Look for any podcast host, guest or anyone
Showing episodes and shows of

Victor Monga

Shows

Zero Trust JourneyZero Trust JourneyEpisode 25: Reduce Blind Spots with a Zero Trust StrategyGuest: George Finney (https://www.linkedin.com/in/georgefinney/)Host: Dr. Victor Monga (https://www.linkedin.com/in/victorvirtual)In this episode, the host sit down with George Finney, CISO at the University of Texas System and bestselling author of Project Zero Trust and Rise of the Machines. George shares why Zero Trust isn’t a product or a marketing term—it’s a long-term security strategy that helps organizations reduce blind spots, shift culture, and stay resilient in the face of evolving threats.From his now-famous “jawbreaker” analogy to the difference between a concept an...2025-07-3122 minZero Trust JourneyZero Trust JourneyEpisode 24: I Zero Trust What You’re Saying – June 2025Welcome to I Zero Trust What You’re Saying – June 2025 Edition! In this episode, we break down the latest Zero Trust news, trends, and updates that matter to security practitioners. No hype—just real insights to help you navigate the evolving cybersecurity landscape.Stay informed, stay secure, and as always, Zero Trust everything!🔗 News Links:--| https://www.techradar.com/pro/live/infosec-europe-2025-were-live-at-the-show-and-heres-everything-weve-seen--| https://federalnewsnetwork.com/cybersecurity/2025/07/trump-admin-focuses-on-zero-trust-2-0-cybersecurity-efficiencies--| https://timesofindia.indiatimes.com/business/cybersecurity/cyber-risks-in-financial-sector-rbi-calls-for-ai-aware-defence-and-zero-trust-approach-warns-of-systemic-threat-from-vendor-lock-ins/articleshow/122164857.cms--| https://www.illumio.com/blog/top-cybersecurity-news-stories-from-june-2025--| https://w...2025-07-2903 minZero Trust JourneyZero Trust JourneyEpisode 23: How to Start Your Podcast the Smart Way?Guest: Jamie Kennedy (https://www.linkedin.com/in/jamiebrookekennedy)Host: Dr. Victor Monga (https://www.linkedin.com/in/victorvirtual)🎙️ Thinking about starting a podcast? In this episode, we break down the real talk on launching your own show—without burning a hole in your wallet.From finding your niche to using smart tools and strategies, we cover what most "how to start a podcast" guides leave out. Whether you're just starting or refining your setup, these tips will save you time, money, and a lot of frustration.What you'll learn:--| Why pas...2025-07-2624 minZero Trust JourneyZero Trust JourneyEpisode 22: Super Users, Super Endpoints: Securing IT, OT, IoT in a Zero Trust WorldGuest: Ben Tyminski Host: Dr. Victor Monga Co-host: Steve TurnerIn this episode, the hosts are joined by Ben Tyminski, a security architect whose hands-on experience spans from finance to media, and from traditional endpoints to the ever-expanding universe of OT and IoT. Ben breaks down why “endpoint” is a moving target in today’s Zero Trust landscape—covering everything from laptops and servers to containers, appliances, and industrial controls. If you think endpoint security is just about laptops, think again.Highlights: --| The evolutio...2025-07-1925 minZero Trust JourneyZero Trust JourneyEpisode 21: Prototype your Zero Trust solutionGuest: https://www.linkedin.com/in/stahltom/Host: https://www.linkedin.com/in/victorvirtualCo-host: https://www.linkedin.com/in/beingageek/In this episode, the hosts are joined by Tom Stahl, a seasoned Senior Solutions Architect supporting end-user computing in one of the top six U.S. banks. Tom brings a wealth of frontline experience from the trenches of implementing Zero Trust—from mobile to desktop, from networking to identity. If you're an engineer, architect, or admin who's ever been told to “go implement Zero Trust,” this episode is your playbook.Highlights:--| Wh...2025-06-1837 minZero Trust JourneyZero Trust JourneyEpisode 20: NIST SP 1800-35 Implementing a Zero Trust ArchitectureIn this episode, hosts Dr. Victor Monga and Zach Pugh unpack one of the most actionable Zero Trust resources available today—NIST Special Publication 1800-35. Unlike its predecessor SP 800-207, this guide dives deep into the how of Zero Trust, providing lab-tested architectures from 24 vendor collaborators including Microsoft, Palo Alto, and Zscaler.Victor and Zach explore how NIST’s Enhanced Identity Governance (EIG) model and real-world testing—complete with adversary emulations—finally give security leaders the blueprint they’ve been waiting for. They spotlight implementation gaps, integration hurdles, and the importance of continuous validation—not just visibility.Hig...2025-06-1709 minZero Trust JourneyZero Trust JourneyEpisode 19: Don’t Buy Zero Trust—Build ItGuest: Razi Rais (https://www.linkedin.com/in/razirais)Host: Victor Monga (https://www.linkedin.com/in/victorvirtual)In this episode of the Zero Trust Journey podcast, bestselling author and enterprise strategist Razi Rais joins host Victor Monga to challenge the idea that Zero Trust can be bought. Razi shares the philosophical foundations of Zero Trust, real-world enterprise pitfalls, and how AI is reshaping security strategies faster than most teams can adapt.Highlights:--| Zero Trust is not a tool—it’s an organizational mindset.--| AI and LLMs are adding pressure on a...2025-06-1428 minZero Trust JourneyZero Trust JourneyEpisode 18: I Zero Trust What You’re Saying – May 2025Welcome to I Zero Trust What You’re Saying – May 2025 Edition! In this episode, we break down the latest Zero Trust news, trends, and updates that matter to security practitioners. No hype—just real insights to help you navigate the evolving cybersecurity landscape.Stay informed, stay secure, and as always, Zero Trust everything!🔗 News Links:--| https://www.forbes.com/councils/forbestechcouncil/2025/05/30/the-future-of-cybersecurity-leadership-universal-zero-trust--| https://www.carahsoft.com/blog/palo-alto-networks-from-concept-to-implementation-operationalizing-zero-trust-architecture-in-government-environments-blog-2025--| https://defensescoop.com/2025/05/22/pentagon-cyber-malaise-zero-trust-deadlines-translate-zero-urgency--| https://www.computerweekly.com/opinion/Zero-trust-is-redefining-cyber-security-in-2025--| https://thehackernews.com/expert-insights/2025/05/eliminating-public-ips-case-for-zero.html--| https...2025-06-1221 minZero Trust JourneyZero Trust JourneyEpisode 17: Zero Trust is a timeless framework for security approaches00:00 Introduction to Allie Mellen01:29 Allie's Journey in Cybersecurity06:29 Understanding Zero Trust09:30 Zero Trust and Security Operations12:26 Platform vs. Best in Breed17:36 The Role of Identity in Zero Trust30:29 Zero Trust: Buzzword or Necessity?34:31 The Importance of Compromise in SecurityGuest: https://www.linkedin.com/in/hackerxbella/Host: https://www.linkedin.com/in/victorvirtualHost: https://www.linkedin.com/in/beingageekHost: https://www.linkedin.com/in/zachary-pugh/In this episode, the hosts and guest Allie Mellen, Principal Analyst at Forrester, dive deep into the realities...2025-06-0633 minDigital Transformation & AI for HumansDigital Transformation & AI for HumansS1|Ep62 Building a Cybersecurity-First Culture: Key Strategies for Sustainable Business GrowthLet’s talk about building a cybersecurity-first culture and uncover the key strategies for sustainable business growth.  We’ll take a closer look at how Artificial Intelligence and Zero Trust strategies are being used to battle intelligent cyber threats, together with my brilliant guest, Dr. Victor Monga from LA, California (USA).Dr. Monga is a Cybersecurity Technologist & Architect, co-author of Simple Solutions, Complex Problems, founder of VTF University, and co-host/producer of the Zero Trust Journey Podcast. With over 70 industry-recognized cybersecurity certifications, Victor is a high...2025-06-0657 minZero Trust JourneyZero Trust JourneyEpisode 16: The Intersection of CTEM and Zero TrustHost: Dr. Victor MongaCo-Host: Steve TurnerGuest: Chris Jablonski, Director of CXO Revolutionaries, ZscalerCSA article: https://cloudsecurityalliance.org/blog/2025/01/31/seize-the-zero-moment-of-trustHighlights:--| The Intersection of CTEM and Zero Trust: Discover how Continuous Threat Exposure Management (CTEM) enhances Zero Trust security by dynamically identifying and mitigating risks.--| Executive Buy-in: Chris shares practical advice on communicating Zero Trust’s tangible benefits to secure critical executive support.--| Legacy Coexistence: Understand why gradual transition and coexistence with legacy systems are not only practical but essential during Zero Trust implementation.2025-05-2940 minZero Trust JourneyZero Trust JourneyEpisode 15: I Zero Trust What You’re Saying – April 2025Welcome to I Zero Trust What You’re Saying – April 2025 Edition! In this episode, we break down the latest Zero Trust news, trends, and updates that matter to security practitioners. No hype—just real insights to help you navigate the evolving cybersecurity landscape.Stay informed, stay secure, and as always, Zero Trust everything!🔗 News Links:--| https://www.meritalk.com/articles/disas-thunderdome-achieves-advanced-zero-trust--| https://federalnewsnetwork.com/federal-insights/2025/04/accelerate-together-zero-trust-2025-zscalers-jose-padin-on-how-to-transform-your-agencys-1990s-approach-to-security--| https://www.cio.com/article/3962906/why-81-of-organizations-plan-to-adopt-zero-trust-by-2026.html--| https://cloudsecurityalliance.org/blog/2025/04/17/zero-trust-is-not-enough-evolving-cloud-security-in-2025--| https://www.virtru.com/blog/zero...2025-05-2725 minZero Trust JourneyZero Trust JourneyEpisode 14: ZTMM+ in Action: Practical Steps for Your Zero Trust JourneyHost: Zach Pugh (LinkedIn)Co-Host Victor Monga (LinkedIn)Guest Jason Garbis (LinkedIn)Highlights:Practical Zero Trust Implementation: Jason emphasizes the importance of adopting a realistic, incremental approach to Zero Trust, urging organizations to leverage existing capabilities before investing in new technologies.Introducing ZTMM+: Discover Jason’s enhancement of the CISA Zero Trust Maturity Model, designed to provide clearer definitions, practical guidance, and address critical gaps like secure internet access and data loss prevention.Simplifying Complexity: Learn how the ZTMM+ framework translates complex Zero Trust maturity assessments into straightforward, actionable questions, pr...2025-04-2530 minZero Trust JourneyZero Trust JourneyEpisode 13: I Zero Trust What You’re Saying – March 2025Welcome to I Zero Trust What You’re Saying – March 2025 Edition! In this episode, we break down the latest Zero Trust news, trends, and updates that matter to security practitioners. No hype—just real insights to help you navigate the evolving cybersecurity landscape.Stay informed, stay secure, and as always, Zero Trust everything!🔗 News Links:https://www.defense.gov/News/News-Stories/Article/Article/4078717/zero-trust-architecture-could-prevent-adversary-data-theft-protect-warfighters/https://www.meritalk.com/articles/dods-ot-zero-trust-strategy-under-review-expected-by-august/https://defensescoop.com/2025/03/11/army-unified-network-plan-2-0-data-zero-trust/https://defensescoop.com/2025/02/19/navy-zero-trust-controls-ot-weapon-systems-platforms/https://statescoop.com/convincing-users-key-for-zero-trust-rollouts-ciso-says/https://www.rcrwireless.com/20250312/security/verizon-zero-trust-securityhttps://www.scworld.com/resou...2025-03-2520 minDigital Transformation & AI for HumansDigital Transformation & AI for HumansS1|Ep51 AI vs. AI: Battling Intelligent Cyber Threats with Artificial Intelligence and Zero Trust StrategiesIn this episode, we’re diving into the next level of AI vs. AI. We’ll take a closer look at how Artificial Intelligence and Zero Trust strategies are being used to battle intelligent cyber threats, together with my brilliant guest, Dr. Victor Monga from LA, California (USA).Dr. Monga is a Cybersecurity Technologist & Architect, co-author of Simple Solutions, Complex Problems, founder of VTF University, and co-host/producer of the Zero Trust Journey Podcast. With over 70 industry-recognized cybersecurity certifications, Victor is a highly sought-after speak...2025-03-2051 minZero Trust JourneyZero Trust JourneyEpisode 12: There's no Zero Trust certified productHostSteve Turner (Linkedin)Co-HostZach Pugh (LinkedIn)GuestChase Cunningham, also known as Dr. Zero Trust (Linkedin)Highlights:No Zero Trust Certified Product: Chase debunks the myth of a one-size-fits-all, certified solution—exposing vendor hype and unrealistic promises.Red Teaming as the Foundation: Learn why actionable red team assessments are critical for uncovering vulnerabilities and accelerating your security journey.Simplifying Micro Segmentation: Discover how modern policy engines and ZTNA are transforming a...2025-03-0535 minZero Trust JourneyZero Trust JourneyEpisode 11: What Does Zero Trust Mean to You?HostZach Pugh (https://www.linkedin.com/in/zachary-pugh/)Co-HostVictor Monga (https://www.linkedin.com/in/victorvirtual/)GuestDrinor Selmanaj (https://www.linkedin.com/in/drinor-selmanaj-5bb28185/)Highlights:Vulnerable vs. Exploitable: Distinguishing between a known vulnerability and a realistic exploitation path is essential for smart security decisions.Return on Effort: Focus on the security measures that provide the greatest risk reduction for the time and resources invested.Continuous Validation: Embrace adversary emulation, red-teaming, and regular testing to ensure your Zero Trust controls remain effective against evolving...2025-02-1936 minZero Trust JourneyZero Trust JourneyEpisode 10: Micro-Segmentation and Macro Impact – A Practitioner's Guide to Zero TrustIn this episode of Zero Trust Journey, host Zach Pugh talks with Nemi George, an experienced information security executive, about the practical realities of implementing Zero Trust in a busy organization—especially where patient care and time-sensitive workflows collide with security needs. Nemi shares real-world strategies for starting small with critical assets, streamlining multi-factor authentication, and addressing legacy systems without disrupting business operations. The discussion underscores how Zero Trust should enable the organization by prioritizing user experience, cultural alignment, and clear leadership support.HighlightsBalancing Security & User Experience: Wh...2025-02-1138 minZero Trust JourneyZero Trust JourneyEpisode 9: How do I reduce network reachability?In this episode of Zero Trust Journey, host Victor Monga is joined by Snehal Antani, CEO and co-founder of Horizon3.ai, to break down the complexities of Zero Trust and the practical steps organizations can take to reduce network reachability and minimize the blast radius of cyberattacks. Snehal shares insights from his career spanning Fortune 500 companies, the Department of Defense, and his current role as a cybersecurity innovator, emphasizing the importance of continuous security validation and understanding the difference between vulnerable and exploitable systems.Snehal offers actionable advice on how to prioritize security efforts based...2025-02-0933 minZero Trust JourneyZero Trust JourneyEpisode 8: I Zero Trust What You’re Saying – February 2025Welcome to I Zero Trust What You’re Saying – February 2025 Edition! In this episode, we break down the latest Zero Trust news, trends, and updates that matter to security practitioners. No hype—just real insights to help you navigate the evolving cybersecurity landscape.Stay informed, stay secure, and as always, Zero Trust everything!🔗 News Links:--| https://executivegov.com/2024/12/nist-zero-trust-architecture-guidance-feedback/--| https://securityboulevard.com/2024/12/making-zero-trust-architecture-achievable/--| https://www.itpro.com/cloud/cloud-security/understanding-nis2-directives-the-role-of-sase-and-zero-trust--| https://www.globenewswire.com/news-release/2024/12/05/2992083/0/en/Zscaler-Finds-Over-87-of-Cyberthreats-Hide-in-Encrypted-Traffic-Reinforcing-Need-For-Zero-Trust.html--| https://www.zscaler.com/resources/industry...2025-02-0719 minZero Trust JourneyZero Trust JourneyEpisode 7: Zero Trust Reality Check – Government Insights, Vendor Myths, and Practical TipsIn this episode of Zero Trust Journey, hosts Victor Monga and Steve are joined by Zach Pugh, a seasoned cybersecurity product manager, to explore why government agencies are leading the charge on Zero Trust initiatives—and how the private sector can catch up. They delve into overcoming cultural resistance, dissecting vendor myths, and understanding why even the humble web browser deserves a serious seat at the Zero Trust table.Zach shares tactical advice from his hands-on experience, emphasizing how organizations can start small, focus on business go...2025-02-0741 minZero Trust JourneyZero Trust JourneyEpisode 3: Validating Security Controls and Gaining Executive Buy-In for Zero TrustIn this episode of Zero Trust Journey, hosts Victor Monga and Zach Pugh sit down with Jose Barajas, Vice President of Global Sales Engineering at AttackIQ to explore what it truly takes to implement and sustain Zero Trust security beyond the buzzwords.Jose shares first-hand insights from years of helping organizations validate their security controls, revealing the biggest misconceptions, common pitfalls, and the real challenges that teams face when moving Zero Trust from theory to practice. From breaking down resistance to...2025-02-0241 minDigital Transformation & AI for HumansDigital Transformation & AI for HumansS1|Ep43 Cybersecurity Trends and Predictions: The Role of AI & Human factors in Shaping the FutureJoin us as we dive into cybersecurity trends and predictions! In this episode, we explore the role of AI and human factors in shaping the future, together with my amazing guest, Dr. Victor Monga from LA, California (USA). Dr. Monga is a Cybersecurity Technologist & Architect, co-author of Simple Solutions, Complex Problems, founder of VTF University, and co-host/producer of the Zero Trust Journey Podcast. With over 70 industry-recognized cybersecurity certifications, Victor is a highly sought-after speaker at global cybersecurity events, an a...2025-01-2459 minZero Trust JourneyZero Trust JourneyEpisode 6: Zero Trust Across Your Digital Estate | Microsoft Zero Trust WorkshopIn this episode of Zero Trust Journey, hosts Victor Monga and Steve Turner are joined by Zero Trust experts from Microsoft Clay Taylor and Tarek Dawoud to discuss how Zero Trust strategies can secure today’s expansive digital estates. They share insights from Microsoft’s Zero Trust Workshop and their collaboration with NIST, offering a practical guide for navigating the challenges of implementation.Clay and Tarek reveal how organizations can move from overwhelmed to action-ready by breaking down silos, alig...2025-01-2237 minZero Trust JourneyZero Trust JourneyEpisode 4: Ditching Perimeter Security, Rejecting Vendor Hype, and Driving Business OutcomesIn this episode of Zero Trust Journey, host Victor Monga is joined by Steve Turner, a former Forrester analyst and current Microsoft expert, to explore the realities of Zero Trust in today's evolving cybersecurity landscape. They tackle the myths, challenges, and strategies surrounding Zero Trust and provide actionable guidance to help organizations build effective architectures and align them with business goals.From discussing why perimeter-based security models are no longer sufficient to exposing the "blinky box" marketing gimmicks of vendors, this episode offers a no-nonsense, practical approach to Zero Trust. Steve and Victor dive deep into the...2024-12-3144 minZero Trust JourneyZero Trust JourneyEpisode 2: Don’t Trust Anybody, The Zero Trust Philosophy for Modern SecurityIn this episode of Zero Trust Journey, host Victor Monga welcomes Jay Mar-Tang, Field CISO at Pantera, for a lively discussion about the real-world application of Zero Trust principles. Taking inspiration from Stone Cold Steve Austin’s mantra, “Don’t Trust Anybody,” they dive deep into the mindset shift needed to embrace Zero Trust as a framework and philosophy.Through candid stories and real-world examples, Victor and Jay tackle some of the most pressing questions about Zero Trust:What does Zero Trust truly mean, beyond the marketing buzz?Why is it a continuous process, not a one-time...2024-12-2322 minZero Trust JourneyZero Trust JourneyEpisode 5: Implementing Zero Trust, Federal Agency Insights on Challenges and Success StoriesIn this episode of Zero Trust Journey, the hosts and guests from the Department of Defense (DOD) share their firsthand experiences with implementing Zero Trust in high-security environments. The discussion explores the challenges, insights, and real-world applications of adopting a Zero Trust security framework, focusing on the steps necessary to achieve a successful Zero Trust journey.Key Topics Covered:The Business-Driven Zero Trust Strategy:The episode emphasizes that organizations must define their Zero Trust strategy from within, rather than being led by vendor-driven solutions. Zero Trust is not a one-size-fits-all solution...2024-12-2049 minZero Trust JourneyZero Trust JourneyEpisode 1: Not a Product, Not an Overnight Process, The Ongoing Zero Trust JourneyWelcome to the first episode of the Zero Trust Journey Podcast, where host Victor Monga sits down with cybersecurity and compliance expert Erin Logue Smith to pull back the curtain on what Zero Trust truly means—and what it doesn’t. Zero Trust is everywhere in the industry’s vocabulary, but for many, it remains a buzzword heavy on aspiration and light on tangible guidance. If you’ve ever wondered why you can’t just buy a product labeled “Zero Trust” and call it a day, or if you’ve struggled to break through organizational barriers that resist meaningful security changes...2024-12-1023 minAttackIQAttackIQAttackIQ Purple Hats 2022: Improving Cloud Security EffectivenessPublic cloud providers have built native security controls into their cloud offerings so customers can easily defend their data in the cloud, but organizations still need a means to test and optimize their cloud security effectiveness. Join leaders from major cybersecurity providers in a discussion about trends in threat-informed defense in cloud security operations. Speakers: Victor Monga, VMware Chad Skipper, VMware AttackIQ Purple Hats: www.purplehats.org/ AttackIQ Academy: academy.attackiq.com/ AttackIQ: attackiq.com/2022-06-2853 min