Scaling Your Cyber Security Business

If you are looking to stay on top of your Cyber Security Managed Services' Business, then invest 2 hours of your time for this online event.

 

There are currently about 3,000 vendors in the cyber security space and more coming.... It's clear that the cyber security landscape is constantly expanding and evolving. What was best practices yesterday may not be today. What can MSPs do to stay ahead of the game to keep on delivering the best possible security protection to their customers?

 

For this event, we decided to have actual MSSPs and SOCs to deliver the insights. They are on the frontlines of defence for businesses and governments every day. They understand what it takes to deliver world-class Cyber Security services. We welcome them to share their insights and wisdom with our channel community during this event.

 

We choose CrucialLogics (a leading Microsoft Gold Partner) MSSP/SOC to present at this Cyber Security event for their deep and wide insights in the security space. Beyond Cyber Security, they do a variety of consultation services for large clients. They also bring a very strong understanding of how the channel plays a role. They do partner with MSPs to augment their Cyber Security solutions. To learn more go to https://cruciallogics.com/clients/ 

 

We also choose eSentire to participate in the event. A leading SOC since 2001 with a 97% customer retention rate. They do partner with MSPs and MSSPs to deliver robust cyber security services. To learn more go to https://www.esentire.com 

 

HACKING: We kick off this event with a live hacking session to demonstrate how hackers are attacking networks. We will explore how hackers are exploiting uncommon ways to enter the network. We will also discuss the human-error attack vectors as social engineering keeps on getting better. Finally, we will touch on the MSPs as a hot attack vector for hackers and how to best protect yourself.

 

Hacker provided by Crucial Logics. Discussion with the leaders of two top MSSPs/SOCs about building-it or out-sourcing Cyber Security and pricing models. 

 

To SOC Or Not To SOC: We will explore the pros and cons of building and scaling a security practice in-house versus outsourcing. Delivering a comprehensive cyber security service is growing in its complexity and cost. On top of that, MSPs have to protect an expanded distributed workforce from attacks. Top players offer PEN testing, threat-hunting, real-time 24/7 monitoring and mediation and forensic analysis in case of a breach. Just hiring and keeping cyber security professionals is a difficult challenge. So, what is the best playbook for MSPs and MSSPs? How can you best protect your customers and company? Should you build in-house or outsource or some hybrid?  Get the latest insights and pick the brains of leading cyber security experts. 

 

 

WHAT SHOULD MSPs CHARGE: Most MSPs offer security protection for a fee around $115 per month per user. However, this covers only part of the risks. To offer the best possible cyber security protection, the cost should probably be over $150 per month per user (depending on the service level). We will explore what MSPs should really be charging their customers and for what level of service. 

 

It many ways, it's actually becoming much easier for channel partners to offer a deeper and wider level of cyber security protection services as vendors are continually improving their solutions to make them more powerful, automated and user friendly! With AI as well as other on-demand PEN testing, hunting, monitoring, forensics and resolution services, it is becoming much easier for channel partners to build out a powerful private-label cyber security business practice.

 

We will showcase a few vendors with outstanding solutions in our Lions' Den. Each vendor gets just 3 minutes to make their pitch!

 

Remember, only attendees will be receiving the recorded sessions for on-demand viewing.


Our news media division echannelNEWS is constantly showcasing the latest Cyber security vendors and solutions. Subscribe to the dedicated news column called "The Daily Breach" to get your daily dose.

 

Join us early to network, play a few games, win some prizes and get an event overview on what to expect in the next hours.

How do hackers attack networks? We will explore how hackers are exploiting uncommon ways.  We will also discuss the human-error attack vectors as social engineering keeps on getting better.

 

Panel Discussion with eSentire and Cruciallogics 

We will explore the pros and cons of building and scaling a security practice in-house versus outsourcing. How can you best protect your customers and company? Should you build in-house or outsource or some hybrid? 

What MSPs should charge:  Most MSPs offer security protection for a fee around $115 per month per user. We will explore what MSPs should really be charging their customers and for what level of service. 

A quick and easy way to see which vendors warrant a further discussion in becoming part of your current portfolio. All participating vendors will be seen live to make their 3-minute pitch! Attendees will be able to instantly vote for their favourite presentation. One vendor will win the "Virtual Warrior Award". And someone from the audience will win a cool prize!

 

 

Event Adjourns

Speaker Vivian Dang
Vivian Dang
Account Executive, Splashtop
Richard Dobosz
Security Architect, CrucialLogics
Scott Wright
CEO of Click Armor
Eldon Sprickerhoff
Founder and chief innovation officer at eSentire
Nim Nadarajah
Principal, Consulting & Advisory Professional Services
Deena Thomchick
Vice President of Product Marketing
Gerlinda Ringe
Director Events
Julian Lee
President
Free to attend
Free

How do I LOGIN to this event?

 

When you register, the system will automatically send and update you with the link to login. You will need to use the same e-mail address and add a password. Depending on the platform we use, you may just be able to automatically enter the event by just clicking on the link. Everything will be outlined in the confirmation that you will receive after registering.

 

Must I activate my web camera? 

 

No, but you are encouraged to do so. When people see people, it delivers a better experience to all.

 

How will I know if my system is compatible to access the online event?

 

There will be a system pre-test link for you to run and that will confirm if you are ready or not.

 

Will I be able to get a recording of the event?

 

Yes. Much of the general content sessions are recorded and automatically sent to only those who registered to the event. Some sessions may not be recorded for privacy concerns.

 

Is the online platform secure?

 

We choose platforms that are secure and we do not host public events. All attendees must register wth a valid e-mail address and must sign in with the same e-mail address to enter. We have people who monitor the event and will be able to intervene, if necessary. That said, never share any confidential information with anyone during a virtual event.

 

Can I use the same link and password to allow my colleagues to access?

 

No. Everyone must register individually. 

 

How is the privacy of my information handled?

 

We do NOT store your information on the system after the event is closed. Nothing stays accessible through the Internet. We do not  share your information with anyone. If you want to connect with a vendor or others, you must exchange your details. In some cases, when you enter a vendor’s booth, the system will indicate that action to the vendor.

Photos
Event Details
Sponsors