Secured with Dr. KJ

Auteur(s): Kenneth Johnson
  • Résumé

  • Welcome to Secured with Dr. KJ—the podcast that explores the evolving world of cybersecurity, the technologies driving it, and the companies shaping our digital future.


    Hosted by Dr. Kenneth Johnson, cybersecurity leader and strategist, this podcast simplifies complex security topics into actionable insights. In today’s digital world, cybersecurity is a business imperative. Each episode dives into cloud security, Zero Trust, identity management, AI-driven security, and more.


    We’ll assess how industry leaders, including Microsoft, are tackling security challenges—and where there’s room for improvement. Featuring expert insights from security professionals, industry leaders, and technologists, Secured with Dr. KJ delivers real-world strategies to protect businesses and individuals.


    🔒 Join the conversation! Subscribe today to explore what it takes to stay secure in a rapidly changing digital world—securing tomorrow, one episode at a time.

    Hosted on Acast. See acast.com/privacy for more information.

    Kenneth Johnson
    Voir plus Voir moins
Épisodes
  • The State of Cybersecurity
    Apr 7 2025

    🎙️ Episode 1: The State of Cybersecurity – Jim Eckart


    Host: Dr. Kenneth Johnson

    Guest: Jim Eckart, General Manager of Security Solution Sales at Microsoft, Former CISO

    Duration: 18:50


    Episode Overview:


    In this premiere episode of Secured with Dr. KJ, we sit down with Jim Eckart—a seasoned security leader with over 25 years in IT and cybersecurity. As a former CISO and current General Manager of Security Solution Sales at Microsoft, Jim shares insights on what it takes to secure organizations at scale in today’s evolving digital landscape.


    What We Discuss:

    •The biggest shifts in the cybersecurity landscape over the last decade

    •Lessons learned from Jim’s time as a CISO

    •How Microsoft approaches enterprise security and what makes it stand out

    •The role of Zero Trust, identity, and AI in modern security strategies

    •Where organizations still fall short—and how they can catch up


    Why You Should Listen:

    Whether you’re a business leader, security professional, or curious about the future of cybersecurity, this episode offers a front-row seat to how one of the world’s biggest tech companies tackles security challenges from the inside out.


    Key Quote:

    “Good security is about anticipating problems before they become breaches—and that takes a culture, not just a toolset.” — Jim Eckart

    Hosted on Acast. See acast.com/privacy for more information.

    Voir plus Voir moins
    19 min
  • Cloud Security: The Microsoft Advantage
    Apr 21 2025

    🎙️ Episode 2: Cloud Security: The Microsoft Advantage


    Host: Dr. Kenneth Johnson

    Guest: Unique Glover, Technical Sales Director, Microsoft

    Duration: ~19 minutes


    Episode Overview


    In this episode of Secured with Dr. KJ, we sit down with Unique Glover, a veteran cybersecurity leader and cloud expert with over 20 years in the industry. Unique currently serves as Technical Sales Director at Microsoft and holds advanced credentials like CISSP and CCSP. His passion for security, innovation, and community shines as we explore how Microsoft is shaping the future of cloud security.


    What You’ll Learn:

    •How Microsoft Azure security compares to AWS and GCP

    •Why Defender for Cloud is a game-changing tool for enterprise security

    •The evolution of data security and the importance of unified security platforms

    •How Microsoft balances innovation with openness and integration

    •Why collaboration across the security industry is critical to staying ahead of threats


    Key Takeaways:

    •Microsoft’s native tooling, threat intelligence, and end-to-end integration create a uniquely powerful security platform.

    •Defender for Cloud offers visibility, compliance frameworks, automation, and consistent posture management.

    •Flexibility and interoperability are must-haves for modern security architecture.

    •Collaboration across vendors, partners, and the community is essential to protect customers and stop adversaries.


    Memorable Quote:

    “If our customers and communities don’t get the protection they need, the only ones who win are the attackers. That’s why integration, collaboration, and transparency matter more than ever.” — Unique Glover


    If you enjoyed this episode, be sure to like, subscribe, and share the podcast with your network.

    Join us next time as we continue securing tomorrow, one episode at a time.

    Hosted on Acast. See acast.com/privacy for more information.

    Voir plus Voir moins
    20 min
  • Securing the Hybrid Workforce
    May 5 2025
    🎙️ Episode 3: Securing the Hybrid Workforce with Rico Mariani


    Host: Dr. Kenneth Johnson

    Guest: Rico Mariani, Veteran Software Performance Engineer & Longtime Microsoft Leader

    Duration: ~20 minutes


    Episode Overview:


    In this episode of Secured with Dr. KJ, Dr. Kenneth Johnson sits down with Rico Mariani, a veteran technologist with decades of experience at Microsoft and a deep background in software performance engineering. Known for his strategic thinking and advocacy for diversity in tech, Rico shares valuable insights on how organizations can better approach security in a hybrid workforce era.


    They explore key challenges with BYOD, transitioning to cloud environments, and the critical need to understand your internal inventory before building outward. Rico also dives into why tailored security matters, how to assume compromise as a defense model, and the human side of securing flexible work.


    What You’ll Learn:


    • The security risks introduced by hybrid and remote work
    • Why visibility and inventory are the foundation of modern security
    • Strategies for managing BYOD in enterprise environments
    • How to align infrastructure with user needs and risk
    • Why tailored access and device assumptions matter
    • The connection between good security and organizational readiness


    Key Takeaways:


    • Understand your inventory before building your security stack.
    • Get your internal systems in order before expanding into hybrid/cloud.
    • Assume devices are compromised to strengthen overall defense.
    • Tailor security to roles and business needs for smarter access control.
    • BYOD success requires flexibility, awareness, and clear boundaries.


    Memorable Quote:


    “Assume they’re connecting with a compromised device. That mindset changes how you design your defenses.” – Rico Mariani

    Hosted on Acast. See acast.com/privacy for more information.

    Voir plus Voir moins
    25 min

Ce que les auditeurs disent de Secured with Dr. KJ

Moyenne des évaluations de clients

Évaluations – Cliquez sur les onglets pour changer la source des évaluations.