Rephonic
Artwork for Afternoon Cyber Tea

Afternoon Cyber Tea with Ann Johnson

Microsoft
Cybersecurity
Artificial Intelligence
International Relations
Cyber Conflict
Cloud Security
Microsoft
Risk Management
Digital Transformation
Trust In Cybersecurity
Geopolitics
Soft Power
Technology
Higher Education
Generative AI
Deepfakes
Data Privacy
Podcasting
Talent Acquisition
Linkedin
Talent Development

Ann Johnson, Corporate Vice President and Deputy Chief Information Security Officer at Microsoft, talks with cybersecurity thought leaders and influential industry experts about the trends shaping the cyber landscape and what should be top-of-mind for the C-suite and other key decision makers. Ann and her guests explore the risk and promise of emerging technologies, as well as the impact on how hu... more

PublishesTwice monthlyEpisodes133Founded6 years ago
Number of ListenersCategories
BusinessTechnology

Listen to this Podcast

Artwork for Afternoon Cyber Tea

Latest Episodes

Tony Sager, Senior VP & Chief Evangelist, Center for Internet Security, joins Ann on this week’s episode of Afternoon Cyber Tea to discuss how the accelerating pace of technology, AI, and global software dependencies are reshaping the cybersecurity l... more

Fabio Catassi, Chief Information Officer at Mediterranean Shipping Company (MSC) joins Ann on this week’s episode of Afternoon Cyber Tea to discuss the unique cybersecurity challenges of pr(otecting global shipping infrastructure. He shares how digit... more

Allie Mellen, cybersecurity analyst and author, joins Ann on this week’s episode of Afternoon Cyber Tea to discuss her new book Code War: How Nations Hack, Spy, and Shape the Digital Battlefield. Allie explores how cyber conflict is deeply connected ... more

Cybersecurity leader and author George Finney joins Ann on this week’s episode of Afternoon Cyber Tea to explore how trust, communication, and culture shape effective security leadership. Drawing on his experience in higher education and enterprise e... more

Key Facts

Accepts Guests
Contact Information
Podcast Host
Number of Listeners
Find out how many people listen to this podcast per episode and each month.

Similar Podcasts

People also subscribe to these shows.

CyberWire Daily
CyberWire DailyN2K Networks
Hacking Humans
Hacking HumansN2K Networks
Risky Business
Risky BusinessRisky Business Media
Defense in Depth
Defense in DepthDavid Spark, Steve Zalewski, Geoff Belknap
CISO Series Podcast
CISO Series PodcastDavid Spark, Mike Johnson, and Andy Ellis

Recent Guests

Tony Sager
Senior Vice President and Chief Evangelist at the Center for Internet Security
Center for Internet Security
Episode: Tony Sager: The Case for Cyber Hygiene First
Fabio Catassi
Chief Information Officer for Mediterranean Shipping Corp.
Mediterranean Shipping Co. (MSC)
Episode: Cybersecurity at Sea: Protecting the Global Supply Chain
Allie Mellen
principal analyst and author of Code War
Episode: Code War with Allie Mellen
George Finney
Cybersecurity executive, CISO, author
Author of Project Zero Trust and Rise of the Machines
Episode: Why Cybersecurity Fails Without Trust
Dawn Song
Professor of Computer Science at UC Berkeley and a leading researcher in AI, security, and privacy.
UC Berkeley
Episode: Dawn Song: When AI Becomes the Hacker and the Defender
David Gee
Seasoned CISO and author of The Aspiring CIO and CISO, and A Day in the Life of the CISO.
Episode: The New Reality of the CISO Role
Amy Edmondson
Novartis Professor of Leadership and Management at Harvard Business School
Harvard Business School
Episode: The Best of Afternoon Cyber Tea 2025
Frank Shaw
Chief Communications Officer at Microsoft
Microsoft
Episode: The Best of Afternoon Cyber Tea 2025
Hugh Thompson
Managing Partner at Crosspoint Capital Partners
Crosspoint Capital Partners
Episode: The Best of Afternoon Cyber Tea 2025

Hosts

Ann Johnson
Corporate Vice President and Deputy Chief Information Security Officer at Microsoft; host focused on cybersecurity leadership and governance.
Dan Johnson
Host of the show and a Microsoft/CyberWire network contributor with a focus on security strategy and leadership discussions.

Reviews

4.9 out of 5 stars from 69 ratings
  • Great introduction to great content

    This was my first episode of this podcast and I thought it was great!

    Just enough to get me through my ride home, learn something and get me thinking for a new day tomorrow.

    Apple Podcasts
    5
    Jorge-GA-Us
    United Statesa year ago
  • Optimistic POV

    This podcast has peaked as my go to CISO insight. As a runner I’m always looking for inspirational productive learnings to compound the value of my time. Afternoon Tea with Ann is a delight of optimism in a world of perpetual security punches. Good stuff!

    Apple Podcasts
    5
    Bjornzerkr
    United States2 years ago
  • good

    good

    Apple Podcasts
    4
    JVo12
    Canada4 years ago
  • Incredibly Helpful

    Love Ann and these interviews are so eye opening!

    Apple Podcasts
    5
    lizaloo367
    United States6 years ago
  • Great podcast for anyone interested in cyber security

    This a must for anyone interested in cyber security, short and concise episodes with high caliber guests and a great host.

    Apple Podcasts
    5
    Oziel Hernández Salgado
    United States6 years ago

Listeners Say

Key themes from listener reviews, highlighting what works and what could be improved about the show.

Concise episodes with actionable takeaways for executives.
Professional, insightful conversations with high-caliber guests.
Clear emphasis on leadership and culture in security practice.

Chart Rankings

How this podcast ranks in the Apple Podcasts, Spotify and YouTube charts.

Apple Podcasts
#63
Argentina/Technology
Apple Podcasts
#200
South Africa/Technology

Talking Points

Recent interactions between the hosts and their guests.

Tony Sager: The Case for Cyber Hygiene First
Q: Where does accountability for cybersecurity sit in most commercial organizations, and where should it sit?
Accountability needs to move from a lone CISO to a broader executive and board-level responsibility. Security must be embedded in governance, strategy, and risk decisions, with leadership demanding measurable cyber hygiene and an engaged, informed approach to risk across the organization.
Tony Sager: The Case for Cyber Hygiene First
Q: From your vantage point, what feels fundamentally different about today's security moment compared to even five or ten years ago?
The pace of change is accelerating beyond what we've seen before; the industry has shifted from reactive to proactive, but market incentives still push toward rapid feature delivery. AI and a globally distributed, open-source software supply chain amplify both opportunity and risk, making secure-by-design thinking essential from the earliest stages of development.
Code War with Allie Mellen
Q: What advice would you give CISOs about when to worry about nation-state cyber risk and when it might be a distraction?
CISOs should hold regular geopolitical risk updates, at least quarterly, and increase frequency when conflicts erupt, because today's geopolitical events can rapidly raise the priority of certain threats for even those not direct targets.
Code War with Allie Mellen
Q: So for leaders who hear a nation-state cyber and immediately think this does not apply to them, how would you describe that this book is really about and why you felt compelled to write it now?
The book argues that cyber operations are a tool of national power that stretches beyond large targets to mid-sized organizations, because supply chains, regulations, and geopolitical tensions touch everyone, making it essential for leaders to understand the global context and its implications for risk and strategy.
Why Cybersecurity Fails Without Trust
Q: What's your take on Zero Trust when talking to non-technical leadership?
Treat Zero Trust as a strategic framework for preventing breaches, not just a tool for the security team, and explain how eliminating unfounded trust helps protect the entire organization.

Audience Metrics

Listeners, social reach, demographics and more for this podcast.

Listeners per Episode
Gender Skew
Location
Interests
Professions
Age Range
Household Income
Social Media Reach

Frequently Asked Questions About Afternoon Cyber Tea

What is Afternoon Cyber Tea about and what kind of topics does it cover?

The show centers on cybersecurity leadership, governance, and the human side of security in a rapidly evolving tech landscape. Conversations frequently cover how AI, cloud adoption, and geopolitical risk shape enterprise risk, with a strong emphasis on leadership, culture, and communication to drive secure modernization. Notable around-the-edges themes include the convergence of IT and operational technology, the role of transparency in crisis response, and the importance of collaboration across public and private sectors. The format often features high-profile CISOs, CIOs, researchers, and industry insiders sharing practical leadership lessons, strategy playbooks, and real-world security challenges that help decision-makers align security ... more

Where can I find podcast stats for Afternoon Cyber Tea?

Rephonic provides a wide range of podcast stats for Afternoon Cyber Tea. We scanned the web and collated all of the information that we could find in our comprehensive podcast database. See how many people listen to Afternoon Cyber Tea and access YouTube viewership numbers, download stats, audience demographics, chart rankings, ratings, reviews and more.

How many listeners does Afternoon Cyber Tea get?

Rephonic provides a full set of podcast information for three million podcasts, including the number of listeners. View further listenership figures for Afternoon Cyber Tea, including podcast download numbers and subscriber numbers, so you can make better decisions about which podcasts to sponsor or be a guest on. You will need to upgrade your account to access this premium data.

What are the audience demographics for Afternoon Cyber Tea?

Rephonic provides comprehensive predictive audience data for Afternoon Cyber Tea, including gender skew, age, country, political leaning, income, professions, education level, and interests. You can access these listener demographics by upgrading your account.

How many subscribers and views does Afternoon Cyber Tea have?

To see how many followers or subscribers Afternoon Cyber Tea has on Spotify and other platforms such as Castbox and Podcast Addict, simply upgrade your account. You'll also find viewership figures for their YouTube channel if they have one.

Which podcasts are similar to Afternoon Cyber Tea?

These podcasts share a similar audience with Afternoon Cyber Tea:

1. CyberWire Daily
2. Hacking Humans
3. Risky Business
4. Defense in Depth
5. CISO Series Podcast

How many episodes of Afternoon Cyber Tea are there?

Afternoon Cyber Tea launched 6 years ago and published 133 episodes to date. You can find more information about this podcast including rankings, audience demographics and engagement in our podcast database.

How do I contact Afternoon Cyber Tea?

Our systems regularly scour the web to find email addresses and social media links for this podcast. We scanned the web and collated all of the contact information that we could find in our podcast database. But in the unlikely event that you can't find what you're looking for, our concierge service lets you request our research team to source better contacts for you.

Where can I see ratings and reviews for Afternoon Cyber Tea?

Rephonic pulls ratings and reviews for Afternoon Cyber Tea from multiple sources, including Spotify, Apple Podcasts, Castbox, and Podcast Addict.

View all the reviews in one place instead of visiting each platform individually and use this information to decide if a show is worth pitching or not.

How do I access podcast episode transcripts for Afternoon Cyber Tea?

Rephonic provides full transcripts for episodes of Afternoon Cyber Tea. Search within each transcript for your keywords, whether they be topics, brands or people, and figure out if it's worth pitching as a guest or sponsor. You can even set-up alerts to get notified when your keywords are mentioned.

What guests have appeared on Afternoon Cyber Tea?

Recent guests on Afternoon Cyber Tea include:

1. Tony Sager
2. Fabio Catassi
3. Allie Mellen
4. George Finney
5. Dawn Song
6. David Gee
7. Amy Edmondson
8. Frank Shaw

To view more recent guests and their details, simply upgrade your Rephonic account. You'll also get access to a typical guest profile to help you decide if the show is worth pitching.

Find and pitch the right podcasts

We help savvy brands, marketers and PR professionals to find the right podcasts for any topic or niche. Get the data and contacts you need to pitch podcasts at scale and turn listeners into customers.
Try it free for 7 days