless Attack on SonicWall SSLVPNs
18 Aug 2025
Contributed by Lukas
In this session of The CyberCall, we’re cutting straight into one of the most relentless threats MSPs and their clients are facing right now—targe...
Selling IT & Cybersecurity Services to the CFO (the one who writes the checks)
11 Aug 2025
Contributed by Lukas
When MSPs are selling IT and security services, the real decision often comes from the person who owns the budget and measures the risk — the CFO. I...
From Tokens to Trust: Microsoft’s Biggest Security Shift Yet
04 Aug 2025
Contributed by Lukas
This week, we’re diving into three huge shifts happening in the Microsoft ecosystem that every MSP should have on their radar:· Token Prote...
From Milestone to Mandate: What the Latest CMMC Update Means for Your MSP & Your Clients
28 Jul 2025
Contributed by Lukas
Big news for the defense and MSP community:The 48 CFR CMMC final rule has officially reached OMB review. This is the second-to-last milestone before p...
What Makes a Good vCISO & Delivering at Scale
21 Jul 2025
Contributed by Lukas
Last week, we tackled a big one: 'Risk, Revenue, Responsibility: The Real Job of the vCISO — and it sparked an incredible conversation around h...
Risk, Revenue, and Responsibility: The vCISO’s Real Job
14 Jul 2025
Contributed by Lukas
In this episode of The CyberCall, we're cutting through the noise and rethinking the true purpose of the vCISO role. It’s not just about framew...
The Ingram Micro Cyber Incident & Building Security Maturity - F12’s ISO 27001Journey
08 Jul 2025
Contributed by Lukas
Supply chain attacks doubled according to the 2025 Verizon DBIR. This week the channel awakens to Ingram Micro being attacked by the SafePay Ransomwar...
The Intersection of AI, RPA & Cyber - What Your MSP Needs to Know
03 Jul 2025
Contributed by Lukas
In this must-listen episode of The CyberCall, hosts Andrew Morgan, Phyllis Lee & Gary Pica are joined by Aharon Chernin, Founder & CEO of Rews...
CIS Controls - Version 8.1 Update Overview
09 Aug 2024
Contributed by Lukas
With the release of NIST Cybersecurity Framework 2.0, CIS felt strongly that an update to The Controls was necessary to crossmap to CSF 2.0. Specifica...
CIS Control 18 - Penetration Testing - Sponsored by Hacket Cyber
26 Jul 2023
Contributed by Lukas
Penetration testing is something that more companies and organizations should be considering a necessary expense. Pen Testing is an important aspect...
CIS Control 17 - Incident Response Management - Sponsored by Exigence
02 Jun 2023
Contributed by Lukas
The biggest takeaway from CIS Control 17 is that planning and communication are critical when responding to an incident. The longer an intruder has ac...
CIS Control 16 - Application Software Security - Sponsored by Manicode
14 Mar 2023
Contributed by Lukas
CIS Control 16 - Application Software SecurityThe way in which we interact with applications has changed dramatically over years. Organizations use ap...
CIS Control 15 - Service Provider Management
22 Jan 2023
Contributed by Lukas
LastPass and the recent Rackspace Exchange incident are two prime examples of "why" this Control is Critical!!Develop a process to evaluate ...
CIS Control 14 - Security Awareness and Skills Training - sponsored by Phin Security
09 Nov 2022
Contributed by Lukas
MSP/MSSPs should offer solutions to provide users with frequent security awareness training to increase its overall security posture. The information ...
CIS Control 13 - Network Monitoring and Defense - sponsor by ConnectWise
29 Sep 2022
Contributed by Lukas
Network monitoring and defense is one of only two controls that does not contain any Implementation Group 1 Safeguards in Controls version 8. This c...
CIS Control 12 - Network Infrastructure Management - sponsored by Domotz!
07 Jul 2022
Contributed by Lukas
Abstract: Network Infrastructure Management - Establish, implement, and actively manage network devices, in order to prevent attackers from exploiting...
CIS Control 11 - Data Recovery - sponsored by Datto!
24 May 2022
Contributed by Lukas
Abstract: Data loss can be a consequence of a variety of factors from malicious ransomware, threat actors using "Double Extortion" and exfil...
CIS Control 10 - Malware Defenses - sponsored by Malwarebytes!
26 Apr 2022
Contributed by Lukas
Abstract: With the continuing rise of ransomware, malware defenses are more critical than ever before with regard to securing your MSP and clients. ...
CIS Control 9 - Email & Web Browser Protections - sponsored by Cisco Secure MSP
17 Mar 2022
Contributed by Lukas
Abstract: Web browsers and email clients are very common points of entry for attackers because of their direct interaction with users inside an organi...
CIS Control 8 - Audit Log Management - sponsored by Blackpoint Cyber
12 Feb 2022
Contributed by Lukas
Abstract: Log collection and analysis is critical for an organization's ability to detect malicious activity quickly. Sometimes audit logs are ...
CIS Control 7 - Continuous Vulnerability Management - sponsored by CyberCNS
22 Dec 2021
Contributed by Lukas
Note we discuss Log4j as this is a very timely topic to this control. Abstract: Cyber defenders are constantly being challenged from attackers who are...
CIS Control 6 - Access Control Management - sponsored by Appgate
23 Nov 2021
Contributed by Lukas
Abstract: It is easier for an external or internal threat actor to gain unauthorized access to assets or data through using valid user credentials tha...
CIS Control 5 - Account Management - sponsored by Keeper Security
19 Oct 2021
Contributed by Lukas
Abstract: There are many ways to covertly obtain access to user accounts, including: week passwords, accounts still valid after a user leaves the ente...
Control 4: Secure Configuration of Enterprise Assets - sponsored by ThreatLocker
26 Aug 2021
Contributed by Lukas
Abstract: Learn why the number one thing organizations can do to defend their networks against top attacks, is to implement secure configurations! A...
Control 3: Data Protection (part 2) - Sponsored by Datto
09 Jul 2021
Contributed by Lukas
Abstract: CIS Control 3 is Data Protection and data is pretty much what's at stake for a high percentage of cyber attacks. Data is more valuabl...
Control 3: Data Protection (part 1) - Sponsored by Netwrix
09 Jul 2021
Contributed by Lukas
Abstract: CIS Control 3 is Data Protection and data is pretty much what's at stake for a high percentage of cyber attacks. Data is more valuabl...
Control 1 & 2: Inventory Control of Enterprise Hardware & Software Assets - Sponsored by CyberCNS
09 Jun 2021
Contributed by Lukas
Abstract: There is a cybersecurity saying; “you can’t protect what you don’t know about.” Without visibility into your information assets, t...
Multifactor Authentication (MFA) - sponsored by Cisco Duo
11 May 2021
Contributed by Lukas
Google reports that Multifactor Authentication (MFA) prevents more than 96% of bulk phishing attempts and more than 76% of targeted attacks that are c...