667: Michael Thomsen of Origin 84 on Building a Process-Driven MSP and Using Compliance Frameworks for Strategy
/Michael Thomsen on Building a Process-Driven MSP and Using Compliance Frameworks for Strategic IT
Host of Command Control Power welcomes returning guest Michael Thomsen of Origin 84 from Sydney ahead of the ACEs conference in Minneapolis, discussing the mental and operational preparation to leave a company running without him through documentation, chain of command, and role accountability using Confluence and selected EOS practices. Thompson explains balancing perfectionism with repeatable team standards, prioritizing avoiding preventable mistakes, and aligning service quality to what clients value. The conversation pivots to SOC 2, HIPAA, and ISO 27001 as validation frameworks increasingly demanded via vendor risk and tenders, emphasizing policy vs procedure and continual improvement. He outlines Origin 84’s flat-fee, services-first model and “magic quadrant” approach—help desk, IT administration, account management, and strategy—using root-cause fixes and programmatic improvements across clients. He advocates standardizing on Microsoft (often using Entra even for Google clients), careful vendor selection, and tailoring higher-cost governance features (e.g., Defender/Purview, logging) to client needs while keeping baseline security consistent.
00:00 Welcome Back Michael
00:35 27 Hour Travel Ritual
01:14 Leaving The Business
03:23 Planning Like Military
04:47 Runbooks And EOS
07:22 Perfection Versus Good
12:24 Standards And Apologies
13:53 SOC2 HIPAA ISO Explained
16:32 Policies Versus Procedures
17:56 Making Services Sticky
20:14 Magic Quadrant Strategy
23:16 Fix Root Causes
26:21 Hourly Billing Incentives
27:45 Value Without Strategy Buy In
29:13 Listening Before Pushing
29:28 Pricing Pushback Case Study
31:52 Standardized Security Baseline
34:33 Paying For The Paperwork
36:10 Reducing Cost Via Account Management
36:50 Stack Ownership And Optional Features
39:21 Microsoft As The North Star
41:10 Vendor Risk And Pricing Strategy
47:54 Entra SSO For Google Clients
50:46 ISO 27001 Policy Reality Check
54:57 Wrap Up And Part Two Tease
