WEBVTT

NOTE
This file was generated by Descript 

00:00:04.547 --> 00:00:08.107
All right, welcome to this special
live edition of the Cybertraps podcast.

00:00:08.127 --> 00:00:13.067
We are here at the Inch360 event, uh,
here in beautiful Spokane, Washington.

00:00:13.407 --> 00:00:16.287
Uh, and we got John
Hansman on the program.

00:00:16.547 --> 00:00:18.947
Uh, John's the CEO of Truett.

00:00:18.987 --> 00:00:22.107
John, tell us a little bit about
what Truett is and who you are.

00:00:22.257 --> 00:00:22.567
Yeah.

00:00:22.577 --> 00:00:26.477
So, uh, Truett is a
managed service provider.

00:00:27.037 --> 00:00:30.887
So we do everything from
the basic IT services.

00:00:31.447 --> 00:00:36.767
Uh, and provide, uh, that with
the cyber security focus that you,

00:00:36.797 --> 00:00:39.207
uh, not always seen with MSPs.

00:00:39.257 --> 00:00:43.957
Uh, it's becoming more and more prevalent,
but our, our focus as a company is

00:00:43.957 --> 00:00:51.007
to help create a specific action plan
and a, a actual cyber security program

00:00:51.257 --> 00:00:52.998
within our IT infrastructure for

00:00:52.998 --> 00:00:53.772
our clients.

00:00:53.962 --> 00:00:55.622
Yeah, I, I like that.

00:00:55.622 --> 00:00:56.772
I think that's really powerful.

00:00:56.772 --> 00:01:01.812
And if you were listening before when
we talked to Nick Marizzi, he was

00:01:01.812 --> 00:01:06.582
talking about using an MSP when you
don't have the capacity to do that

00:01:06.582 --> 00:01:11.112
yourself and how that's a smart thing
to do because you can use somebody

00:01:11.122 --> 00:01:16.462
else's expertise to, to make those
things easier for you so that you don't

00:01:16.462 --> 00:01:20.242
have to stress about a lot of the cyber
security issues because somebody else

00:01:20.647 --> 00:01:22.637
is stressing about that for you, right?

00:01:22.647 --> 00:01:22.957
Is that

00:01:23.127 --> 00:01:27.977
Well that's it, and I think for us, we
really focus on bridging the gap between

00:01:27.977 --> 00:01:33.457
that large business that is, you know,
they have 100 employees so they need

00:01:33.467 --> 00:01:38.612
internal IT and either helping them
with the security stack side which is a

00:01:38.622 --> 00:01:43.723
possibility or we help them or we help
the smaller businesses who don't have

00:01:43.763 --> 00:01:48.663
anything and they're too small to really
need to have an internal IT department.

00:01:49.333 --> 00:01:51.433
So, our company, we do both.

00:01:51.673 --> 00:01:57.943
We help with co managed solutions, where
large companies say, Hey, we've got a

00:01:57.943 --> 00:02:02.173
really good tech support team, we've got
a good help desk, but we, we're not 100

00:02:02.383 --> 00:02:05.493
percent sure on our, our cyber stack.

00:02:06.053 --> 00:02:06.893
Can you help us?

00:02:07.253 --> 00:02:11.713
Or be available for, you know,
engineering level solutions.

00:02:12.089 --> 00:02:15.919
and then we, we take care of
mostly small businesses, you

00:02:15.919 --> 00:02:17.719
know, 10 employees up to, uh,

00:02:18.279 --> 00:02:19.029
100 employees.

00:02:19.169 --> 00:02:19.669
Gotcha.

00:02:19.959 --> 00:02:23.039
And so what brings you to
a conference like this?

00:02:24.129 --> 00:02:28.569
Well, honestly, it's because, uh,
if I'm in cybersecurity in Spokane,

00:02:28.629 --> 00:02:29.959
I shouldn't be anywhere else.

00:02:30.839 --> 00:02:31.379
Good point.

00:02:34.209 --> 00:02:37.059
And, uh, not only did we say
we're going to attend, but

00:02:37.059 --> 00:02:38.479
we doubled down on sponsored.

00:02:38.479 --> 00:02:38.789
Yeah.

00:02:38.819 --> 00:02:43.438
And, and I'm a panelist, uh, shortly
and so really it was just a matter of

00:02:43.438 --> 00:02:47.308
saying we're, we firmly believe that
all businesses need to be thinking

00:02:47.308 --> 00:02:49.278
forward towards cybersecurity.

00:02:50.038 --> 00:02:51.698
We, we heard it like four times today.

00:02:51.698 --> 00:02:55.928
It's not a matter of if, but
when, uh, so if you're, if you're

00:02:55.928 --> 00:02:58.888
thinking forward, you can have a
plan so that if something happens.

00:02:58.928 --> 00:03:04.278
And so, you know, me, John Hansman is
working hard to become a thought leader

00:03:04.388 --> 00:03:10.128
as well, uh, in the space around the
cities that I work in to help people

00:03:10.388 --> 00:03:15.108
just think about cyber security, uh, help
them understand they need to have a plan.

00:03:15.658 --> 00:03:19.238
And then for some people who
want our help, we help them.

00:03:19.828 --> 00:03:22.398
Make that plan and put it
together and put it into action.

00:03:22.728 --> 00:03:23.078
Yeah,

00:03:23.158 --> 00:03:23.868
that's awesome.

00:03:24.248 --> 00:03:27.428
Um, so what's your
takeaway from today so far?

00:03:28.518 --> 00:03:32.868
I, I think the biggest thing, uh, we, we
just talked about Herb Whitworth's talk.

00:03:33.533 --> 00:03:35.283
they did a lot of things right.

00:03:35.463 --> 00:03:38.433
When you watch the news, you think those
jerks lost a bunch of stuff, right?

00:03:38.433 --> 00:03:39.063
I know, right?

00:03:39.463 --> 00:03:42.713
But when you listen to them talk,
they had a lot of stuff in place.

00:03:43.813 --> 00:03:49.588
And Really they could, they could, they
have done more possibly, but really they

00:03:49.588 --> 00:03:51.328
did a lot and they still got hacked.

00:03:51.688 --> 00:03:52.128
Yeah.

00:03:52.268 --> 00:03:56.848
So And, and I just want to say real
quick, I think the real, uh, clear

00:03:56.848 --> 00:04:01.518
signal that they did a lot of things
right was that they, uh, they got

00:04:01.518 --> 00:04:03.308
hacked and their CIO got promoted.

00:04:03.438 --> 00:04:03.718
Yeah.

00:04:03.788 --> 00:04:06.728
And he, he said that not in a
bragging way, which I thought

00:04:06.728 --> 00:04:11.283
was, was good, but really like
They did a lot of things right.

00:04:11.293 --> 00:04:14.033
And so it seems like it was
not as bad as it could have

00:04:14.033 --> 00:04:14.218
been.

00:04:14.218 --> 00:04:16.563
They really seem like
they took the stress off.

00:04:16.593 --> 00:04:18.993
Like, you know, it's going to be stressed
when you have a cyber attack, right?

00:04:19.033 --> 00:04:23.103
But they knew what their jobs
were ahead of time, which I

00:04:23.103 --> 00:04:24.183
think was a really key thing.

00:04:24.183 --> 00:04:28.193
I think that was the biggest takeaway,
even for me as an MSP going back home

00:04:28.193 --> 00:04:33.664
and, and talking with my staff and saying,
let's make sure all of our cybersecurity,

00:04:34.094 --> 00:04:37.584
uh, plans are ready for all of our
clients, but practice, practice, practice.

00:04:37.644 --> 00:04:37.964
Yeah.

00:04:38.384 --> 00:04:42.018
And just be ready and know that,
that you've got the plan and

00:04:42.018 --> 00:04:45.378
your customer, if you're an MSP,
needs to know that plan, too.

00:04:45.798 --> 00:04:48.658
You need to sit down with them and
say, this is what it looks like.

00:04:48.768 --> 00:04:49.088
Yeah.

00:04:49.348 --> 00:04:50.568
So that they're not in a panic.

00:04:50.568 --> 00:04:53.498
So I thought that was really, it was
fascinating to hear them talk and

00:04:53.498 --> 00:04:55.048
I was looking forward to that part.

00:04:55.288 --> 00:04:55.678
Yeah.

00:04:55.968 --> 00:04:58.668
So, uh, if somebody's listening
and they want to know more about

00:04:58.678 --> 00:04:59.948
Truett, where should they go?

00:04:59.948 --> 00:05:00.668
How should they learn more about

00:05:00.668 --> 00:05:00.678
Truett?

00:05:00.678 --> 00:05:03.318
Yeah, best place to go is Truett.

00:05:03.318 --> 00:05:03.358
io.

00:05:03.358 --> 00:05:04.508
T R U I T.

00:05:04.778 --> 00:05:05.498
io.

00:05:05.923 --> 00:05:09.323
Uh, and you can also look me up,
uh, I'm on every social media

00:05:09.323 --> 00:05:11.483
platform under John Hansman.

00:05:11.483 --> 00:05:12.633
Even johnhansman.

00:05:12.633 --> 00:05:13.763
com will get you my contact

00:05:14.023 --> 00:05:14.413
information.

00:05:14.433 --> 00:05:14.883
There you go.

00:05:14.893 --> 00:05:15.883
Thank you so much, John.

00:05:15.893 --> 00:05:16.703
Appreciate you being here.

00:05:16.793 --> 00:05:17.283
My pleasure.

00:05:17.323 --> 00:05:17.633
And good

00:05:17.633 --> 00:05:18.343
luck on your panel.

00:05:18.433 --> 00:05:18.993
Yeah, thanks.