What You Really Need to Know about MSSP: Busting the Myths, Mistakes and Misconceptions

Watch Now

To watch this webinar you’ll need an Infosecurity Magazine account. Log in or sign up below.

Log in
Sign up

Get up-to-the-minute news and opinions, plus access to a wide assortment of Information Security resources that will keep you current and informed.

This will be used to identify you if you take part in our online comments.

Your password should:

  • be at least eight characters long
  • be no more than 25 characters long
  • contain at least one uppercase, lowercase and special character
  • contain at least one digit
  • only contain alphanumeric characters or ~!@#$%^&*()_-+=?.

For more information explaining how we use your information please see our privacy policy.

By registering you agree with our terms and conditions.

Choosing your managed security services provider (MSSP) can often feel like a leap of faith – but it shouldn’t. When you sign on the dotted line, you want to know that they can support your team and provide the level of security and assurance you need.

So, what should you be looking for when selecting your MSSP? Including expert advice from Microsoft and industry thought-leaders, this webinar will answer that question and more, arming you with the key information you need to be able to choose your MSSP with confidence.

Register for the webinar to learn:

  • What a managed security services provider is – and what it isn’t
  • The key trust marks and certifications to look for
  • How an MSSP should adapt to meet your unique challenges
  • How an MSSP can keep you both secure and compliant
  • Why your MSSP must operate as a partner, not just a provider


Photo of Greg Heard

Greg Heard

Managed Security Services Commercial Lead, ThirdSpace

Photo of Tee Patel

Tee Patel

COO, Iron Oak Security & vCISO

Photo of Ally  Turnbull

Ally Turnbull

Cloud solutions architect, Microsoft

Photo of Martin Webley

Martin Webley

Head of Security Operations, ThirdSpace

Brought to you by

Should you watch this webinar your information may be shared with the sponsors indicated above. Please see Infosecurity Magazine’s privacy policy for more information.