DiscoverNo Password Required
No Password Required
Claim Ownership

No Password Required

Author: Cyber Florida

Subscribed: 39Played: 279
Share

Description

The No Password Required Podcast connects with the cybersecurity industry’s most interesting professionals and shares their stories. No Password Required covers a variety of tech topics, from the cyber-related challenges facing law enforcement to the advent of quantum computing, this podcast explores the people and topics at the forefront of the field.
62 Episodes
Reverse
SummaryIn this episode, Jack Clabby and Kayley Melton discuss their conversation with Reginald Andre, a cybersecurity expert and CEO of ARK Solvers. They explore themes of mentorship, the evolution of cybersecurity businesses, the impact of AI, team culture, and community engagement. Andre shares his journey from aspiring English teacher to successful entrepreneur, emphasizing the importance of mentorship and personal growth in the cybersecurity field. In this engaging conversation, the speakers delve into the importance of mentorship, innovative teaching methods, and the role of AI in personal and professional development. They share personal anecdotes about mentoring students and children, emphasizing hands-on learning and real-world applications. The discussion also touches on the fun and insightful lifestyle polygraph segment, where the guest answers quirky questions that reveal his personality and approach to challenges.TakeawaysAndre is a natural mentor who emphasizes actionable advice.The importance of building a fantasy board of directors.Reginald's journey from CompUSA to CEO of ARK Solvers.The shift from IT to cybersecurity in business.AI's growing role in cybersecurity and business efficiency.Hiring based on personality and cultural fit over technical skills.Encouraging a culture of learning from mistakes.The impact of community engagement on personal growth.The significance of mentorship in shaping careers.Raising awareness on critical social issues like human trafficking. Mentorship can significantly impact a student's career trajectory.Hands-on learning is more effective than traditional lectures.Building a resume starts with taking initiative in school activities.AI can serve as a valuable tool for decision-making and mentorship.Creating a community around learning can enhance educational experiences.Students should actively seek internships and opportunities before graduation.Innovative teaching methods can fill gaps in traditional education systems.Personal anecdotes can illustrate the effectiveness of mentorship.Engaging with technology early can lead to better career prospects.Networking and building relationships are crucial for professional growth.TitlesMentorship in Cybersecurity: Lessons from Reginald AndreThe Evolution of Cybersecurity: From IT to AIBuilding a Strong Team Culture in CybersecurityCommunity Engagement: Making a Difference Beyond BusinessSound Bites"Andre is such a natural mentor.""I built my fantasy board of directors.""I had to pivot my business.""AI is not going to take your job.""I always leave him with something.""He was actually building his resume.""Everything has to be hands-on.""I would do Too Fast Too Furious.""You'd be tasked with AI education."Chapters00:00 Introduction to Cybersecurity Mentorship01:56 The Journey of Reginald Andre05:58 From IT to Cybersecurity: A Business Evolution11:55 The Impact of AI on Cybersecurity17:52 Building a Strong Team Culture22:05 Community Engagement and Personal Growth27:39 Mentorship and Impact30:21 Innovative Teaching Approaches34:04 Lifestyle Polygraph: Fun and Insightful Questions
keywordscybersecurity, leadership, startups, failure, vendor trust, HACKERverse, communication, investment, innovation, beginner's mindset, job search, LinkedIn, networking, AI, personal branding, cybersecurity, lifestyle polygraph, superheroes, career advice, mentorshipsummaryIn this episode of No Password Required, host Jack Clabby and co-host Kaylee Melton engage in a thought-provoking conversation with Mariana Padilla, co-founder and CEO of HACKERverse.AI. The discussion revolves around the importance of embracing failure as a learning opportunity, the role of leadership in fostering a positive work environment, and the challenges faced in the cybersecurity vendor landscape. Mariana shares her insights on the need for better communication in the industry and the importance of a beginner's mindset in driving innovation. The conversation also touches on the future of investment in cybersecurity and the necessity of rebuilding trust within the industry. In this engaging conversation, Mariana discusses the challenges of job searching in the current landscape dominated by AI and the importance of networking and personal branding. She emphasizes that building trust and connections is crucial in the cybersecurity field. The discussion transitions into a fun segment called the lifestyle polygraph, where Mariana shares her thoughts on superheroes and their relevance to personal and professional growth. The episode concludes with Mariana providing insights on how to connect with her and her work.takeawaysEmbracing failure is crucial for personal and professional growth.Leadership should focus on transparency and learning from mistakes.A beginner's mindset can lead to innovative solutions in cybersecurity.The cybersecurity industry struggles with communication and trust.Venture capital influences the direction of cybersecurity startups.Sustainable business practices are essential for long-term success.The sales process in cybersecurity needs to be more efficient.Understanding vendor interoperability is critical for security.Cybersecurity vendors must demonstrate product viability effectively.The industry must evolve to meet the rapid pace of technological change. You're competing against AI for some of these jobs.Networking is so, so, so important.The online application system has been dying for quite some time.Your personal brand matters and you have to have one.Conferences are a prime opportunity to peacock a little bit.Batman has real feelings and real demons.The correct answer is Star Trek.Margot Robbie, I really like her.You're on the fantasy cybersecurity squad.Come follow me on LinkedIn for lots of shenanigans.titlesEmbracing Failure in CybersecurityThe Importance of Leadership in StartupsInnovating with a Beginner's MindsetHACKERverse: Revolutionizing CybersecuritySound Bites"It's all about leadership and leading by example.""I think we have a gap here.""We should focus on sustainably built businesses.""It's just a bunch of nonsense.""Networking is so, so, so important.""Batman has real feelings and real demons.""The correct answer is Star Trek.""Margot Robbie, I really like her.""You're on the fantasy cybersecurity squad."Chapters 00:00 Introduction to Cybersecurity Conversations02:00 Embracing Failure as a Learning Opportunity06:02 The Role of Leadership in Startups09:00 The Value of a Beginner's Mindset11:58 Understanding HACKERverse's Mission13:59 Challenges in the Cybersecurity Vendor Landscape17:08 Shaking Up the Status Quo in Cybersecurity21:52 The Future of Investment in Cybersecurity24:36 Navigating Job Searches in the Age of AI29:35 The Importance of Personal Branding30:23 Lifestyle Polygraph: Fun and Games39:05 Superheroes and Their Lessons43:45 Connecting with Mariana: Final Thoughts
summaryIn this episode of No Password Required, host Jack Clabby and guest Trevor Hilligoss discuss various aspects of cybersecurity, including the transition from military service to the private sector, the importance of leadership in tech, and the misconceptions surrounding cyber threats. Trevor shares insights from his career, emphasizing the need for a proactive approach to cybersecurity and the value of empowering teams to innovate and learn from failures. In this engaging conversation, the speakers delve into memorable experiences in cybersecurity, including impactful interactions and the importance of sharing knowledge. They explore personal preferences through a fun lifestyle polygraph segment, discussing walk-up songs, breakfast favorites, and nerd culture. The conversation also touches on the lighter side of cybersecurity with prank calls and the dynamics of building an escape room team. The episode concludes with contact information and an invitation to connect further.takeawaysTrevor emphasizes the importance of metaphors in understanding cybersecurity.The public often fears sophisticated threats while ignoring more common dangers.Leadership in cybersecurity should focus on empowering teams rather than micromanaging.A proactive approach in cybersecurity can prevent victimization before it occurs.Technical leaders should understand core concepts to effectively guide their teams.Misconceptions about cyber criminals often stem from Hollywood portrayals.The military experience can significantly shape leadership styles in tech.Daily life in cybersecurity involves constant learning and adaptation.Sophistication in cyber threats does not always correlate with success.Cybersecurity is about both fighting threats and fortifying defenses. Memorable interactions can lead to impactful collaborations in cybersecurity.Sharing knowledge can help mitigate cyber threats effectively.Personal preferences can reveal a lot about an individual's character.Walk-up songs can reflect one's personality and professional identity.Breakfast choices can be a blend of cultural influences and personal tastes.Building a team for an escape room requires diverse skills and personalities.Nerd culture can foster connections and shared interests among individuals.Prank calls can be a humorous way to engage with public figures.Culinary competitions highlight the absurdity of turning survival into entertainment.Networking in cybersecurity can lead to unexpected opportunities.titlesCybersecurity Connections: Memorable MomentsThe Lifestyle Polygraph: Fun and InsightsWalk-Up Songs: A Reflection of IdentityBreakfast Favorites: A Culinary JourneySound Bites"Tell them what needs to get done.""Empower your people to fail.""We can stop that identity theft.""I was in Europe giving a talk.""I sent him everything that we had.""I would get Jack Sparrow.""I love Star Wars.""I would call Gordon Ramsey."Chapters00:00 Introduction to Cybersecurity Insights02:54 Career Path and Unexpected Experiences05:55 Transitioning from Military to Cybersecurity09:07 Daily Life at Spy Cloud12:12 Leadership Philosophy and Management Style14:53 The Nature of Cyber Threats17:50 Technical Skills in Leadership20:52 Misconceptions About Cyber Criminals25:32 Memorable Cybersecurity Interactions28:12 Lifestyle Polygraph Introduction28:35 Walk-Up Songs and Personal Preferences32:07 Breakfast Favorites and Culinary Influences34:40 Building the Ultimate Escape Room Team37:36 Nerd Culture and Personal Interests39:02 Prank Calls and Culinary Competitions41:20 Closing Thoughts and Contact Information
keywordscybersecurity, zero trust, public speaking, ThreatLocker, AI threats, layered security, Rob Allen, cybersecurity insights, personal growth, industry challenges, technology, wearables, Buc-ee's, sports, DIY, tech addiction, Vision Pro, personal achievements, American culture, cybersecuritysummaryIn this episode of the No Password Required podcast, host Jack Klabby engages with cybersecurity experts Kaylee Melton and Rob Allen, discussing Rob's journey to ThreatLocker, the importance of overcoming public speaking fears, and the principles of Zero Trust security. They explore common mistakes organizations make when implementing Zero Trust, the future of cybersecurity in relation to AI threats, and the public's perception of cybersecurity incidents. The conversation also touches on the significance of layered security approaches and personal experiences in the industry, culminating in a fun lifestyle polygraph segment. In this engaging conversation, the speakers delve into their personal tech addictions, particularly focusing on extravagant purchases like the Vision Pro. They explore the future of wearable technology and its integration into daily life. The discussion shifts to the uniquely American experience of visiting Buc-ee's, a gas station that offers much more than fuel. They also debate the joy derived from sports victories versus personal achievements like hitting a hole in one. Finally, the conversation wraps up with a humorous take on the challenges of mastering DIY skills.takeawaysRob Allen's journey from engineer to Chief Product Officer at ThreatLocker showcases career growth in cybersecurity.Public speaking can be daunting, but practice and experience help overcome fears.Zero Trust is a mindset focused on security, not just a product to buy.Organizations often hesitate to adopt Zero Trust due to misconceptions about efficiency.Inertia is a major obstacle for companies considering Zero Trust implementation.AI can be a double-edged sword in cybersecurity, used for both protection and attacks.Many smaller cybersecurity incidents go unreported compared to major breaches.Layered security should involve diverse approaches, not just similar detection tools.Stress in the workplace can be managed by adopting a laid-back mindset.Mentorship plays a crucial role in personal and professional development. Some people have good addictions and some have bad ones.The Vision Pro is an expensive but amazing piece of tech.Wearable technology is becoming increasingly common.Buc-ee's is a unique and quintessentially American experience.Experiencing a sports win can be as joyful as personal achievements.DIY skills can be both challenging and rewarding.Tech purchases often lead to guilt and reflection.The future of wearables may include more practical and stylish designs.Personal experiences shape our views on technology and culture.Mastering DIY can lead to greater independence and satisfaction.titlesTech Addictions: The Price of InnovationThe Future of Wearables: Are We Ready?Buc-ee's: A Journey into American CultureSports Wins vs. Personal Achievements: What Brings More Joy?Sound Bites"It's a process, you know, start somewhere.""Deny by default, permit by exception.""Zero Trust is not a product. It's a mindset.""The beauty of Zero Trust is it's not reactive.""AI is just as likely to be used against you.""I am never going to be that guy.""Buc-ee's is the most American thing ever.""I would very much like to have a hole in one.""I would like to be good at DIY."Chapters00:00 Introduction to Cybersecurity Insights03:05 Rob Allen's Journey to ThreatLocker05:49 Overcoming Public Speaking Fears08:55 Understanding Zero Trust Security12:12 Common Mistakes in Zero Trust Implementation15:02 The Future of Zero Trust and AI Threats18:05 Public Perception of Cybersecurity21:08 Layered Security Approaches24:02 Personal Experiences and Lessons Learned26:58 Lifestyle Polygraph and Fun Questions27:11 Tech Addictions and Unnecessary Purchases32:05 The Future of Wearable Technology34:08 Experiencing Buc-ee's: The Most American Gas Station36:44 Joyful Moments: Sports Wins vs. Personal Achievements39:03 Mastering DIY Skills: A Personal Journey
keywordscybersecurity, 5G, 6G, AI, quantum computing, global collaboration, career advice, creativity, technology, Dr. Anmol AgarwalsummaryIn this episode of No Password Required, host Jack Clabby and cybersecurity expert Dr. Anmol Agarwal discuss the evolving landscape of cybersecurity, focusing on the challenges and innovations surrounding 5G and 6G networks, the integration of AI and quantum computing, and the importance of global collaboration in addressing cybersecurity threats. Dr. Agarwal shares her insights on the significance of creativity in the field, offers advice for those entering the cybersecurity space, and engages in a fun lifestyle polygraph segment that highlights her personal interests and professional aspirations.takeawaysStart posting about what you're learning immediately to gain exposure.The transition from 5G to 6G involves long-term security thinking.AI and quantum computing are complementary technologies in cybersecurity.Global collaboration is essential for effective cybersecurity solutions.Creativity is crucial in addressing emerging cybersecurity challenges.Focus on personal interests rather than peer pressure in career choices.Healthcare is a sector particularly vulnerable to AI-driven attacks.Continuous learning and sharing knowledge is vital for career growth.Security standardization is a key aspect of developing new technologies.Engagement and interaction are important in educational and professional settings.titlesNavigating the Future of CybersecurityThe 6G Security LandscapeAI and Quantum: The New FrontierCollaborative Cybersecurity: A Global PerspectiveSound Bites"Start posting about what you're learning immediately.""We're going to be thinking in a serious way.""My role specifically on this team is security standardization.""I want to work on AI security.""Security is a team effort.""AI can make mistakes as well.""Focus on what you like instead of worrying about others.""Creativity is probably the most important thing.""I would add a journalist to my cybersecurity dream team."Chapters00:00 Introduction to Cybersecurity Insights02:30 Exploring 5G and 6G Security Challenges11:10 The Intersection of AI, Quantum Computing, and Cybersecurity18:00 Global Collaboration in Cybersecurity24:57 Advice for Aspiring Cybersecurity Professionals26:48 The Role of Creativity in Cybersecurity31:27 Lifestyle Polygraph: Fun and Insightful Questions
In this conversation, Tanya Janca discusses the importance of secure coding in the cybersecurity landscape, sharing her journey and experiences as both a developer and educator. She emphasizes the need for software developers to understand security principles, the role of OWASP in providing resources, and the challenges of balancing user experience with security measures. Tanya also highlights the significance of validation in development and the implications of implied trust in cybersecurity practices.
SummaryThis conversation explores the U.S. Army's investment in cybersecurity compliance for small businesses, the importance of mentorship in the defense industry, and the unique career path of Sabrina McIntyre at KPMG. Sabrina discusses her transition from art to cybersecurity, the challenges of navigating compliance standards, and her advocacy for women in the field. The episode also touches on the intersection of art and cybersecurity, the vision for a cybersecurity museum, and fun personal insights from Zabrina's life.TakeawaysThe U.S. Army is investing in small business cybersecurity compliance.Certification programs can help defense contractors meet compliance.Creating a secure environment for small businesses is essential.Mentorship programs are crucial for small business growth.Zabrina's career path showcases the value of diverse experiences.Understanding compliance standards like PCI DSS is challenging but necessary.Being open to new opportunities can lead to fulfilling career paths.Women in Cybersecurity is making strides in community building.Creativity is important in the cybersecurity field.Cybersecurity education should be accessible to all.titlesInvesting in Cybersecurity for Small BusinessesNavigating Compliance in the Cybersecurity LandscapeZabrina McIntyre: A Unique Career JourneyEmpowering Women in CybersecuritySound Bites"Certification program for defense contractors""Largest federal government mentor-protege program""Cybersecurity maturity model is crucial""Be your own best advocate in your career""If you can see it, you can be it""We need more creative people in cybersecurity""Cybersecurity should be accessible to everyone""Umbrellas don't work in Seattle" Chapters00:00 Introduction to the Next Generation Commercial Operations Program02:51 The Importance of Cybersecurity Compliance for Small Businesses05:45 Zabrina McIntyre's Role at KPMG08:54 Zabrina's Unique Career Path11:51 Navigating Cybersecurity Standards14:48 Advice for Aspiring Cybersecurity Professionals17:58 Women in Cybersecurity: Building Community20:59 The Intersection of Art and Cybersecurity24:04 Zabrina's Vision for a Cybersecurity Museum27:02 Lifestyle Polygraph: Fun Questions with Zabrina30:09 Key Takeaways and Closing Thoughts 
summaryIn this episode, the conversation begins with a significant data breach at Star Health Insurance, affecting over 31 million individuals. The discussion delves into the complexities of insider threats, particularly focusing on the alleged involvement of the company's CISO. The episode transitions to an introduction of Dr. Sunny Ware, a web application penetration tester, who shares her journey from software development to cybersecurity. Dr. Sunny discusses her role in penetration testing, the importance of understanding application logic, and the use of AI in her work. The episode concludes with a lifestyle polygraph segment, where Dr. Sunny shares personal insights and experiences, emphasizing the importance of mentorship in cybersecurity.  takeawaysStar Health Insurance experienced a major data breach affecting millions.Insider threats are predicted to be a significant risk in 2025.Dr. Sunny Ware transitioned from software development to cybersecurity.Understanding application logic is crucial in penetration testing.AI can be a valuable tool in penetration testing.Bug bounty programs offer focused opportunities for security testing.Mentorship is important for the next generation of cybersecurity professionals.Dr. Sunny emphasizes the creativity involved in coding and security.Vulnerability disclosure programs differ from bug bounty programs.Dr. Sunny's passion for teaching and sharing knowledge is evident.titlesThe Star Health Insurance Data Breach: A Deep DiveInsider Threats: The New Face of Cybersecurity RisksMeet Dr. Sunny Ware: A Cybersecurity TrailblazerThe Art of Penetration Testing with Dr. SunnyExploring AI's Role in Cybersecuritysound bites"Star Health Insurance suffered a significant data security incident.""There's a hacker and then there's this kind of cool insider twist.""The alleged hackers claimed that Star Health's CISO facilitated the breach.""Insider threats are going to be the risk to prepare for in 2025.""I came from very humble beginnings.""I think coding is like making a painting on a blank canvas.""I want to capitalize on the experience I already have in web API.""I use AI almost every day on every pen test.""I actively do bug hunting.""I want to make sure that if there's anything I can share to help."chapters00:00 Data Breach at Star Health Insurance06:06 Insider Threats and Whistleblowers07:05 Introduction to Dr. Sunny Ware30:14 Dr. Sunny's Career Path and Penetration Testing37:00 Lifestyle Polygraph with Dr. Sunny48:55 Key Takeaways and Closing Thoughts
A new school in San Antonio called Nukudu offers a paid training program followed by a guaranteed job in cybersecurity. The program aims to address the shortage of cyber jobs and provides hands-on training to ensure candidates are prepared for the workforce. Our guest, Dr. Thomas Hyslop, an assistant professor at the University of South Florida, shares his experience in law enforcement and the importance of interagency collaboration in combating cybercrime. He also discusses the Master of Science in Cybercrime program at USF, which focuses on digital forensics and criminal investigation. The future of cybercrime is concerning as large criminal organizations are becoming more sophisticated and mimicking nation states in their capabilities. Investigating international cybercrime is challenging due to the need for cooperation between countries and the slow response times. Changes in international treaties and agreements are needed to expedite investigations. Dr. Highslip ran a museum of vintage technology and is looking for a place to house it permanently. He enjoys swimming in Mirror Lake, biking on Champs-Elysees, and running in DC for his ideal triathlon. His favorite junk food treat is Bit-O-Honey and he loves all kinds of pies. Guns N' Roses is his favorite hair metal band and his favorite song is Paradise City. He enjoys playing metal songs at social gatherings and believes that Appetite for Destruction is a timeless album. Dr. Highslip has what it takes to join the fantasy cybersecurity squad and is a force multiplier with his expertise in incident response and alternative theories for obtaining information from foreign governments.takeawaysNukudu offers a paid training program followed by a guaranteed job in cybersecurity to address the shortage of cyber jobs.Interagency collaboration is crucial in combating cybercrime, and federal law enforcement plays a significant role in stopping cybercriminals.The Master of Science in Cybercrime program at the University of South Florida focuses on digital forensics and criminal investigation.Team building and collaboration are essential skills in cybersecurity and are emphasized in the education of future cybersecurity professionals. Large criminal organizations are becoming more sophisticated and mimicking nation states in their cyber capabilities.Investigating international cybercrime is challenging due to slow response times and the need for cooperation between countries.Changes in international treaties and agreements are needed to expedite investigations.Dr. Highslip ran a museum of vintage technology and is looking for a permanent location to house it.His ideal triathlon includes swimming in Mirror Lake, biking on Champs-Elysees, and running in DC.His favorite junk food treat is Bit-O-Honey and he loves all kinds of pies.Guns N' Roses is his favorite hair metal band and Paradise City is his favorite song.Dr. Highslip has what it takes to join the fantasy cybersecurity squad and is a force multiplier with his expertise in incident response and alternative theories for obtaining information from foreign governments.titlesThe Role of Interagency Collaboration in Combating CybercrimeEmphasizing Team Building and Collaboration in Cybersecurity Education Indulging in Junk Food: Bit-O-Honey and PiesChallenges in Investigating International CybercrimeSound Bites"Nukudu offers a paid training program followed by a guaranteed job.""Dr. Thomas Hyslop led a DCIS undercover operation.""The Master of Science in Cybercrime program focuses on digital forensics and criminal investigation.""The future of cybercrime is concerning as large criminal organizations are becoming more sophisticated and mimicking nation states in their capabilities.""Investigating international cybercrime is challenging due to slow response times and the need for cooperation between countries.""Dr. Highslip ran a museum of vintage technology and is looking for a permanent location to house it."Chapters00:00 Nukudu: A New School Offering Paid Training and Guaranteed Job Placement in Cybersecurity06:21 The Role of Interagency Collaboration in Combating Cybercrime19:07 The Master of Science in Cybercrime Program at the University of South Florida25:48 Emphasizing Team Building and Collaboration in Cybersecurity Education26:42 The Future of Cybercrime27:11 Investigating International Cybercrime31:25 Preserving Vintage Technology37:30 The Ideal Triathlon43:03 Indulging in Junk Food45:23 Rocking Out with Guns N' Roses49:11 Dr. Highslip: A Valuable Addition to the Fantasy Cybersecurity Squad
SummaryKenya's efforts to enhance its cybersecurity and technological progress through partnerships with the US and major tech companies. The focus is on responsible state behavior in cyberspace and addressing mobile app security. The role of public-private partnerships in promoting a robust digital economy and infrastructure. The conversation then transitions to an interview with Maretta Morovitz, a cybersecurity expert at MITRE, discussing her career path, the importance of mentorship, and the impact of ADHD on her work. The discussion also covers MITRE Engage, which focuses on cyber denial, deception, and adversary engagement, and highlights the use of simple yet effective techniques like decoy credentials. In this conversation, Maretta Morovitz discusses the importance of thinking creatively and outside the box when it comes to cybersecurity solutions, especially for organizations with limited budgets. She emphasizes the need for simplicity and proactive measures in cybersecurity. Maretta also highlights the value of interdisciplinary collaboration in the field, involving professionals from various backgrounds such as human behavioral scientists and graphic designers. She shares a successful collaboration between MITRE and HSBC in the field of deception operations. Maretta also talks about her passion for dance and her unique talent of reciting the alphabet backwards.KeywordsKenya, cybersecurity, technological progress, partnerships, responsible state behavior, mobile app security, public-private partnerships, digital economy, infrastructure, interview, Maretta Morovitz, career path, mentorship, ADHD, MITRE Engage, cyber denial, deception, adversary engagement, decoy credentials, cybersecurity, low budget solutions, simplicity, proactive measures, interdisciplinary collaboration, deception operations, dance, talentTakeawaysKenya is forging partnerships with the US and major tech companies to enhance its cybersecurity and technological progress.The focus is on responsible state behavior in cyberspace and addressing mobile app security.Public-private partnerships play a crucial role in promoting a robust digital economy and infrastructure.Mentorship is important in career development, and having mentors who provide opportunities and support can be instrumental in success.ADHD can present challenges but also bring unique strengths to the workplace.MITRE Engage focuses on cyber denial, deception, and adversary engagement, using simple yet effective techniques like decoy credentials. Thinking creatively and outside the box is crucial in cybersecurity, especially for organizations with limited budgets.Simplicity and proactive measures are key in cybersecurity to effectively address threats.Interdisciplinary collaboration involving professionals from various backgrounds can bring new perspectives and solutions to the field.Deception operations can be a valuable tool in cybersecurity, and successful collaborations in this area have been seen between organizations like MITRE and HSBC.Passions and talents outside of cybersecurity, such as dance, can bring unique perspectives and skills to the field.Sound Bites"Sometimes the real solution is something very low tech or just kind of outside the box, low budget.""Being proactive has to be simple.""We definitely need more of that interdisciplinary approach."Chapters00:00 Kenya's Cybersecurity Partnerships03:24 Addressing Mobile App Security07:13 Interview with Maretta Morovitz11:35 Cyber Deception and Adversary Engagement29:12 The Importance of Simplicity and Proactive Measures30:07 Interdisciplinary Collaboration in Cybersecurity31:06 Successful Collaboration in Deception Operations34:44 Bringing Unique Perspectives and Skills to Cybersecurity  Follow Maretta Morovitz on LinkedIn: Maretta MorovitzFollow MITRE on Twitter: @MITREcorpLearn more about MITRE Engage: MITRE Engage
Summary The conversation discusses the extradition case of Julian Assange and the role of the US prison system in the decision. It also explores Tanya Janca's role at Semgrep and her passion for affordable cybersecurity education. Additionally, it touches on Tanya's experience in election security and the importance of transparency in the process. Tanya discusses her volunteer work with the Canadian government, where she helps educate students about cybersecurity. She talks about the importance of teaching young people about privacy, protecting digital devices, and understanding cyber threats. Tanya also mentions her involvement in the Cyber Titan competition and her efforts to promote cybersecurity as a career. She shares her experience writing the book 'Alice and Bob Learn Application Security' and her unique approach to making technical concepts accessible through stories and different learning styles. Tanya also talks about the importance of mentoring and how she has benefited from mentors throughout her career.Keywords Julian Assange, extradition, US prison system, cybersecurity education, Semgrep, election security, transparency, volunteer work, Canadian government, cybersecurity education, privacy, digital devices, cyber threats, Cyber Titan, promoting cybersecurity, career, Alice and Bob Learn Application Security, technical concepts, stories, learning styles, mentoringTakeawaysThe extradition case of Julian Assange highlights the differences in prison systems between the US and other Western democracies.Tanya Janca's role at Semgrep involves community management and education in the field of cybersecurity.Affordable cybersecurity education is crucial for organizations to effectively use security tools and integrate them into their programs.Election security requires centralization, knowledge sharing, and transparency to ensure public trust in the process. Volunteer work with the Canadian government focuses on educating students about cybersecurity, including topics like privacy and protecting digital devices.Promoting cybersecurity as a career is important, and initiatives like the Cyber Titan competition help engage high school students in learning about cybersecurity.Tanya's book 'Alice and Bob Learn Application Security' uses stories and different learning styles to make technical concepts accessible.Mentoring is valuable for personal and professional growth, and Tanya has both benefited from mentors and become a mentor herself.TitlesThe Importance of Transparency in Election SecurityCybersecurity as a Career: The Cyber Titan CompetitionThe Value of Mentoring: Tanya's Experience as a Mentor and MenteeSound Bites"I am head of community and education, which is a role they made up just for me.""They decided, I think in 2017, we need to make a task force to make sure they know cyber.""Defenders need to understand attacks or they can't be good at defending, right? Like we're teaching them ethics as we teach them how to hack.""Alice and Bob are going to learn secure coding this time."Chapters00:00 The Extradition Case of Julian Assange08:18 Affordable Cybersecurity Education at Semgrep30:40 Tanya's Volunteer Work with the Canadian Government31:35 Promoting Cybersecurity as a Career34:02 Making Technical Concepts Accessible: 'Alice and Bob Learn Application Security'39:45 The Value of Mentoring
SummaryIn this episode of the No Password Required podcast, host Jack Clabby and co-host Kayley Melton interview Tamiko Fletcher, the CISO at Kennedy Space Center. Tamiko shares her journey from a small town in South Carolina to working at NASA and discusses her role as a CISO. She emphasizes the importance of mentorship, outreach, and diversity in the cybersecurity field. Tamiko also talks about the unique challenges of cybersecurity at NASA, such as patching during launches and balancing innovation with security. She emphasizes the need to know and learn about individuals' strengths, interests, and motivations in order to effectively place them on teams and utilize their skills. Tamiko also shares her experiences working at NASA and the changes she has witnessed over the years, including the evolution of IT and the increasing diversity at the Kennedy Space Center. She highlights the excitement and pride she feels when witnessing a launch and the impact of NASA's work on the world.KeywordsNASA, cybersecurity, CISO, career trajectory, mentorship, outreach, diversity, patching, innovation, security, NASA, Kennedy Space Center, cybersecurity, teamwork, understanding people, IT evolution, diversity, launches, personal experiences, imposter syndrome, work-life balance, advocating for oneself, UFOsTakeawaysTamiko Fletcher shares her journey from a small town in South Carolina to working at NASA as the CISO at Kennedy Space Center.She highlights the importance of mentorship, outreach, and diversity in the cybersecurity field.Tamiko discusses the unique challenges of cybersecurity at NASA, such as patching during launches and balancing innovation with security.She emphasizes the need for flexibility and adaptability in the ever-changing cybersecurity landscape. Understanding and valuing people is crucial in the workplace, as it allows for effective team placement and utilization of individual skills.The evolution of IT and the increasing diversity at NASA's Kennedy Space Center have been significant changes over the years.Witnessing a launch at NASA is an exciting and prideful experience, reminding employees of the impact of their work.Advocating for oneself and setting boundaries is important for maintaining work-life balance and overall well-being.Sound Bites"I'm from a small town called Manning, South Carolina. If you look it up on the map, it's near Travel America. It's probably the best thing we got going for it, honestly.""Success stories like yours are common at NASA. And it's also based on one's definition of success, right? So everyone has their own definition of what success is for them.""I try to actually know and learn people... because I want to understand what makes them tick so I know where to place them on a team.""We are human first and then we are who our job is. And I want to be able to utilize that person, that whole person, what makes them happy, what makes them excited to come in every day.""I have a vast variety of folks on the team who help get cyber done." Chapters00:00 Introduction and Welcome to the Podcast08:00 Education and Career Trajectory25:48 Challenges and Innovations in Cybersecurity at NASA34:4 8Building a Team and Emphasizing Diversity41:30 The Diversity of the Cyber Team at NASA54:25 Instilling Values in Teams to Change the Work Environment
SummaryRoman Sanikov, is the president of Constellation Cyber and specializes in cyber threat intelligence. In this episode, Roman discusses the importance of collaboration and transparency in the cybersecurity industry, particularly in combating ransomware attacks. He also emphasizes the need for a holistic approach to cybersecurity, involving education and empowerment for both employees and consumers. In this episode, Roman Reinhart shares his experiences as an undercover agent in the cybercrime world. He discusses maintaining a persona, dealing with forum behavior, and memorable arrests. He also emphasizes the importance of redemption and second chances. Roman also talks about his involvement with Helpster USA, an organization dedicated to providing life-saving treatment to young people in developing economies. He shares his hobbies of mushrooming and highlights the satisfying moments at work. Finally, he reflects on the cultural differences he experienced after moving overseas.TakeawaysPig butchering schemes are a significant cause of financial losses globally, and it is important to approach the topic with compassion and nuance.Many scammers involved in these schemes are forced into this life against their will, either through human trafficking or being lured into it with false promises.Collaboration and transparency are crucial in the cybersecurity industry to effectively combat ransomware attacks and mitigate their secondary and tertiary impacts.A holistic approach to cybersecurity, involving education and empowerment for employees and consumers, is necessary to create a more secure environment. Maintaining a persona in the cybercrime world requires careful observation and adaptation.Memorable arrests can lead to redemption and second chances for individuals involved in cybercrime.Helpster USA provides life-saving treatment to young people in developing economies.Mushrooming is a rewarding hobby that allows for outdoor exploration and collection.Satisfying moments at work include helping clients have eureka moments and making positive changes.Cultural differences, such as politeness, can take time to understand and adapt to.Chapters00:00 Introduction to Pig Butchering Schemes (opening conversation)02:18 Online Scams and Exploitation03:41 Forced Labor and Human Trafficking04:41 Approaching Scams with Compassion05:39 Guest Introduction: Roman Sanikov07:01 Roman's Role at Constellation Cyber08:22 Promoting Transparency in Ransomware Incidents10:17 Mitigating Secondary and Tertiary Impacts of Ransomware Attacks11:14 The Ripple Effect of Ransomware Attacks13:10 The Importance of Collaboration in Cybersecurity14:58 Roman's Career Path and Background19:34 Educating and Empowering Employees and Consumers21:28 Avoiding Victim-Blaming in Cybersecurity24:16 The Need for Collaboration and Transparency in the Industry25:10 Balancing Non-Traditional Pursuits with College26:37 Undercover Work and Building Relationships33:07 Maintaining a Persona36:25 Dealing with Forum Behavior38:18 Memorable Arrests41:25 Redemption and Second Chances45:13 Helpster USA48:16 Eccentricities of NHL Players50:56 Life's Unexpected Moments56:19 The Joy of Mushrooming58:43 Satisfying Moments at Work01:01:04 Learning Politeness in America
SummaryIn this episode, Jo Anna joins Carlton Fields P.A. Jack Clabby and KnowBe4’s VP of Remote Publishing Teams Kayley Melton to tell the story of how her career has changed since starting at Rice University 17 years ago. From her early days as a receptionist at a hair salon to her current role as a security analyst, Jo Anna shares her journey in the cyber world and her fascination with artificial intelligence, stemming from her compliance-related responsibilities. Emphasizing a realism-based view on AI, she passionately advocates for a comprehensive understanding of AI, emphasizing that it’s neither inherently good nor bad.TakeawaysStolen recordings from popular artists can sell for high prices on the black market.Cyber criminals are involved in various illegal activities, including stealing cryptocurrency and trading stolen, unreleased rap recordings.Law enforcement plays a crucial role in investigating and apprehending cyber criminals, and these crimes can have real-life consequences.The intersection of cybersecurity and AI presents challenges in assessing the risks associated with AI technologies.Community outreach and education are important in promoting cybersecurity awareness and encouraging more people to pursue careers in the field.Chapters00:00 Stolen Recordings and Cyber Criminals01:29 Arrest of a Florida Man and Stolen Rap Recordings02:27 The Allegations and Nicknames03:26 The Connection Between Cyber Crime and Rap Music04:23 Real-Life Consequences of Cybersecurity Crimes05:52 The Role of Law Enforcement in Cybersecurity Crimes06:50 Introduction of Guest Joanna Parker-Martin07:18 Joanna's Role at Rice University08:15 Protecting Data at Rice University09:08 Joanna's Journey into Cybersecurity10:04 Overcoming Challenges and Changing Career Paths18:14 Joanna's Interest in Artificial Intelligence19:22 The Intersection of Cybersecurity and AI20:46 The Challenges of Assessing AI Risk21:13 The Inevitability of AI22:37 The Risks of Facial Recognition Technology27:26 Joanna's Involvement with WiCys29:48 Community Outreach and Cybersecurity Education30:10 Misconceptions About Cybersecurity Professionals32:32 The Lifestyle Polygraph43:35 Joanna's Preference for Sponge Cake in Strawberry Shortcake
SummaryThe conversation discusses the arrest of Ola Segun Simpson Adagorin, a Nigerian national facing US federal charges for a business email compromise scheme. The collaboration between the FBI and Ghana is highlighted, along with the role of the legal attache job in solving crimes with international impact. The scheme and indictment details are explored, emphasizing the sophistication of the attack. Dr. Diana Burley, Vice Provost for Research and Innovation at American University, shares insights on cybersecurity education and workforce readiness. The importance of understanding human behavior in cybersecurity is discussed, along with strategies for engaging in conversations and addressing the search for cyber unicorns. In this episode, the importance of password security and the various methods to enhance it are discussed. The conversation covers common password mistakes, the use of password managers, multi-factor authentication, biometric authentication, and the future of password security.TakeawaysCollaboration between law enforcement agencies is crucial in solving cybercrime cases with international implications.Understanding human behavior is essential in addressing cybersecurity challenges and shaping effective policies.Digital literacy and foundational cybersecurity skills should be integrated into education across disciplines.Creating a culture of cybersecurity requires a balance between rules and creativity, and a focus on psychological safety.Engaging in conversations with strangers can be facilitated by finding common interests and making personal connections. Create strong and unique passwords for each online account.Avoid common password mistakes such as using personal information or easily guessable patterns.Consider using a password manager to securely store and generate passwords.Enable multi-factor authentication whenever possible for an added layer of security.Biometric authentication, such as fingerprint or facial recognition, can provide convenient and secure access to devices and accounts.Passwordless authentication methods, such as biometrics or hardware tokens, may become more prevalent in the future.Stay informed about emerging technologies and best practices in password security.Chapters00:00 Introduction and Arrest of Ola Segun Simpson Adagorin01:24 Collaboration between FBI and Ghana03:15 Scheme and Indictment Details04:44 Legal Attache Job and Collaboration06:10 Deterrence and Sealed Indictments07:36 Introduction of Dr. Diana Burley08:31 Dr. Burley's Background and Role at American University09:23 Interest in Cybersecurity and Technology10:21 American University's Role in Educating Policymakers12:15 Engaging with Leaders and Shaping Policy13:36 Engaging with Students and Future Leaders14:28 American University's Focus on Policy and Research15:27 Misconceptions about the Cybersecurity Workforce16:23 Digital Literacy and Foundational Cybersecurity Skills18:45 Retaining Skilled Members in the Academic Environment19:43 Benefits of Engaging as a University Faculty Member20:37 Understanding Human Behavior in Cybersecurity22:05 Insights from Research on Human Behavior23:25 Understanding Employee Behavior in Cybersecurity24:47 Creating a Culture of Cybersecurity27:08 Strategies for Initiating Conversations with Strangers31:50 The Cyber Unicorn Project35:08 Addressing the Search for Cyber Unicorns41:45 Lifestyle Polygraph50:57 Understanding Irrational Behavior and Self-Awareness53:37 Engaging in Conversations with Strangers02:30 The Importance of Password Security10:15 Common Password Mistakes18:45 Password Managers27:10 Multi-Factor Authentication35:40 Biometric Authentication44:20 Passwordless Authentication52:30 Future of Password Security58:21 Conclusion
SummaryIn this episode, Jack Clabby and Kayley Melton discuss the upcoming Sunshine Cyber Conference and their collaboration with Winn Schwartau. They also talk about the importance of diverse cybersecurity talent and their plans for a joint session at the conference. The hosts then interview Lisa Plaggemier, the executive director at the National Cybersecurity Alliance, who shares her career journey and the role of creativity and curiosity in cybersecurity. They also discuss the impact of COVID-19 on the cybersecurity industry and the importance of humor and satire in cybersecurity training. The episode concludes with a lifestyle polygraph segment. In this episode, the conversation covers various topics related to comedy, storytelling, and implementing change in organizations. The power of the internet is discussed, highlighting the potential consequences of online content. The guest shares her favorite comedy movies, emphasizing the comedic element in her expertise. The use of humor in training and awareness programs is explored, along with the challenges of implementing change in organizations. Dealing with roadblocks in security and the passion for security awareness are also discussed. The episode concludes with information on how to get in touch with the guest and a recap of what was learned. TakeawaysThe Sunshine Cyber Conference features keynote speakers from the No Password Required podcast, including Winn Schwartau.The hosts will be doing their first on-site remote recording at the Sunshine Cyber Conference, featuring keynote speaker Tamiko Fletcher.The National Cybersecurity Alliance focuses on training and awareness, using creativity and humor to engage and educate people.Comedy movies, such as Monty Python and the Holy Grail, can be a source of expertise and inspiration.Humor can be effectively used in training and awareness programs to engage and educate participants.Implementing change in organizations can be challenging, but finding allies and overcoming roadblocks is essential. Chapters00:00 Introduction01:28 Fishing for Potential, the RTFM Guide to Diverse Cybersecurity Talent02:25 Live On-Site Remote Recording and Keynote Speakers03:51 Sunshine Cyber Conference and Registration04:46 Interview with Lisa Plaggemier05:15 Background and Role at the National Cybersecurity Alliance05:53 Transition to Security and Marketing Collaboration06:22 Incident Response and Training and Awareness07:20 Leadership and Skills in Cybersecurity08:18 Kubikle Series and Creativity in Security09:17 Curiosity and Creativity in Cybersecurity10:48 Naming and Shaming in Pen Tests and Phishing Testing11:41 DDoS Attack and Incident Response12:38 Neurodiversity and Cybersecurity13:21 Leading a Team During COVID-1914:21 Creating Engaging Training Content15:19 Global Data and Data Privacy Laws16:18 Humor and Satire in Cybersecurity Training18:47 Kubikle Series and Satire in Cybersecurity20:41 Creating Kubikle Series and Future Plans23:03Trust in Password Managers24:22 The Importance of Curiosity in Cybersecurity25:52 The Oh Behave Report and Behavioral Science26:50 Communicating Security Information Effectively28:44 Naming and Shaming in Phishing Testing29:39 Accepting Risk and Escalation Plans30:38 The Role of Security Teams and HR32:35 Building Trust in Password Managers33:32 Global Data and Cybersecurity Awareness36:51 The Importance of Curiosity in Cybersecurity Hiring40:03 The Underground Student-Led Newspaper41:12 The Significance of Curiosity and Creativity in Career50:44 The Power of the Internet51:14 Favorite Comedy Movies52:12 Using Humor in Training and Awareness53:38 Implementing Change in Organizations54:55 Dealing with Roadblocks in Security55:45 Passion for Security Awareness56:06 How to Get in Touch56:37 What Was Learned57:11 Closing Remarks
Jayson Street — Chief Adversarial Officer at Secure Yeti, a DEF CON Groups Global Ambassador, and a world-class awkward hugger Jayson Street, the dynamic Chief Adversarial Officer at Secure Yeti, has worn many masks throughout his life and career. He was once named a “World-Class Hacker” on the National Geographic series "Breakthrough Cyber-Terror," but he prefers the simpler title of Hacker, Helper, and Human. In this episode, Jayson joins Carlton Fields P.A.’s Jack Clabby and KnowBe4’s VP of Remote Publishing Teams Kayley Melton to talk about his journey of self-discovery that led him from being an award-winning janitor at McDonald's to one of the world’s most infamous ethical hackers. From his early childhood, Jayson has embraced hacking as a way of life, embodying the spirit of relentless exploration, innovation, and resilience. Like our favorite co-host Kayley, Jayson uncovered a new layer of his identity in his adulthood when he discovered that he is neurodivergent. He dives deep into how this new understanding altered his perception of himself, allowed him to embrace the various “masks” he wears throughout life, and discovered that his unique mind is actually his superpower. He also shares extraordinary stories of how he gained entry into some of the hardest-to-access cyber targets in the world. To start off the show, Jack and Kayley talk about the celebrity that’s topping the Hacker Celebrity Hot List as the celeb whose name is used most by cybercriminals when creating online scams. Hint: he’s just Ken… You can follow Jayson on LinkedIn here: https://www.linkedin.com/in/jstreet/ You can follow Jayson on Twitter here: @jaysonstreet You can learn more about Jayson here: https://jaysonestreet.com You can learn more about Secure Yeti here: https://www.secureyeti.com/
Kristin Demoranville — CEO and Founder of AnzenSage, defender of the food sector, and friend to primates What is the role of cybersecurity in food safety? Kristin Demoranville, CEO and Founder of AnzenSage, is committed to shielding the food sector from potential cybersecurity threats and ensuring the resilience of the entire food supply chain. Her dedication is not just a professional pursuit; it's a mission to prevent any compromise to public health. In this episode, Carlton Fields Cybersecurity Attorney Jack Clabby and No Password Required producer Rex Wilson speak with Kristin about everything from the deployment of autonomous tractors to the secure refrigeration of airport food, and Kristin sheds light on the other facets of daily life that are linked to the food supply chain. Kristen also shares how her love for wildlife led to her working with primates at the Louisville Zoo before making the transition into cybersecurity, and the value that podcasting has brought to her life. Kristen’s podcast, the Bites & Bytes Podcast, is her platform for discussing cybersecurity and food safety, and is recommended listening for fans of No Password Required. Bites & Bytes has fast become a medium for Kristin to share insights, connect with audiences, and explore the intersections of her diverse interests. Jack and Rex also delve into the intricacies of the Environmental Protection Agency's recent decision not to include cybersecurity in water system audits, and the questions this may raise about the security of water utility infrastructure. You can follow Kristin on LinkedIn here: https://www.linkedin.com/in/demoranvillekristin/ You can follow Kristin on Twitter here: @demokris You can learn more about AnzenSage here: https://www.anzensage.com/
Jessica Gulick — Founder and Commissioner of the US Cyber Games, CEO of the cyber marketing firm Katzcy, and someone who values perseverance over perfection Jessica Gulick is a woman of many trades. She is the Founder and CEO of the cyber marketing firm Katzcy, the Founder and Commissioner of the US Cyber Games, and a trailblazer who is working to make cybersecurity a sport that thrives. In this episode, Jessica joins Carlton Fields P.A.’s Jack Clabby and KnowBe4’s Kayley Melton to share her experiences as a female entrepreneur and the role that perseverance has played throughout her career. She also talks about the inception of the US Cyber Games, its commitment to bringing together elite cyber athletes, coaches, and industry leaders, and the purpose she hopes it will serve in the cyber world. Jack and Kayley also discuss the recent developments of Droidish, which may sound like a new Star Trek language but is actually the language being developed by the US military to allow AI drones to communicate with one another to become useful “tools” for many different purposes. You can follow Jessica on LinkedIn here: https://www.linkedin.com/in/jessicagulick/ You can follow Jessica on Twitter here: @CyberRiskLady You can learn more about US Cyber Games here: https://www.playcyber.com/
loading
Comments