Pen testing is among the top add-on services provided by MSSPs, with over half of MSSPs offering these services themselves and another 30% partnering to offer them. In this webinar we’ll hear from a panel of MSSPs about best practices when it comes to Pen Testing, how to stand up a Pen Testing service if you don’t already offer it, and the pros and cons of doing it yourself versus partnering. You’ll learn:
• Why the Pen Testing offered by insurance companies doesn’t measure up
• How to market and how not to market Pen Testing services
• How Pen Testing services fit into your overall business, and
• Crawl, Walk, and Run pathways to establishing a Pen Testing service
Join our panel of MSSPs and learn how to establish, build and grow a successful Pen Testing practice in your business.
Jessica C. Davis has spent a career as a journalist and editor covering the business of technology including chips, software, the cloud, AI, and cybersecurity. She previously served as editor in chief of Channel Insider and later of MSP Mentor. She now serves as editorial director for CyberRisk Alliance’s channel brands, MSSP Alert and ChannelE2E.
Dr. Mike Saylor is co-founder and CEO of Blackswan Cybersecurity, where he serves as the incident response lead, as well as the Executive Director of Cyber Defense Center, 501(c)(3). He is a 30-year IT/Cyber veteran with 24 years as a University Professor of Cyber and Digital Forensics & Incident Response (DFIR) – currently at the Univ. of Texas San Antonio. Dr. Saylor is also 24-year Infragard member, past president, and current Healthcare Sector Chief, and a Fusion Liaison officer for the North Texas Fusion Center.
Fred Langston is a pen testing expert at Critical Insight, a managed security services provider. He has been at forefront of InfoSec for over two decades, with experience spanning back to his role as one of the authors of the HIPAA security rule. He has over 24 years of professional information security experience working for thousands of clients creating effective risk management strategies, enterprise security and data protection programs.