Episodios

  • No Password Required Podcast Episode 50 — Tanya Janca
    May 28 2024

    Summary

    The conversation discusses the extradition case of Julian Assange and the role of the US prison system in the decision. It also explores Tanya Janca's role at Semgrep and her passion for affordable cybersecurity education. Additionally, it touches on Tanya's experience in election security and the importance of transparency in the process. Tanya discusses her volunteer work with the Canadian government, where she helps educate students about cybersecurity. She talks about the importance of teaching young people about privacy, protecting digital devices, and understanding cyber threats. Tanya also mentions her involvement in the Cyber Titan competition and her efforts to promote cybersecurity as a career. She shares her experience writing the book 'Alice and Bob Learn Application Security' and her unique approach to making technical concepts accessible through stories and different learning styles. Tanya also talks about the importance of mentoring and how she has benefited from mentors throughout her career.

    Keywords

    Julian Assange, extradition, US prison system, cybersecurity education, Semgrep, election security, transparency, volunteer work, Canadian government, cybersecurity education, privacy, digital devices, cyber threats, Cyber Titan, promoting cybersecurity, career, Alice and Bob Learn Application Security, technical concepts, stories, learning styles, mentoring

    Takeaways

    • The extradition case of Julian Assange highlights the differences in prison systems between the US and other Western democracies.
    • Tanya Janca's role at Semgrep involves community management and education in the field of cybersecurity.
    • Affordable cybersecurity education is crucial for organizations to effectively use security tools and integrate them into their programs.
    • Election security requires centralization, knowledge sharing, and transparency to ensure public trust in the process. Volunteer work with the Canadian government focuses on educating students about cybersecurity, including topics like privacy and protecting digital devices.
    • Promoting cybersecurity as a career is important, and initiatives like the Cyber Titan competition help engage high school students in learning about cybersecurity.
    • Tanya's book 'Alice and Bob Learn Application Security' uses stories and different learning styles to make technical concepts accessible.
    • Mentoring is valuable for personal and professional growth, and Tanya has both benefited from mentors and become a mentor herself.

    Titles

    • The Importance of Transparency in Election Security
    • Cybersecurity as a Career: The Cyber Titan Competition
    • The Value of Mentoring: Tanya's Experience as a Mentor and Mentee

    Sound Bites

    • "I am head of community and education, which is a role they made up just for me."
    • "They decided, I think in 2017, we need to make a task force to make sure they know cyber."
    • "Defenders need to understand attacks or they can't be good at defending, right? Like we're teaching them ethics as we teach them how to hack."
    • "Alice and Bob are going to learn secure coding this time."

    Chapters

    00:00 The Extradition Case of Julian Assange

    08:18 Affordable Cybersecurity Education at Semgrep

    30:40 Tanya's Volunteer Work with the Canadian Government

    31:35 Promoting Cybersecurity as a Career

    34:02 Making Technical Concepts Accessible: 'Alice and Bob Learn Application Security'

    39:45 The Value of Mentoring

    Más Menos
    1 h y 1 m
  • No Password Required Podcast Episode 49 — Tamiko Fletcher LIVE from Sunshine Cyber Con
    Apr 30 2024

    Summary

    In this episode of the No Password Required podcast, host Jack Clabby and co-host Kayley Melton interview Tamiko Fletcher, the CISO at Kennedy Space Center. Tamiko shares her journey from a small town in South Carolina to working at NASA and discusses her role as a CISO. She emphasizes the importance of mentorship, outreach, and diversity in the cybersecurity field. Tamiko also talks about the unique challenges of cybersecurity at NASA, such as patching during launches and balancing innovation with security.

    She emphasizes the need to know and learn about individuals' strengths, interests, and motivations in order to effectively place them on teams and utilize their skills. Tamiko also shares her experiences working at NASA and the changes she has witnessed over the years, including the evolution of IT and the increasing diversity at the Kennedy Space Center. She highlights the excitement and pride she feels when witnessing a launch and the impact of NASA's work on the world.

    Keywords

    NASA, cybersecurity, CISO, career trajectory, mentorship, outreach, diversity, patching, innovation, security, NASA, Kennedy Space Center, cybersecurity, teamwork, understanding people, IT evolution, diversity, launches, personal experiences, imposter syndrome, work-life balance, advocating for oneself, UFOs

    Takeaways

    • Tamiko Fletcher shares her journey from a small town in South Carolina to working at NASA as the CISO at Kennedy Space Center.
    • She highlights the importance of mentorship, outreach, and diversity in the cybersecurity field.
    • Tamiko discusses the unique challenges of cybersecurity at NASA, such as patching during launches and balancing innovation with security.
    • She emphasizes the need for flexibility and adaptability in the ever-changing cybersecurity landscape. Understanding and valuing people is crucial in the workplace, as it allows for effective team placement and utilization of individual skills.
    • The evolution of IT and the increasing diversity at NASA's Kennedy Space Center have been significant changes over the years.
    • Witnessing a launch at NASA is an exciting and prideful experience, reminding employees of the impact of their work.
    • Advocating for oneself and setting boundaries is important for maintaining work-life balance and overall well-being.

    Sound Bites

    • "I'm from a small town called Manning, South Carolina. If you look it up on the map, it's near Travel America. It's probably the best thing we got going for it, honestly."
    • "Success stories like yours are common at NASA. And it's also based on one's definition of success, right? So everyone has their own definition of what success is for them."
    • "I try to actually know and learn people... because I want to understand what makes them tick so I know where to place them on a team."
    • "We are human first and then we are who our job is. And I want to be able to utilize that person, that whole person, what makes them happy, what makes them excited to come in every day."
    • "I have a vast variety of folks on the team who help get cyber done."

    Chapters

    00:00 Introduction and Welcome to the Podcast

    08:00 Education and Career Trajectory

    25:48 Challenges and Innovations in Cybersecurity at NASA

    34:4 8Building a Team and Emphasizing Diversity

    41:30 The Diversity of the Cyber Team at NASA

    54:25 Instilling Values in Teams to Change the Work Environment

    Más Menos
    1 h y 12 m
  • No Password Required Podcast Episode 48 — Roman Sannikov
    Mar 26 2024

    Summary

    Roman Sanikov, is the president of Constellation Cyber and specializes in cyber threat intelligence. In this episode, Roman discusses the importance of collaboration and transparency in the cybersecurity industry, particularly in combating ransomware attacks. He also emphasizes the need for a holistic approach to cybersecurity, involving education and empowerment for both employees and consumers. In this episode, Roman Reinhart shares his experiences as an undercover agent in the cybercrime world. He discusses maintaining a persona, dealing with forum behavior, and memorable arrests. He also emphasizes the importance of redemption and second chances. Roman also talks about his involvement with Helpster USA, an organization dedicated to providing life-saving treatment to young people in developing economies. He shares his hobbies of mushrooming and highlights the satisfying moments at work. Finally, he reflects on the cultural differences he experienced after moving overseas.

    Takeaways

    • Pig butchering schemes are a significant cause of financial losses globally, and it is important to approach the topic with compassion and nuance.
    • Many scammers involved in these schemes are forced into this life against their will, either through human trafficking or being lured into it with false promises.
    • Collaboration and transparency are crucial in the cybersecurity industry to effectively combat ransomware attacks and mitigate their secondary and tertiary impacts.
    • A holistic approach to cybersecurity, involving education and empowerment for employees and consumers, is necessary to create a more secure environment. Maintaining a persona in the cybercrime world requires careful observation and adaptation.
    • Memorable arrests can lead to redemption and second chances for individuals involved in cybercrime.
    • Helpster USA provides life-saving treatment to young people in developing economies.
    • Mushrooming is a rewarding hobby that allows for outdoor exploration and collection.
    • Satisfying moments at work include helping clients have eureka moments and making positive changes.
    • Cultural differences, such as politeness, can take time to understand and adapt to.

    Chapters

    00:00 Introduction to Pig Butchering Schemes (opening conversation)

    02:18 Online Scams and Exploitation

    03:41 Forced Labor and Human Trafficking

    04:41 Approaching Scams with Compassion

    05:39 Guest Introduction: Roman Sanikov

    07:01 Roman's Role at Constellation Cyber

    08:22 Promoting Transparency in Ransomware Incidents

    10:17 Mitigating Secondary and Tertiary Impacts of Ransomware Attacks

    11:14 The Ripple Effect of Ransomware Attacks

    13:10 The Importance of Collaboration in Cybersecurity

    14:58 Roman's Career Path and Background

    19:34 Educating and Empowering Employees and Consumers

    21:28 Avoiding Victim-Blaming in Cybersecurity

    24:16 The Need for Collaboration and Transparency in the Industry

    25:10 Balancing Non-Traditional Pursuits with College

    26:37 Undercover Work and Building Relationships

    33:07 Maintaining a Persona

    36:25 Dealing with Forum Behavior

    38:18 Memorable Arrests

    41:25 Redemption and Second Chances

    45:13 Helpster USA

    48:16 Eccentricities of NHL Players

    50:56 Life's Unexpected Moments

    56:19 The Joy of Mushrooming

    58:43 Satisfying Moments at Work

    01:01:04 Learning Politeness in America

    Más Menos
    1 h y 6 m
  • No Password Required Podcast Episode 47 — Jo Anna Parker Martin
    Feb 27 2024

    Summary

    In this episode, Jo Anna joins Carlton Fields P.A. Jack Clabby and KnowBe4’s VP of Remote Publishing Teams Kayley Melton to tell the story of how her career has changed since starting at Rice University 17 years ago. From her early days as a receptionist at a hair salon to her current role as a security analyst, Jo Anna shares her journey in the cyber world and her fascination with artificial intelligence, stemming from her compliance-related responsibilities. Emphasizing a realism-based view on AI, she passionately advocates for a comprehensive understanding of AI, emphasizing that it’s neither inherently good nor bad.

    Takeaways

    • Stolen recordings from popular artists can sell for high prices on the black market.
    • Cyber criminals are involved in various illegal activities, including stealing cryptocurrency and trading stolen, unreleased rap recordings.
    • Law enforcement plays a crucial role in investigating and apprehending cyber criminals, and these crimes can have real-life consequences.
    • The intersection of cybersecurity and AI presents challenges in assessing the risks associated with AI technologies.
    • Community outreach and education are important in promoting cybersecurity awareness and encouraging more people to pursue careers in the field.

    Chapters

    00:00 Stolen Recordings and Cyber Criminals

    01:29 Arrest of a Florida Man and Stolen Rap Recordings

    02:27 The Allegations and Nicknames

    03:26 The Connection Between Cyber Crime and Rap Music

    04:23 Real-Life Consequences of Cybersecurity Crimes

    05:52 The Role of Law Enforcement in Cybersecurity Crimes

    06:50 Introduction of Guest Joanna Parker-Martin

    07:18 Joanna's Role at Rice University

    08:15 Protecting Data at Rice University

    09:08 Joanna's Journey into Cybersecurity

    10:04 Overcoming Challenges and Changing Career Paths

    18:14 Joanna's Interest in Artificial Intelligence

    19:22 The Intersection of Cybersecurity and AI

    20:46 The Challenges of Assessing AI Risk

    21:13 The Inevitability of AI

    22:37 The Risks of Facial Recognition Technology

    27:26 Joanna's Involvement with WiCys

    29:48 Community Outreach and Cybersecurity Education

    30:10 Misconceptions About Cybersecurity Professionals

    32:32 The Lifestyle Polygraph

    43:35 Joanna's Preference for Sponge Cake in Strawberry Shortcake

    Más Menos
    48 m
  • No Password Required Podcast Episode 46 — Dr. Diana Burley
    Jan 31 2024

    SummaryThe conversation discusses the arrest of Ola Segun Simpson Adagorin, a Nigerian national facing US federal charges for a business email compromise scheme. The collaboration between the FBI and Ghana is highlighted, along with the role of the legal attache job in solving crimes with international impact. The scheme and indictment details are explored, emphasizing the sophistication of the attack. Dr. Diana Burley, Vice Provost for Research and Innovation at American University, shares insights on cybersecurity education and workforce readiness. The importance of understanding human behavior in cybersecurity is discussed, along with strategies for engaging in conversations and addressing the search for cyber unicorns. In this episode, the importance of password security and the various methods to enhance it are discussed. The conversation covers common password mistakes, the use of password managers, multi-factor authentication, biometric authentication, and the future of password security.

    Takeaways

    • Collaboration between law enforcement agencies is crucial in solving cybercrime cases with international implications.
    • Understanding human behavior is essential in addressing cybersecurity challenges and shaping effective policies.
    • Digital literacy and foundational cybersecurity skills should be integrated into education across disciplines.
    • Creating a culture of cybersecurity requires a balance between rules and creativity, and a focus on psychological safety.
    • Engaging in conversations with strangers can be facilitated by finding common interests and making personal connections. Create strong and unique passwords for each online account.
    • Avoid common password mistakes such as using personal information or easily guessable patterns.
    • Consider using a password manager to securely store and generate passwords.
    • Enable multi-factor authentication whenever possible for an added layer of security.
    • Biometric authentication, such as fingerprint or facial recognition, can provide convenient and secure access to devices and accounts.
    • Passwordless authentication methods, such as biometrics or hardware tokens, may become more prevalent in the future.
    • Stay informed about emerging technologies and best practices in password security.

    Chapters

    00:00 Introduction and Arrest of Ola Segun Simpson Adagorin

    01:24 Collaboration between FBI and Ghana

    03:15 Scheme and Indictment Details

    04:44 Legal Attache Job and Collaboration

    06:10 Deterrence and Sealed Indictments

    07:36 Introduction of Dr. Diana Burley

    08:31 Dr. Burley's Background and Role at American University

    09:23 Interest in Cybersecurity and Technology

    10:21 American University's Role in Educating Policymakers

    12:15 Engaging with Leaders and Shaping Policy

    13:36 Engaging with Students and Future Leaders

    14:28 American University's Focus on Policy and Research

    15:27 Misconceptions about the Cybersecurity Workforce

    16:23 Digital Literacy and Foundational Cybersecurity Skills

    18:45 Retaining Skilled Members in the Academic Environment

    19:43 Benefits of Engaging as a University Faculty Member

    20:37 Understanding Human Behavior in Cybersecurity

    22:05 Insights from Research on Human Behavior

    23:25 Understanding Employee Behavior in Cybersecurity

    24:47 Creating a Culture of Cybersecurity

    27:08 Strategies for Initiating Conversations with Strangers

    31:50 The Cyber Unicorn Project

    35:08 Addressing the Search for Cyber Unicorns

    41:45 Lifestyle Polygraph

    50:57 Understanding Irrational Behavior and Self-Awareness

    53:37 Engaging in Conversations with Strangers

    02:30 The Importance of Password Security

    10:15 Common Password Mistakes

    18:45 Password Managers

    27:10 Multi-Factor Authentication

    35:40 Biometric Authentication

    44:20 Passwordless Authentication

    52:30 Future of Password Security

    58:21 Conclusion

    Más Menos
    59 m
  • No Password Required Podcast Episode 45 — Lisa Plaggemier
    Jan 10 2024

    Summary

    In this episode, Jack Clabby and Kayley Melton discuss the upcoming Sunshine Cyber Conference and their collaboration with Winn Schwartau. They also talk about the importance of diverse cybersecurity talent and their plans for a joint session at the conference. The hosts then interview Lisa Plaggemier, the executive director at the National Cybersecurity Alliance, who shares her career journey and the role of creativity and curiosity in cybersecurity. They also discuss the impact of COVID-19 on the cybersecurity industry and the importance of humor and satire in cybersecurity training. The episode concludes with a lifestyle polygraph segment. In this episode, the conversation covers various topics related to comedy, storytelling, and implementing change in organizations. The power of the internet is discussed, highlighting the potential consequences of online content. The guest shares her favorite comedy movies, emphasizing the comedic element in her expertise. The use of humor in training and awareness programs is explored, along with the challenges of implementing change in organizations. Dealing with roadblocks in security and the passion for security awareness are also discussed. The episode concludes with information on how to get in touch with the guest and a recap of what was learned.

     

    Takeaways

    • The Sunshine Cyber Conference features keynote speakers from the No Password Required podcast, including Winn Schwartau.
    • The hosts will be doing their first on-site remote recording at the Sunshine Cyber Conference, featuring keynote speaker Tamiko Fletcher.
    • The National Cybersecurity Alliance focuses on training and awareness, using creativity and humor to engage and educate people.
    • Comedy movies, such as Monty Python and the Holy Grail, can be a source of expertise and inspiration.
    • Humor can be effectively used in training and awareness programs to engage and educate participants.
    • Implementing change in organizations can be challenging, but finding allies and overcoming roadblocks is essential.

     

    Chapters

    00:00 Introduction

    01:28 Fishing for Potential, the RTFM Guide to Diverse Cybersecurity Talent

    02:25 Live On-Site Remote Recording and Keynote Speakers

    03:51 Sunshine Cyber Conference and Registration

    04:46 Interview with Lisa Plaggemier

    05:15 Background and Role at the National Cybersecurity Alliance

    05:53 Transition to Security and Marketing Collaboration

    06:22 Incident Response and Training and Awareness

    07:20 Leadership and Skills in Cybersecurity

    08:18 Kubikle Series and Creativity in Security

    09:17 Curiosity and Creativity in Cybersecurity

    10:48 Naming and Shaming in Pen Tests and Phishing Testing

    11:41 DDoS Attack and Incident Response

    12:38 Neurodiversity and Cybersecurity

    13:21 Leading a Team During COVID-19

    14:21 Creating Engaging Training Content

    15:19 Global Data and Data Privacy Laws

    16:18 Humor and Satire in Cybersecurity Training

    18:47 Kubikle Series and Satire in Cybersecurity

    20:41 Creating Kubikle Series and Future Plans

    23:03Trust in Password Managers

    24:22 The Importance of Curiosity in Cybersecurity

    25:52 The Oh Behave Report and Behavioral Science

    26:50 Communicating Security Information Effectively

    28:44 Naming and Shaming in Phishing Testing

    29:39 Accepting Risk and Escalation Plans

    30:38 The Role of Security Teams and HR

    32:35 Building Trust in Password Managers

    33:32 Global Data and Cybersecurity Awareness

    36:51 The Importance of Curiosity in Cybersecurity Hiring

    40:03 The Underground Student-Led Newspaper

    41:12 The Significance of Curiosity and Creativity in Career

    50:44 The Power of the Internet

    51:14 Favorite Comedy Movies

    52:12 Using Humor in Training and Awareness

    53:38 Implementing Change in Organizations

    54:55 Dealing with Roadblocks in Security

    55:45 Passion for Security Awareness

    56:06 How to Get in Touch

    56:37 What Was Learned

    57:11 Closing Remarks

    Más Menos
    58 m
  • No Password Required Podcast Episode 44 — Jayson Street
    Dec 11 2023
    Jayson Street — Chief Adversarial Officer at Secure Yeti, a DEF CON Groups Global Ambassador, and a world-class awkward hugger Jayson Street, the dynamic Chief Adversarial Officer at Secure Yeti, has worn many masks throughout his life and career. He was once named a “World-Class Hacker” on the National Geographic series "Breakthrough Cyber-Terror," but he prefers the simpler title of Hacker, Helper, and Human. In this episode, Jayson joins Carlton Fields P.A.’s Jack Clabby and KnowBe4’s VP of Remote Publishing Teams Kayley Melton to talk about his journey of self-discovery that led him from being an award-winning janitor at McDonald's to one of the world’s most infamous ethical hackers. From his early childhood, Jayson has embraced hacking as a way of life, embodying the spirit of relentless exploration, innovation, and resilience. Like our favorite co-host Kayley, Jayson uncovered a new layer of his identity in his adulthood when he discovered that he is neurodivergent. He dives deep into how this new understanding altered his perception of himself, allowed him to embrace the various “masks” he wears throughout life, and discovered that his unique mind is actually his superpower. He also shares extraordinary stories of how he gained entry into some of the hardest-to-access cyber targets in the world. To start off the show, Jack and Kayley talk about the celebrity that’s topping the Hacker Celebrity Hot List as the celeb whose name is used most by cybercriminals when creating online scams. Hint: he’s just Ken… You can follow Jayson on LinkedIn here: https://www.linkedin.com/in/jstreet/ You can follow Jayson on Twitter here: @jaysonstreet You can learn more about Jayson here: https://jaysonestreet.com You can learn more about Secure Yeti here: https://www.secureyeti.com/
    Más Menos
    1 h y 6 m
  • No Password Required Podcast Episode 43 — Kristin Demoranville
    Nov 20 2023
    Kristin Demoranville — CEO and Founder of AnzenSage, defender of the food sector, and friend to primates What is the role of cybersecurity in food safety? Kristin Demoranville, CEO and Founder of AnzenSage, is committed to shielding the food sector from potential cybersecurity threats and ensuring the resilience of the entire food supply chain. Her dedication is not just a professional pursuit; it's a mission to prevent any compromise to public health. In this episode, Carlton Fields Cybersecurity Attorney Jack Clabby and No Password Required producer Rex Wilson speak with Kristin about everything from the deployment of autonomous tractors to the secure refrigeration of airport food, and Kristin sheds light on the other facets of daily life that are linked to the food supply chain. Kristen also shares how her love for wildlife led to her working with primates at the Louisville Zoo before making the transition into cybersecurity, and the value that podcasting has brought to her life. Kristen’s podcast, the Bites & Bytes Podcast, is her platform for discussing cybersecurity and food safety, and is recommended listening for fans of No Password Required. Bites & Bytes has fast become a medium for Kristin to share insights, connect with audiences, and explore the intersections of her diverse interests. Jack and Rex also delve into the intricacies of the Environmental Protection Agency's recent decision not to include cybersecurity in water system audits, and the questions this may raise about the security of water utility infrastructure. You can follow Kristin on LinkedIn here: https://www.linkedin.com/in/demoranvillekristin/ You can follow Kristin on Twitter here: @demokris You can learn more about AnzenSage here: https://www.anzensage.com/
    Más Menos
    1 h y 3 m