PodParley PodParley
Afternoon Cyber Tea with Ann Johnson cover art

All Episodes

Afternoon Cyber Tea with Ann Johnson — 133 episodes

#
Title
1

Tony Sager: The Case for Cyber Hygiene First

2

Cybersecurity at Sea: Protecting the Global Supply Chain

3

Code War with Allie Mellen

4

Why Cybersecurity Fails Without Trust

5

Dawn Song: When AI Becomes the Hacker and the Defender

6

Trust Is Patient Well-being: Rob Suárez on Cybersecurity in Healthcare

7

The New Reality of the CISO Role

8

The Best of Afternoon Cyber Tea 2025

9

Lorrie Cranor: Why Security Fails Real People

10

Inside Data Breaches and Human Behavior with Troy Hunt

11

Educating for Resilience: STEM, AI, and the Future of Cybersecurity

12

How Microsoft Is Redefining Global Cyber Defense

13

The Power of Converged Security in a Connected World

14

From Silos to Solutions: Building Trust Through Transparent Cybersecurity Communications with Microsoft's Frank Shaw

15

Lessons from the Frontlines of Industrial Security

16

Modernizing Cybersecurity with Matt Rowe

17

From Bottlenecks to Breakthroughs: Aligning Legal and Security Teams

18

The Psychology of Speaking Up with Amy Edmondson

19

Nasrin Rezai on the Frontlines of Cybersecurity

20

Encore: Hugh Thompson on Building the RSA Conference

21

Encore: Cybercrime and Storytelling with Jack Rhysider

22

Machine-Scale Defense and the Future of Cybersecurity

23

The Human Firewall: People-First Cybersecurity

24

Security and Agentic AI

25

Hugh Thompson on Building the RSA Conference

26

Bringing the Cyber Tea to RSA 2025

27

Game Plans and Playbooks: Building and Implementing a Cybersecurity Strategy

28

Cybercrime and Storytelling with Jack Rhysider

29

Building Resilient Security Teams with Ryan Field

30

What Business Leaders Can Learn from Higher Ed Cybersecurity

31

The Power of Partnership in Cyber Defense

32

Afternoon Cyber Tea: Season 8 Trailer

33

Season 8: Afternoon Cyber Tea Returns

34

Reflecting on 100 Episodes of Afternoon Cyber Tea

35

The Role of Data and AI in Modern Cybersecurity

36

Navigating Cyber Trends with Alberto Yepez

37

Cybersecurity in Focus with Katie Jenkins

38

Talent Development in the Cyber Era

39

Insights from LinkedIn's CISO

40

Nurturing Trust in Cybersecurity

41

Inside the Smashing Security Podcast

42

Keren Elazari on the Hacker Mindset

43

Insights from GitHub's Chief Security Officer

44

Cyber and Critical Infrastructure

45

Cybersecurity at 35,000 Feet

46

Afternoon Cyber Tea x @CybersecurityGirl

47

Beyond Basics with Tanya Janca

48

The Power of Diverse Perspectives with Lynn Dohm

49

Leading Edge Cyber Innovation with Nadav Zafrir

50

Cyber Trends in Financial Services

51

Building Secure Tech from the Start

52

AI: The Promise and Potential Peril

53

A Lesson on Leadership

54

The Rise in Social Engineering

55

Cybercrime: A Multi-Billion-Dollar Industry

56

Microsoft EVP Charlie Bell on the Future of Security

57

Best of Season Six

58

Encore: Security Trends in 2023 and Beyond

59

A Spotlight on Black Tech Street

60

Risk and Resilience in the Modern Era

61

Introducing Cyversity Western Washington

62

Cyber Paradigm Shifts with Samir Kapuria

63

Navigating Current Cyber Challenges

64

Cyber Resilience in Healthcare

65

The Art and Science of Cybersecurity

66

The CISO Transformation

67

Storytelling and Cybersecurity Awareness

68

Security Trends in 2023 and Beyond

69

Shaping the Future of Cyber

70

Evolution of the CISO

71

Building Personal Resilience in Cyber

72

Protecting our Cyber Defenders’ Mental Health

73

Breaking into the Cybersecurity Industry

74

Cyber Resiliency with Sounil Yu

75

Microsoft Security CTO on Future of Cyber

76

Cyber Insurance Past, Present, and Future

77

What’s Influencing Cyber Capital Investment

78

Addressing the Critical Cybersecurity Talent Shortage

79

The Journey to Greater Representation

80

Implementing Stronger Authentication

81

Mitigating Future Risks

82

Preventing Digital Fraud & Scams

83

The Criticality of Cyber Resilience

84

A Librarian’s Guide to Cybersecurity

85

Building Trust Through Cybersecurity

86

Helping Future Proof the Cyber Landscape

87

Defending Against Advanced Actors

88

Building Customer Trust in the Face of Cyber Attacks

89

Cybersecurity & Privacy Protections

90

Protecting Journalism and Free Speech

91

Girl Security

92

Inside Microsoft's Security Response Center

93

The Next Cyber Defender

94

IoT-Based Infrastructures

95

The Rising Ransomware Risks

96

The Rising Risks of Cybercrime

97

Defending Our Infrastructure

98

Addressing the Spread of Disinformation

99

The Adversary of the Future: The Ongoing Evolution of Cybercrime

100

The Importance of Protecting Our Online Selves

101

Fighting the Good Fight: Microsoft’s Quest To Combat Disinformation and Cyberattacks

102

Understanding Today’s Cyberattacks Through an Ancient Lens

103

Opening Opportunities: Lowering Barriers to Entry Into Cybersecurity

104

Understanding the Race Against Cybercrime

105

Ransomware and the Strength of Diversity

106

Strengthening the Global Supply Chain Against Cybersecurity Threats

107

Taking a “When, Not If” Approach to Cybersecurity

108

Amplifying Cybersecurity’s Diverse Voices To Strengthen the Industry: Part 2

109

Amplifying Cybersecurity’s Diverse Voices To Strengthen the Industry: Part 1

110

Fortifying Security Strategies With a Cyber Mindset

111

Working Through It: Operational Resilience in the Face of Disaster

112

Cybersecurity Becomes a Business Imperative

113

Privacy, the Pandemic, and Protecting Our Cyber Future

114

Evaluating Individual and Organizational Cyber Risk in a Pandemic

115

Litigating the New Frontier: How Tech Law Protects Consumers and Fosters Innovation

116

Revisiting Social Engineering: The Human Threat to Cybersecurity

117

Election Protection: Safeguarding America’s Voting Infrastructure and Integrity

118

The Internet of Bodies: Human Potential and Security Pitfalls, Part 2

119

The Internet of Bodies: Human Potential and Security Pitfalls, Part 1

120

Revisiting the State of Cybersecurity: How Did We Get Here, What Does It Mean?

121

Sim Swapping and Hacker Gangs: Fighting Cybercrime in a COVID-19 World

122

How Information Sharing Helps Assess the Threat Landscape

123

Zero Trust and the Predictive Power of Threat Analytics

124

National Security and the Weaponization of Cyberattacks

125

Diversity and Inclusion in Cybersecurity: Lifting Up Leaders

126

The Business of Cybersecurity: Evolution to Present Day

127

Social Engineering: The Human Threat to Cybersecurity

128

Thoughts From the Edge: Leveraging a Hacker Mindset

129

Peak, Plateau or Plummet? Cyber Trends That Are Here To Stay… and Fading Away

130

Cybersecurity and IoT: New Risks and How To Minimize Them

131

Building Operational Resilience in a Digital World

132

From Threat Intelligence to Chatbots: A Look at AI in Cybersecurity

133

The State of Cybersecurity: How Did We Get Here, What Does It Mean?