TJ Banasik

CISSP-ISSEP, ISSAP, ISSMP, Principal Product Manager, Cloud & AI Security

TJ Banasik is a Senior Program Manager for Microsoft in the Cloud & AI Security Group. He has consulted with numerous organizations in cybersecurity and has built security operations centers across the government, military and commercial sectors. A security operations expert, TJ has extensive experience in incident response, threat intelligence, insider threat, and threat vulnerability management. He’s previously worked as the Director of Security for Veritas Technologies, the Senior Security Operations Center Manager for the U.S. Government Accountability Office (CSRA), and Army Officer with Army Cyber Command (ARCYBER). TJ holds a Master of Arts in intelligence studies concentrating cyber from AMU. TJ holds the CISSP-ISSEP, ISSAP, ISSMP, CCSP, GCIH, GCWN, GCIA, GCCC, GCFA, GSEC, GPEN, PMP, CISM, CISA, CRISC, CEH, CHFI, CASP, Azure Solutions Architect Expert certifications and is currently pursuing his second graduate degree in information systems security engineering from the SANS Technology Institute.

Post by this author

CMMC with Microsoft Azure: Maintenance & Media Protection (6 of 10)

This is the sixth in a ten-part blog series where we’ll demonstrate principles of the Cybersecurity Maturity Model Certification aligned with Microsoft Azure. Subsequent blogs in the series will delve into recovery & risk management, security assessment & risk management, system & communications protection and system & ...

CMMC with Microsoft Azure: Incident Response Maturity (5 of 10)

This is the fifth in a ten-part blog series where we’ll demonstrate principles of the Cybersecurity Maturity Model Certification aligned with Microsoft Azure. Subsequent blogs in the series will delve into maintenance & media protection, recovery & risk management, security assessment & risk management, system & ...

CMMC with Microsoft Azure: Identification & Authentication Maturity (4 of 10)

This is the fourth in a ten-part blog series where we’ll demonstrate principles of the Cybersecurity Maturity Model Certification aligned with Microsoft Azure. Subsequent blogs in the series will delve into incident response, maintenance & media protection, recovery & risk management, security assessment & risk management, system...

CMMC with Microsoft Azure: Asset & Configuration Management (3 of 10)

This is the third in a ten-part blog series where we’ll demonstrate principles of the Cybersecurity Maturity Model Certification aligned with Microsoft Azure. Subsequent blogs in the series will delve into identification & authentication, incident response, maintenance & media protection, recovery & risk management, security ...

CMMC with Microsoft Azure: Audit & Accountability Management (2 of 10)

This is the second in a ten-part blog series where we’ll demonstrate principles of the Cybersecurity Maturity Model Certification (CMMC) aligned with Microsoft Azure. Subsequent blogs in the series will delve into asset & configuration management, identification & authentication, incident response, maintenance & media protection...

CMMC with Microsoft Azure: Access Control (1 of 10)

This is the first in a ten-part blog series where we’ll demonstrate principles of the Cybersecurity Maturity Model Certification (CMMC) aligned with Microsoft Azure. Subsequent blogs in the series will delve into audit & accountability maturity, asset & configuration management, identification & authentication, incident response...

Supply Chain Risk Management for Zero Trust with Microsoft Azure (6 of 6)

This is the last blog of a six-part series where we’ve demonstrated the application of Zero Trust concepts for securing federal information systems with Microsoft Azure. In this sixth blog of the series we will explore how to leverage Microsoft Azure for supply chain risk management in Zero Trust models. This blog series is coauthored by...

Insider Threat Monitoring for Zero Trust with Microsoft Azure (5 of 6)

This is the fifth in a six-part blog series where we will demonstrate the application of Zero Trust concepts for securing federal information systems with Microsoft Azure. In this fifth blog of the series we will explore how to leverage Microsoft Azure for insider threats in Zero Trust models. The last blog in the series will include ...

Enforcing Policy for Zero Trust with Azure Policy (4 of 6)

This is the fourth in a six-part blog series where we will demonstrate the application of Zero Trust concepts for securing federal information systems with Microsoft Azure. In this fourth blog of the series we will explore how to leverage Azure Policy for enforcing access control in Zero Trust models. Additional blogs in the series will ...

Monitoring Cloud Security for Zero Trust with Azure Sentinel (3 of 6)

This is the third in a six-part blog series where we will demonstrate the application of Zero Trust concepts for securing federal information systems with Microsoft Azure. In this third blog of the series we will explore how to leverage Azure Sentinel for security monitoring in Zero Trust models. Additional blogs in the series will include ...