Secured with Dr. KJ

Secured with Dr. KJ
Podcast Description
Welcome to Secured with Dr. KJ—the podcast that explores the evolving world of cybersecurity, the technologies driving it, and the companies shaping our digital future.Hosted by Dr. Kenneth Johnson, cybersecurity leader and strategist, this podcast simplifies complex security topics into actionable insights. In today’s digital world, cybersecurity is a business imperative. Each episode dives into cloud security, Zero Trust, identity management, AI-driven security, and more.We’ll assess how industry leaders, including Microsoft, are tackling security challenges—and where there’s room for improvement. Featuring expert insights from security professionals, industry leaders, and technologists, Secured with Dr. KJ delivers real-world strategies to protect businesses and individuals.🔒 Join the conversation! Subscribe today to explore what it takes to stay secure in a rapidly changing digital world—securing tomorrow, one episode at a time. Hosted on Acast. See acast.com/privacy for more information.
Podcast Insights
Content Themes
The podcast covers a range of cybersecurity topics, including cloud security, Zero Trust frameworks, identity management, and AI-driven security solutions. For example, episodes like 'Cloud Security: The Microsoft Advantage' explore specific tools and strategies utilized by industry giants, while 'The State of Cybersecurity' discusses overarching trends that shape security practices.

Welcome to Secured with Dr. KJ—the podcast that explores the evolving world of cybersecurity, the technologies driving it, and the companies shaping our digital future.
Hosted by Dr. Kenneth Johnson, cybersecurity leader and strategist, this podcast simplifies complex security topics into actionable insights. In today’s digital world, cybersecurity is a business imperative. Each episode dives into cloud security, Zero Trust, identity management, AI-driven security, and more.
We’ll assess how industry leaders, including Microsoft, are tackling security challenges—and where there’s room for improvement. Featuring expert insights from security professionals, industry leaders, and technologists, Secured with Dr. KJ delivers real-world strategies to protect businesses and individuals.
🔒 Join the conversation! Subscribe today to explore what it takes to stay secure in a rapidly changing digital world—securing tomorrow, one episode at a time.
Hosted on Acast. See acast.com/privacy for more information.
Episode 3: Small Targets, Big Impact: The Ransomware wake up call with Matthew Waddell
Host: Kenneth Johnson
Guest: Matthew Waddell, Incident Response Expert & Author of Survive Ransomware
Duration: ~19 minutes
Keywords: Ransomware, Small Business Cybersecurity, Incident Response, Backups, Generative AI, Phishing, Tabletop Exercises, Managed Service Providers, AI in Cyber Defense
Episode Summary
In this episode of Secured with Dr. KJ, I sit down with Matthew Waddell—an incident response veteran with over 25 years of experience defending governments, military operations, and private sector organizations. We focus on the ransomware epidemic hitting small businesses and explore why they’re often seen as low-risk, high-reward targets for cybercriminals.
Matthew shares practical, budget-friendly strategies small businesses can implement today—from running internal tabletop exercises and building relationships with law enforcement to creating effective playbooks and developing a culture of vigilance. We also dive into the critical role of offline, tested backups and how poor backup practices can turn an incident into a full-scale disaster.
The conversation takes a forward-looking turn as we discuss generative AI—how it’s making ransomware attacks more convincing and sophisticated, and how defenders can leverage AI-driven tools, such as virtual SOCs, to match the attackers’ speed and precision. Matthew closes by previewing his upcoming book, Survive Ransomware, designed to give non-technical leaders the tools and knowledge to respond effectively to an attack.
What You’ll Learn
- Why ransomware gangs target small businesses as “practice grounds” for larger attacks
- The importance of employee awareness as the first line of defense
- How tabletop exercises can uncover gaps before an incident strikes
- Why backups must be offline, air-gapped, and regularly tested
- How generative AI is being weaponized by attackers—and how defenders can fight back
- How to build strong relationships with law enforcement and managed service providers before you need them
Key Takeaways
- Small businesses aren’t immune—they’re often easier and more appealing targets for attackers.
- Incident response planning doesn’t require a huge budget, but it does require time, communication, and documentation.
- Backups are only as good as your last test—and ransomware actors actively seek to destroy them.
- Generative AI is reshaping the threat landscape, producing more believable phishing campaigns and faster attacks.
- Proactive relationships with service providers and law enforcement can be invaluable during an incident.
Memorable Quotes
“It doesn’t take a large budget to be secure—just a team willing to think through ‘what if?’ scenarios.” – Matthew Waddell
“If your backups aren’t offline and tested, they might as well not exist when ransomware hits.” – Matthew Waddell
“Attackers are using AI to get faster and smarter—so defenders must do the same.” – Matthew Waddell
Connect with the Guest
🔗 Connect with Matthew Waddell on LinkedIn
Secured with Dr. KJ – Securing tomorrow, one episode at a time.
Hosted on Acast. See acast.com/privacy for more information.

Disclaimer
This podcast’s information is provided for general reference and was obtained from publicly accessible sources. The Podcast Collaborative neither produces nor verifies the content, accuracy, or suitability of this podcast. Views and opinions belong solely to the podcast creators and guests.
For a complete disclaimer, please see our Full Disclaimer on the archive page. The Podcast Collaborative bears no responsibility for the podcast’s themes, language, or overall content. Listener discretion is advised. Read our Terms of Use and Privacy Policy for more details.