

Heavy Strategy
Packet Pushers
From technology to workplace culture, from geopolitical trends to economics, Heavy Strategy debates pivotal questions in enterprise IT. Hosts Johna Till Johnson & John Burke bring their technical expertise, analytical acumen, and contrasting viewpoints to discuss complex topics of interest to IT leaders. Frequently irreverent and always thought-provoking, these are the conversations you wish you could have at the leadership table. Tune in and join the think tank, where unanswered questions are better than unquestioned answers.
Episodes
Mentioned books

Dec 2, 2025 • 24min
HS119: Securing 2026: How AI, Quantum, and the AI-Powered Browser are Driving Enterprise Defense (Sponsored)
Anand Oswal, Executive Vice President at Palo Alto Networks, joins Johna Johnson and John Burke for a wide-ranging exploration of two emerging focal points of enterprise risk: cryptographically relevant quantum computing, and browser-mediated agentic AI. The looming arrival of quantum computers that can break legacy encryption has already created the threat of “harvest now, decrypt... Read more »

Nov 25, 2025 • 35min
HS118: Bricking the Company – Discussing Existential Threats with Leadership
The discussion dives into existential threats that could potentially cripple organizations. Concepts like 'bricking the company' and real-world examples, including Travelex and Codespaces, highlight the stakes involved. Insights on how to assess vulnerabilities and the implications of supply-chain risks provide crucial knowledge. The hosts emphasize the importance of framing these risks effectively for senior leadership, recommending concise communication and practical exercises to enhance awareness. The role of AI in amplifying threats is also thoughtfully examined.

Nov 18, 2025 • 34min
HS117: Environmental, Social and Governance Initiatives: What That Means for Your Organization (Sponsored)
Environmental, Social, Governance (ESG) initiatives aren’t just “the right thing to do”, they can also save companies real dollars, particularly if they’re investing in data centers and other infrastructure. Join Jonathan Ciccio, Continuous Improvement Manager for The Siemon Company, as we discuss The Siemon Company’s ESG initiatives. The Siemon Company has been in business for... Read more »

Nov 11, 2025 • 33min
HS116: Nth-Party Risk May Put You on the (Block) Chain Gang
Dive into the complex world of nth-party risks and how they ripple through modern supply chains. Discover the implications of recent Salesforce breaches and the rise of agentic AI in managing these hidden dangers. The conversation reveals the need for blockchain as a solution for tracking software changes and ensuring accountability. Explore the challenges of standards and the role of government procurement in driving adoption. The hosts debate the balance between speed and responsible risk management in the face of evolving technology.

Oct 28, 2025 • 36min
HS115: Cyber-Risk Assessment and Cybersecurity Budgeting: You’re (Probably) Doing It Wrong
In this engaging discussion, hosts explore the pitfalls of linking cybersecurity budgets to IT spending, revealing why this approach is flawed. They highlight human complacency and the need for a fresh perspective on security in a world without clear network perimeters. By recommending a spend-per-employee model, they emphasize the importance of identifying what truly matters to an organization. The conversation also delves into the complexities of AI and third-party risks, urging listeners to modernize their risk assessment strategies.

Oct 14, 2025 • 40min
HS114: In or Out? Deciding Which IT Functions to Bring In or Push Out
Exploring when to insource or outsource IT functions, the hosts stress the need for organizations to reassess sourcing strategies during shifts in the economy or technology. They discuss the sacrifices made when outsourcing, including loss of control. Key drivers like demographics and cloud economics are analyzed. There's a spotlight on the importance of aligning IT with HR and determining the true purpose behind moving workloads. The discussion also touches on the risks of inaction and the delicate balance between swift transitions and comprehensive planning.

5 snips
Sep 30, 2025 • 41min
HS113: Bad Tech Romance: Five Signs You’re In an Abusive IT Relationship
Sandy Miller, a pseudonymous CIO, shares her insights on identifying toxic IT work environments. She highlights five signs of an abusive IT relationship, including the dreaded 'Sunday scaries' and stalled promotions. Sandy shares personal experiences of fear and distrust stemming from manipulation of information and siloed cultures. The discussion dives into recognizing hostile workplaces, the impact of bad leadership versus toxic company intentions, and the importance of aligning personal values with corporate missions. A candid exploration of workplace dynamics!

Sep 16, 2025 • 38min
HS112: Standardizing NaaS Service Definitions
Network-as-a-Service (NaaS) promises enterprises the ability to set up and configure connectivity and network security with a couple of clicks. But for NaaS to truly transform enterprise networking, one thing has been missing: standards. Enter Mplify (formerly the Metro Ethernet Forum), a non-profit focused on standardizing NaaS service definitions. Mplify’s CTO, Pascal Menezes, joins Johna... Read more »

10 snips
Sep 2, 2025 • 38min
HS111: When Someone Makes Your Cloud Service Go Poof!
The discussion highlights the risks of losing cloud services amidst geopolitical tensions, illustrated by a case of an Indian energy company cut off from Microsoft. It’s crucial for organizations to rethink their risk management strategies and incorporate contingency plans. The impacts of legal changes on corporate structures are explored, emphasizing communication between departments. The hosts advocate for diversifying service providers and preparing for unexpected disruptions, likening it to buying insurance against unpredictability in an unstable global landscape.

12 snips
Aug 19, 2025 • 23min
HS110: Cryptocalypse Soon! The CRQCs Are Due Sooner Than We Thought
Experts discuss the rapidly approaching threat of quantum computing capable of breaking traditional encryption. Recent estimates show this technology could arrive years sooner than expected. Organizations must act fast, particularly in finance, to adopt quantum-resistant cryptography. The conversation dives into evaluating vendor strategies for data protection and the importance of proactive cybersecurity measures. With cryptographic vulnerabilities on the rise, there's an urgent need for reassessing security practices to safeguard communications in our tech-driven world.


