{"id":25617,"date":"2025-08-11T13:45:20","date_gmt":"2025-08-11T17:45:20","guid":{"rendered":"https:\/\/www.sherweb.com\/blog\/?p=25617"},"modified":"2025-09-29T02:14:05","modified_gmt":"2025-09-29T06:14:05","slug":"ai-in-cybersecurity-for-msps","status":"publish","type":"post","link":"https:\/\/www.sherweb.com\/blog\/security\/ai-in-cybersecurity-for-msps\/","title":{"rendered":"AI in cybersecurity for MSPs: Insights from Hacker Summer Camp 2025 at Black Hat and DEF CON"},"content":{"rendered":"<p><em>AI is reshaping the cybersecurity landscape for MSPs, from how SOCs investigate threats to how attackers exploit new tools. Cybersecurity Technical Fellow <a href=\"https:\/\/www.sherweb.com\/blog\/tag\/author-roddy-bergeron\/\">Roddy Bergeron<\/a> shares his key takeaways from Black Hat 2025 and DEF CON 33 to help MSPs prepare for what\u2019s next.<\/em><\/p>\n<p><span data-contrast=\"auto\">Attending Black Hat 2025 and DEF CON 33 in Las Vegas was a whirlwind immersion into the future of cybersecurity and what the good guys are doing to protect our critical infrastructure. This year, everything revolved around AI transformation, new community energy, headline-grabbing vulnerabilities and gaining insights into known threat actors.<\/span><span data-ccp-props=\"{&quot;335559738&quot;:120,&quot;335559739&quot;:120}\">\u00a0<\/span><\/p>\n<h2><b><span data-contrast=\"auto\">AI tracks: A new era in security operations<\/span><\/b><span data-ccp-props=\"{&quot;335559738&quot;:120,&quot;335559739&quot;:120}\">\u00a0<\/span><\/h2>\n<p><span data-contrast=\"auto\">Black Hat 2025 felt like a tipping point for the application of artificial intelligence in cybersecurity. The dedicated AI Summit at Black Hat launched the conference with densely packed sessions about practical AI adoption and governance, not just theoretical discussions. Key industry players showcased live demos of tools now integrated into Security Operations Centers (SOCs) that automate investigations and respond to threats in minutes rather than hours. Companies like Microsoft, Palo Alto Networks, and SentinelOne moved past pilot projects. Attendees learned about full production deployments where AI engines are handling enormous incident volumes, surfacing millions of investigations from billions of leads, all with existing staff sizes.<\/span><span data-ccp-props=\"{&quot;335559738&quot;:120,&quot;335559739&quot;:120}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">One of the hottest topics was the new &#8220;agentic AI&#8221; threat model. Presenters shared how attacker groups now weaponize generative AI throughout the attack chain, from crafting synthetic social profiles using deepfakes to writing credible production code as embedded insiders. This raised profound questions about how to verify not just code snippets but digital identities throughout organizations.<\/span><\/p>\n<p><span data-contrast=\"auto\">Likewise at DEF CON, the discussions were around attacker&#8217;s use of AI, over-permissioned agentic AI or AI bots causing data leakage, and the poor \u201csoft controls\u201d which are easily circumvented by crafting special prompts. Researchers also showed off how badly threat actors mess up either with poor coding, insecure methods, and how publicly they brag about their efforts.\u00a0 Don\u2019t take them lightly though, they have tons of resources due to their connection with nation states.<\/span><\/p>\n<p><span data-contrast=\"auto\">The villages at DEF CON are also special. Opening, welcoming, and full of people passionate about their craft.\u00a0 Walking around the floor, you get a sense of a real community ran by some of the best people in the world. You also get some of the coolest stickers, which are now proudly displayed on my laptop.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<h2><b><span data-contrast=\"auto\">The community: Diversity and next-gen talent<\/span><\/b><span data-ccp-props=\"{}\">\u00a0<\/span><\/h2>\n<p><span data-contrast=\"auto\">What stood out this year was the sheer diversity and collaborative energy. The hallway conversations included not just established researchers and enterprise security architects, but also open-source advocates, cloud-native developers, and AI ethicists. This diverse group brought a lot of practical knowledge as well as theoretical talks about the future of AI.\u00a0\u00a0<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<h2><b><span data-contrast=\"auto\">Major announcements and industry reality checks<\/span><\/b><span data-ccp-props=\"{}\">\u00a0<\/span><\/h2>\n<p><span data-contrast=\"auto\">Multiple vendors used the conference to roll out not just upgraded products but partnerships to shore up the software supply chain. This was one of the year\u2019s headline concerns as breaches showed just how fragile the chain has become, especially in organizations that leverage vast open-source and third-party AI and code. Security teams are now racing to tag, track, and secure code as it zips through rapidly evolving CI\/CD pipelines. Software bill of materials was discussed in depth as a way to help with vulnerability management and threat hunting.\u00a0\u00a0<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">CrowdStrike\u2019s Adam Meyers issued what many considered the conference\u2019s bluntest forecast. \u201cAI is going to be the next insider threat. Organizations trust those AIs implicitly&#8230; the more comfortable they become, the less they&#8217;re going to check the output.\u201d This candor captured much of the atmosphere, a recognition that AI\u2019s promise demanded new security paradigms, not just faster pattern matching.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<h2><b><span data-contrast=\"auto\">DEF CON spotlight: The Kaseya REvil talk<\/span><\/b><span data-ccp-props=\"{}\">\u00a0<\/span><\/h2>\n<p><span data-contrast=\"auto\">One of my most anticipated sessions was easily the Kaseya REvil ransomware panel. It drew a packed room of researchers, incident responders, and journalists. The speakers provided granular, undisclosed details about the 2021 supply chain ransomware attack, including attacker tradecraft, backend accounting information, and their intimate talks with <\/span><span data-contrast=\"none\">Yaroslav Vasinskyi, who was a major player with REvil<\/span><span data-contrast=\"auto\">. Getting to hear more about Yaroslav\u2019s story, mainly because he stayed quiet during his trail and sentencing, was a great way to help the audience understand how these groups operate while letting you know they are humans with flaws.\u00a0 You can read the full interview here:<\/span><br \/>\n<a href=\"https:\/\/analyst1.com\/ransomware-diaries-volume-7-i-had-to-take-the-guilt-for-everyone-the-kaseya-hacker-breaks-his-silence\/\"><span data-contrast=\"none\">Ransomware Diaries Volume 7: The Kaseya Hacker Breaks His Silence<\/span><\/a><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<h2><b><span data-contrast=\"auto\">A convergence of technology and responsibility<\/span><\/b><span data-ccp-props=\"{}\">\u00a0<\/span><\/h2>\n<p><span data-contrast=\"auto\">Leaving Las Vegas, it was clear Black Hat and DEF CON 2025 didn\u2019t just celebrate emerging technology. They challenged the entire security community to come together in new ways. As a person who spends the majority of his time in the MSP space, it\u2019s great to get out of our world to see how the broader community security is changing. My overall thoughts:\u00a0 Whether you\u2019re an old hand or attending for the first time, this is the moment to get involved.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>AI is reshaping the cybersecurity landscape for MSPs, from how SOCs investigate threats to how at","protected":false},"author":188,"featured_media":25622,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[753],"tags":[919,1121,1135,1136,1137,1138,1139],"class_list":["post-25617","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-security","tag-cybersecurity","tag-author-roddy-bergeron","tag-black-hat-2025-highlights","tag-def-con-33-recap","tag-msp-security-trends","tag-cybersecurity-conferences-2025","tag-msp-security-strategies"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>AI in Cybersecurity for MSPs | Hacker Summer Camp 2025 Insights | Sherweb<\/title>\n<meta name=\"description\" content=\"AI in cybersecurity for MSPs takes center stage at Hacker Camp 2025. Discover the trends and threats shaping the next wave of defense.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.sherweb.com\/blog\/security\/ai-in-cybersecurity-for-msps\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"AI in Cybersecurity for MSPs | Hacker Summer Camp 2025 Insights | Sherweb\" \/>\n<meta property=\"og:description\" content=\"AI in cybersecurity for MSPs takes center stage at Hacker Camp 2025. Discover the trends and threats shaping the next wave of defense.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.sherweb.com\/blog\/security\/ai-in-cybersecurity-for-msps\/\" \/>\n<meta property=\"og:site_name\" content=\"Sherweb\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/Sherweb\" \/>\n<meta property=\"article:published_time\" content=\"2025-08-11T17:45:20+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-09-29T06:14:05+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.sherweb.com\/blog\/wp-content\/uploads\/Black_Hat-DefCon-1200x480-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2400\" \/>\n\t<meta property=\"og:image:height\" content=\"920\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Roddy Bergeron\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@SherWeb\" \/>\n<meta name=\"twitter:site\" content=\"@SherWeb\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Roddy Bergeron\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/security\\\/ai-in-cybersecurity-for-msps\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/security\\\/ai-in-cybersecurity-for-msps\\\/\"},\"author\":{\"name\":\"Roddy Bergeron\",\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/#\\\/schema\\\/person\\\/f6a0c8e1d541dbeb57fd3e025b325795\"},\"headline\":\"AI in cybersecurity for MSPs: Insights from Hacker Summer Camp 2025 at Black Hat and DEF CON\",\"datePublished\":\"2025-08-11T17:45:20+00:00\",\"dateModified\":\"2025-09-29T06:14:05+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/security\\\/ai-in-cybersecurity-for-msps\\\/\"},\"wordCount\":836,\"commentCount\":0,\"image\":{\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/security\\\/ai-in-cybersecurity-for-msps\\\/#primaryimage\"},\"thumbnailUrl\":\"\\\/blog\\\/wp-content\\\/uploads\\\/Black_Hat-DefCon-1200x480-1.jpg\",\"keywords\":[\"Cybersecurity\",\"Author: Roddy Bergeron\",\"Black Hat 2025 highlights\",\"DEF CON 33 recap\",\"MSP security trends\",\"Cybersecurity conferences 2025\",\"MSP security strategies\"],\"articleSection\":[\"Security\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/security\\\/ai-in-cybersecurity-for-msps\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/security\\\/ai-in-cybersecurity-for-msps\\\/\",\"url\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/security\\\/ai-in-cybersecurity-for-msps\\\/\",\"name\":\"AI in Cybersecurity for MSPs | Hacker Summer Camp 2025 Insights | Sherweb\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/security\\\/ai-in-cybersecurity-for-msps\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/security\\\/ai-in-cybersecurity-for-msps\\\/#primaryimage\"},\"thumbnailUrl\":\"\\\/blog\\\/wp-content\\\/uploads\\\/Black_Hat-DefCon-1200x480-1.jpg\",\"datePublished\":\"2025-08-11T17:45:20+00:00\",\"dateModified\":\"2025-09-29T06:14:05+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/#\\\/schema\\\/person\\\/f6a0c8e1d541dbeb57fd3e025b325795\"},\"description\":\"AI in cybersecurity for MSPs takes center stage at Hacker Camp 2025. Discover the trends and threats shaping the next wave of defense.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/security\\\/ai-in-cybersecurity-for-msps\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/security\\\/ai-in-cybersecurity-for-msps\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/security\\\/ai-in-cybersecurity-for-msps\\\/#primaryimage\",\"url\":\"\\\/blog\\\/wp-content\\\/uploads\\\/Black_Hat-DefCon-1200x480-1.jpg\",\"contentUrl\":\"\\\/blog\\\/wp-content\\\/uploads\\\/Black_Hat-DefCon-1200x480-1.jpg\",\"width\":2400,\"height\":920,\"caption\":\"AI in cybersecurity for MSPs\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/security\\\/ai-in-cybersecurity-for-msps\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Security\",\"item\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/category\\\/security\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"AI in cybersecurity for MSPs: Insights from Hacker Summer Camp 2025 at Black Hat and DEF CON\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/\",\"name\":\"Sherweb\",\"description\":\"More than a cloud marketplace\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/#\\\/schema\\\/person\\\/f6a0c8e1d541dbeb57fd3e025b325795\",\"name\":\"Roddy Bergeron\",\"description\":\"Roddy Bergeron's career has taken various paths including government auditing, nonprofit work, public\\\/private partnerships with the State of Louisiana, helping build an MSP by building their managed service, managed security, vCISO and compliance programs, and now as the Cybersecurity Technical Fellow with Sherweb. Roddy has obtained many certifications over the years including his MCSE, CCNA:Security, CEH, CCSP, CISSP and CSAP. Our MSP community is extremely important to Roddy and he loves giving back to the community that has helped him out so much over the years. Roddy hopes to continue to help other MSPs succeed and raise the cybersecurity tide for our industry.\",\"sameAs\":[\"https:\\\/\\\/www.linkedin.com\\\/in\\\/roddy-bergeron-cissp-ccsp-csap-33432573\\\/\"],\"url\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/author\\\/roddy-bergeron\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"AI in Cybersecurity for MSPs | Hacker Summer Camp 2025 Insights | Sherweb","description":"AI in cybersecurity for MSPs takes center stage at Hacker Camp 2025. Discover the trends and threats shaping the next wave of defense.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.sherweb.com\/blog\/security\/ai-in-cybersecurity-for-msps\/","og_locale":"en_US","og_type":"article","og_title":"AI in Cybersecurity for MSPs | Hacker Summer Camp 2025 Insights | Sherweb","og_description":"AI in cybersecurity for MSPs takes center stage at Hacker Camp 2025. Discover the trends and threats shaping the next wave of defense.","og_url":"https:\/\/www.sherweb.com\/blog\/security\/ai-in-cybersecurity-for-msps\/","og_site_name":"Sherweb","article_publisher":"https:\/\/www.facebook.com\/Sherweb","article_published_time":"2025-08-11T17:45:20+00:00","article_modified_time":"2025-09-29T06:14:05+00:00","og_image":[{"width":2400,"height":920,"url":"https:\/\/www.sherweb.com\/blog\/wp-content\/uploads\/Black_Hat-DefCon-1200x480-1.jpg","type":"image\/jpeg"}],"author":"Roddy Bergeron","twitter_card":"summary_large_image","twitter_creator":"@SherWeb","twitter_site":"@SherWeb","twitter_misc":{"Written by":"Roddy Bergeron","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.sherweb.com\/blog\/security\/ai-in-cybersecurity-for-msps\/#article","isPartOf":{"@id":"https:\/\/www.sherweb.com\/blog\/security\/ai-in-cybersecurity-for-msps\/"},"author":{"name":"Roddy Bergeron","@id":"https:\/\/www.sherweb.com\/blog\/#\/schema\/person\/f6a0c8e1d541dbeb57fd3e025b325795"},"headline":"AI in cybersecurity for MSPs: Insights from Hacker Summer Camp 2025 at Black Hat and DEF CON","datePublished":"2025-08-11T17:45:20+00:00","dateModified":"2025-09-29T06:14:05+00:00","mainEntityOfPage":{"@id":"https:\/\/www.sherweb.com\/blog\/security\/ai-in-cybersecurity-for-msps\/"},"wordCount":836,"commentCount":0,"image":{"@id":"https:\/\/www.sherweb.com\/blog\/security\/ai-in-cybersecurity-for-msps\/#primaryimage"},"thumbnailUrl":"\/blog\/wp-content\/uploads\/Black_Hat-DefCon-1200x480-1.jpg","keywords":["Cybersecurity","Author: Roddy Bergeron","Black Hat 2025 highlights","DEF CON 33 recap","MSP security trends","Cybersecurity conferences 2025","MSP security strategies"],"articleSection":["Security"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.sherweb.com\/blog\/security\/ai-in-cybersecurity-for-msps\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.sherweb.com\/blog\/security\/ai-in-cybersecurity-for-msps\/","url":"https:\/\/www.sherweb.com\/blog\/security\/ai-in-cybersecurity-for-msps\/","name":"AI in Cybersecurity for MSPs | Hacker Summer Camp 2025 Insights | Sherweb","isPartOf":{"@id":"https:\/\/www.sherweb.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.sherweb.com\/blog\/security\/ai-in-cybersecurity-for-msps\/#primaryimage"},"image":{"@id":"https:\/\/www.sherweb.com\/blog\/security\/ai-in-cybersecurity-for-msps\/#primaryimage"},"thumbnailUrl":"\/blog\/wp-content\/uploads\/Black_Hat-DefCon-1200x480-1.jpg","datePublished":"2025-08-11T17:45:20+00:00","dateModified":"2025-09-29T06:14:05+00:00","author":{"@id":"https:\/\/www.sherweb.com\/blog\/#\/schema\/person\/f6a0c8e1d541dbeb57fd3e025b325795"},"description":"AI in cybersecurity for MSPs takes center stage at Hacker Camp 2025. Discover the trends and threats shaping the next wave of defense.","breadcrumb":{"@id":"https:\/\/www.sherweb.com\/blog\/security\/ai-in-cybersecurity-for-msps\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.sherweb.com\/blog\/security\/ai-in-cybersecurity-for-msps\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.sherweb.com\/blog\/security\/ai-in-cybersecurity-for-msps\/#primaryimage","url":"\/blog\/wp-content\/uploads\/Black_Hat-DefCon-1200x480-1.jpg","contentUrl":"\/blog\/wp-content\/uploads\/Black_Hat-DefCon-1200x480-1.jpg","width":2400,"height":920,"caption":"AI in cybersecurity for MSPs"},{"@type":"BreadcrumbList","@id":"https:\/\/www.sherweb.com\/blog\/security\/ai-in-cybersecurity-for-msps\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.sherweb.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Security","item":"https:\/\/www.sherweb.com\/blog\/category\/security\/"},{"@type":"ListItem","position":3,"name":"AI in cybersecurity for MSPs: Insights from Hacker Summer Camp 2025 at Black Hat and DEF CON"}]},{"@type":"WebSite","@id":"https:\/\/www.sherweb.com\/blog\/#website","url":"https:\/\/www.sherweb.com\/blog\/","name":"Sherweb","description":"More than a cloud marketplace","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.sherweb.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.sherweb.com\/blog\/#\/schema\/person\/f6a0c8e1d541dbeb57fd3e025b325795","name":"Roddy Bergeron","description":"Roddy Bergeron's career has taken various paths including government auditing, nonprofit work, public\/private partnerships with the State of Louisiana, helping build an MSP by building their managed service, managed security, vCISO and compliance programs, and now as the Cybersecurity Technical Fellow with Sherweb. Roddy has obtained many certifications over the years including his MCSE, CCNA:Security, CEH, CCSP, CISSP and CSAP. Our MSP community is extremely important to Roddy and he loves giving back to the community that has helped him out so much over the years. Roddy hopes to continue to help other MSPs succeed and raise the cybersecurity tide for our industry.","sameAs":["https:\/\/www.linkedin.com\/in\/roddy-bergeron-cissp-ccsp-csap-33432573\/"],"url":"https:\/\/www.sherweb.com\/blog\/author\/roddy-bergeron\/"}]}},"tag_names":["Cybersecurity","Author: Roddy Bergeron","Black Hat 2025 highlights","DEF CON 33 recap","MSP security trends","Cybersecurity conferences 2025","MSP security strategies"],"_links":{"self":[{"href":"https:\/\/www.sherweb.com\/blog\/wp-json\/wp\/v2\/posts\/25617","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.sherweb.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.sherweb.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.sherweb.com\/blog\/wp-json\/wp\/v2\/users\/188"}],"replies":[{"embeddable":true,"href":"https:\/\/www.sherweb.com\/blog\/wp-json\/wp\/v2\/comments?post=25617"}],"version-history":[{"count":5,"href":"https:\/\/www.sherweb.com\/blog\/wp-json\/wp\/v2\/posts\/25617\/revisions"}],"predecessor-version":[{"id":25624,"href":"https:\/\/www.sherweb.com\/blog\/wp-json\/wp\/v2\/posts\/25617\/revisions\/25624"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.sherweb.com\/blog\/wp-json\/wp\/v2\/media\/25622"}],"wp:attachment":[{"href":"https:\/\/www.sherweb.com\/blog\/wp-json\/wp\/v2\/media?parent=25617"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.sherweb.com\/blog\/wp-json\/wp\/v2\/categories?post=25617"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.sherweb.com\/blog\/wp-json\/wp\/v2\/tags?post=25617"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}