Menu
Sign In Search Podcasts Charts People & Topics Add Podcast API Blog Pricing
Podcast Image

The CyberCall Podcast

Technology

Activity Overview

Episode publication activity over the past year

Episodes

Is AI “Poisoning” Your MSPs Marketing?

31 Mar 2026

Contributed by Lukas

Last week, a supply chain attack hit LiteLLM the open-source AI gateway that sits inside 36% of cloud environment and for about six hours, anyone who ...

AI Installed the Backdoor. Now What?

23 Mar 2026

Contributed by Lukas

Imagine this. A developer opens their laptop. Gets a routine VS Code update notification. Clicks install. Goes back to work.What they don't know ...

Code Wars: How Nation-States Really Launch Cyberattacks

17 Mar 2026

Contributed by Lukas

For years, many of us have thought about cyberattacks as criminals chasing money. But when you zoom out, you realize something much bigger is happenin...

Iran Knocked Out AWS. Your Clients' Business Continuity Plan Wasn't Built for This

09 Mar 2026

Contributed by Lukas

On February 28th, the United States and Israel launched coordinated strikes on Iran. Most people know that part.What most people don't know is th...

From Tech Talk to Table Talk

03 Mar 2026

Contributed by Lukas

There’s a conversation happening in boardrooms right now that most security professionals aren’t equipped to lead. Not because they don’t unders...

Incident Response Simplified

24 Feb 2026

Contributed by Lukas

There's a concept in military and emergency response called the fog of war — that moment when everything is happening at once, information is i...

The Hard Truths About M365 Security

17 Feb 2026

Contributed by Lukas

Last week at Right of Boom, something interesting happened.In a conference full of great sessions, one stood out — not because of hype, but because ...

Beyond Zero-Days: What Real Threat Hunting Is Actually Finding

27 Jan 2026

Contributed by Lukas

Every week there’s a new zero-day, a new CVE, a new headline. But what rarely gets talked about is what real threat hunting is uncovering when you a...

AI & Third Party Risk

21 Jan 2026

Contributed by Lukas

Welcome back to The CyberCall. Today we’re tackling one of the fastest-growing risks MSPs face: third-party exposure in the age of AI.Our guest is G...

John Strand & the BHIS Team at RoB26

14 Jan 2026

Contributed by Lukas

Today’s conversation is all about how MSPs actually win in the modern threat landscape — before, during, and after an attack.We’re joined by thr...

The Year of Identity Based Attacks

08 Jan 2026

Contributed by Lukas

In 2025, attackers aren’t breaking in through zero-days — they’re logging in. Identity has become the primary attack surface, and once access is...

ISO & CMMC – Lessons Learned During Audits

29 Dec 2025

Contributed by Lukas

Welcome back to The CyberCall. Our guest, Joy Beland from Summit7, helps lead security and compliance at the largest MSP serving the Defense Industria...

Your 2026 Business Plan – Impacts of AI, Cyber & Automation on MSPs.

09 Dec 2025

Contributed by Lukas

Most MSPs don’t fail because of ransomware. They fail because they drift. They chase revenue without direction. They stack tools without a strategy....

Faster, Smarter, Scalable: The Future of M365 Management

25 Nov 2025

Contributed by Lukas

Today’s conversation is all about what comes next for Microsoft 365 — because after Ignite, it’s clear that we’re entering a brand-new era. AI...

The Ulimate Partner – Building an MSP Growth Engine with Microsoft

18 Nov 2025

Contributed by Lukas

Today we’re talking about what it really takes to partner with a giant.Every MSP wants to grow alongside hyperscalers like Microsoft — but few tru...

From Bouncer to MSP Baller – How to Make Microsoft Notice Your MSP

11 Nov 2025

Contributed by Lukas

Today’s guest has one of the most unconventional origin stories in the MSP world. Nabil Aitoumeziane started his career not behind a keyboard—but ...

The State of Pen Testing in 2025 & the Role of AI & Autonomous Solutions (with John Strand)

03 Nov 2025

Contributed by Lukas

Today we’re talking about one of the biggest shifts in offensive security that MSPs, CISOs, and defenders cannot ignore.For years, pen testing was a...

ZTNA & SASE, the Next Era for MSPs

27 Oct 2025

Contributed by Lukas

Today we’re tackling one of the biggest shifts in modern network security. VPNs are breaking under the weight of hybrid work, SaaS sprawl, and const...

The Human Lag: Why AI Outpaces Operational Readiness

14 Oct 2025

Contributed by Lukas

Artificial intelligence is evolving faster than most organizations can operationally absorb. We’ve automated analysis, accelerated response, and eve...

Disinformation Security – Deepfakes & Social Deception

06 Oct 2025

Contributed by Lukas

This week on The CyberCall, we’re turning up the heat on deepfakes & disinformation—why they’re no longer sci-fi, and how they’re already ...

NIST Small Business Primer and Quick Start Guides

30 Sep 2025

Contributed by Lukas

Today we’re talking about something that may sound government-heavy but is actually critical for MSPs and the SMBs they serve: the new NIST Small Bu...

Microsegmentation Demystified: What Every MSP & Client Should Know

23 Sep 2025

Contributed by Lukas

Today we’re tackling microsegmentation—a solution that could change the game against ransomware.Ransomware thrives on lateral movement: one compro...

AI’s Evolving Role in Attacks & Incident Reponse

16 Sep 2025

Contributed by Lukas

Over the past couple of days, I was digging into the latest Anthropic Threat Report and one section really hit me.They wrote: ‘We’ve developed sop...

Encryption to Extortion, the Evolution of Cloud Based Attacks

08 Sep 2025

Contributed by Lukas

In this session we talk about Salesloft Drift and the implications of OAuth based attacks. Companies use Drift with Salesloft to automate lead capture...

When Cyber Hits the Fan: How Your Contracts Protect or Expose You

25 Aug 2025

Contributed by Lukas

Last week, we dug into the surge of SonicWall VPN compromises. At first, there was speculation about a possible new zero day — but as the dust settl...

Akira Ransomware’s Relentless Attack on SonicWall SSLVPNs

18 Aug 2025

Contributed by Lukas

In this session of The CyberCall, we’re cutting straight into one of the most relentless threats MSPs and their clients are facing right now—targe...

Selling IT & Cybersecurity Services to the CFO (the one who writes the checks)

11 Aug 2025

Contributed by Lukas

When MSPs are selling IT and security services, the real decision often comes from the person who owns the budget and measures the risk — the CFO. I...

From Tokens to Trust: Microsoft’s Biggest Security Shift Yet

04 Aug 2025

Contributed by Lukas

This week, we’re diving into three huge shifts happening in the Microsoft ecosystem that every MSP should have on their radar:·      Token Prote...

From Milestone to Mandate: What the Latest CMMC Update Means for Your MSP & Your Clients

28 Jul 2025

Contributed by Lukas

Big news for the defense and MSP community:The 48 CFR CMMC final rule has officially reached OMB review. This is the second-to-last milestone before p...

What Makes a Good vCISO & Delivering at Scale

21 Jul 2025

Contributed by Lukas

Last week, we tackled a big one: 'Risk, Revenue, Responsibility: The Real Job of the vCISO — and it sparked an incredible conversation around h...

Risk, Revenue, and Responsibility: The vCISO’s Real Job

14 Jul 2025

Contributed by Lukas

In this episode of The CyberCall, we're cutting through the noise and rethinking the true purpose of the vCISO role. It’s not just about framew...

The Ingram Micro Cyber Incident & Building Security Maturity - F12’s ISO 27001Journey

08 Jul 2025

Contributed by Lukas

Supply chain attacks doubled according to the 2025 Verizon DBIR. This week the channel awakens to Ingram Micro being attacked by the SafePay Ransomwar...

The Intersection of AI, RPA & Cyber - What Your MSP Needs to Know

03 Jul 2025

Contributed by Lukas

In this must-listen episode of The CyberCall, hosts Andrew Morgan, Phyllis Lee & Gary Pica are joined by Aharon Chernin, Founder & CEO of Rews...

CIS Controls - Version 8.1 Update Overview

09 Aug 2024

Contributed by Lukas

With the release of NIST Cybersecurity Framework 2.0, CIS felt strongly that an update to The Controls was necessary to crossmap to CSF 2.0. Specifica...

CIS Control 18 - Penetration Testing - Sponsored by Hacket Cyber

26 Jul 2023

Contributed by Lukas

Penetration testing is something that more companies and organizations should be considering a necessary expense. Pen Testing  is an important aspect...

CIS Control 17 - Incident Response Management - Sponsored by Exigence

02 Jun 2023

Contributed by Lukas

The biggest takeaway from CIS Control 17 is that planning and communication are critical when responding to an incident. The longer an intruder has ac...

CIS Control 16 - Application Software Security - Sponsored by Manicode

14 Mar 2023

Contributed by Lukas

CIS Control 16 - Application Software SecurityThe way in which we interact with applications has changed dramatically over years. Organizations use ap...

CIS Control 15 - Service Provider Management

22 Jan 2023

Contributed by Lukas

LastPass and the recent Rackspace Exchange incident are two prime examples of "why" this Control is Critical!!Develop a process to evaluate ...

CIS Control 14 - Security Awareness and Skills Training - sponsored by Phin Security

09 Nov 2022

Contributed by Lukas

MSP/MSSPs should offer solutions to provide users with frequent security awareness training to increase its overall security posture. The information ...

CIS Control 13 - Network Monitoring and Defense - sponsor by ConnectWise

29 Sep 2022

Contributed by Lukas

Network monitoring and defense is one of only two controls that does not contain any Implementation Group 1 Safeguards in Controls version 8.  This c...

CIS Control 12 - Network Infrastructure Management - sponsored by Domotz!

07 Jul 2022

Contributed by Lukas

Abstract: Network Infrastructure Management - Establish, implement, and actively manage network devices, in order to prevent attackers from exploiting...

CIS Control 11 - Data Recovery - sponsored by Datto!

24 May 2022

Contributed by Lukas

Abstract: Data loss can be a consequence of a variety of factors from malicious ransomware, threat actors using "Double Extortion" and exfil...

CIS Control 10 - Malware Defenses - sponsored by Malwarebytes!

26 Apr 2022

Contributed by Lukas

Abstract: With the continuing rise of ransomware, malware defenses are more critical than ever before with regard to securing your MSP and clients.  ...

CIS Control 9 - Email & Web Browser Protections - sponsored by Cisco Secure MSP

17 Mar 2022

Contributed by Lukas

Abstract: Web browsers and email clients are very common points of entry for attackers because of their direct interaction with users inside an organi...

CIS Control 8 - Audit Log Management - sponsored by Blackpoint Cyber

12 Feb 2022

Contributed by Lukas

Abstract: Log collection and analysis is critical for an organization's ability to detect malicious activity quickly.  Sometimes audit logs are ...

CIS Control 7 - Continuous Vulnerability Management - sponsored by CyberCNS

22 Dec 2021

Contributed by Lukas

Note we discuss Log4j as this is a very timely topic to this control. Abstract: Cyber defenders are constantly being challenged from attackers who are...

CIS Control 6 - Access Control Management - sponsored by Appgate

23 Nov 2021

Contributed by Lukas

Abstract: It is easier for an external or internal threat actor to gain unauthorized access to assets or data through using valid user credentials tha...

CIS Control 5 - Account Management - sponsored by Keeper Security

19 Oct 2021

Contributed by Lukas

Abstract: There are many ways to covertly obtain access to user accounts, including: week passwords, accounts still valid after a user leaves the ente...

Control 4: Secure Configuration of Enterprise Assets - sponsored by ThreatLocker

26 Aug 2021

Contributed by Lukas

Abstract:  Learn why the number one thing organizations can do to defend their networks against top attacks, is to implement secure configurations! A...

Control 3: Data Protection (part 2) - Sponsored by Datto

09 Jul 2021

Contributed by Lukas

Abstract: CIS Control 3 is Data Protection and data is pretty much what's at stake for a high percentage of cyber attacks.  Data is more valuabl...

Control 3: Data Protection (part 1) - Sponsored by Netwrix

09 Jul 2021

Contributed by Lukas

Abstract: CIS Control 3 is Data Protection and data is pretty much what's at stake for a high percentage of cyber attacks.  Data is more valuabl...

Control 1 & 2: Inventory Control of Enterprise Hardware & Software Assets - Sponsored by CyberCNS

09 Jun 2021

Contributed by Lukas

Abstract: There is a cybersecurity saying; “you can’t protect what you don’t know about.”  Without visibility into your information assets, t...

Multifactor Authentication (MFA) - sponsored by Cisco Duo

11 May 2021

Contributed by Lukas

Google reports that Multifactor Authentication (MFA) prevents more than 96% of bulk phishing attempts and more than 76% of targeted attacks that are c...