エピソード

  • The Future of Cybersecurity
    2025/08/11

    Episode 10: The Future of Cybersecurity with Michael Billy

    Host: Dr. Kenneth Johnson

    Guest: Michael Billy

    Duration: ~20 minutes

    Keywords:

    cybersecurity, generative AI, security trends, tool sprawl, AI security, automation, human oversight, future-proofing, security technologies, Microsoft

    Episode Summary:

    In this episode of Secured with Dr. KJ, Michael Billy joins the show to explore the future of cybersecurity and how organizations can evolve with confidence in the face of rapid technological change.

    From the impact of generative AI to the risks of tool sprawl, Michael outlines why fundamentals like security hygiene and human oversight are more critical than ever. He also discusses how organizations can build trust in AI-powered tools, prepare their teams for the unknown, and create a sustainable plan to stay ahead of threats while embracing innovation.

    What You’ll Learn:

    • Why hygiene is still the #1 threat in security
    • How generative AI is reshaping security tools and tactics
    • The importance of vetting AI suppliers and securing AI agents
    • Why tool sprawl can lead to visibility gaps and operational fatigue
    • How to balance automation with human judgment
    • Why Zero Trust and assume breach remain foundational principles
    • Strategies for future-proofing security teams and tech stacks

    Key Takeaways:

    • Hygiene remains the top threat in cybersecurity
    • Generative AI will significantly impact security practices
    • Organizations must secure their AI agents effectively
    • Tool sprawl is a growing concern in cybersecurity
    • Vetting generative AI suppliers is crucial for security
    • Embracing technology helps teams understand its implications
    • Assuming breach is essential for a Zero Trust environment
    • Setting a clear plan is vital for security leaders
    • Balancing automation with human oversight is necessary
    • Continuous learning and adaptation are key in cybersecurity

    Memorable Quotes:

    • “Hygiene is still the number one threat.”
    • “There is no silver bullet in security.”
    • “Empower everyone to achieve more.”

    Hosted on Acast. See acast.com/privacy for more information.

    続きを読む 一部表示
    20 分
  • Zero Trust in Practice
    2025/05/19

    Episode 4: Zero Trust – Zero Trust in Practice with Mark Simos


    Host: Dr. Kenneth Johnson

    Guest: Mark Simos, Lead Cybersecurity Architect, Microsoft

    Duration: ~20 minutes


    Keywords:


    Zero Trust, Cybersecurity, Identity Management, AI, Security Architecture, Collaboration, Trust Verification, Modern Security Strategies


    Episode Summary:


    In this episode of Secured with Dr. KJ, Kenneth Johnson and Mark Simos break down the reality of Zero Trust—moving beyond buzzwords into actionable strategies. They explore why traditional perimeter-based security no longer works, and how identity, verification, and AI are reshaping the way we think about trust in cybersecurity.


    Mark shares insights on how organizations can align their teams, embrace a culture of shared responsibility, and make security a business enabler—not a blocker. The conversation also touches on how AI is accelerating complex security tasks, helping teams stay ahead of evolving threats.


    What You’ll Learn:


    • Why Zero Trust is more than a framework—it’s a mindset shift
    • The critical role identity plays in modern security
    • How AI supports and strengthens Zero Trust strategies
    • The cost of implicit trust and the value of explicit verification
    • Why collaboration and communication are essential to success

    Key Takeaways:


    • Zero Trust removes the false assumption of a secure perimeter.
    • Verification of identity is essential in modern security.
    • Trust is costly; explicit verification is necessary.
    • Identity management is crucial for Zero Trust success.
    • AI plays a symbiotic role in enhancing security.
    • Security must be integrated into business processes.
    • Every asset and user must have a defined identity.
    • Collaboration across teams is vital for security effectiveness.
    • Security professionals should act as enablers for other teams.
    • Open communication fosters a successful Zero Trust implementation.


    Memorable Quotes:


    • “AI accelerates complex security tasks.”
    • “Identity is the new security perimeter.”
    • “Security is part of everyone’s job.”

    Hosted on Acast. See acast.com/privacy for more information.

    続きを読む 一部表示
    19 分
  • Small Targets: Big Impact
    2025/09/22
    Episode 3: Small Targets, Big Impact: The Ransomware wake up call with Matthew Waddell


    Host: Kenneth Johnson

    Guest: Matthew Waddell, Incident Response Expert & Author of Survive Ransomware

    Duration: ~19 minutes

    Keywords: Ransomware, Small Business Cybersecurity, Incident Response, Backups, Generative AI, Phishing, Tabletop Exercises, Managed Service Providers, AI in Cyber Defense


    Episode Summary


    In this episode of Secured with Dr. KJ, I sit down with Matthew Waddell—an incident response veteran with over 25 years of experience defending governments, military operations, and private sector organizations. We focus on the ransomware epidemic hitting small businesses and explore why they’re often seen as low-risk, high-reward targets for cybercriminals.


    Matthew shares practical, budget-friendly strategies small businesses can implement today—from running internal tabletop exercises and building relationships with law enforcement to creating effective playbooks and developing a culture of vigilance. We also dive into the critical role of offline, tested backups and how poor backup practices can turn an incident into a full-scale disaster.


    The conversation takes a forward-looking turn as we discuss generative AI—how it’s making ransomware attacks more convincing and sophisticated, and how defenders can leverage AI-driven tools, such as virtual SOCs, to match the attackers’ speed and precision. Matthew closes by previewing his upcoming book, Survive Ransomware, designed to give non-technical leaders the tools and knowledge to respond effectively to an attack.


    What You’ll Learn


    • Why ransomware gangs target small businesses as “practice grounds” for larger attacks
    • The importance of employee awareness as the first line of defense
    • How tabletop exercises can uncover gaps before an incident strikes
    • Why backups must be offline, air-gapped, and regularly tested
    • How generative AI is being weaponized by attackers—and how defenders can fight back
    • How to build strong relationships with law enforcement and managed service providers before you need them


    Key Takeaways


    • Small businesses aren’t immune—they’re often easier and more appealing targets for attackers.
    • Incident response planning doesn’t require a huge budget, but it does require time, communication, and documentation.
    • Backups are only as good as your last test—and ransomware actors actively seek to destroy them.
    • Generative AI is reshaping the threat landscape, producing more believable phishing campaigns and faster attacks.
    • Proactive relationships with service providers and law enforcement can be invaluable during an incident.


    Memorable Quotes


    “It doesn’t take a large budget to be secure—just a team willing to think through ‘what if?’ scenarios.” – Matthew Waddell

    “If your backups aren’t offline and tested, they might as well not exist when ransomware hits.” – Matthew Waddell

    “Attackers are using AI to get faster and smarter—so defenders must do the same.” – Matthew Waddell


    Connect with the Guest


    🔗 Connect with Matthew Waddell on LinkedIn


    Secured with Dr. KJSecuring tomorrow, one episode at a time.

    続きを読む 一部表示
    22 分
  • Cloud Security: The Microsoft Advantage
    2025/04/21

    🎙️ Episode 2: Cloud Security: The Microsoft Advantage


    Host: Dr. Kenneth Johnson

    Guest: Unique Glover, Technical Sales Director, Microsoft

    Duration: ~19 minutes


    Episode Overview


    In this episode of Secured with Dr. KJ, we sit down with Unique Glover, a veteran cybersecurity leader and cloud expert with over 20 years in the industry. Unique currently serves as Technical Sales Director at Microsoft and holds advanced credentials like CISSP and CCSP. His passion for security, innovation, and community shines as we explore how Microsoft is shaping the future of cloud security.


    What You’ll Learn:

    •How Microsoft Azure security compares to AWS and GCP

    •Why Defender for Cloud is a game-changing tool for enterprise security

    •The evolution of data security and the importance of unified security platforms

    •How Microsoft balances innovation with openness and integration

    •Why collaboration across the security industry is critical to staying ahead of threats


    Key Takeaways:

    •Microsoft’s native tooling, threat intelligence, and end-to-end integration create a uniquely powerful security platform.

    •Defender for Cloud offers visibility, compliance frameworks, automation, and consistent posture management.

    •Flexibility and interoperability are must-haves for modern security architecture.

    •Collaboration across vendors, partners, and the community is essential to protect customers and stop adversaries.


    Memorable Quote:

    “If our customers and communities don’t get the protection they need, the only ones who win are the attackers. That’s why integration, collaboration, and transparency matter more than ever.” — Unique Glover


    If you enjoyed this episode, be sure to like, subscribe, and share the podcast with your network.

    Join us next time as we continue securing tomorrow, one episode at a time.

    Hosted on Acast. See acast.com/privacy for more information.

    続きを読む 一部表示
    20 分
  • Privacy and Our Kids
    2025/08/18
    🎙️ Bonus Episode: Privacy and Our Kids – The Hidden Cost of Growing Up in a Digital World


    Host: Kenneth Johnson

    Guest: Richard Kaufmann

    Duration: 21m 28s

    Location: United States

    Podcast Link: Secured with Dr. KJ on Acast


    Keywords


    Privacy, Children, Cybersecurity, Surveillance, Digital Footprint, Parenting, AI, Data Protection, Cyber Awareness, Online Safety


    Episode Summary


    In this bonus episode, Dr. KJ sits down with cybersecurity and AI expert Richard Kaufmann to explore one of the most critical and emotionally charged issues in today’s digital era: privacy and our children. With kids being exposed to technology from infancy and data trails forming before they can even talk, Richard walks us through the unseen costs of growing up in a world that never forgets.

    They explore how everything from smart devices to educational apps can silently collect data and what that means for a child’s future. Richard blends real-world experience, strategic insight, and parental empathy to highlight what leaders, parents, and policymakers need to understand—and act on.


    What You’ll Learn
    • How digital exposure starts before birth and why that’s a problem.
    • The long-term consequences of early data collection and surveillance.
    • Why privacy must be treated as a child safety issue.
    • How AI complicates the protection of minors.
    • Practical tips for parents, educators, and security professionals.

    Key Takeaways


    • Digital Childhood is Permanent: Children’s data footprints are not erasable and can shape their opportunities later in life.
    • Security Isn’t Optional: Protecting kids in the digital age means rethinking both parenting and policy through a cybersecurity lens.
    • AI is a Double-Edged Sword: While powerful for personalization and protection, it can also enable surveillance and data misuse.
    • We Need Guardrails: The time to act is now—before children’s futures are compromised by today’s tech conveniences.

    Memorable Quotes
    • “We put more protection on a credit card than we do on a child’s data.” – Richard Kaufmann
    • “The most vulnerable population in the digital age is the one without a voice yet.” – Richard Kaufmann

    Connect with the Guest


    Want to learn more from Richard Kaufmann or continue the conversation?

    • 🔹 Connect with Richard on LinkedIn

    Hosted on Acast. See acast.com/privacy for more information.

    続きを読む 一部表示
    21 分
  • Securing the Hybrid Workforce
    2025/05/05
    🎙️ Episode 3: Securing the Hybrid Workforce with Rico Mariani


    Host: Dr. Kenneth Johnson

    Guest: Rico Mariani, Veteran Software Performance Engineer & Longtime Microsoft Leader

    Duration: ~20 minutes


    Episode Overview:


    In this episode of Secured with Dr. KJ, Dr. Kenneth Johnson sits down with Rico Mariani, a veteran technologist with decades of experience at Microsoft and a deep background in software performance engineering. Known for his strategic thinking and advocacy for diversity in tech, Rico shares valuable insights on how organizations can better approach security in a hybrid workforce era.


    They explore key challenges with BYOD, transitioning to cloud environments, and the critical need to understand your internal inventory before building outward. Rico also dives into why tailored security matters, how to assume compromise as a defense model, and the human side of securing flexible work.


    What You’ll Learn:


    • The security risks introduced by hybrid and remote work
    • Why visibility and inventory are the foundation of modern security
    • Strategies for managing BYOD in enterprise environments
    • How to align infrastructure with user needs and risk
    • Why tailored access and device assumptions matter
    • The connection between good security and organizational readiness


    Key Takeaways:


    • Understand your inventory before building your security stack.
    • Get your internal systems in order before expanding into hybrid/cloud.
    • Assume devices are compromised to strengthen overall defense.
    • Tailor security to roles and business needs for smarter access control.
    • BYOD success requires flexibility, awareness, and clear boundaries.


    Memorable Quote:


    “Assume they’re connecting with a compromised device. That mindset changes how you design your defenses.” – Rico Mariani

    Hosted on Acast. See acast.com/privacy for more information.

    続きを読む 一部表示
    25 分
  • The State of Cybersecurity
    2025/04/07

    🎙️ Episode 1: The State of Cybersecurity – Jim Eckart


    Host: Dr. Kenneth Johnson

    Guest: Jim Eckart, General Manager of Security Solution Sales at Microsoft, Former CISO

    Duration: 18:50


    Episode Overview:


    In this premiere episode of Secured with Dr. KJ, we sit down with Jim Eckart—a seasoned security leader with over 25 years in IT and cybersecurity. As a former CISO and current General Manager of Security Solution Sales at Microsoft, Jim shares insights on what it takes to secure organizations at scale in today’s evolving digital landscape.


    What We Discuss:

    •The biggest shifts in the cybersecurity landscape over the last decade

    •Lessons learned from Jim’s time as a CISO

    •How Microsoft approaches enterprise security and what makes it stand out

    •The role of Zero Trust, identity, and AI in modern security strategies

    •Where organizations still fall short—and how they can catch up


    Why You Should Listen:

    Whether you’re a business leader, security professional, or curious about the future of cybersecurity, this episode offers a front-row seat to how one of the world’s biggest tech companies tackles security challenges from the inside out.


    Key Quote:

    “Good security is about anticipating problems before they become breaches—and that takes a culture, not just a toolset.” — Jim Eckart

    Hosted on Acast. See acast.com/privacy for more information.

    続きを読む 一部表示
    19 分
  • Ransomware and Threat Protection
    2025/06/02

    Episode 6: Ransomware and Threat Protection with James Ringold


    Host: Dr. Kenneth Johnson

    Guest: James Ringold

    Duration: ~20 minutes


    Keywords:

    ransomware, cybersecurity, threat landscape, AI in security, recovery strategies, ransomware as a service, security education, enterprise security, ransomware attacks, modern security platforms


    Episode Summary:

    In this episode of Secured with Dr. KJ, James Ringold breaks down the constantly evolving ransomware threat landscape and its implications for enterprise security. From the rise of AI-powered attacks to the growth of ransomware as a service, James explains why these threats demand more than just technical fixes—they require a strategic, cross-functional approach.


    We also explore the growing importance of security education, the burden of legacy systems, and how organizations can better balance proactive prevention with rapid recovery strategies.


    What You’ll Learn:
    • How ransomware tactics have evolved, including triple extortion
    • Why legacy systems are still a major weak spot
    • How AI is both a threat and a tool in cybersecurity
    • The role of cloud storage and file versioning in recovery
    • Why education and awareness are just as critical as tooling
    • How to think about ransomware as a business risk, not just a tech problem

    Key Takeaways:
    • Ransomware damages are projected to hit $57 billion by 2025
    • Triple extortion and human-operated attacks are on the rise
    • AI is enabling faster, stealthier attacks
    • Ransomware as a service creates a supply chain of cybercrime
    • Legacy infrastructure remains a major vulnerability
    • Cloud-based recovery tools like versioning can expedite restoration
    • Employee education and SOC readiness are vital to response
    • Effective defense requires cross-team collaboration
    • Prevention and recovery must go hand-in-hand
    • Ransomware is a business-level risk, not just an IT concern

    Memorable Quotes:
    • “AI is used to automate phishing and evade detection.”
    • “Ransomware as a service is a growing concern.”
    • “Attackers don’t hack anymore—they log in.”
    • “Balancing prevention with rapid recovery is crucial.”

    Hosted on Acast. See acast.com/privacy for more information.

    続きを読む 一部表示
    26 分