Follow me on LinkedIn for daily Microsoft 365 insights

Security Talk Episodes

Security Talk is where we deal with the uncomfortable but necessary reality that the modern threat landscape is no longer “patching and antivirus” — it is identity-centric, cloud-first, constantly evolving, and deeply business-impacting.
This is Microsoft Defender, Sentinel, Entra ID, Purview risk and compliance capabilities, Zero Trust patterns, SIEM + XDR fusion, identity protection, conditional access strategy, and the practical translation of security controls into operational, measurable outcomes.

The discussion is not tool-demo driven — it is threat-driven.
We talk about how to actually design and maintain a defensible Microsoft security posture in environments that are hybrid, mobile, multi-tenant, and constantly changing. We unpack what Secure Score actually means in real life, how to interpret signals instead of chasing alerts, why identity hygiene matters more than firewall rules, how to navigate user friction vs control, and how to build security approaches that support the business instead of blocking it.

Security Talk is about translating Microsoft’s security stack into patterns that reduce blast radius, enable fast detection, accelerate response, withstand breaches, and help security teams work as a strategic partner rather than a reactive helpdesk. It is focused on real attack path reduction, not checkbox compliance.

If it hardens identity, protects data, strengthens posture, or allows defenders to respond faster and smarter — it lives in Security Talk.
Dec. 19, 2025

Cloud Crime Scene: The Microsoft Forensics

This episode plays out like a cybercrime thriller, exposing how today’s most dangerous breaches don’t smash doors—they’re invited inside. The investigation opens with a single click on January 12th. A polished phishing email doesn’t steal a password; it steals a session token. Within minutes, that …
Dec. 18, 2025

Agentageddon: Why Your Agents Are Outpacing You — And How Humans Can Prevent the Collapse

What if your AI systems aren’t rebelling — they’re simply executing the chaos you built? In this episode, we break down a hard truth about AI agents, Microsoft Copilot, Power Automate, and enterprise automation: failures don’t come from intelligence gone rogue, they come from human inconsistency…
Dec. 15, 2025

AI Agents Are The New Shadow IT

Shadow IT didn’t disappear, it evolved into AI agents quietly moving your data faster than your controls can see. In this episode, we break down how AI agents, Copilot Studio bots, and Power Automate flows are becoming the new Shadow IT inside Microsoft 365. What starts as productivity quickly t…
Dec. 11, 2025

Stop Document Chaos: Build Your Purview Shield Wall

In a recent podcast, Mirko Peters discussed the critical importance of effective document management and compliance in organizations, emphasizing that lost documents can lead to organizational failure. He presented strategies for building an audit-ready Enterprise Content Management (ECM) system in…
Dec. 7, 2025

Your Endpoints Are Lying to You: Why Intune Alone Isn’t Enough

Stop patching ghosts and start running a self-healing workplace. This Podcast reveals why Microsoft Intune alone can’t scale your endpoint management – and how pairing Intune with Azure, Automation, Functions, Microsoft Graph, managed identities and Log Analytics turns chaos into a quiet, secure es…
Dec. 5, 2025

Why Your Intune Deployment Is A Security Risk

STOP leaving your Intune tenant one misclick away from a breach. In this video, we hunt down the five most dangerous Microsoft Intune misconfigurations quietly exposing your Zero Trust ecosystem: weak conditional access, missing security baselines, standing admin rights, unmanaged BYOD, and reckles…
Dec. 4, 2025

Why Your Threat Analytics Is Useless (The Report You Missed)

You’re letting attackers stroll through your Microsoft tenant because you treat Threat Analytics like a newsletter instead of a weapon. In this episode, we show security leaders and SOC analysts how to turn Microsoft Threat Analytics into a living playbook that actually reduces time to detect and c…
Dec. 4, 2025

The M365 Audit Logs You're Ignoring: Why Zero Trust is a Lie Without Them

What if your Zero Trust stack is silently greenlighting a perfect data heist in Microsoft 365? In this episode, we dissect how one “compliant” account quietly pulled 12,000 SharePoint files in 20 minutes—no malware, no DLP alerts, and all your Entra ID and conditional access policies saying “allow…
Dec. 3, 2025

Why Your M365 Security Fails Against Social Engineering

Your Microsoft 365 tenant might already be compromised—and your MFA is effectively useless because of one misconfiguration you’ve probably left on. In this episode, the Office of Corrective Doctrine walks you through five brutal real-world attack paths inside Microsoft 365 and Entra ID: Teams ph…
Dec. 2, 2025

Your "Hybrid Security" Is A Lie: Why Defender XDR Is Mandatory

Stop Buying Security Tools: The Shocking ROI of One XDR Timeline Drowning in alerts across M365, endpoints, and cloud apps? This video shows why your hybrid security stack is a Rube Goldberg machine that screams and still misses real attacks. You’ll see the four blind spots in Microsoft 365, ide…
Dec. 2, 2025

The M365 Attack Chain Is Not What You Think

MFA is not your shield – it’s already broken. In this episode, we walk the bridge of a real M365 tenant breach, step-by-step, from the attacker’s cockpit to your shattered inbox. You’ll hear how one phishing click plus an AitM proxy and a “benign” OAuth app stole live cookies, hijacked mailboxes, a…
Nov. 30, 2025

Your Conditional Access Policy Has Trust Issues: We Need To Talk

This episode explains how to “calm down” a messy Conditional Access setup by removing blind spots and setting clear boundaries. It walks through three main trust problems—overbroad exclusions, unclear device compliance, and token theft—and shows how to replace permanent exceptions with time-bound a…
Nov. 10, 2025

The Security Intern Is Now A Terminator

Your “intern” just became your scariest, smartest coworker—and it’s made of code. In this episode, we unpack how Microsoft Security Copilot is quietly turning traditional Security Operations Centers into AI-driven defense factories. Forget drowning in alerts, phishing noise, and endless Patch Tu…
Nov. 2, 2025

The Hidden Governance Risk in Copilot Notebooks

Copilot Notebooks feel magical — a conversational workspace that pulls context from SharePoint, OneDrive, Teams, decks, sheets, emails — and synthesizes answers instantly. But the moment users trust that illusion, they generate data that has no parents. Every Copilot output — a summary, parag…
Oct. 20, 2025

Master Dataverse Security: Stop External Leaks Now

Your Power App didn’t get “hacked”—it was over-permitted. Treating Dataverse like SharePoint (big buckets, broad roles) turns guest access into a data breach waiting to happen. Dataverse is a relational fortress built on granular privileges (Create/Read/Write/Delete/Append/Append To/Assign/Share), …
Oct. 19, 2025

Stop Writing GRC Reports: Use This AI Agent Instead

Manual GRC reporting burns time and budget: exporting Purview logs to Excel, reconciling pivots, and hoping nothing changed overnight. Replace that drag with an autonomous GRC agent built entirely on Microsoft 365: Purview for audit truth, Power Automate for scheduled extraction + classification, a…
Oct. 19, 2025

Advanced Copilot Agent Governance with Microsoft Purview

Copilot Studio agents don’t have their own ethics—or identities. By default they borrow the caller’s token, so any SharePoint, Outlook, Dataverse, or custom API you can see, your bot can see—and say. That’s how “innocent” answers leak context: connectors combine, chat telemetry persists, and analyt…
Oct. 18, 2025

Copilot Governance: Policy or Pipe Dream?

Turning on Microsoft Copilot isn’t magic—it’s governance in motion. That toggle activates a chain of contractual, technical, and organizational controls that either align…or explode. Contracts (Microsoft Product Terms + DPA) set the legal wiring: data residency, processor role, IP ownership, no tra…
Oct. 15, 2025

Governance Boards: The Last Defense Against AI Mayhem

This episode is a practical walk-through of what actually goes wrong when organizations deploy copilots or chatbots without Responsible AI guardrails. It explains why: modern LLMs are non-deterministic prompt injection is not hypothetical bad outputs can cascade across business workflows fast…
Oct. 10, 2025

Autonomous Agents Gone Rogue? The Hidden Risks

AI agents are about to feel like real coworkers inside Teams—fast, tireless, and dangerously literal. This episode gives you a simple framework to keep them helpful and safe: manage their memory, entitlements, and tools, and layer prompting, verification, and human-in-the-loop oversight. You’ll lea…
Oct. 6, 2025

Ditch Passwords—How Real Azure Apps Secure Everything

In this episode, we break down the essential steps for securing web applications on Microsoft Azure, focusing on Azure App Service and its built-in security capabilities. You’ll learn what Azure App Service is, why it’s a powerful platform-as-a-service (PaaS) option, and how it simplifies deploymen…
Oct. 2, 2025

SOC Team vs. Rogue Copilot: Who Wins?

AI isn’t an edge case in your SIEM anymore—it’s a participant. This episode asks a hard question: when Copilot surfaces a confidential file your user can technically access, is that a breach, a policy gap, or “works as designed”? We walk through why AI access alerts don’t fit classic kill-chain thi…
Sept. 27, 2025

Autonomous Agents: Productivity Hack or Admin Nightmare?

The real shift is autonomous AI agents – systems that don’t just answer a prompt and wait for the next human nudge, but notice, decide, and act on their own. Not a “bot that replies in Teams,” but a worker that reads the situation, picks a plan, executes it, and learns from whatever broke along the…
Sept. 19, 2025

The Info Architect’s Guide to Surviving Purview

Microsoft Purview has quickly become one of the most important tools for modern data governance, and in this episode we break down exactly how its architecture works, why organizations rely on it, and how to put best practices in place to protect sensitive information across Microsoft 365, Azure, m…