Look for any podcast host, guest or anyone
Showing episodes and shows of

Dr. Victor Monga

Shows

Zero Trust JourneyZero Trust JourneyEpisode 14: ZTMM+ in Action: Practical Steps for Your Zero Trust JourneyHost: Zach Pugh (LinkedIn)Co-Host Victor Monga (LinkedIn)Guest Jason Garbis (LinkedIn)Highlights:Practical Zero Trust Implementation: Jason emphasizes the importance of adopting a realistic, incremental approach to Zero Trust, urging organizations to leverage existing capabilities before investing in new technologies.Introducing ZTMM+: Discover Jason’s enhancement of the CISA Zero Trust Maturity Model, designed to provide clearer definitions, practical guidance, and address critical gaps like secure internet access and data loss prevention.Simplifying Complexity: Learn how the ZTMM+ framework translates complex Zero Trust maturity assessments into straightforward, actionable questions, pr...2025-04-2530 minZero Trust JourneyZero Trust JourneyEpisode 13: I Zero Trust What You’re Saying – March 2025Welcome to I Zero Trust What You’re Saying – March 2025 Edition! In this episode, we break down the latest Zero Trust news, trends, and updates that matter to security practitioners. No hype—just real insights to help you navigate the evolving cybersecurity landscape.Stay informed, stay secure, and as always, Zero Trust everything!🔗 News Links:https://www.defense.gov/News/News-Stories/Article/Article/4078717/zero-trust-architecture-could-prevent-adversary-data-theft-protect-warfighters/https://www.meritalk.com/articles/dods-ot-zero-trust-strategy-under-review-expected-by-august/https://defensescoop.com/2025/03/11/army-unified-network-plan-2-0-data-zero-trust/https://defensescoop.com/2025/02/19/navy-zero-trust-controls-ot-weapon-systems-platforms/https://statescoop.com/convincing-users-key-for-zero-trust-rollouts-ciso-says/https://www.rcrwireless.com/20250312/security/verizon-zero-trust-securityhttps://www.scworld.com/resou...2025-03-2520 minDigital Transformation & AI for HumansDigital Transformation & AI for HumansAI vs. AI: Battling Intelligent Cyber Threats with Artificial Intelligence and Zero Trust StrategiesIn this episode, we’re diving into the next level of AI vs. AI. We’ll take a closer look at how Artificial Intelligence and Zero Trust strategies are being used to battle intelligent cyber threats, together with my brilliant guest, Dr. Victor Monga from LA, California (USA).Dr. Monga is a Cybersecurity Technologist & Architect, co-author of Simple Solutions, Complex Problems, founder of VTF University, and co-host/producer of the Zero Trust Journey Podcast. With over 70 industry-recognized cybersecurity certifications, Victor is a highly sought-after speak...2025-03-2051 minZero Trust JourneyZero Trust JourneyEpisode 12: There's no Zero Trust certified productHostSteve Turner (Linkedin)Co-HostZach Pugh (LinkedIn)GuestChase Cunningham, also known as Dr. Zero Trust (Linkedin)Highlights:No Zero Trust Certified Product: Chase debunks the myth of a one-size-fits-all, certified solution—exposing vendor hype and unrealistic promises.Red Teaming as the Foundation: Learn why actionable red team assessments are critical for uncovering vulnerabilities and accelerating your security journey.Simplifying Micro Segmentation: Discover how modern policy engines and ZTNA are transforming a...2025-03-0535 minZero Trust JourneyZero Trust JourneyEpisode 11: What Does Zero Trust Mean to You?HostZach Pugh (https://www.linkedin.com/in/zachary-pugh/)Co-HostVictor Monga (https://www.linkedin.com/in/victorvirtual/)GuestDrinor Selmanaj (https://www.linkedin.com/in/drinor-selmanaj-5bb28185/)Highlights:Vulnerable vs. Exploitable: Distinguishing between a known vulnerability and a realistic exploitation path is essential for smart security decisions.Return on Effort: Focus on the security measures that provide the greatest risk reduction for the time and resources invested.Continuous Validation: Embrace adversary emulation, red-teaming, and regular testing to ensure your Zero Trust controls remain effective against evolving...2025-02-1936 minZero Trust JourneyZero Trust JourneyEpisode 10: Micro-Segmentation and Macro Impact – A Practitioner's Guide to Zero TrustIn this episode of Zero Trust Journey, host Zach Pugh talks with Nemi George, an experienced information security executive, about the practical realities of implementing Zero Trust in a busy organization—especially where patient care and time-sensitive workflows collide with security needs. Nemi shares real-world strategies for starting small with critical assets, streamlining multi-factor authentication, and addressing legacy systems without disrupting business operations. The discussion underscores how Zero Trust should enable the organization by prioritizing user experience, cultural alignment, and clear leadership support.HighlightsBalancing Security & User Experience: Wh...2025-02-1138 minZero Trust JourneyZero Trust JourneyEpisode 9: How do I reduce network reachability?In this episode of Zero Trust Journey, host Victor Monga is joined by Snehal Antani, CEO and co-founder of Horizon3.ai, to break down the complexities of Zero Trust and the practical steps organizations can take to reduce network reachability and minimize the blast radius of cyberattacks. Snehal shares insights from his career spanning Fortune 500 companies, the Department of Defense, and his current role as a cybersecurity innovator, emphasizing the importance of continuous security validation and understanding the difference between vulnerable and exploitable systems.Snehal offers actionable advice on how to prioritize security efforts based...2025-02-0933 minZero Trust JourneyZero Trust JourneyEpisode 8: I Zero Trust What You’re Saying – February 2025Welcome to I Zero Trust What You’re Saying – February 2025 Edition! In this episode, we break down the latest Zero Trust news, trends, and updates that matter to security practitioners. No hype—just real insights to help you navigate the evolving cybersecurity landscape.Stay informed, stay secure, and as always, Zero Trust everything!🔗 News Links:--| https://executivegov.com/2024/12/nist-zero-trust-architecture-guidance-feedback/--| https://securityboulevard.com/2024/12/making-zero-trust-architecture-achievable/--| https://www.itpro.com/cloud/cloud-security/understanding-nis2-directives-the-role-of-sase-and-zero-trust--| https://www.globenewswire.com/news-release/2024/12/05/2992083/0/en/Zscaler-Finds-Over-87-of-Cyberthreats-Hide-in-Encrypted-Traffic-Reinforcing-Need-For-Zero-Trust.html--| https://www.zscaler.com/resources/industry...2025-02-0719 minZero Trust JourneyZero Trust JourneyEpisode 7: Zero Trust Reality Check – Government Insights, Vendor Myths, and Practical TipsIn this episode of Zero Trust Journey, hosts Victor Monga and Steve are joined by Zach Pugh, a seasoned cybersecurity product manager, to explore why government agencies are leading the charge on Zero Trust initiatives—and how the private sector can catch up. They delve into overcoming cultural resistance, dissecting vendor myths, and understanding why even the humble web browser deserves a serious seat at the Zero Trust table.Zach shares tactical advice from his hands-on experience, emphasizing how organizations can start small, focus on business go...2025-02-0741 minZero Trust JourneyZero Trust JourneyEpisode 3: Validating Security Controls and Gaining Executive Buy-In for Zero TrustIn this episode of Zero Trust Journey, hosts Victor Monga and Zach Pugh sit down with Jose Barajas, Vice President of Global Sales Engineering at AttackIQ to explore what it truly takes to implement and sustain Zero Trust security beyond the buzzwords.Jose shares first-hand insights from years of helping organizations validate their security controls, revealing the biggest misconceptions, common pitfalls, and the real challenges that teams face when moving Zero Trust from theory to practice. From breaking down resistance to...2025-02-0241 minDigital Transformation & AI for HumansDigital Transformation & AI for HumansCybersecurity Trends and Predictions: The Role of AI & Human factors in Shaping the FutureJoin us as we dive into cybersecurity trends and predictions! In this episode, we explore the role of AI and human factors in shaping the future, together with my amazing guest, Dr. Victor Monga from LA, California (USA). Dr. Monga is a Cybersecurity Technologist & Architect, co-author of Simple Solutions, Complex Problems, founder of VTF University, and co-host/producer of the Zero Trust Journey Podcast. With over 70 industry-recognized cybersecurity certifications, Victor is a highly sought-after speaker at global cybersecurity events, an a...2025-01-2459 minZero Trust JourneyZero Trust JourneyEpisode 6: Zero Trust Across Your Digital Estate | Microsoft Zero Trust WorkshopIn this episode of Zero Trust Journey, hosts Victor Monga and Steve Turner are joined by Zero Trust experts from Microsoft Clay Taylor and Tarek Dawoud to discuss how Zero Trust strategies can secure today’s expansive digital estates. They share insights from Microsoft’s Zero Trust Workshop and their collaboration with NIST, offering a practical guide for navigating the challenges of implementation.Clay and Tarek reveal how organizations can move from overwhelmed to action-ready by breaking down silos, alig...2025-01-2237 minZero Trust JourneyZero Trust JourneyEpisode 4: Ditching Perimeter Security, Rejecting Vendor Hype, and Driving Business OutcomesIn this episode of Zero Trust Journey, host Victor Monga is joined by Steve Turner, a former Forrester analyst and current Microsoft expert, to explore the realities of Zero Trust in today's evolving cybersecurity landscape. They tackle the myths, challenges, and strategies surrounding Zero Trust and provide actionable guidance to help organizations build effective architectures and align them with business goals.From discussing why perimeter-based security models are no longer sufficient to exposing the "blinky box" marketing gimmicks of vendors, this episode offers a no-nonsense, practical approach to Zero Trust. Steve and Victor dive deep into the...2024-12-3144 minZero Trust JourneyZero Trust JourneyEpisode 2: Don’t Trust Anybody, The Zero Trust Philosophy for Modern SecurityIn this episode of Zero Trust Journey, host Victor Monga welcomes Jay Mar-Tang, Field CISO at Pantera, for a lively discussion about the real-world application of Zero Trust principles. Taking inspiration from Stone Cold Steve Austin’s mantra, “Don’t Trust Anybody,” they dive deep into the mindset shift needed to embrace Zero Trust as a framework and philosophy.Through candid stories and real-world examples, Victor and Jay tackle some of the most pressing questions about Zero Trust:What does Zero Trust truly mean, beyond the marketing buzz?Why is it a continuous process, not a one-time...2024-12-2322 minZero Trust JourneyZero Trust JourneyEpisode 5: Implementing Zero Trust, Federal Agency Insights on Challenges and Success StoriesIn this episode of Zero Trust Journey, the hosts and guests from the Department of Defense (DOD) share their firsthand experiences with implementing Zero Trust in high-security environments. The discussion explores the challenges, insights, and real-world applications of adopting a Zero Trust security framework, focusing on the steps necessary to achieve a successful Zero Trust journey.Key Topics Covered:The Business-Driven Zero Trust Strategy:The episode emphasizes that organizations must define their Zero Trust strategy from within, rather than being led by vendor-driven solutions. Zero Trust is not a one-size-fits-all solution...2024-12-2049 minZero Trust JourneyZero Trust JourneyEpisode 1: Not a Product, Not an Overnight Process, The Ongoing Zero Trust JourneyWelcome to the first episode of the Zero Trust Journey Podcast, where host Victor Monga sits down with cybersecurity and compliance expert Erin Logue Smith to pull back the curtain on what Zero Trust truly means—and what it doesn’t. Zero Trust is everywhere in the industry’s vocabulary, but for many, it remains a buzzword heavy on aspiration and light on tangible guidance. If you’ve ever wondered why you can’t just buy a product labeled “Zero Trust” and call it a day, or if you’ve struggled to break through organizational barriers that resist meaningful security changes...2024-12-1023 minAttackIQAttackIQAttackIQ Purple Hats 2022: Improving Cloud Security EffectivenessPublic cloud providers have built native security controls into their cloud offerings so customers can easily defend their data in the cloud, but organizations still need a means to test and optimize their cloud security effectiveness. Join leaders from major cybersecurity providers in a discussion about trends in threat-informed defense in cloud security operations. Speakers: Victor Monga, VMware Chad Skipper, VMware AttackIQ Purple Hats: www.purplehats.org/ AttackIQ Academy: academy.attackiq.com/ AttackIQ: attackiq.com/2022-06-2853 min