エピソード

  • The State of Cybersecurity
    2025/04/07

    🎙️ Episode 1: The State of Cybersecurity – Jim Eckart


    Host: Dr. Kenneth Johnson

    Guest: Jim Eckart, General Manager of Security Solution Sales at Microsoft, Former CISO

    Duration: 18:50


    Episode Overview:


    In this premiere episode of Secured with Dr. KJ, we sit down with Jim Eckart—a seasoned security leader with over 25 years in IT and cybersecurity. As a former CISO and current General Manager of Security Solution Sales at Microsoft, Jim shares insights on what it takes to secure organizations at scale in today’s evolving digital landscape.


    What We Discuss:

    •The biggest shifts in the cybersecurity landscape over the last decade

    •Lessons learned from Jim’s time as a CISO

    •How Microsoft approaches enterprise security and what makes it stand out

    •The role of Zero Trust, identity, and AI in modern security strategies

    •Where organizations still fall short—and how they can catch up


    Why You Should Listen:

    Whether you’re a business leader, security professional, or curious about the future of cybersecurity, this episode offers a front-row seat to how one of the world’s biggest tech companies tackles security challenges from the inside out.


    Key Quote:

    “Good security is about anticipating problems before they become breaches—and that takes a culture, not just a toolset.” — Jim Eckart

    Hosted on Acast. See acast.com/privacy for more information.

    続きを読む 一部表示
    19 分
  • Cloud Security: The Microsoft Advantage
    2025/04/21

    🎙️ Episode 2: Cloud Security: The Microsoft Advantage


    Host: Dr. Kenneth Johnson

    Guest: Unique Glover, Technical Sales Director, Microsoft

    Duration: ~19 minutes


    Episode Overview


    In this episode of Secured with Dr. KJ, we sit down with Unique Glover, a veteran cybersecurity leader and cloud expert with over 20 years in the industry. Unique currently serves as Technical Sales Director at Microsoft and holds advanced credentials like CISSP and CCSP. His passion for security, innovation, and community shines as we explore how Microsoft is shaping the future of cloud security.


    What You’ll Learn:

    •How Microsoft Azure security compares to AWS and GCP

    •Why Defender for Cloud is a game-changing tool for enterprise security

    •The evolution of data security and the importance of unified security platforms

    •How Microsoft balances innovation with openness and integration

    •Why collaboration across the security industry is critical to staying ahead of threats


    Key Takeaways:

    •Microsoft’s native tooling, threat intelligence, and end-to-end integration create a uniquely powerful security platform.

    •Defender for Cloud offers visibility, compliance frameworks, automation, and consistent posture management.

    •Flexibility and interoperability are must-haves for modern security architecture.

    •Collaboration across vendors, partners, and the community is essential to protect customers and stop adversaries.


    Memorable Quote:

    “If our customers and communities don’t get the protection they need, the only ones who win are the attackers. That’s why integration, collaboration, and transparency matter more than ever.” — Unique Glover


    If you enjoyed this episode, be sure to like, subscribe, and share the podcast with your network.

    Join us next time as we continue securing tomorrow, one episode at a time.

    Hosted on Acast. See acast.com/privacy for more information.

    続きを読む 一部表示
    20 分
  • Securing the Hybrid Workforce
    2025/05/05
    🎙️ Episode 3: Securing the Hybrid Workforce with Rico Mariani


    Host: Dr. Kenneth Johnson

    Guest: Rico Mariani, Veteran Software Performance Engineer & Longtime Microsoft Leader

    Duration: ~20 minutes


    Episode Overview:


    In this episode of Secured with Dr. KJ, Dr. Kenneth Johnson sits down with Rico Mariani, a veteran technologist with decades of experience at Microsoft and a deep background in software performance engineering. Known for his strategic thinking and advocacy for diversity in tech, Rico shares valuable insights on how organizations can better approach security in a hybrid workforce era.


    They explore key challenges with BYOD, transitioning to cloud environments, and the critical need to understand your internal inventory before building outward. Rico also dives into why tailored security matters, how to assume compromise as a defense model, and the human side of securing flexible work.


    What You’ll Learn:


    • The security risks introduced by hybrid and remote work
    • Why visibility and inventory are the foundation of modern security
    • Strategies for managing BYOD in enterprise environments
    • How to align infrastructure with user needs and risk
    • Why tailored access and device assumptions matter
    • The connection between good security and organizational readiness


    Key Takeaways:


    • Understand your inventory before building your security stack.
    • Get your internal systems in order before expanding into hybrid/cloud.
    • Assume devices are compromised to strengthen overall defense.
    • Tailor security to roles and business needs for smarter access control.
    • BYOD success requires flexibility, awareness, and clear boundaries.


    Memorable Quote:


    “Assume they’re connecting with a compromised device. That mindset changes how you design your defenses.” – Rico Mariani

    Hosted on Acast. See acast.com/privacy for more information.

    続きを読む 一部表示
    25 分
  • Zero Trust in Practice
    2025/05/19

    Episode 4: Zero Trust – Zero Trust in Practice with Mark Simos


    Host: Dr. Kenneth Johnson

    Guest: Mark Simos, Lead Cybersecurity Architect, Microsoft

    Duration: ~20 minutes


    Keywords:


    Zero Trust, Cybersecurity, Identity Management, AI, Security Architecture, Collaboration, Trust Verification, Modern Security Strategies


    Episode Summary:


    In this episode of Secured with Dr. KJ, Kenneth Johnson and Mark Simos break down the reality of Zero Trust—moving beyond buzzwords into actionable strategies. They explore why traditional perimeter-based security no longer works, and how identity, verification, and AI are reshaping the way we think about trust in cybersecurity.


    Mark shares insights on how organizations can align their teams, embrace a culture of shared responsibility, and make security a business enabler—not a blocker. The conversation also touches on how AI is accelerating complex security tasks, helping teams stay ahead of evolving threats.


    What You’ll Learn:


    • Why Zero Trust is more than a framework—it’s a mindset shift
    • The critical role identity plays in modern security
    • How AI supports and strengthens Zero Trust strategies
    • The cost of implicit trust and the value of explicit verification
    • Why collaboration and communication are essential to success

    Key Takeaways:


    • Zero Trust removes the false assumption of a secure perimeter.
    • Verification of identity is essential in modern security.
    • Trust is costly; explicit verification is necessary.
    • Identity management is crucial for Zero Trust success.
    • AI plays a symbiotic role in enhancing security.
    • Security must be integrated into business processes.
    • Every asset and user must have a defined identity.
    • Collaboration across teams is vital for security effectiveness.
    • Security professionals should act as enablers for other teams.
    • Open communication fosters a successful Zero Trust implementation.


    Memorable Quotes:


    • “AI accelerates complex security tasks.”
    • “Identity is the new security perimeter.”
    • “Security is part of everyone’s job.”

    Hosted on Acast. See acast.com/privacy for more information.

    続きを読む 一部表示
    19 分
  • Ransomware and Threat Protection
    2025/06/02

    Episode 6: Ransomware and Threat Protection with James Ringold


    Host: Dr. Kenneth Johnson

    Guest: James Ringold

    Duration: ~20 minutes


    Keywords:

    ransomware, cybersecurity, threat landscape, AI in security, recovery strategies, ransomware as a service, security education, enterprise security, ransomware attacks, modern security platforms


    Episode Summary:

    In this episode of Secured with Dr. KJ, James Ringold breaks down the constantly evolving ransomware threat landscape and its implications for enterprise security. From the rise of AI-powered attacks to the growth of ransomware as a service, James explains why these threats demand more than just technical fixes—they require a strategic, cross-functional approach.


    We also explore the growing importance of security education, the burden of legacy systems, and how organizations can better balance proactive prevention with rapid recovery strategies.


    What You’ll Learn:
    • How ransomware tactics have evolved, including triple extortion
    • Why legacy systems are still a major weak spot
    • How AI is both a threat and a tool in cybersecurity
    • The role of cloud storage and file versioning in recovery
    • Why education and awareness are just as critical as tooling
    • How to think about ransomware as a business risk, not just a tech problem

    Key Takeaways:
    • Ransomware damages are projected to hit $57 billion by 2025
    • Triple extortion and human-operated attacks are on the rise
    • AI is enabling faster, stealthier attacks
    • Ransomware as a service creates a supply chain of cybercrime
    • Legacy infrastructure remains a major vulnerability
    • Cloud-based recovery tools like versioning can expedite restoration
    • Employee education and SOC readiness are vital to response
    • Effective defense requires cross-team collaboration
    • Prevention and recovery must go hand-in-hand
    • Ransomware is a business-level risk, not just an IT concern

    Memorable Quotes:
    • “AI is used to automate phishing and evade detection.”
    • “Ransomware as a service is a growing concern.”
    • “Attackers don’t hack anymore—they log in.”
    • “Balancing prevention with rapid recovery is crucial.”

    Hosted on Acast. See acast.com/privacy for more information.

    続きを読む 一部表示
    26 分
  • Regulatory Compliance in the Cloud
    2025/06/16
    Episode 7: Regulatory Compliance in the Cloud with Awnya Creque


    Host: Dr. Kenneth Johnson

    Guest: Awnya Creque

    Duration: ~20 minutes


    Keywords:

    cloud compliance, data security, regulatory challenges, Microsoft Purview, risk assessment, industry regulations, cloud migration, access control, data privacy, compliance automation


    Episode Summary:

    In this episode of Secured with Dr. KJ, Awnya Creque, Principal Technical Specialist at Microsoft, breaks down the complex world of regulatory compliance in the cloud.


    Awnya outlines five critical focus areas—data residency, access control, data privacy, regulatory compliance, and auditing/reporting—that organizations must address when migrating to or operating in cloud environments. She explains how compliance challenges vary across sectors like government, healthcare, and financial services, and how tools like Microsoft Purview can support proactive compliance strategies.


    The conversation also explores the importance of fostering a culture of compliance, leveraging automation, and integrating regulatory checks into day-to-day workflows.


    What You’ll Learn:
    • The top compliance challenges when moving to the cloud
    • Why data sovereignty and residency matter more than ever
    • How identity and access control play a central role in securing sensitive data
    • Why compliance isn’t a one-time task—it’s a continuous process
    • How industry-specific requirements shape cloud security strategies
    • The role of cloud providers and automation in easing the compliance burden


    Key Takeaways:
    • Organizations face multiple compliance challenges in the cloud
    • Data residency and sovereignty are essential to meet global regulations
    • Strong access control and identity management are non-negotiable
    • Security programs must adhere to evolving frameworks like GDPR and HIPAA
    • Compliance demands constant attention and adaptation
    • Effective auditing and reporting help demonstrate accountability
    • Industry-specific regulations drive unique security needs
    • Cloud platforms like Microsoft Purview offer valuable support
    • Proactive strategies and automation reduce risk
    • Embedding compliance into daily workflows drives long-term success


    Memorable Quotes:
    • “Data stays where it needs to be.”
    • “Stay informed about regulatory updates.”
    • “Conducting a risk assessment is crucial.”
    • “Integrate compliance into your workflows.”

    Hosted on Acast. See acast.com/privacy for more information.

    続きを読む 一部表示
    25 分
  • Identity and Access Management
    2025/06/30

    Episode Title:

    Identity and Access Management


    Host: Dr. Kenneth Johnson

    Guest: Corey Lee, Security CTO, Microsoft Education

    Duration: ~20 minutes


    Keywords:

    identity, security, breaches, governance, authentication, authorization, MFA, passwordless, AI, zero trust


    Episode Summary:

    In this episode of Secured with Dr. KJ, Corey Lee, Security CTO for Microsoft Education, unpacks the foundational role of identity in today’s security landscape. With over 15 years of experience in risk analysis, identity, and AI-enabled security, Corey shares how identity acts as the glue connecting people, devices, and data—and as the edge organizations must protect.


    The conversation covers the rise of identity-driven breaches, the growing importance of governance, and innovations like passkeys and verified ID. Corey also provides insights into strengthening MFA strategies, enabling passwordless adoption, and preparing for a future where AI and zero trust shape every layer of defense.


    What You’ll Learn:

    • Why identity is now the core security perimeter
    • How identity connects and protects in a hybrid, AI-driven world
    • The role of governance in managing evolving permissions
    • Why MFA remains critical—and how to improve its adoption
    • What a successful passwordless journey looks like
    • How identity threat detection is becoming more automated and intelligent
    • The importance of strategic planning in identity management
    • Why identity is key to unlocking secure innovation at scale


    Key Takeaways:

    • Identity is the core of modern security architecture
    • Breaches often stem from compromised or mismanaged identities
    • Identity governance helps manage scope creep and permissions sprawl
    • MFA should be enforced adaptively based on risk
    • Passwordless strategies reduce known attack surfaces
    • Organizations must report on and monitor identity security gaps
    • Identity is now central to AI and agent-based security scenarios
    • Strategic identity planning unlocks innovation and improves protection
    • Continuous tracking and governance support transformation
    • Identity is here to stay and growing more critical each day


    Memorable Quotes:

    • “Identity is the new security perimeter.”
    • “Passwords create very bad behavior.”
    • “Identity has never been easy.”
    • “Identity is here to stay.”


    Listen now on your favorite platform:

    • Apple Podcasts: https://podcasts.apple.com/us/podcast/secured-with-dr-kj/id1730562581
    • Spotify: https://open.spotify.com/show/5ZHg5qHXGP6MSf2QnK6LDo
    • Acast: https://shows.acast.com/secured-with-dr-kj
    • Amazon Music: https://music.amazon.com/podcasts/4ff12a6c-f35f-4f8d-a5d4-9170c601ea3f


    Secured with Dr. KJ – Securing tomorrow, one episode at a time.

    Hosted on Acast. See acast.com/privacy for more information.

    続きを読む 一部表示
    23 分
  • Securing the Internet of Things (IoT)
    2025/07/14

    Episode 10: Securing the Internet of Things with Maurice Hampton

    Host: Dr. Kenneth Johnson

    Guest: Maurice Hampton

    Duration: ~23 minutes


    Keywords:

    IoT security, connected devices, cybersecurity, risk management, best practices, visibility, control, AI, machine learning, organizational strategy


    Episode Summary:

    In this episode of Secured with Dr. KJ, Maurice Hampton, Director of Cybersecurity Solution Sales (East) at Microsoft, unpacks the security challenges posed by the exponential growth of connected devices.


    Maurice walks through the evolution of the IoT attack surface, explaining how formerly isolated systems are now interconnected and exposed to new threats. He outlines a practical, phased approach—acknowledge, assess, implement controls—for tackling IoT security at scale. The discussion underscores the need for visibility, collaboration, and AI-driven insights to manage risk across environments like manufacturing, transportation, and smart cities.


    Listeners will gain actionable strategies and real-world examples of how organizations can secure their IoT footprint from the edge to the cloud.


    What You’ll Learn:

    • Why IoT security is more complex today than ever before
    • The risks associated with interconnectivity and outdated systems
    • How to launch an IoT security strategy using a crawl-walk-run approach
    • Why visibility and inventory are foundational to defense
    • The critical role of cross-functional collaboration in securing IoT
    • How AI and machine learning enhance detection and response
    • Real-world examples of IoT security transformation


    Key Takeaways:

    • The IoT attack surface has expanded due to rapid connectivity
    • Security must be built into innovation—not added later
    • Acknowledging risks is step one in any IoT security journey
    • Comprehensive assessments are essential to understand current state
    • Controls must follow knowledge—not precede it
    • Cross-team collaboration is vital—security is a team sport
    • Visibility into devices and their behavior drives stronger defense
    • AI can uncover anomalies that humans may miss
    • Start small and build repeatable processes
    • Taking action is the key to reducing long-term risk


    Memorable Quotes:

    • “The attack surface has grown exponentially.”
    • “Acknowledge, understand, and then controls.”
    • “Get other people in the boat with you.”
    • “Security isn’t a solo act—it’s a team sport.”
    • “AI lets us see what we couldn’t before.”

    Hosted on Acast. See acast.com/privacy for more information.

    続きを読む 一部表示
    20 分