Secured with Dr. KJ cover art

Secured with Dr. KJ

Secured with Dr. KJ

By: Kenneth Johnson
Listen for free

Summary

Welcome to Secured with Dr. KJ—the podcast that explores the evolving world of cybersecurity, the technologies driving it, and the companies shaping our digital future.

Hosted by Dr. Kenneth Johnson, cybersecurity leader and strategist, this podcast simplifies complex security topics into actionable insights. In today’s digital world, cybersecurity is a business imperative. Each episode dives into cloud security, Zero Trust, identity management, AI-driven security, and more.

We’ll assess how industry leaders, including Microsoft, are tackling security challenges—and where there’s room for improvement. Featuring expert insights from security professionals, industry leaders, and technologists, Secured with Dr. KJ delivers real-world strategies to protect businesses and individuals.

Join the conversation! Subscribe today to explore what it takes to stay secure in a rapidly changing digital world—securing tomorrow, one episode at a time.

2025 Kenneth Johnson
Politics & Government
Episodes
  • AI and Security: Friend or Foe?
    Jul 28 2025

    Episode 9: AI and Security: Friend or Foe? with Terence Jackson

    Host: Dr. Kenneth Johnson

    Guest: Terence Jackson

    Duration: ~23 minutes


    Keywords:

    AI, cybersecurity, threat detection, security posture, upskilling, cross-training, digital security, threat actors, zero trust, automation


    Episode Summary:

    In this episode of Secured with Dr. KJ, Terence Jackson, Chief Security Advisor at Microsoft, explores how artificial intelligence is revolutionizing both sides of the cybersecurity battlefield.


    Terence explains how AI is redefining traditional defenses, making threat detection faster and smarter—but also more accessible to adversaries. He walks through the advantages of agentic AI, the evolving threat landscape, and the urgent need for organizations to strengthen posture management and automate security operations. The conversation highlights the importance of upskilling, cross-training, and revisiting foundational security practices like zero trust to stay ahead in the AI arms race.


    Listeners will gain insight into the balance between automation and human oversight, and the very real pressures defenders face in a world where attackers have no red tape.


    What You’ll Learn:

    • How AI empowers defenders to reason over large datasets
    • Why threat actors are gaining speed with natural language-driven exploits
    • What agentic AI means for posture management and response
    • How cross-training existing personnel accelerates readiness
    • Why the basics (patching, RBAC, MFA) still matter most
    • How to prepare your SOC for AI-assisted defense


    Key Takeaways:

    • AI has obliterated traditional defenses—speed is the new battleground
    • Threat actors are better resourced and less restricted than defenders
    • Natural language is the new attack surface
    • Agentic AI brings autonomous detection and remediation capabilities
    • Time to compromise is now measured in minutes, not months
    • Cross-training network and IT engineers reduces staffing gaps
    • AI can democratize learning and accelerate workforce development
    • Organizations must focus on zero trust and foundational hygiene
    • Automation must be balanced with human oversight
    • AI is both a friend and a foe—how we use it determines the outcome


    Memorable Quotes:

    • “AI is obliterating traditional defenses.”
    • “The hottest programming language right now is natural language.”
    • “We’re defending at the pace and speed of AI.”
    • “The attackers have jobs—just like we do.”
    • “We need to do the basics better.”

    Hosted on Acast. See acast.com/privacy for more information.

    Show More Show Less
    27 mins
  • Small Targets: Big Impact
    Sep 22 2025
    Episode 3: Small Targets, Big Impact: The Ransomware wake up call with Matthew Waddell


    Host: Kenneth Johnson

    Guest: Matthew Waddell, Incident Response Expert & Author of Survive Ransomware

    Duration: ~19 minutes

    Keywords: Ransomware, Small Business Cybersecurity, Incident Response, Backups, Generative AI, Phishing, Tabletop Exercises, Managed Service Providers, AI in Cyber Defense


    Episode Summary


    In this episode of Secured with Dr. KJ, I sit down with Matthew Waddell—an incident response veteran with over 25 years of experience defending governments, military operations, and private sector organizations. We focus on the ransomware epidemic hitting small businesses and explore why they’re often seen as low-risk, high-reward targets for cybercriminals.


    Matthew shares practical, budget-friendly strategies small businesses can implement today—from running internal tabletop exercises and building relationships with law enforcement to creating effective playbooks and developing a culture of vigilance. We also dive into the critical role of offline, tested backups and how poor backup practices can turn an incident into a full-scale disaster.


    The conversation takes a forward-looking turn as we discuss generative AI—how it’s making ransomware attacks more convincing and sophisticated, and how defenders can leverage AI-driven tools, such as virtual SOCs, to match the attackers’ speed and precision. Matthew closes by previewing his upcoming book, Survive Ransomware, designed to give non-technical leaders the tools and knowledge to respond effectively to an attack.


    What You’ll Learn


    • Why ransomware gangs target small businesses as “practice grounds” for larger attacks
    • The importance of employee awareness as the first line of defense
    • How tabletop exercises can uncover gaps before an incident strikes
    • Why backups must be offline, air-gapped, and regularly tested
    • How generative AI is being weaponized by attackers—and how defenders can fight back
    • How to build strong relationships with law enforcement and managed service providers before you need them


    Key Takeaways


    • Small businesses aren’t immune—they’re often easier and more appealing targets for attackers.
    • Incident response planning doesn’t require a huge budget, but it does require time, communication, and documentation.
    • Backups are only as good as your last test—and ransomware actors actively seek to destroy them.
    • Generative AI is reshaping the threat landscape, producing more believable phishing campaigns and faster attacks.
    • Proactive relationships with service providers and law enforcement can be invaluable during an incident.


    Memorable Quotes


    “It doesn’t take a large budget to be secure—just a team willing to think through ‘what if?’ scenarios.” – Matthew Waddell

    “If your backups aren’t offline and tested, they might as well not exist when ransomware hits.” – Matthew Waddell

    “Attackers are using AI to get faster and smarter—so defenders must do the same.” – Matthew Waddell


    Connect with the Guest


    🔗 Connect with Matthew Waddell on LinkedIn


    Secured with Dr. KJSecuring tomorrow, one episode at a time.

    Show More Show Less
    22 mins
  • Zero Trust in Practice
    May 19 2025

    Episode 4: Zero Trust – Zero Trust in Practice with Mark Simos


    Host: Dr. Kenneth Johnson

    Guest: Mark Simos, Lead Cybersecurity Architect, Microsoft

    Duration: ~20 minutes


    Keywords:


    Zero Trust, Cybersecurity, Identity Management, AI, Security Architecture, Collaboration, Trust Verification, Modern Security Strategies


    Episode Summary:


    In this episode of Secured with Dr. KJ, Kenneth Johnson and Mark Simos break down the reality of Zero Trust—moving beyond buzzwords into actionable strategies. They explore why traditional perimeter-based security no longer works, and how identity, verification, and AI are reshaping the way we think about trust in cybersecurity.


    Mark shares insights on how organizations can align their teams, embrace a culture of shared responsibility, and make security a business enabler—not a blocker. The conversation also touches on how AI is accelerating complex security tasks, helping teams stay ahead of evolving threats.


    What You’ll Learn:


    • Why Zero Trust is more than a framework—it’s a mindset shift
    • The critical role identity plays in modern security
    • How AI supports and strengthens Zero Trust strategies
    • The cost of implicit trust and the value of explicit verification
    • Why collaboration and communication are essential to success

    Key Takeaways:


    • Zero Trust removes the false assumption of a secure perimeter.
    • Verification of identity is essential in modern security.
    • Trust is costly; explicit verification is necessary.
    • Identity management is crucial for Zero Trust success.
    • AI plays a symbiotic role in enhancing security.
    • Security must be integrated into business processes.
    • Every asset and user must have a defined identity.
    • Collaboration across teams is vital for security effectiveness.
    • Security professionals should act as enablers for other teams.
    • Open communication fosters a successful Zero Trust implementation.


    Memorable Quotes:


    • “AI accelerates complex security tasks.”
    • “Identity is the new security perimeter.”
    • “Security is part of everyone’s job.”

    Hosted on Acast. See acast.com/privacy for more information.

    Show More Show Less
    19 mins
adbl_web_anon_alc_button_suppression_c
No reviews yet