The latest episodes
Episode 8
Does being compliant mean you are secure?
Join Ann Johnson, Microsoft CVP of Cybersecurity, as she discusses compliance and security with Emma Smith, Group CISO at Vodafone.
Episode 7
Episode 7: The people behind the cloud
Focus on your top threats and let Microsoft Security operations take care of the rest. We’ve got you covered. You’re not alone.
Episode 6
Episode 6: Security Intelligence Report
Learn about the latest threats in 2019 and how to protect your organization now and in the future.
Podcasts: Afternoon Cyber Tea with Ann Johnson

Social Engineering: The Human Threat to Cybersecurity
Ann and Rachel delve into the neuroscience behind social engineering, the entry points social media offers, how fear and urgency factor in, and the similarities between improv and vishing.

The State of Cybersecurity: How Did We Get Here? What Does It Mean?
Join host Ann Johnson and global security strategist Marc Goodman as they discuss how authorities and experts at local, national, and global levels defend against cyberthreats.

From Threat Intelligence to Chatbots: A Look at AI in Cybersecurity
Listen as Ann chats with CISO advisor, author, speaker, and champion for women in cybersecurity Jane Frankland.

Building Operational Resilience in a Digital World
Join Ann as she discusses how CISOs can prepare for a cyberattack with Kubernetes container and cloud infrastructure specialist Ian Coldwater.

Cybersecurity and IoT: New Risks and How to Minimize Them
Learn from cybersecurity expert Dr. Andrea Little Limbago about how IoT can empower businesses to enrich and leverage AI, machine learning, and automation to achieve their goals.

Peak, Plateau, or Plummet? Cyber Trends That Are Here to Stay…and Fading Away
Listen as cybersecurity thought leader Kevin Beaumont trades insights with Ann on how organizations can examine the dynamics of an attack and effectively prevent or recover from one.

Thoughts from the Edge: Leveraging a Hacker Mindset
Hear Ann and security expert Chris Wysopal talk about how cybercriminals monetize attacks, the rise of attacks by nation states, and what hacktivists are up to these days.