Ready to dive deeper?Register or log in to unlock exclusive Right of Boom content:

Resources: Video

Threat Modeling and the MSP

06/29/2021
In this video, Ryan and Wes discuss MSP threat modeling and the importance of understanding adversaries to improve cyber resilience. They explore a real-world case involving a threat actor known as Gold Southfield, highlighting the significance of multi-factor authentication, phishing simulations, and effective control mapping to mitigate risks. The session emphasizes the necessity of adversary emulation and continuous improvement in security practices to safeguard MSP environments.
  • Understanding threat actors and their tactics is crucial for creating effective security measures. Adversary emulation can help test the effectiveness of current controls against specific threats.
  • Data flow diagrams are essential in threat modeling. They help MSPs understand their network and identify vulnerabilities. Regularly updating and auditing these diagrams can significantly improve security posture.
  • Basic security measures such as multi-factor authentication, proper credential management, and network segmentation are often overlooked but are essential in defending against common cyber threats.
Andrew Morgan