DiscoverNo Password Required
No Password Required
Claim Ownership

No Password Required

Author: Cyber Florida

Subscribed: 32Played: 189
Share

Description

The No Password Required Podcast connects with the cybersecurity industry’s most interesting professionals and shares their stories. No Password Required covers a variety of tech topics, from the cyber-related challenges facing law enforcement to the advent of quantum computing, this podcast explores the people and topics at the forefront of the field.
58 Episodes
Reverse
SummaryThis conversation explores the U.S. Army's investment in cybersecurity compliance for small businesses, the importance of mentorship in the defense industry, and the unique career path of Sabrina McIntyre at KPMG. Sabrina discusses her transition from art to cybersecurity, the challenges of navigating compliance standards, and her advocacy for women in the field. The episode also touches on the intersection of art and cybersecurity, the vision for a cybersecurity museum, and fun personal insights from Zabrina's life.TakeawaysThe U.S. Army is investing in small business cybersecurity compliance.Certification programs can help defense contractors meet compliance.Creating a secure environment for small businesses is essential.Mentorship programs are crucial for small business growth.Zabrina's career path showcases the value of diverse experiences.Understanding compliance standards like PCI DSS is challenging but necessary.Being open to new opportunities can lead to fulfilling career paths.Women in Cybersecurity is making strides in community building.Creativity is important in the cybersecurity field.Cybersecurity education should be accessible to all.titlesInvesting in Cybersecurity for Small BusinessesNavigating Compliance in the Cybersecurity LandscapeZabrina McIntyre: A Unique Career JourneyEmpowering Women in CybersecuritySound Bites"Certification program for defense contractors""Largest federal government mentor-protege program""Cybersecurity maturity model is crucial""Be your own best advocate in your career""If you can see it, you can be it""We need more creative people in cybersecurity""Cybersecurity should be accessible to everyone""Umbrellas don't work in Seattle" Chapters00:00 Introduction to the Next Generation Commercial Operations Program02:51 The Importance of Cybersecurity Compliance for Small Businesses05:45 Zabrina McIntyre's Role at KPMG08:54 Zabrina's Unique Career Path11:51 Navigating Cybersecurity Standards14:48 Advice for Aspiring Cybersecurity Professionals17:58 Women in Cybersecurity: Building Community20:59 The Intersection of Art and Cybersecurity24:04 Zabrina's Vision for a Cybersecurity Museum27:02 Lifestyle Polygraph: Fun Questions with Zabrina30:09 Key Takeaways and Closing Thoughts 
Mari Galloway, CEO of the Women’s Society of Cyberjutsu, is a woman whose magnetic presence ignites every room she enters. Her power radiates in an undeniable way through her hair, attire, and unwavering confidence, and the Do We Belong Here team wanted to know - did her light always shine this bright or did she work to cultivate it over time?In this episode of Do We Belong Here, Tashya Denose and Pam Lindemoen speak with Mari about how she got “stuck” in the cyber world, eventually leading her to working in Vegas with the biggest casinos in the world. As they navigate through her experiences, the trio reflects on the adage that what happens in Vegas doesn't always stay in Vegas, especially in the realm of cybersecurity.The discussion explores Mari’s evolution of self-confidence as she reflects on the challenges of being a trailblazing black woman in a predominantly male-dominated field. They also dive deep into Mari’s chapter of “Securing Our Future” by the Black Women in Cyber Collective and explore the pivotal role of finding your community in fostering resilience and self-empowerment.Women’s Society of Cyberjutsu - womenscyberjutsu.orgConnect with Mari on LinkedIn - linkedin.com/in/themarigalloway/Find us on social media - @DoWeBelongPodLearn more about Cyber Florida - cyberflorida.orgWatch the podcast on YouTube: youtube.com/@cybersecurityfl
summaryIn this episode, the conversation begins with a significant data breach at Star Health Insurance, affecting over 31 million individuals. The discussion delves into the complexities of insider threats, particularly focusing on the alleged involvement of the company's CISO. The episode transitions to an introduction of Dr. Sunny Ware, a web application penetration tester, who shares her journey from software development to cybersecurity. Dr. Sunny discusses her role in penetration testing, the importance of understanding application logic, and the use of AI in her work. The episode concludes with a lifestyle polygraph segment, where Dr. Sunny shares personal insights and experiences, emphasizing the importance of mentorship in cybersecurity.  takeawaysStar Health Insurance experienced a major data breach affecting millions.Insider threats are predicted to be a significant risk in 2025.Dr. Sunny Ware transitioned from software development to cybersecurity.Understanding application logic is crucial in penetration testing.AI can be a valuable tool in penetration testing.Bug bounty programs offer focused opportunities for security testing.Mentorship is important for the next generation of cybersecurity professionals.Dr. Sunny emphasizes the creativity involved in coding and security.Vulnerability disclosure programs differ from bug bounty programs.Dr. Sunny's passion for teaching and sharing knowledge is evident.titlesThe Star Health Insurance Data Breach: A Deep DiveInsider Threats: The New Face of Cybersecurity RisksMeet Dr. Sunny Ware: A Cybersecurity TrailblazerThe Art of Penetration Testing with Dr. SunnyExploring AI's Role in Cybersecuritysound bites"Star Health Insurance suffered a significant data security incident.""There's a hacker and then there's this kind of cool insider twist.""The alleged hackers claimed that Star Health's CISO facilitated the breach.""Insider threats are going to be the risk to prepare for in 2025.""I came from very humble beginnings.""I think coding is like making a painting on a blank canvas.""I want to capitalize on the experience I already have in web API.""I use AI almost every day on every pen test.""I actively do bug hunting.""I want to make sure that if there's anything I can share to help."chapters00:00 Data Breach at Star Health Insurance06:06 Insider Threats and Whistleblowers07:05 Introduction to Dr. Sunny Ware30:14 Dr. Sunny's Career Path and Penetration Testing37:00 Lifestyle Polygraph with Dr. Sunny48:55 Key Takeaways and Closing Thoughts
SummaryIn this episode, the hosts discuss the importance of representation in cybersecurity, highlighting a documentary that showcases the experiences of women and underrepresented groups in the industry. They are joined by Confidence Stavely, founder of the CyberSafe Foundation, who shares her personal journey from a victim of cybercrime to a leader in promoting digital safety and inclusion in Africa. The conversation explores themes of overcoming challenges, the significance of passion in career choices, and the responsibilities of leadership in creating opportunities for others. Confidence also discusses her creative approach to making complex topics accessible through her YouTube series, API Kitchen, and emphasizes the importance of mobilizing resources to empower the next generation in tech.TakeawaysThe documentary highlights the importance of representation in cybersecurity.There are solutions to the challenges faced by underrepresented groups.Personal experiences can drive a passion for change in the industry.Education is a key factor in overcoming barriers to entry in tech.Leadership should focus on values and empowering team members.Creativity can be a powerful tool in communicating complex ideas.API Kitchen was created as a response to gender stereotypes in tech.Cybersecurity skills can significantly change lives and communities.It's essential to hold the door open for others in the industry.Passion is a driving force behind career success.Chapters00:00 The Impact of Representation in Cybersecurity05:47 Confidence Stavely's Journey and CyberSafe Foundation12:00 Overcoming Challenges and Pursuing Passion18:00 Leadership and Responsibility in Cybersecurity24:12 Creativity and Communication in Tech29:46 Personal Growth and Future Aspirations
A new school in San Antonio called Nukudu offers a paid training program followed by a guaranteed job in cybersecurity. The program aims to address the shortage of cyber jobs and provides hands-on training to ensure candidates are prepared for the workforce. Our guest, Dr. Thomas Hyslop, an assistant professor at the University of South Florida, shares his experience in law enforcement and the importance of interagency collaboration in combating cybercrime. He also discusses the Master of Science in Cybercrime program at USF, which focuses on digital forensics and criminal investigation. The future of cybercrime is concerning as large criminal organizations are becoming more sophisticated and mimicking nation states in their capabilities. Investigating international cybercrime is challenging due to the need for cooperation between countries and the slow response times. Changes in international treaties and agreements are needed to expedite investigations. Dr. Highslip ran a museum of vintage technology and is looking for a place to house it permanently. He enjoys swimming in Mirror Lake, biking on Champs-Elysees, and running in DC for his ideal triathlon. His favorite junk food treat is Bit-O-Honey and he loves all kinds of pies. Guns N' Roses is his favorite hair metal band and his favorite song is Paradise City. He enjoys playing metal songs at social gatherings and believes that Appetite for Destruction is a timeless album. Dr. Highslip has what it takes to join the fantasy cybersecurity squad and is a force multiplier with his expertise in incident response and alternative theories for obtaining information from foreign governments.takeawaysNukudu offers a paid training program followed by a guaranteed job in cybersecurity to address the shortage of cyber jobs.Interagency collaboration is crucial in combating cybercrime, and federal law enforcement plays a significant role in stopping cybercriminals.The Master of Science in Cybercrime program at the University of South Florida focuses on digital forensics and criminal investigation.Team building and collaboration are essential skills in cybersecurity and are emphasized in the education of future cybersecurity professionals. Large criminal organizations are becoming more sophisticated and mimicking nation states in their cyber capabilities.Investigating international cybercrime is challenging due to slow response times and the need for cooperation between countries.Changes in international treaties and agreements are needed to expedite investigations.Dr. Highslip ran a museum of vintage technology and is looking for a permanent location to house it.His ideal triathlon includes swimming in Mirror Lake, biking on Champs-Elysees, and running in DC.His favorite junk food treat is Bit-O-Honey and he loves all kinds of pies.Guns N' Roses is his favorite hair metal band and Paradise City is his favorite song.Dr. Highslip has what it takes to join the fantasy cybersecurity squad and is a force multiplier with his expertise in incident response and alternative theories for obtaining information from foreign governments.titlesThe Role of Interagency Collaboration in Combating CybercrimeEmphasizing Team Building and Collaboration in Cybersecurity Education Indulging in Junk Food: Bit-O-Honey and PiesChallenges in Investigating International CybercrimeSound Bites"Nukudu offers a paid training program followed by a guaranteed job.""Dr. Thomas Hyslop led a DCIS undercover operation.""The Master of Science in Cybercrime program focuses on digital forensics and criminal investigation.""The future of cybercrime is concerning as large criminal organizations are becoming more sophisticated and mimicking nation states in their capabilities.""Investigating international cybercrime is challenging due to slow response times and the need for cooperation between countries.""Dr. Highslip ran a museum of vintage technology and is looking for a permanent location to house it."Chapters00:00 Nukudu: A New School Offering Paid Training and Guaranteed Job Placement in Cybersecurity06:21 The Role of Interagency Collaboration in Combating Cybercrime19:07 The Master of Science in Cybercrime Program at the University of South Florida25:48 Emphasizing Team Building and Collaboration in Cybersecurity Education26:42 The Future of Cybercrime27:11 Investigating International Cybercrime31:25 Preserving Vintage Technology37:30 The Ideal Triathlon43:03 Indulging in Junk Food45:23 Rocking Out with Guns N' Roses49:11 Dr. Highslip: A Valuable Addition to the Fantasy Cybersecurity Squad
SummaryKenya's efforts to enhance its cybersecurity and technological progress through partnerships with the US and major tech companies. The focus is on responsible state behavior in cyberspace and addressing mobile app security. The role of public-private partnerships in promoting a robust digital economy and infrastructure. The conversation then transitions to an interview with Maretta Morovitz, a cybersecurity expert at MITRE, discussing her career path, the importance of mentorship, and the impact of ADHD on her work. The discussion also covers MITRE Engage, which focuses on cyber denial, deception, and adversary engagement, and highlights the use of simple yet effective techniques like decoy credentials. In this conversation, Maretta Morovitz discusses the importance of thinking creatively and outside the box when it comes to cybersecurity solutions, especially for organizations with limited budgets. She emphasizes the need for simplicity and proactive measures in cybersecurity. Maretta also highlights the value of interdisciplinary collaboration in the field, involving professionals from various backgrounds such as human behavioral scientists and graphic designers. She shares a successful collaboration between MITRE and HSBC in the field of deception operations. Maretta also talks about her passion for dance and her unique talent of reciting the alphabet backwards.KeywordsKenya, cybersecurity, technological progress, partnerships, responsible state behavior, mobile app security, public-private partnerships, digital economy, infrastructure, interview, Maretta Morovitz, career path, mentorship, ADHD, MITRE Engage, cyber denial, deception, adversary engagement, decoy credentials, cybersecurity, low budget solutions, simplicity, proactive measures, interdisciplinary collaboration, deception operations, dance, talentTakeawaysKenya is forging partnerships with the US and major tech companies to enhance its cybersecurity and technological progress.The focus is on responsible state behavior in cyberspace and addressing mobile app security.Public-private partnerships play a crucial role in promoting a robust digital economy and infrastructure.Mentorship is important in career development, and having mentors who provide opportunities and support can be instrumental in success.ADHD can present challenges but also bring unique strengths to the workplace.MITRE Engage focuses on cyber denial, deception, and adversary engagement, using simple yet effective techniques like decoy credentials. Thinking creatively and outside the box is crucial in cybersecurity, especially for organizations with limited budgets.Simplicity and proactive measures are key in cybersecurity to effectively address threats.Interdisciplinary collaboration involving professionals from various backgrounds can bring new perspectives and solutions to the field.Deception operations can be a valuable tool in cybersecurity, and successful collaborations in this area have been seen between organizations like MITRE and HSBC.Passions and talents outside of cybersecurity, such as dance, can bring unique perspectives and skills to the field.Sound Bites"Sometimes the real solution is something very low tech or just kind of outside the box, low budget.""Being proactive has to be simple.""We definitely need more of that interdisciplinary approach."Chapters00:00 Kenya's Cybersecurity Partnerships03:24 Addressing Mobile App Security07:13 Interview with Maretta Morovitz11:35 Cyber Deception and Adversary Engagement29:12 The Importance of Simplicity and Proactive Measures30:07 Interdisciplinary Collaboration in Cybersecurity31:06 Successful Collaboration in Deception Operations34:44 Bringing Unique Perspectives and Skills to Cybersecurity  Follow Maretta Morovitz on LinkedIn: Maretta MorovitzFollow MITRE on Twitter: @MITREcorpLearn more about MITRE Engage: MITRE Engage
Summary The conversation discusses the extradition case of Julian Assange and the role of the US prison system in the decision. It also explores Tanya Janca's role at Semgrep and her passion for affordable cybersecurity education. Additionally, it touches on Tanya's experience in election security and the importance of transparency in the process. Tanya discusses her volunteer work with the Canadian government, where she helps educate students about cybersecurity. She talks about the importance of teaching young people about privacy, protecting digital devices, and understanding cyber threats. Tanya also mentions her involvement in the Cyber Titan competition and her efforts to promote cybersecurity as a career. She shares her experience writing the book 'Alice and Bob Learn Application Security' and her unique approach to making technical concepts accessible through stories and different learning styles. Tanya also talks about the importance of mentoring and how she has benefited from mentors throughout her career.Keywords Julian Assange, extradition, US prison system, cybersecurity education, Semgrep, election security, transparency, volunteer work, Canadian government, cybersecurity education, privacy, digital devices, cyber threats, Cyber Titan, promoting cybersecurity, career, Alice and Bob Learn Application Security, technical concepts, stories, learning styles, mentoringTakeawaysThe extradition case of Julian Assange highlights the differences in prison systems between the US and other Western democracies.Tanya Janca's role at Semgrep involves community management and education in the field of cybersecurity.Affordable cybersecurity education is crucial for organizations to effectively use security tools and integrate them into their programs.Election security requires centralization, knowledge sharing, and transparency to ensure public trust in the process. Volunteer work with the Canadian government focuses on educating students about cybersecurity, including topics like privacy and protecting digital devices.Promoting cybersecurity as a career is important, and initiatives like the Cyber Titan competition help engage high school students in learning about cybersecurity.Tanya's book 'Alice and Bob Learn Application Security' uses stories and different learning styles to make technical concepts accessible.Mentoring is valuable for personal and professional growth, and Tanya has both benefited from mentors and become a mentor herself.TitlesThe Importance of Transparency in Election SecurityCybersecurity as a Career: The Cyber Titan CompetitionThe Value of Mentoring: Tanya's Experience as a Mentor and MenteeSound Bites"I am head of community and education, which is a role they made up just for me.""They decided, I think in 2017, we need to make a task force to make sure they know cyber.""Defenders need to understand attacks or they can't be good at defending, right? Like we're teaching them ethics as we teach them how to hack.""Alice and Bob are going to learn secure coding this time."Chapters00:00 The Extradition Case of Julian Assange08:18 Affordable Cybersecurity Education at Semgrep30:40 Tanya's Volunteer Work with the Canadian Government31:35 Promoting Cybersecurity as a Career34:02 Making Technical Concepts Accessible: 'Alice and Bob Learn Application Security'39:45 The Value of Mentoring
SummaryIn this episode of the No Password Required podcast, host Jack Clabby and co-host Kayley Melton interview Tamiko Fletcher, the CISO at Kennedy Space Center. Tamiko shares her journey from a small town in South Carolina to working at NASA and discusses her role as a CISO. She emphasizes the importance of mentorship, outreach, and diversity in the cybersecurity field. Tamiko also talks about the unique challenges of cybersecurity at NASA, such as patching during launches and balancing innovation with security. She emphasizes the need to know and learn about individuals' strengths, interests, and motivations in order to effectively place them on teams and utilize their skills. Tamiko also shares her experiences working at NASA and the changes she has witnessed over the years, including the evolution of IT and the increasing diversity at the Kennedy Space Center. She highlights the excitement and pride she feels when witnessing a launch and the impact of NASA's work on the world.KeywordsNASA, cybersecurity, CISO, career trajectory, mentorship, outreach, diversity, patching, innovation, security, NASA, Kennedy Space Center, cybersecurity, teamwork, understanding people, IT evolution, diversity, launches, personal experiences, imposter syndrome, work-life balance, advocating for oneself, UFOsTakeawaysTamiko Fletcher shares her journey from a small town in South Carolina to working at NASA as the CISO at Kennedy Space Center.She highlights the importance of mentorship, outreach, and diversity in the cybersecurity field.Tamiko discusses the unique challenges of cybersecurity at NASA, such as patching during launches and balancing innovation with security.She emphasizes the need for flexibility and adaptability in the ever-changing cybersecurity landscape. Understanding and valuing people is crucial in the workplace, as it allows for effective team placement and utilization of individual skills.The evolution of IT and the increasing diversity at NASA's Kennedy Space Center have been significant changes over the years.Witnessing a launch at NASA is an exciting and prideful experience, reminding employees of the impact of their work.Advocating for oneself and setting boundaries is important for maintaining work-life balance and overall well-being.Sound Bites"I'm from a small town called Manning, South Carolina. If you look it up on the map, it's near Travel America. It's probably the best thing we got going for it, honestly.""Success stories like yours are common at NASA. And it's also based on one's definition of success, right? So everyone has their own definition of what success is for them.""I try to actually know and learn people... because I want to understand what makes them tick so I know where to place them on a team.""We are human first and then we are who our job is. And I want to be able to utilize that person, that whole person, what makes them happy, what makes them excited to come in every day.""I have a vast variety of folks on the team who help get cyber done." Chapters00:00 Introduction and Welcome to the Podcast08:00 Education and Career Trajectory25:48 Challenges and Innovations in Cybersecurity at NASA34:4 8Building a Team and Emphasizing Diversity41:30 The Diversity of the Cyber Team at NASA54:25 Instilling Values in Teams to Change the Work Environment
SummaryRoman Sanikov, is the president of Constellation Cyber and specializes in cyber threat intelligence. In this episode, Roman discusses the importance of collaboration and transparency in the cybersecurity industry, particularly in combating ransomware attacks. He also emphasizes the need for a holistic approach to cybersecurity, involving education and empowerment for both employees and consumers. In this episode, Roman Reinhart shares his experiences as an undercover agent in the cybercrime world. He discusses maintaining a persona, dealing with forum behavior, and memorable arrests. He also emphasizes the importance of redemption and second chances. Roman also talks about his involvement with Helpster USA, an organization dedicated to providing life-saving treatment to young people in developing economies. He shares his hobbies of mushrooming and highlights the satisfying moments at work. Finally, he reflects on the cultural differences he experienced after moving overseas.TakeawaysPig butchering schemes are a significant cause of financial losses globally, and it is important to approach the topic with compassion and nuance.Many scammers involved in these schemes are forced into this life against their will, either through human trafficking or being lured into it with false promises.Collaboration and transparency are crucial in the cybersecurity industry to effectively combat ransomware attacks and mitigate their secondary and tertiary impacts.A holistic approach to cybersecurity, involving education and empowerment for employees and consumers, is necessary to create a more secure environment. Maintaining a persona in the cybercrime world requires careful observation and adaptation.Memorable arrests can lead to redemption and second chances for individuals involved in cybercrime.Helpster USA provides life-saving treatment to young people in developing economies.Mushrooming is a rewarding hobby that allows for outdoor exploration and collection.Satisfying moments at work include helping clients have eureka moments and making positive changes.Cultural differences, such as politeness, can take time to understand and adapt to.Chapters00:00 Introduction to Pig Butchering Schemes (opening conversation)02:18 Online Scams and Exploitation03:41 Forced Labor and Human Trafficking04:41 Approaching Scams with Compassion05:39 Guest Introduction: Roman Sanikov07:01 Roman's Role at Constellation Cyber08:22 Promoting Transparency in Ransomware Incidents10:17 Mitigating Secondary and Tertiary Impacts of Ransomware Attacks11:14 The Ripple Effect of Ransomware Attacks13:10 The Importance of Collaboration in Cybersecurity14:58 Roman's Career Path and Background19:34 Educating and Empowering Employees and Consumers21:28 Avoiding Victim-Blaming in Cybersecurity24:16 The Need for Collaboration and Transparency in the Industry25:10 Balancing Non-Traditional Pursuits with College26:37 Undercover Work and Building Relationships33:07 Maintaining a Persona36:25 Dealing with Forum Behavior38:18 Memorable Arrests41:25 Redemption and Second Chances45:13 Helpster USA48:16 Eccentricities of NHL Players50:56 Life's Unexpected Moments56:19 The Joy of Mushrooming58:43 Satisfying Moments at Work01:01:04 Learning Politeness in America
SummaryIn this episode, Jo Anna joins Carlton Fields P.A. Jack Clabby and KnowBe4’s VP of Remote Publishing Teams Kayley Melton to tell the story of how her career has changed since starting at Rice University 17 years ago. From her early days as a receptionist at a hair salon to her current role as a security analyst, Jo Anna shares her journey in the cyber world and her fascination with artificial intelligence, stemming from her compliance-related responsibilities. Emphasizing a realism-based view on AI, she passionately advocates for a comprehensive understanding of AI, emphasizing that it’s neither inherently good nor bad.TakeawaysStolen recordings from popular artists can sell for high prices on the black market.Cyber criminals are involved in various illegal activities, including stealing cryptocurrency and trading stolen, unreleased rap recordings.Law enforcement plays a crucial role in investigating and apprehending cyber criminals, and these crimes can have real-life consequences.The intersection of cybersecurity and AI presents challenges in assessing the risks associated with AI technologies.Community outreach and education are important in promoting cybersecurity awareness and encouraging more people to pursue careers in the field.Chapters00:00 Stolen Recordings and Cyber Criminals01:29 Arrest of a Florida Man and Stolen Rap Recordings02:27 The Allegations and Nicknames03:26 The Connection Between Cyber Crime and Rap Music04:23 Real-Life Consequences of Cybersecurity Crimes05:52 The Role of Law Enforcement in Cybersecurity Crimes06:50 Introduction of Guest Joanna Parker-Martin07:18 Joanna's Role at Rice University08:15 Protecting Data at Rice University09:08 Joanna's Journey into Cybersecurity10:04 Overcoming Challenges and Changing Career Paths18:14 Joanna's Interest in Artificial Intelligence19:22 The Intersection of Cybersecurity and AI20:46 The Challenges of Assessing AI Risk21:13 The Inevitability of AI22:37 The Risks of Facial Recognition Technology27:26 Joanna's Involvement with WiCys29:48 Community Outreach and Cybersecurity Education30:10 Misconceptions About Cybersecurity Professionals32:32 The Lifestyle Polygraph43:35 Joanna's Preference for Sponge Cake in Strawberry Shortcake
SummaryThe conversation discusses the arrest of Ola Segun Simpson Adagorin, a Nigerian national facing US federal charges for a business email compromise scheme. The collaboration between the FBI and Ghana is highlighted, along with the role of the legal attache job in solving crimes with international impact. The scheme and indictment details are explored, emphasizing the sophistication of the attack. Dr. Diana Burley, Vice Provost for Research and Innovation at American University, shares insights on cybersecurity education and workforce readiness. The importance of understanding human behavior in cybersecurity is discussed, along with strategies for engaging in conversations and addressing the search for cyber unicorns. In this episode, the importance of password security and the various methods to enhance it are discussed. The conversation covers common password mistakes, the use of password managers, multi-factor authentication, biometric authentication, and the future of password security.TakeawaysCollaboration between law enforcement agencies is crucial in solving cybercrime cases with international implications.Understanding human behavior is essential in addressing cybersecurity challenges and shaping effective policies.Digital literacy and foundational cybersecurity skills should be integrated into education across disciplines.Creating a culture of cybersecurity requires a balance between rules and creativity, and a focus on psychological safety.Engaging in conversations with strangers can be facilitated by finding common interests and making personal connections. Create strong and unique passwords for each online account.Avoid common password mistakes such as using personal information or easily guessable patterns.Consider using a password manager to securely store and generate passwords.Enable multi-factor authentication whenever possible for an added layer of security.Biometric authentication, such as fingerprint or facial recognition, can provide convenient and secure access to devices and accounts.Passwordless authentication methods, such as biometrics or hardware tokens, may become more prevalent in the future.Stay informed about emerging technologies and best practices in password security.Chapters00:00 Introduction and Arrest of Ola Segun Simpson Adagorin01:24 Collaboration between FBI and Ghana03:15 Scheme and Indictment Details04:44 Legal Attache Job and Collaboration06:10 Deterrence and Sealed Indictments07:36 Introduction of Dr. Diana Burley08:31 Dr. Burley's Background and Role at American University09:23 Interest in Cybersecurity and Technology10:21 American University's Role in Educating Policymakers12:15 Engaging with Leaders and Shaping Policy13:36 Engaging with Students and Future Leaders14:28 American University's Focus on Policy and Research15:27 Misconceptions about the Cybersecurity Workforce16:23 Digital Literacy and Foundational Cybersecurity Skills18:45 Retaining Skilled Members in the Academic Environment19:43 Benefits of Engaging as a University Faculty Member20:37 Understanding Human Behavior in Cybersecurity22:05 Insights from Research on Human Behavior23:25 Understanding Employee Behavior in Cybersecurity24:47 Creating a Culture of Cybersecurity27:08 Strategies for Initiating Conversations with Strangers31:50 The Cyber Unicorn Project35:08 Addressing the Search for Cyber Unicorns41:45 Lifestyle Polygraph50:57 Understanding Irrational Behavior and Self-Awareness53:37 Engaging in Conversations with Strangers02:30 The Importance of Password Security10:15 Common Password Mistakes18:45 Password Managers27:10 Multi-Factor Authentication35:40 Biometric Authentication44:20 Passwordless Authentication52:30 Future of Password Security58:21 Conclusion
SummaryIn this episode, Jack Clabby and Kayley Melton discuss the upcoming Sunshine Cyber Conference and their collaboration with Winn Schwartau. They also talk about the importance of diverse cybersecurity talent and their plans for a joint session at the conference. The hosts then interview Lisa Plaggemier, the executive director at the National Cybersecurity Alliance, who shares her career journey and the role of creativity and curiosity in cybersecurity. They also discuss the impact of COVID-19 on the cybersecurity industry and the importance of humor and satire in cybersecurity training. The episode concludes with a lifestyle polygraph segment. In this episode, the conversation covers various topics related to comedy, storytelling, and implementing change in organizations. The power of the internet is discussed, highlighting the potential consequences of online content. The guest shares her favorite comedy movies, emphasizing the comedic element in her expertise. The use of humor in training and awareness programs is explored, along with the challenges of implementing change in organizations. Dealing with roadblocks in security and the passion for security awareness are also discussed. The episode concludes with information on how to get in touch with the guest and a recap of what was learned. TakeawaysThe Sunshine Cyber Conference features keynote speakers from the No Password Required podcast, including Winn Schwartau.The hosts will be doing their first on-site remote recording at the Sunshine Cyber Conference, featuring keynote speaker Tamiko Fletcher.The National Cybersecurity Alliance focuses on training and awareness, using creativity and humor to engage and educate people.Comedy movies, such as Monty Python and the Holy Grail, can be a source of expertise and inspiration.Humor can be effectively used in training and awareness programs to engage and educate participants.Implementing change in organizations can be challenging, but finding allies and overcoming roadblocks is essential. Chapters00:00 Introduction01:28 Fishing for Potential, the RTFM Guide to Diverse Cybersecurity Talent02:25 Live On-Site Remote Recording and Keynote Speakers03:51 Sunshine Cyber Conference and Registration04:46 Interview with Lisa Plaggemier05:15 Background and Role at the National Cybersecurity Alliance05:53 Transition to Security and Marketing Collaboration06:22 Incident Response and Training and Awareness07:20 Leadership and Skills in Cybersecurity08:18 Kubikle Series and Creativity in Security09:17 Curiosity and Creativity in Cybersecurity10:48 Naming and Shaming in Pen Tests and Phishing Testing11:41 DDoS Attack and Incident Response12:38 Neurodiversity and Cybersecurity13:21 Leading a Team During COVID-1914:21 Creating Engaging Training Content15:19 Global Data and Data Privacy Laws16:18 Humor and Satire in Cybersecurity Training18:47 Kubikle Series and Satire in Cybersecurity20:41 Creating Kubikle Series and Future Plans23:03Trust in Password Managers24:22 The Importance of Curiosity in Cybersecurity25:52 The Oh Behave Report and Behavioral Science26:50 Communicating Security Information Effectively28:44 Naming and Shaming in Phishing Testing29:39 Accepting Risk and Escalation Plans30:38 The Role of Security Teams and HR32:35 Building Trust in Password Managers33:32 Global Data and Cybersecurity Awareness36:51 The Importance of Curiosity in Cybersecurity Hiring40:03 The Underground Student-Led Newspaper41:12 The Significance of Curiosity and Creativity in Career50:44 The Power of the Internet51:14 Favorite Comedy Movies52:12 Using Humor in Training and Awareness53:38 Implementing Change in Organizations54:55 Dealing with Roadblocks in Security55:45 Passion for Security Awareness56:06 How to Get in Touch56:37 What Was Learned57:11 Closing Remarks
Jayson Street — Chief Adversarial Officer at Secure Yeti, a DEF CON Groups Global Ambassador, and a world-class awkward hugger Jayson Street, the dynamic Chief Adversarial Officer at Secure Yeti, has worn many masks throughout his life and career. He was once named a “World-Class Hacker” on the National Geographic series "Breakthrough Cyber-Terror," but he prefers the simpler title of Hacker, Helper, and Human. In this episode, Jayson joins Carlton Fields P.A.’s Jack Clabby and KnowBe4’s VP of Remote Publishing Teams Kayley Melton to talk about his journey of self-discovery that led him from being an award-winning janitor at McDonald's to one of the world’s most infamous ethical hackers. From his early childhood, Jayson has embraced hacking as a way of life, embodying the spirit of relentless exploration, innovation, and resilience. Like our favorite co-host Kayley, Jayson uncovered a new layer of his identity in his adulthood when he discovered that he is neurodivergent. He dives deep into how this new understanding altered his perception of himself, allowed him to embrace the various “masks” he wears throughout life, and discovered that his unique mind is actually his superpower. He also shares extraordinary stories of how he gained entry into some of the hardest-to-access cyber targets in the world. To start off the show, Jack and Kayley talk about the celebrity that’s topping the Hacker Celebrity Hot List as the celeb whose name is used most by cybercriminals when creating online scams. Hint: he’s just Ken… You can follow Jayson on LinkedIn here: https://www.linkedin.com/in/jstreet/ You can follow Jayson on Twitter here: @jaysonstreet You can learn more about Jayson here: https://jaysonestreet.com You can learn more about Secure Yeti here: https://www.secureyeti.com/
Kristin Demoranville — CEO and Founder of AnzenSage, defender of the food sector, and friend to primates What is the role of cybersecurity in food safety? Kristin Demoranville, CEO and Founder of AnzenSage, is committed to shielding the food sector from potential cybersecurity threats and ensuring the resilience of the entire food supply chain. Her dedication is not just a professional pursuit; it's a mission to prevent any compromise to public health. In this episode, Carlton Fields Cybersecurity Attorney Jack Clabby and No Password Required producer Rex Wilson speak with Kristin about everything from the deployment of autonomous tractors to the secure refrigeration of airport food, and Kristin sheds light on the other facets of daily life that are linked to the food supply chain. Kristen also shares how her love for wildlife led to her working with primates at the Louisville Zoo before making the transition into cybersecurity, and the value that podcasting has brought to her life. Kristen’s podcast, the Bites & Bytes Podcast, is her platform for discussing cybersecurity and food safety, and is recommended listening for fans of No Password Required. Bites & Bytes has fast become a medium for Kristin to share insights, connect with audiences, and explore the intersections of her diverse interests. Jack and Rex also delve into the intricacies of the Environmental Protection Agency's recent decision not to include cybersecurity in water system audits, and the questions this may raise about the security of water utility infrastructure. You can follow Kristin on LinkedIn here: https://www.linkedin.com/in/demoranvillekristin/ You can follow Kristin on Twitter here: @demokris You can learn more about AnzenSage here: https://www.anzensage.com/
Jessica Gulick — Founder and Commissioner of the US Cyber Games, CEO of the cyber marketing firm Katzcy, and someone who values perseverance over perfection Jessica Gulick is a woman of many trades. She is the Founder and CEO of the cyber marketing firm Katzcy, the Founder and Commissioner of the US Cyber Games, and a trailblazer who is working to make cybersecurity a sport that thrives. In this episode, Jessica joins Carlton Fields P.A.’s Jack Clabby and KnowBe4’s Kayley Melton to share her experiences as a female entrepreneur and the role that perseverance has played throughout her career. She also talks about the inception of the US Cyber Games, its commitment to bringing together elite cyber athletes, coaches, and industry leaders, and the purpose she hopes it will serve in the cyber world. Jack and Kayley also discuss the recent developments of Droidish, which may sound like a new Star Trek language but is actually the language being developed by the US military to allow AI drones to communicate with one another to become useful “tools” for many different purposes. You can follow Jessica on LinkedIn here: https://www.linkedin.com/in/jessicagulick/ You can follow Jessica on Twitter here: @CyberRiskLady You can learn more about US Cyber Games here: https://www.playcyber.com/
Allan Liska —Threat Intelligence Analyst at Recorded Future, the Ransomware Sommelier, and a guy with a mildly exciting expense account Allan Liska is a Threat Intelligence Analyst at Recorded Future. In this episode, Allan returns to No Password Required to talk with Carlton Fields Attorney Jack Clabby and KnowBe4’s Kayley Melton about his experiences in the ever-evolving battlefield of cyber threats, what has changed in ransomware since his first time on the show, and his perspective on the power of AI in the battle against cyber threats. He also updates us on his passion project: the upcoming release of the Yours Truly, Johnny Dollar comic book. In this thrilling new venture, Allan breathes new life into iconic insurance investigator Johnny Dollar by casting him in a role that hits close to home: a ransomware investigator. The best part was that he gifted the No Password Required team the chance to act out a scene from the comic. Jack and Kayley also talk about the dismantling of Qakbot, marking one of the largest-ever U.S.-led enforcement actions against a botnet (and also marking one of the best U.S. mission titles - Operation Duck Hunt.) You can follow Allan on LinkedIn here: https://www.linkedin.com/in/allan2/ You can follow Allan on Twitter here: @uuallan You can learn more about Recorded Future here: https://www.recordedfuture.com/
Courtney H. Jackson — CEO of Paragon Cyber Solutions, family-night game champion, and calculated-risk taker Courtney H. Jackson is the CEO of Paragon Cyber Solutions, a Tampa-based cybersecurity solutions provider. If Courtney’s name sounds familiar, that may be because she was awarded the Global 2022 Cybersecurity Woman Entrepreneur of the Year! In addition, Courtney is a 2023 Business Woman of the Year Honoree and a veteran of the U.S. Navy, where she was introduced to the world of cyber and IT. In this episode of No Password Required, Courtney joins Carlton Fields P.A. Jack Clabby and KnowBe4’s Kayley Melton to talk about her path to becoming a CEO, the resources that she wished she’d had when starting her career in this industry, how she uses a Cybersecurity Apprenticeship program approved by the Department of Education and Department of Veterans Affairs and SkillBridge to fill her growing team with talent, and the “one” family-night game that brings out her family’s competitive spirit. Jack and Kayley also talk about the unlikely duo behind the 2016 Bitfinex hack - one of whom is most known by her persona as the aspiring rapper “Razzlekhan.” You can follow Courtney on LinkedIn here: https://www.linkedin.com/in/courtneyhjackson/ You can follow Courtney on Twitter here: @mrschjackson You can learn more about Paragon Cyber Solutions here: https://paragoncybersolutions.com/
Lisa Ventura — founder of Cyber Security Unity, Member of the Order of the British Empire, and appreciator of 80s soap operas Lisa Ventura MBE is the founder of Cyber Security Unity, a UK-based organization seeking to unite the cyber security industry globally. Lisa is also a proud neurodivergent person; after being diagnosed in her adulthood with autism and ADHD, she gained a wider understanding of who she is, how she can use her unique traits to make the world better, and how she can advocate for neurodivergent talent in the cyber industry. In this episode of No Password Required, Lisa joins Carlton Fields, P.A.’s Jack Clabby and KnowBe4’s Kayley Melton to share how she went from working on the UK version of “Who Wants to be a Millionaire?” to becoming an award-winning leader in the cybersecurity industry. She also tells us about receiving her honorary award from the British Parliament, her love of 1980s U.S. soap operas, and the sci-fi world she’d most want to live in. Jack and Kayley discuss the drastic increase in the amount of cash Americans lost to text-messaging scams in recent years. Why is this type of attack showing so much growth? How can consumers continue moving forward? They talk about all of that and more. A special thanks to the great Sarina Gandy for producing this episode. You can connect with Lisa on Twitter here: @cybergeekgirl You can connect with Lisa on her personal website here: https://lisaventura.co.uk/ You can learn more about Cyber Security Unity here: https://csu.org.uk/
Nick Biasini - Threat researcher at Cisco Talos and a veteran of the highest profile cyber incidents who roasts his own coffee beans Nick Biasini leads a team of threat researchers at Cisco Talos who patrol the cutting edge of the threat landscape. Not only has he investigated some of the most significant cyberattacks in history, but he also has hands-on experience with the 1980 Olympic bobsled track. In this episode of No Password Required, Nick joins Carlton Fields’s Jack Clabby and KnowBe4’s Kayley Melton to talk about his start as an FAA security analyst, some of his top discoveries during his threat research days, and the value of getting comfortable with failure. He shares his story of investigating the SamSam ransomware and his predictions for how AI might be able to support businesses in the future. Kayley and Jack break down the $10 million reward for information leading to the arrest or conviction of alleged Russian ransomware affiliate Mikhail Matveev. You can connect with Nick on Twitter here: @infosec_nick Check it out on YouTube here: https://tinyurl.com/4mtbd4ed
Gotham Sharma is a cybersecurity consultant, writer, educator, and stand-up comic. He’s on a mission to help folks build successful careers in information security through his latest venture, AccessCyber.co. In his training, Gotham leverages humor to make security awareness and education relatable to audiences of various technical backgrounds. Inspired by satire publications like The Onion, Gotham recently launched an infosec magazine called Brute Farce Attack, one of the many projects on his growing list of side hustles. In this episode of No Password Required, Gotham joins Carlton Fields’s Jack Clabby and KnowBe4’s Kayley Melton to share how his life changed after a well-intentioned anti-mentor inspired him. Jack and Kayley discuss IARPA’s plan to hack hackers’ brains as the agency considers reimagining security with cyberpsychology-informed network defenses. You can connect with Gotham on Twitter here: @GothamJSharma You can learn more about AccessCyber here: https://accesscyber.co/ You can learn more about Brute Farce Attack here: https://www.brutefarceattack.com/
loading