Secured with Dr. KJ

Kenneth Johnson

Welcome to Secured with Dr. KJ—the podcast that explores the evolving world of cybersecurity, the technologies driving it, and the companies shaping our digital future. Hosted by Dr. Kenneth Johnson, cybersecurity leader and strategist, this podcast simplifies complex security topics into actionable insights. In today’s digital world, cybersecurity is a business imperative. Each episode dives into cloud security, Zero Trust, identity management, AI-driven security, and more. We’ll assess how industry leaders, including Microsoft, are tackling security challenges—and where there’s room for improvement. Featuring expert insights from security professionals, industry leaders, and technologists, Secured with Dr. KJ delivers real-world strategies to protect businesses and individuals. Join the conversation! Subscribe today to explore what it takes to stay secure in a rapidly changing digital world—securing tomorrow, one episode at a time.

  1. The Foundation of AI Success with Avertium

    EPISODE 1

    The Foundation of AI Success with Avertium

    Episode OverviewIn this Season 3 premiere, Ben Masino, President and Chief Growth Officer at Avertium, discusses how security enables business growth rather than hindering it. We explore building security programs through the Microsoft Security platform, the critical role of data hygiene in AI adoption, and meeting customers where they are for long-term success. GuestBen Masino President & Chief Growth Officer, Avertium LinkedIn: Ben Masino Key TopicsAvertium's Approach "Assess, Design, Protect" methodology for regulated industriesServing healthcare, manufacturing, retail, and finance sectors20+ years combined experience in security and complianceAI Readiness Through Data Securing your data estate is foundational for AI successUsing Microsoft Purview for data discovery and governanceBridging executive AI mandates with IT/security realitiesCustomer Success Healthcare company journey: pen test to full MXDR partnershipIntune misconfiguration discovery and remediationBuilding trust through actionable assessmentsCustomer Zero Philosophy Avertium uses Microsoft E5, Sentinel, and Defender internally firstTesting Copilot for Security to enhance analyst workLeading into the future with proven expertiseTimestamps00:00 - Introduction 00:20 - Avertium's mission in security 02:05 - Common challenges across regulated industries 03:44 - Assess, Design, Protect methodology 05:54 - Customer success story 08:26 - AI readiness and data estates 10:57 - Bridging executives and IT teams 12:57 - Customer Zero approach 15:09 - Final thoughts ResourcesAvertium: avertium.comMicrosoft Security: Sentinel, Defender XDR, PurviewCompliance: HIPAA, PCI, NERC, High TrustKey TakeawaysFocus creates depth - specialization builds meaningful partnershipsData hygiene before AI - organize your data estate firstMeet customers where they are - tactical starts lead to strategic relationshipsBe your own customer zero - internal testing builds real expertiseSecurity enables business - proper programs accelerate outcomesConnectSubscribe to Secured with Dr. KJ on your favorite podcast platform. Feedback, topics, or want to be a guest? Visit: Secured with Dr. KJ - Podcast Keep securing tomorrow, one episode at a time.

    18 min
  2. Defense Cybersecurity - from checkbox compliance to security culture

    EPISODE 2

    Defense Cybersecurity - from checkbox compliance to security culture

    Episode OverviewAllen Westley, Director of Cyber Intelligence at L3Harris Technologies, explores the challenges government contractors face with AI, compliance, and operational security. We discuss the compliance trap, agentic AI risks, and why judgment-driven leadership outweighs certifications. GuestAllen Westley Director of Cyber Intelligence, L3Harris Technologies Founder, Cyber Explorer LLC | Adjunct Professor LinkedIn: Allen Westley, CSM, CISSP, MBA Key TopicsThe Compliance Trap Passing CMMC audits vs. having operational securityCritical importance of scoping for defense contractorsConvergence of classified and unclassified systems (CUI, 871 controls)Shadow IT: operators using unapproved tools to meet deliverablesAI as Dual-Use Technology Adversaries operationalizing AI alongside defendersCognitive mapping and anthropomorphizing risksPattern matching creating unintended classified informationTraining gaps when mandating AI adoption without guardrailsAgentic AI Systems Models collaborating with limited visibilityChatGPT agent example: exceeding original instructionsData segmentation failures enabling unauthorized accessEngineers bypassing inadequate guardrailsSecurity Culture Judgment over knowledge through experiencePsychological safety for reporting mistakesLeading by example in daily decisionsTrust built through consistency, not town hallsTimestamps00:00 - Introduction 01:51 - Compliance trap challenges 04:03 - CMMC scoping essentials 06:05 - AI reshaping operations 10:21 - Agentic systems and data risks 12:46 - Canva agent example 15:03 - Building security culture 18:00 - Outro ResourcesCMMC Compliance: Levels 1-3, FCI vs CUIDefense Industrial Base guidanceAI governance frameworksKey TakeawaysScoping determines CMMC successCompliance ≠ operational securityAI needs training and guardrailsAgentic systems require data segmentationPsychological safety builds real cultureConnectSubscribe to Secured with Dr. KJ. Feedback or want to be a guest? Visit: Secured with Dr. KJ - Podcast Securing tomorrow, one episode at a time.

    19 min
  3. DNS Security in the AI Era

    EPISODE 3

    DNS Security in the AI Era

    Episode Title: DNS Security in the AI Era with Garland Moore Guest: Garland Moore, Solutions Architect at F5 Episode Description: In this episode of Secured with Dr. KJ, I sit down with Garland Moore, Solutions Architect at F5, to discuss DNS security threats, effective defense strategies, and how AI is transforming both the attack landscape and our defensive capabilities. Garland brings over 17 years of hands-on infrastructure experience and shares practical insights for organizations of all sizes. What We Discussed: DNS Security Threats & Defense Why DNS remains a primary target and the impact of major outagesEffective strategies: DNSSEC adoption, resolver hardening, rate limitingThe importance of monitoring, logging, and analyticsIntelligent DNS and managed DNS solutions for threat intelligence AI's Dual Role in DNS Security How AI is being weaponized for DNS attacksLeveraging AI for predictive threat detection and filtering log noiseThe emergence of "layer eight" security challenges Practical Guidance for Smaller Organizations Minimum DNS security implementations without enterprise budgetsHybrid approaches combining managed services with internal controlsSticking to security fundamentals over flashy tools Building Security Culture & Getting Executive Buy-In Why foundational systems (DNS, identity, patching, backups) get overlookedTying DNS security to business impact: revenue, risk, speed to market"If DNS goes down, business stops"—translating technical issues to business outcomes Breaking Into Cybersecurity You don't need 10 certifications to get startedThree essential qualities: curiosity, fundamentals, and persistence"Sponge mode": learning broadly while waiting for opportunitiesThe critical importance of soft skills Key Quotes: DNS is the heartbeat of the internet—it's definitely something that is highly targeted.Nobody really cares about DNS until it doesn't work.You can't protect what you don't understand.Cybersecurity isn't about chasing the latest attack—it's about protecting the foundational systems that everything relies on. About Garland Moore: Garland Moore is a Solutions Architect at F5 specializing in security and modern applications. With over 17 years of infrastructure experience, he combines deep technical expertise with a growing focus on AI to build scalable, secure solutions. His journey from infrastructure operations to Solutions Architect gives him unique end-to-end understanding of enterprise systems. He holds CKA and AWS Solutions Architect certifications and volunteers with Feed the Children and coaches' youth basketball. Connect with Garland: Garland Moore | LinkedIn Securing tomorrow, one episode at a time.

    18 min
  4. Building Trust in AI-Driven Supply Chain

    EPISODE 4

    Building Trust in AI-Driven Supply Chain

    Guest: Erika Voss, CISO at Blue YonderEpisode OverviewDr. KJ sits down with Erika Voss, CISO at Blue Yonder, to explore the evolving landscape of cybersecurity at the intersection of AI and supply chain management. Erika shares her insights on why identity has become the new attack surface, the challenges of securing AI-driven systems, and why customers are ultimately buying trust, not technology. Key Discussion TopicsAI-Driven Supply Chain Security Managing expanding attack surfaces in 2026Integrating AI with 40-50 year old legacy systemsMoving to millisecond-level supply chain optimization Identity as the New Attack Surface Why all roads in security lead to identityThe identity triad: non-negotiable, high-value, and advanced tiersMoving beyond patch management as a primary concern Insider Risk and Access Management Permission creep and trust-but-verify principlesJust-in-time (JIT) access and modern privilege managementBehavioral red flags in identity management Building Security Culture From project managers to technical program managersWhy MFA is now just "cyber hygiene basics"Ground-up security programs vs. top-down mandates The Trust Economy Why customers buy trust, not technology"The 'us' in trust is broken if you can't answer the trust question"Key TakeawaysIdentity is the new control plane - All modern security challenges ultimately trace back to identity and access managementNail the basics first - Before investing in AI agents, ensure your foundation is solidAutonomous security requires governance - AI-driven systems need monitoring, validation, testing, and governanceTrust is the product - In 2026, customers aren't buying technology—they're buying assuranceNotable Quotes"All roads now are leading back to identity... identity is your new attack surface.""It's not about patching the server anymore. That is so 1980.""The 'us' in trust is broken. You're not going to be around if you can't answer that question.""People are not buying your product anymore. What they're buying is trust."About the GuestErika Voss is the Chief Information Security Officer at Blue Yonder, a leader in AI-driven supply chain management. With a doctorate focused on insider threat and extensive experience in enterprise security, Erika brings a unique perspective on securing the intersection of legacy systems and cutting-edge AI technology. Connect with ErikaLinkedIn: Erika Voss, PhD | LinkedIn About Secured with Dr. KJHosted by Dr. Kenneth Johnson, "Secured with Dr. KJ" features authentic conversations with cybersecurity practitioners across industries. Each episode focuses on substance over sales, bringing you real insights from security leaders. Securing tomorrow, one episode at a time. Listen on: Apple Podcasts | Spotify | YouTube

    26 min
  5. App Security in the Age of AI

    EPISODE 5

    App Security in the Age of AI

    Episode Title: App Security in the Age of AI Host: Dr. Kenneth "KJ" Johnson Guest: Zack Tembi Guest Title: CEO, Single Fin | Managing Partner, Single Fin Ventures | CIO/CISO Community Builder Duration: ~20 minutes Keywords: application security, AI, identity security, agentic AI, private cloud Episode SummaryZack Tembi joins Dr. KJ to unpack the growing tension between AI-accelerated development and application security. From the explosion of autonomous agents to the rise of identity-based threats, Zack brings a practitioner and investor lens to some of the most pressing challenges facing security teams today. The conversation explores why legacy monitoring tools are falling short, how organizational structure must evolve to embed security into development, and why taking ownership of your data — rather than relying entirely on external AI providers — is becoming a critical strategic imperative. Zack closes with a call to action for security professionals to continuously sharpen their skills and lean into modern innovation with curiosity rather than fear. What You'll LearnWhy AI-native monitoring tools are replacing legacy solutions and what that means for your security stackHow the rise of agentic AI is fundamentally expanding the identity threat surfaceWhy security must be embedded into development teams — not siloed as a separate functionTop 3 TakeawaysThe threat landscape is evolving faster than training programs — security professionals must proactively upskill and test modern tools in their own environmentsIdentity is the new perimeter — as AI agents proliferate, managing machine-to-machine identity is becoming as critical as managing human accessData ownership matters — organizations should consider private cloud or on-prem solutions for mission-critical workloads before sending sensitive data to external AI providersMemorable Quotes"You don't need to be a sophisticated hacker anymore to create these attacks." — Zack Tembi "Security isn't just a security team thing — it's a company thing." — Zack Tembi "We still need that human innovation and creativity to really get value out of AI." — Zack Tembi Connect with the GuestZack Tembi LinkedIn: https://www.linkedin.com/in/zacktembi/ Newsletter: www.ciosurge.com Company: www.singlefinventures.io Listen & SubscribeLike, follow, and subscribe to Secured with Dr. KJ: https://swdrkj.riverside.com Apple Podcasts: https://podcasts.apple.com/us/podcast/secured-with-dr-kj/id1805058517 Spotify: Search "Secured with Dr. KJ" YouTube: Search "Secured with Dr. KJ" Support the ShowIf this episode helped you, share it with your team, leave a quick rating/review, and follow the show for new episodes on AI, application security, identity, and more. Securing tomorrow, one episode at a time.

    19 min

Ratings & Reviews

5
out of 5
8 Ratings

About

Welcome to Secured with Dr. KJ—the podcast that explores the evolving world of cybersecurity, the technologies driving it, and the companies shaping our digital future. Hosted by Dr. Kenneth Johnson, cybersecurity leader and strategist, this podcast simplifies complex security topics into actionable insights. In today’s digital world, cybersecurity is a business imperative. Each episode dives into cloud security, Zero Trust, identity management, AI-driven security, and more. We’ll assess how industry leaders, including Microsoft, are tackling security challenges—and where there’s room for improvement. Featuring expert insights from security professionals, industry leaders, and technologists, Secured with Dr. KJ delivers real-world strategies to protect businesses and individuals. Join the conversation! Subscribe today to explore what it takes to stay secure in a rapidly changing digital world—securing tomorrow, one episode at a time.