<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:media="http://search.yahoo.com/mrss/" xmlns:podcast="https://podcastindex.org/namespace/1.0">
  <channel>
    <atom:link href="https://feeds.simplecast.com/YGJgknbK" rel="self" title="MP3 Audio" type="application/atom+xml"/>
    <atom:link href="https://simplecast.superfeedr.com" rel="hub" xmlns="http://www.w3.org/2005/Atom"/>
    <generator>https://simplecast.com</generator>
    <title>No Password Required</title>
    <description>The No Password Required Podcast connects with the cybersecurity industry’s most interesting professionals and shares their stories. No Password Required covers a variety of tech topics, from the cyber-related challenges facing law enforcement to the advent of quantum computing, this podcast explores the people and topics at the forefront of the field.</description>
    <copyright>2019 No Password Required</copyright>
    <language>en</language>
    <pubDate>Mon, 6 Apr 2026 04:00:00 +0000</pubDate>
    <lastBuildDate>Mon, 6 Apr 2026 04:00:11 +0000</lastBuildDate>
    <image>
      <link>https://no-password-required.simplecast.com</link>
      <title>No Password Required</title>
      <url>https://image.simplecastcdn.com/images/d43689d3-22e4-45dd-97ad-4c2145bc601b/37eb3852-4934-4013-8cf6-ea4df990d8c4/3000x3000/show-logo-24-no-password-required-2024.jpg?aid=rss_feed</url>
    </image>
    <link>https://no-password-required.simplecast.com</link>
    <itunes:type>episodic</itunes:type>
    <itunes:summary>The No Password Required Podcast connects with the cybersecurity industry’s most interesting professionals and shares their stories. No Password Required covers a variety of tech topics, from the cyber-related challenges facing law enforcement to the advent of quantum computing, this podcast explores the people and topics at the forefront of the field.</itunes:summary>
    <itunes:author>Cyber Florida</itunes:author>
    <itunes:explicit>false</itunes:explicit>
    <itunes:image href="https://image.simplecastcdn.com/images/d43689d3-22e4-45dd-97ad-4c2145bc601b/37eb3852-4934-4013-8cf6-ea4df990d8c4/3000x3000/show-logo-24-no-password-required-2024.jpg?aid=rss_feed"/>
    <itunes:new-feed-url>https://feeds.simplecast.com/YGJgknbK</itunes:new-feed-url>
    <itunes:keywords>computer fraud, computer scams, computer security, cyber culture, cybersecurity, infosec, data breach, data security, national security, password security, quantum computing, network engineer, ransomware, networking, brute force, coding, cloud computing, data privacy, quantum supremacy, windows, cybercrime, python, anonymous, internet, risk management, hacked, network, developer, network security, hacks, code, ai, cloud, big data, encryption, information security, business, data, software</itunes:keywords>
    <itunes:owner>
      <itunes:name>Cyber Florida</itunes:name>
      <itunes:email>rex2@cyberflorida.org</itunes:email>
    </itunes:owner>
    <itunes:category text="Technology"/>
    <itunes:category text="Education">
      <itunes:category text="How To"/>
    </itunes:category>
    <itunes:category text="Business">
      <itunes:category text="Management"/>
    </itunes:category>
    <item>
      <guid isPermaLink="false">d35482f4-bf45-46f8-ab43-43aca0b8218e</guid>
      <title>No Password Required Podcast Episode 71 - Cynthia Wrye</title>
      <description><![CDATA[<p><strong>Cynthia Wyre —Project Manager at Rapid7 and the Queen of Cyber Media </strong></p>
<p><strong>No Password Required Season 7: Episode 4 - Cynthia Wyre </strong></p>
<p>Cynthia Wyre is a Senior Strategic Engagement Project Manager at Rapid7, where she helps connect academic research and industry. Her path into cybersecurity innovation was untraditional, moving from healthcare and construction project management into vulnerability research and academic partnerships. </p>
<p>Cynthia reflects on how she applied for a role she did not think she was qualified for, why professionals of all backgrounds belong in cyber, and how project management skills can open unexpected doors. </p>
<p>Jack Clabby of Carlton Fields, P.A., and K. Melton of the Cognitive Security Institute welcome Cynthia live from CyberBay 2026 in Tampa for a conversation about research, resilience, and relationship-building in cybersecurity. Cynthia explains Rapid7’s partnership with USF and Cyber Florida, including her efforts to support research around SOC analyst training and burnout, and the future of cyber education. </p>
<p>Throughout the conversation, Cynthia highlights the importance of community, mentorship, and helping people see that cybersecurity is not limited to one path or one type of person. </p>
<p>The episode wraps with the Lifestyle Polygraph, where Cynthia reveals how she would work a room full of strangers and how she won a costume contest moments before meeting rapper Young Gravy. She also earns a crown of her own, officially joining the No Password Required fantasy cybersecurity squad as Queen of the Podcast. </p>
<p>Follow Cynthia on LinkedIn: https://www.linkedin.com/in/cynthiawyre/</p>
<p>Presented by ThreatLocker </p>
<p>Follow ThreatLocker on LinkedIn: https://www.linkedin.com/company/threatlockerinc/posts/</p>
<p><i><strong>Chapters: </strong></i></p>
<p>00:00 Introduction</p>
<p>02:15 From Aspiring Physical Therapist to Project Manager</p>
<p>03:50 Transitioning from Construction to Cybersecurity</p>
<p>05:12 Applying for the Rapid7 Role and Overcoming Self-Doubt</p>
<p>10:25 Academic Partnerships with USF and Cyber Florida</p>
<p>12:56 Leaning into Discomfort and Personal Growth</p>
<p>20:15 The Role of Marching Band and Education in Cynthia’s Life</p>
<p>24:25 A Memorable Encounter with a Music Industry Entertainer Yung Gravy</p>
<p>28:00 Lifestyle Polygraph and Fun Personal Questions</p>
<p>37:40 Crowning Cynthia as Queen of the Podcast</p>
]]></description>
      <pubDate>Mon, 6 Apr 2026 04:00:00 +0000</pubDate>
      <author>rex2@cyberflorida.org (Ernie Ferraresso, Rex Wilson, Jack Clabby, Cynthia Wrye, Kayley Melton, Alex Vanscoy, Yazzel Corona, Cyber Florida, cyberbay, Threat Locker, Rapid7)</author>
      <link>https://no-password-required.simplecast.com/episodes/no-password-required-podcast-episode-71-cynthia-RGfX5jm0</link>
      <media:thumbnail height="720" url="https://image.simplecastcdn.com/images/d43689d3-22e4-45dd-97ad-4c2145bc601b/9a928e4c-facd-4d9b-b46c-d0024b43e7b3/youtubetemplatecynthia_wyre.png" width="1280"/>
      <content:encoded><![CDATA[<p><strong>Cynthia Wyre —Project Manager at Rapid7 and the Queen of Cyber Media </strong></p>
<p><strong>No Password Required Season 7: Episode 4 - Cynthia Wyre </strong></p>
<p>Cynthia Wyre is a Senior Strategic Engagement Project Manager at Rapid7, where she helps connect academic research and industry. Her path into cybersecurity innovation was untraditional, moving from healthcare and construction project management into vulnerability research and academic partnerships. </p>
<p>Cynthia reflects on how she applied for a role she did not think she was qualified for, why professionals of all backgrounds belong in cyber, and how project management skills can open unexpected doors. </p>
<p>Jack Clabby of Carlton Fields, P.A., and K. Melton of the Cognitive Security Institute welcome Cynthia live from CyberBay 2026 in Tampa for a conversation about research, resilience, and relationship-building in cybersecurity. Cynthia explains Rapid7’s partnership with USF and Cyber Florida, including her efforts to support research around SOC analyst training and burnout, and the future of cyber education. </p>
<p>Throughout the conversation, Cynthia highlights the importance of community, mentorship, and helping people see that cybersecurity is not limited to one path or one type of person. </p>
<p>The episode wraps with the Lifestyle Polygraph, where Cynthia reveals how she would work a room full of strangers and how she won a costume contest moments before meeting rapper Young Gravy. She also earns a crown of her own, officially joining the No Password Required fantasy cybersecurity squad as Queen of the Podcast. </p>
<p>Follow Cynthia on LinkedIn: https://www.linkedin.com/in/cynthiawyre/</p>
<p>Presented by ThreatLocker </p>
<p>Follow ThreatLocker on LinkedIn: https://www.linkedin.com/company/threatlockerinc/posts/</p>
<p><i><strong>Chapters: </strong></i></p>
<p>00:00 Introduction</p>
<p>02:15 From Aspiring Physical Therapist to Project Manager</p>
<p>03:50 Transitioning from Construction to Cybersecurity</p>
<p>05:12 Applying for the Rapid7 Role and Overcoming Self-Doubt</p>
<p>10:25 Academic Partnerships with USF and Cyber Florida</p>
<p>12:56 Leaning into Discomfort and Personal Growth</p>
<p>20:15 The Role of Marching Band and Education in Cynthia’s Life</p>
<p>24:25 A Memorable Encounter with a Music Industry Entertainer Yung Gravy</p>
<p>28:00 Lifestyle Polygraph and Fun Personal Questions</p>
<p>37:40 Crowning Cynthia as Queen of the Podcast</p>
]]></content:encoded>
      <enclosure length="38594880" type="audio/mpeg" url="https://dts.podtrac.com/redirect.mp3/cdn.simplecast.com/media/audio/transcoded/38daa724-3435-49b6-9093-de297cb0b5c1/ba5244e0-cb0d-4762-b681-e884e01b43fb/episodes/audio/group/c3546e58-9912-4d44-b7d3-27c5f81a8204/group-item/6782c50c-88af-4ba5-9061-5fc3f68f9868/128_default_tc.mp3?aid=rss_feed&amp;feed=YGJgknbK"/>
      <itunes:title>No Password Required Podcast Episode 71 - Cynthia Wrye</itunes:title>
      <itunes:author>Ernie Ferraresso, Rex Wilson, Jack Clabby, Cynthia Wrye, Kayley Melton, Alex Vanscoy, Yazzel Corona, Cyber Florida, cyberbay, Threat Locker, Rapid7</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/d43689d3-22e4-45dd-97ad-4c2145bc601b/ba79ff86-b70e-4a0d-8d4f-8abebfc79223/3000x3000/cynthia_wyreepisodeart_2.jpg?aid=rss_feed"/>
      <itunes:duration>00:40:09</itunes:duration>
      <itunes:summary>Cynthia Wyre —Project Manager at Rapid7 and the Queen of Cyber Media  
No Password Required Season 7: Episode 4 - Cynthia Wyre  

 Cynthia Wyre is a Senior Strategic Engagement Project Manager at Rapid7, where she helps connect academic research and industry. Her path into cybersecurity innovation was untraditional, moving from healthcare and construction project management into vulnerability research and academic partnerships.  

Cynthia reflects how she applied for a role she did not think she was qualified for, why professionals of all backgrounds belong in cyber, and how project management skills can open unexpected doors.  

Jack Clabby of Carlton Fields, P.A., and K. Melton of the Cognitive Security Institute welcome Cynthia live from CyberBay 2026 in Tampa for a conversation about research, resilience, and relationship-building in cybersecurity. Cynthia explains Rapid7’s partnership with USF and Cyber Florida, including her efforts to support research around SOC analyst training and burnout, and the future of cyber education.  

 

Throughout the conversation, Cynthia highlights the importance of community, mentorship, and helping people see that cybersecurity is not limited to one path or one type of person.  

The episode wraps with the Lifestyle Polygraph, where Cynthia reveals how she would work a room full of strangers and how she won a costume contest moments before meeting rapper Young Gravy. She also earns a crown of her own, officially joining the No Password Required fantasy cybersecurity squad as Queen of the Podcast.  

Follow Cynthia on LinkedIn: https://www.linkedin.com/in/cynthiawyre/ 

Presented by ThreatLocker 
Follow ThreatLocker on LinkedIn: https://www.linkedin.com/company/threatlockerinc/posts/</itunes:summary>
      <itunes:subtitle>Cynthia Wyre —Project Manager at Rapid7 and the Queen of Cyber Media  
No Password Required Season 7: Episode 4 - Cynthia Wyre  

 Cynthia Wyre is a Senior Strategic Engagement Project Manager at Rapid7, where she helps connect academic research and industry. Her path into cybersecurity innovation was untraditional, moving from healthcare and construction project management into vulnerability research and academic partnerships.  

Cynthia reflects how she applied for a role she did not think she was qualified for, why professionals of all backgrounds belong in cyber, and how project management skills can open unexpected doors.  

Jack Clabby of Carlton Fields, P.A., and K. Melton of the Cognitive Security Institute welcome Cynthia live from CyberBay 2026 in Tampa for a conversation about research, resilience, and relationship-building in cybersecurity. Cynthia explains Rapid7’s partnership with USF and Cyber Florida, including her efforts to support research around SOC analyst training and burnout, and the future of cyber education.  

 

Throughout the conversation, Cynthia highlights the importance of community, mentorship, and helping people see that cybersecurity is not limited to one path or one type of person.  

The episode wraps with the Lifestyle Polygraph, where Cynthia reveals how she would work a room full of strangers and how she won a costume contest moments before meeting rapper Young Gravy. She also earns a crown of her own, officially joining the No Password Required fantasy cybersecurity squad as Queen of the Podcast.  

Follow Cynthia on LinkedIn: https://www.linkedin.com/in/cynthiawyre/ 

Presented by ThreatLocker 
Follow ThreatLocker on LinkedIn: https://www.linkedin.com/company/threatlockerinc/posts/</itunes:subtitle>
      <itunes:keywords>vulnerability research, project manager in tech, non traditional careers, breaking into cybersecurity, cyber community, cybersecurity education, cyberbay 2026, cybersecurity podcast, soc burnout, cybersecurity industry insights, cyber florida, lifestyle polygraph, cyber leadership, unconventional career path, women in tech leadership, cyberbay summit, diversity in tech, leadership in tech, career pivot, mentorship in cybersecurity, academic partnerships, cybersecurity, cynthia wyre, soc analyst, rapid7, cybersecurity networking, podcast interview, project management, human side of cybersecurity, cyber talent pipeline, resilience in tech, security operations center, women in cybersecurity, no password required podcast, building relationships in cyber, tampa cybersecurity, cybersecurity careers, usf cybersecurity, security training, cyber innovation, cyber research, future of cybersecurity, tech careers, community in cybersecurity, cybersecurity storytelling, cyber workforce development</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>71</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">0f2ca66d-e380-450e-9464-7fabc3b65735</guid>
      <title>No Password Required Podcast Episode 70 - Madhav Nakar</title>
      <description><![CDATA[<p>Madhav Nakar — AI Security Researcher and Documentarian of Spirituality and Play  </p>
<p>No Password Required Season 7: Episode 3 - Madhav Nakar  </p>
<p>Madhav Nakar is a Security Researcher at BeyondTrust specializing in identity threats, endpoint security, and cloud attack paths. With a background in theoretical mathematics, his current research focuses on analyzing attacker behavior to build practical systems of detection.  </p>
<p>In this episode, Madhav shares the pivotal moments that shaped his career, including his first experience witnessing a nation-state attack unfold in real time from his seat in a SOC. He explains how mathematical thinking sharpens security strategy and why strong research is rooted in exploration, not predetermined outcomes.  </p>
<p>Jack Clabby of Carlton Fields, joined by co-host Kayley Melton of the Cognitive Security Institute, welcomes Madhav for a conversation on modern cyber defense. From AI-driven attacks and agentic systems to privilege escalation risks in role-based access environments, Madhav breaks down what teams are getting wrong about AI and why defending against AI increasingly requires AI-powered tools.  </p>
<p>The conversation turns to Madhav’s philosophy of “serious play,” where curiosity, experimentation, and failure fuel better research and resilience. He also shares insights from his spiritual and philosophy project, The Fire of Knowing, exploring consciousness and belief through a neutral lens.  </p>
<p>In the Lifestyle Polygraph, Madhav pitches a cybersecurity documentary, debates growth versus comfort, and reflects public dancing experiments. </p>
<p>Follow Madhav Nakar here: https://www.linkedin.com/in/madhav-nakar/</p>
<p>Follow "The Fire of Knowing" on Instagram and Youtube! </p>
<p>CHAPTERS: </p>
<p>00:00 Introduction with Kayley and Jack</p>
<p>08:08 Transition from Theoretical Math to Cybersecurity</p>
<p>16:13 Exploring Spiritual Traditions and Madhav’s Documentary</p>
<p>19:48 The Intersection of Art and Science in Content Creation</p>
<p>25:20 The Lifestyle Polygraph: Challenging Perspectives on Security</p>
]]></description>
      <pubDate>Tue, 17 Mar 2026 04:00:00 +0000</pubDate>
      <author>rex2@cyberflorida.org (Madhav Nakar, Rex Wilson, Kayley Melton, Jack Clabby, Ernie Ferraresso, Cyber Florida, Yazzel Corona)</author>
      <link>https://no-password-required.simplecast.com/episodes/no-password-required-podcast-episode-70-madhav-nakar-dQTLeWmQ</link>
      <media:thumbnail height="720" url="https://image.simplecastcdn.com/images/d43689d3-22e4-45dd-97ad-4c2145bc601b/4088e276-3914-4c6d-8589-11b485d835f1/youtubetemplatemadhav.png" width="1280"/>
      <content:encoded><![CDATA[<p>Madhav Nakar — AI Security Researcher and Documentarian of Spirituality and Play  </p>
<p>No Password Required Season 7: Episode 3 - Madhav Nakar  </p>
<p>Madhav Nakar is a Security Researcher at BeyondTrust specializing in identity threats, endpoint security, and cloud attack paths. With a background in theoretical mathematics, his current research focuses on analyzing attacker behavior to build practical systems of detection.  </p>
<p>In this episode, Madhav shares the pivotal moments that shaped his career, including his first experience witnessing a nation-state attack unfold in real time from his seat in a SOC. He explains how mathematical thinking sharpens security strategy and why strong research is rooted in exploration, not predetermined outcomes.  </p>
<p>Jack Clabby of Carlton Fields, joined by co-host Kayley Melton of the Cognitive Security Institute, welcomes Madhav for a conversation on modern cyber defense. From AI-driven attacks and agentic systems to privilege escalation risks in role-based access environments, Madhav breaks down what teams are getting wrong about AI and why defending against AI increasingly requires AI-powered tools.  </p>
<p>The conversation turns to Madhav’s philosophy of “serious play,” where curiosity, experimentation, and failure fuel better research and resilience. He also shares insights from his spiritual and philosophy project, The Fire of Knowing, exploring consciousness and belief through a neutral lens.  </p>
<p>In the Lifestyle Polygraph, Madhav pitches a cybersecurity documentary, debates growth versus comfort, and reflects public dancing experiments. </p>
<p>Follow Madhav Nakar here: https://www.linkedin.com/in/madhav-nakar/</p>
<p>Follow "The Fire of Knowing" on Instagram and Youtube! </p>
<p>CHAPTERS: </p>
<p>00:00 Introduction with Kayley and Jack</p>
<p>08:08 Transition from Theoretical Math to Cybersecurity</p>
<p>16:13 Exploring Spiritual Traditions and Madhav’s Documentary</p>
<p>19:48 The Intersection of Art and Science in Content Creation</p>
<p>25:20 The Lifestyle Polygraph: Challenging Perspectives on Security</p>
]]></content:encoded>
      <enclosure length="35291087" type="audio/mpeg" url="https://dts.podtrac.com/redirect.mp3/cdn.simplecast.com/media/audio/transcoded/38daa724-3435-49b6-9093-de297cb0b5c1/ba5244e0-cb0d-4762-b681-e884e01b43fb/episodes/audio/group/e6a05ec5-bb65-4a98-81f9-e8749858a8fa/group-item/590affb5-69d1-4adb-ab8f-f21f41957068/128_default_tc.mp3?aid=rss_feed&amp;feed=YGJgknbK"/>
      <itunes:title>No Password Required Podcast Episode 70 - Madhav Nakar</itunes:title>
      <itunes:author>Madhav Nakar, Rex Wilson, Kayley Melton, Jack Clabby, Ernie Ferraresso, Cyber Florida, Yazzel Corona</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/d43689d3-22e4-45dd-97ad-4c2145bc601b/18a2dd54-7fa4-412c-80c2-706b8c032422/3000x3000/madhavepisodeart.jpg?aid=rss_feed"/>
      <itunes:duration>00:36:40</itunes:duration>
      <itunes:summary>Madhav Nakar — AI Security Researcher and Documentarian of Spirituality and Play  

No Password Required Season 7: Episode 3 - Madhav Nakar  

Madhav Nakar is a Security Researcher at BeyondTrust specializing in identity threats, endpoint security, and cloud attack paths. With a background in theoretical mathematics, his current research focuses on analyzing attacker behavior to build practical systems of detection.  

In this episode, Madhav shares the pivotal moments that shaped his career, including his first experience witnessing a nation-state attack unfold in real time from his seat in a SOC. He explains how mathematical thinking sharpens security strategy and why strong research is rooted in exploration, not predetermined outcomes.  

Jack Clabby of Carlton Fields, joined by co-host Kayley Melton of the Cognitive Security Institute, welcomes Madhav for a conversation on modern cyber defense. From AI-driven attacks and agentic systems to privilege escalation risks in role-based access environments, Madhav breaks down what teams are getting wrong about AI and why defending against AI increasingly requires AI-powered tools.  

The conversation turns to Madhav’s philosophy of “serious play,” where curiosity, experimentation, and failure fuel better research and resilience. He also shares insights from his spiritual and philosophy project, The Fire of Knowing, exploring consciousness and belief through a neutral lens.  

In the Lifestyle Polygraph, Madhav pitches a cybersecurity documentary, debates growth versus comfort, and reflects public dancing experiments. 

Follow Madhav Nakar here: https://www.linkedin.com/in/madhav-nakar/
Follow &quot;The Fire of Knowing&quot; on Instagram and Youtube! 
</itunes:summary>
      <itunes:subtitle>Madhav Nakar — AI Security Researcher and Documentarian of Spirituality and Play  

No Password Required Season 7: Episode 3 - Madhav Nakar  

Madhav Nakar is a Security Researcher at BeyondTrust specializing in identity threats, endpoint security, and cloud attack paths. With a background in theoretical mathematics, his current research focuses on analyzing attacker behavior to build practical systems of detection.  

In this episode, Madhav shares the pivotal moments that shaped his career, including his first experience witnessing a nation-state attack unfold in real time from his seat in a SOC. He explains how mathematical thinking sharpens security strategy and why strong research is rooted in exploration, not predetermined outcomes.  

Jack Clabby of Carlton Fields, joined by co-host Kayley Melton of the Cognitive Security Institute, welcomes Madhav for a conversation on modern cyber defense. From AI-driven attacks and agentic systems to privilege escalation risks in role-based access environments, Madhav breaks down what teams are getting wrong about AI and why defending against AI increasingly requires AI-powered tools.  

The conversation turns to Madhav’s philosophy of “serious play,” where curiosity, experimentation, and failure fuel better research and resilience. He also shares insights from his spiritual and philosophy project, The Fire of Knowing, exploring consciousness and belief through a neutral lens.  

In the Lifestyle Polygraph, Madhav pitches a cybersecurity documentary, debates growth versus comfort, and reflects public dancing experiments. 

Follow Madhav Nakar here: https://www.linkedin.com/in/madhav-nakar/
Follow &quot;The Fire of Knowing&quot; on Instagram and Youtube! 
</itunes:subtitle>
      <itunes:keywords>digital identity protection, threat research, ai attacks, nation state attacks, exploration mindset, identity and access management, threat modeling, beyondtrust, incident response, ai defense, cybersecurity community, zero trust security, enterprise security, cybersecurity education, cyber defense, digital defense, cybersecurity leadership insights, attack surface, machine learning security, digital forensics, saas security, cybersecurity podcast, ai automation, cybersecurity education initiatives, defensive ai, cybersecurity innovation, cyber florida, cloud attack paths, cybersecurity leadership, enterprise risk management, ai security, threat intelligence, cloud identity, least privilege access, technology ethics, creative problem solving, tech culture, security community, tech podcast, penetration testing, offensive ai, role based access control, security analytics, endpoint security, cybersecurity, cloud security, account takeover, threat detection, problem solving, security architecture, human centered security, documentary filmmaking, future of ai security, cyber resilience, agentic ai, artificial intelligence, adversary tactics, madhav nakar, ai agents, identity governance, cognitive security, security mindset, identity threats, detection engineering, iam security, red canary, security operations, attacker behavior, rbac, security engineering, blue team, identity security, cyber threats, kayleigh melton, jack clabby, red team, math in cybersecurity, ethical hacking, no password required, emerging cyber threats, cybersecurity trends, cybersecurity research, security research, cybersecurity careers, privilege escalation, ai governance, cyber resilience strategy, ai risk, cyber investigation, cyber risk, security strategy, security awareness, ai threats, future of cybersecurity, curiosity in cybersecurity, access control, credential abuse, cybersecurity storytelling, soc operations</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>70</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">a4c715b1-b564-4dc1-9fcb-455b76d2db92</guid>
      <title>No Password Required: Next Gen - Ep.1 - Michelle McAveety</title>
      <description><![CDATA[<p><strong>No Password Required: Next Gen – Ep. 1 - Michelle McAveety</strong></p>
<p><strong>Michelle McAveety- Cyber Competitions, Crowd Surfing & Main-Character Energy</strong></p>
<p>Welcome to our new spinoff series, <strong>No Password Required: Next Generation.  </strong>Where we go behind the scenes and interview up-and-coming young professionals in cybersecurity!</p>
<p>Whether you’re trying to figure out your career path, looking for a little inspiration, or just want to have a laugh while learning about the industry, this show is for you.</p>
<p>Real stories. Real journeys. Next Gen Cyber.</p>
<p><strong>About this episode:</strong></p>
<p>Michelle McAveety is a Computer Engineering and Math student at USF and the Team Captain of the CyberHerd, the university’s cybersecurity competition team.</p>
<p>We get into the chaos and adrenaline of competition life, what it’s like leading in a high-pressure cyber environment, and how she balances it all without losing herself. Spoiler: the answer includes crocheting, blasting heavy metal, going to concerts, and possibly crowd surfing if the vibe is right.</p>
<p>Michelle also drops some real advice opening up about the pressure to compare yourself in competitive fields and why staying grounded and focused on your own path is the real win.</p>
<p>Follow Michelles journey on linked in! <a href="https://www.linkedin.com/in/mcaveety/" target="_blank" rel="noopener noreferrer">https://www.linkedin.com/in/mcaveety/</a></p>
<p> </p>
<p><i><strong>Chapters:</strong></i></p>
<p><i><strong>00:39 - Who is Michelle? </strong></i></p>
<p><i><strong>00:54-  Being in Cyberherd </strong></i></p>
<p><i><strong>01:38- Hobbies that bring Michelle Joy!  </strong></i></p>
<p><i><strong>02:51- Comparison and Growth </strong></i></p>
<p> </p>
]]></description>
      <pubDate>Fri, 27 Feb 2026 05:00:00 +0000</pubDate>
      <author>rex2@cyberflorida.org (Ernie Ferraresso, Rex Wilson, Yazzel Corona, Alex Vanscoy, Michelle McAveety, Cyber Florida)</author>
      <link>https://no-password-required.simplecast.com/episodes/no-password-required-next-gen-ep-1-michelle-mcaveety-vVFjE_xi</link>
      <media:thumbnail height="720" url="https://image.simplecastcdn.com/images/d43689d3-22e4-45dd-97ad-4c2145bc601b/b39e74f8-ec96-40f3-b16e-0e287d923b5f/yt_thumbnail.png" width="1280"/>
      <content:encoded><![CDATA[<p><strong>No Password Required: Next Gen – Ep. 1 - Michelle McAveety</strong></p>
<p><strong>Michelle McAveety- Cyber Competitions, Crowd Surfing & Main-Character Energy</strong></p>
<p>Welcome to our new spinoff series, <strong>No Password Required: Next Generation.  </strong>Where we go behind the scenes and interview up-and-coming young professionals in cybersecurity!</p>
<p>Whether you’re trying to figure out your career path, looking for a little inspiration, or just want to have a laugh while learning about the industry, this show is for you.</p>
<p>Real stories. Real journeys. Next Gen Cyber.</p>
<p><strong>About this episode:</strong></p>
<p>Michelle McAveety is a Computer Engineering and Math student at USF and the Team Captain of the CyberHerd, the university’s cybersecurity competition team.</p>
<p>We get into the chaos and adrenaline of competition life, what it’s like leading in a high-pressure cyber environment, and how she balances it all without losing herself. Spoiler: the answer includes crocheting, blasting heavy metal, going to concerts, and possibly crowd surfing if the vibe is right.</p>
<p>Michelle also drops some real advice opening up about the pressure to compare yourself in competitive fields and why staying grounded and focused on your own path is the real win.</p>
<p>Follow Michelles journey on linked in! <a href="https://www.linkedin.com/in/mcaveety/" target="_blank" rel="noopener noreferrer">https://www.linkedin.com/in/mcaveety/</a></p>
<p> </p>
<p><i><strong>Chapters:</strong></i></p>
<p><i><strong>00:39 - Who is Michelle? </strong></i></p>
<p><i><strong>00:54-  Being in Cyberherd </strong></i></p>
<p><i><strong>01:38- Hobbies that bring Michelle Joy!  </strong></i></p>
<p><i><strong>02:51- Comparison and Growth </strong></i></p>
<p> </p>
]]></content:encoded>
      <enclosure length="3586132" type="audio/mpeg" url="https://dts.podtrac.com/redirect.mp3/cdn.simplecast.com/media/audio/transcoded/38daa724-3435-49b6-9093-de297cb0b5c1/ba5244e0-cb0d-4762-b681-e884e01b43fb/episodes/audio/group/6fc8864a-9f18-4859-a6a0-bbd0f23ec817/group-item/7e3ce118-65f7-4b1a-9afa-281c82c6c21f/128_default_tc.mp3?aid=rss_feed&amp;feed=YGJgknbK"/>
      <itunes:title>No Password Required: Next Gen - Ep.1 - Michelle McAveety</itunes:title>
      <itunes:author>Ernie Ferraresso, Rex Wilson, Yazzel Corona, Alex Vanscoy, Michelle McAveety, Cyber Florida</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/d43689d3-22e4-45dd-97ad-4c2145bc601b/316001cc-288c-45fb-8dec-57d55a4c0809/3000x3000/next_gen_michelle.jpg?aid=rss_feed"/>
      <itunes:duration>00:03:44</itunes:duration>
      <itunes:summary>No Password Required: Next Gen – Ep. 1 - Michelle McAveety 

Michelle McAveety- Cyber Competitions, Crowd Surfing &amp; Main-Character Energy 

Welcome to our new spinoff series, No Password Required: Next Generation.  Where we go behind the scenes and interview up-and-coming young professionals in cybersecurity! 

Whether you’re trying to figure out your career path, looking for a little inspiration, or just want to have a laugh while learning about the industry, this show is for you. 

Real stories. Real journeys. Next Gen Cyber. 

About this episode: 

Michelle McAveety is a Computer Engineering and Math student at USF and the Team Captain of the CyberHerd, the university’s cybersecurity competition team. 

We get into the chaos and adrenaline of competition life, what it’s like leading in a high-pressure cyber environment, and how she balances it all without losing herself. Spoiler: the answer includes crocheting, blasting heavy metal, going to concerts, and possibly crowd surfing if the vibe is right. 

Michelle also drops some real advice opening up about the pressure to compare yourself in competitive fields and why staying grounded and focused on your own path is the real win. 

Follow Michelles journey on linked in! https://www.linkedin.com/in/mcaveety/ </itunes:summary>
      <itunes:subtitle>No Password Required: Next Gen – Ep. 1 - Michelle McAveety 

Michelle McAveety- Cyber Competitions, Crowd Surfing &amp; Main-Character Energy 

Welcome to our new spinoff series, No Password Required: Next Generation.  Where we go behind the scenes and interview up-and-coming young professionals in cybersecurity! 

Whether you’re trying to figure out your career path, looking for a little inspiration, or just want to have a laugh while learning about the industry, this show is for you. 

Real stories. Real journeys. Next Gen Cyber. 

About this episode: 

Michelle McAveety is a Computer Engineering and Math student at USF and the Team Captain of the CyberHerd, the university’s cybersecurity competition team. 

We get into the chaos and adrenaline of competition life, what it’s like leading in a high-pressure cyber environment, and how she balances it all without losing herself. Spoiler: the answer includes crocheting, blasting heavy metal, going to concerts, and possibly crowd surfing if the vibe is right. 

Michelle also drops some real advice opening up about the pressure to compare yourself in competitive fields and why staying grounded and focused on your own path is the real win. 

Follow Michelles journey on linked in! https://www.linkedin.com/in/mcaveety/ </itunes:subtitle>
      <itunes:keywords>authenticity in tech, cybersecurity competition team, young professionals in cybersecurity, cyberherd, usf, cyber careers, college cybersecurity, leadership in tech, professional development, work life balance, team captain, cybersecurity, cyber competitions, next generation cybersecurity, heavy metal, cyber resiliency, overcoming comparison, business and communications, women in cyber, math minor, computer engineering student, student success, gen z in tech, university of south florida, student leadership, engineering students, competition life, career in cyber, cram challenge, internships in cybersecurity</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>bonus</itunes:episodeType>
    </item>
    <item>
      <guid isPermaLink="false">2b51a6a0-0b32-4a22-98b3-095332df115e</guid>
      <title>No Password Required Podcast Episode 69 - Sue Serna</title>
      <description><![CDATA[<p><strong>Sue Serna - Social Media Security and Governance Leader and Lover of All Beagles</strong></p><p><strong>No Password Required Season 7: Episode 2 - Sue Serna</strong></p><p>Sue Serna is the CEO and Founder of Serna Social and the former head of global social media at Cargill. She brings more than two decades of experience at the intersection of storytelling, strategy, and security.</p><p>In this episode, she shares her journey from business reporter to leading her own consultancy serving companies around the world on social media strategy.</p><p>Jack Clabby of Carlton Fields, P.A, joined by guest co-host Rex Wilson of Cyber Florida, welcomes Sue for a candid discussion about the realities of enterprise social media. From managing more than 150 Facebook pages for a single company, to navigating internal politics, agency relationships, and regulatory pressure, Sue explains why social media is far from “free” and why most organizations still under-resource it.</p><p>Sue dives deep into the gap between social media teams and cybersecurity departments. She outlines how personal account compromises can escalate into enterprise-level incidents, why governance frameworks matter, and how large organizations can regain control of sprawling digital footprints. Drawing from real-world examples, she argues that social media must be treated like finance or HR, a core business function requiring structure, ownership, and accountability.</p><p>The episode wraps with the Lifestyle Polygraph, where Sue reveals her love of Apollo-era space history, debates iconic Philadelphia traditions, and imagines what magical talent her beagle would bring to Hogwarts.</p><p>Follow Sue at SernaSocial.com or connect with her on LinkedIn: https://www.linkedin.com/in/sueserna/</p><p> </p><p><i><strong>Chapters: </strong></i></p><p>00:00 Introduction and First Impressions   </p><p>02:45 The Evolving Role of Social Media in Corporations   </p><p>04:58 Transitioning from Journalism to Social Media  </p><p>11:11 Building Social Media from Scratch   </p><p>13:00 Becoming a CEO and Founder   </p><p>16:28 The Importance of Networking   </p><p>16:54 Bridging the Gap Between Social Media and Cybersecurity  </p><p>20:51 Real-World Social Media Security Incidents  </p><p>28:35 Navigating Internal Conflicts in Social Media  </p><p>30:32 The Lifestyle Polygraph Begins   </p><p>31:17 Nerd Things That Expose Sue: Space and Harry Potter!  </p><p>35:16 Sue’s Love For Beagles  </p><p>37:50 Wreckless Intern or Overconfident Executive?  </p><p>40:42 Hogwarts and Magical Beagles </p>
]]></description>
      <pubDate>Mon, 16 Feb 2026 05:00:00 +0000</pubDate>
      <author>rex2@cyberflorida.org (Rex Wilson, Sue Serna, Jack Clabby, cyber florida, Carlton Fields, Ernie Ferraresso, Devin Malice, Alex Vanscoy, Yazzel Corona)</author>
      <link>https://no-password-required.simplecast.com/episodes/no-password-required-podcast-episode-69-sue-serna-d3ewpxn-KE5m4NJm</link>
      <media:thumbnail height="720" url="https://image.simplecastcdn.com/images/d43689d3-22e4-45dd-97ad-4c2145bc601b/37f6343c-2559-466f-a3c7-747a5701b206/youtube-template-sue-20serna.jpg" width="1280"/>
      <content:encoded><![CDATA[<p><strong>Sue Serna - Social Media Security and Governance Leader and Lover of All Beagles</strong></p><p><strong>No Password Required Season 7: Episode 2 - Sue Serna</strong></p><p>Sue Serna is the CEO and Founder of Serna Social and the former head of global social media at Cargill. She brings more than two decades of experience at the intersection of storytelling, strategy, and security.</p><p>In this episode, she shares her journey from business reporter to leading her own consultancy serving companies around the world on social media strategy.</p><p>Jack Clabby of Carlton Fields, P.A, joined by guest co-host Rex Wilson of Cyber Florida, welcomes Sue for a candid discussion about the realities of enterprise social media. From managing more than 150 Facebook pages for a single company, to navigating internal politics, agency relationships, and regulatory pressure, Sue explains why social media is far from “free” and why most organizations still under-resource it.</p><p>Sue dives deep into the gap between social media teams and cybersecurity departments. She outlines how personal account compromises can escalate into enterprise-level incidents, why governance frameworks matter, and how large organizations can regain control of sprawling digital footprints. Drawing from real-world examples, she argues that social media must be treated like finance or HR, a core business function requiring structure, ownership, and accountability.</p><p>The episode wraps with the Lifestyle Polygraph, where Sue reveals her love of Apollo-era space history, debates iconic Philadelphia traditions, and imagines what magical talent her beagle would bring to Hogwarts.</p><p>Follow Sue at SernaSocial.com or connect with her on LinkedIn: https://www.linkedin.com/in/sueserna/</p><p> </p><p><i><strong>Chapters: </strong></i></p><p>00:00 Introduction and First Impressions   </p><p>02:45 The Evolving Role of Social Media in Corporations   </p><p>04:58 Transitioning from Journalism to Social Media  </p><p>11:11 Building Social Media from Scratch   </p><p>13:00 Becoming a CEO and Founder   </p><p>16:28 The Importance of Networking   </p><p>16:54 Bridging the Gap Between Social Media and Cybersecurity  </p><p>20:51 Real-World Social Media Security Incidents  </p><p>28:35 Navigating Internal Conflicts in Social Media  </p><p>30:32 The Lifestyle Polygraph Begins   </p><p>31:17 Nerd Things That Expose Sue: Space and Harry Potter!  </p><p>35:16 Sue’s Love For Beagles  </p><p>37:50 Wreckless Intern or Overconfident Executive?  </p><p>40:42 Hogwarts and Magical Beagles </p>
]]></content:encoded>
      <enclosure length="42959165" type="audio/mpeg" url="https://dts.podtrac.com/redirect.mp3/cdn.simplecast.com/audio/ba5244e0-cb0d-4762-b681-e884e01b43fb/episodes/172c9497-6c34-45c8-9ae2-673e54248749/audio/e394954d-3ae0-4296-ba33-5dd122c5d52e/default_tc.mp3?aid=rss_feed&amp;feed=YGJgknbK"/>
      <itunes:title>No Password Required Podcast Episode 69 - Sue Serna</itunes:title>
      <itunes:author>Rex Wilson, Sue Serna, Jack Clabby, cyber florida, Carlton Fields, Ernie Ferraresso, Devin Malice, Alex Vanscoy, Yazzel Corona</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/d43689d3-22e4-45dd-97ad-4c2145bc601b/8987e24c-07e9-4ac9-b1c5-5e69536fe2b6/3000x3000/sue-20serna-episode-art.jpg?aid=rss_feed"/>
      <itunes:duration>00:44:39</itunes:duration>
      <itunes:summary>Sue Serna - Social Media Security and Governance Leader and Lover of All Beagles

No Password Required Season 7: Episode 2 - Sue Serna

Sue Serna is the CEO and Founder of Serna Social and the former head of global social media at Cargill. She brings more than two decades of experience at the intersection of storytelling, strategy, and security.

In this episode, she shares her journey from business reporter to leading her own consultancy serving companies around the world on social media strategy.

Jack Clabby of Carlton Fields, P.A, joined by guest co-host Rex Wilson of Cyber Florida, welcomes Sue for a candid discussion about the realities of enterprise social media. From managing more than 150 Facebook pages for a single company, to navigating internal politics, agency relationships, and regulatory pressure, Sue explains why social media is far from “free” and why most organizations still under-resource it.

Sue dives deep into the gap between social media teams and cybersecurity departments. She outlines how personal account compromises can escalate into enterprise-level incidents, why governance frameworks matter, and how large organizations can regain control of sprawling digital footprints. Drawing from real-world examples, she argues that social media must be treated like finance or HR, a core business function requiring structure, ownership, and accountability.

The episode wraps with the Lifestyle Polygraph, where Sue reveals her love of Apollo-era space history, debates iconic Philadelphia traditions, and imagines what magical talent her beagle would bring to Hogwarts.

Follow Sue at SernaSocial.com or connect with her on LinkedIn: https://www.linkedin.com/in/sueserna/</itunes:summary>
      <itunes:subtitle>Sue Serna - Social Media Security and Governance Leader and Lover of All Beagles

No Password Required Season 7: Episode 2 - Sue Serna

Sue Serna is the CEO and Founder of Serna Social and the former head of global social media at Cargill. She brings more than two decades of experience at the intersection of storytelling, strategy, and security.

In this episode, she shares her journey from business reporter to leading her own consultancy serving companies around the world on social media strategy.

Jack Clabby of Carlton Fields, P.A, joined by guest co-host Rex Wilson of Cyber Florida, welcomes Sue for a candid discussion about the realities of enterprise social media. From managing more than 150 Facebook pages for a single company, to navigating internal politics, agency relationships, and regulatory pressure, Sue explains why social media is far from “free” and why most organizations still under-resource it.

Sue dives deep into the gap between social media teams and cybersecurity departments. She outlines how personal account compromises can escalate into enterprise-level incidents, why governance frameworks matter, and how large organizations can regain control of sprawling digital footprints. Drawing from real-world examples, she argues that social media must be treated like finance or HR, a core business function requiring structure, ownership, and accountability.

The episode wraps with the Lifestyle Polygraph, where Sue reveals her love of Apollo-era space history, debates iconic Philadelphia traditions, and imagines what magical talent her beagle would bring to Hogwarts.

Follow Sue at SernaSocial.com or connect with her on LinkedIn: https://www.linkedin.com/in/sueserna/</itunes:subtitle>
      <itunes:keywords>corporate cybersecurity, insider threat, b2c social media, facebook security, newsroom culture, facebook business manager, social media audits, internal communications, enterprise security, credential management, data security, content governance, networking in cybersecurity, ad account security, cybersecurity podcast, password managers, digital risk management, social media tools, password security, online reputation management, marketing communications, corporate social media, social media leadership, social engineering, social media security, enterprise social media, social media workflow, cybersecurity, social media strategy, corporate social media teams, account takeover, social media career, instagram management, social media roi, social media best practices, business account security, b2b social media, social media compliance, social media risk, social media management, risk mitigation, social media staffing, security leadership, social media budgeting, 1password, enterprise social media training, cyber awareness, multilingual social media, social media policy, journalism skills in social media, social media operations, digital risk awareness, keeper, social media governance, instagram security, online brand security, social media consulting, social media incidents, fortune 500, information security, social media hacks, social media crises, global social media, digital governance, cyber risk, agency management, brand protection, it security</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>69</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">29869c86-6cab-448b-b301-a5acc62b38c9</guid>
      <title>No Password Required Podcast Episode 68 — Rob Hughes</title>
      <description><![CDATA[<p><strong>Rob Hughes — CISO at RSA and Champion of a Passwordless Future</strong></p><p>No Password Required Season 7:  Episode 1 - Rob Hughes</p><p>Rob Hughes, the CISO at RSA, has more than 25 years of experience leading security and cloud infrastructure teams. In this episode, he reflects on his unconventional career path, from co-founding the original <a href="http://geek.com/" target="_blank">Geek.com</a> and serving as its Chief Technologist during the early days of the internet, to leading security and systems design at Philips Home Monitoring.</p><p>Jack Clabby of Carlton Fields, P.A. and Kayley Melton welcome Rob for a wide-ranging conversation on identity, leadership, and the realities of modern cybersecurity. Rob currently leads RSA’s Security and Risk Office, overseeing cybersecurity, information security governance, and risk across both RSA’s products and corporate environment.</p><p>Rob explains his dream for a passwordless future. He unpacks why passwords remain one of the largest sources of cyber risk, how real-world incidents and password-spraying attacks have accelerated change, and why phishing-resistant technologies like passkeys may finally be reaching a tipping point. <br /> </p><p>The episode wraps with the Lifestyle Polygraph, where Rob lightens the conversation with stories about gaming with his kids, underrated horror films, and classic cars.</p><p>Follow Rob on LinkedIn: <a href="https://www.linkedin.com/in/robert-hughes-816067a4/" target="_blank">https://www.linkedin.com/in/robert-hughes-816067a4/</a></p><p><i><strong>Chapters: </strong></i></p><p>00:00 Introduction to No Password Required</p><p>01:43 Meet Rob Hughes, CISO at RSA</p><p>02:05 The Role of a CISO in a Security Company</p><p>05:09 Transitioning to the CISO Role</p><p>08:00 The Early Days of Geek.com</p><p>12:14 Launching a Startup During the Dot Com Boom</p><p>14:30 The Push for a Passwordless Future</p><p>18:21 Tipping Point for Passwordless Adoption</p><p>20:20 Ongoing Learning in Cybersecurity</p><p>26:09 Managing Stress in High-Pressure Environments</p><p>33:46 The Lifestyle Polygraph Begins</p><p>34:15 Career Insights in Cybersecurity</p><p>36:08 Dream Cars and Personal Preferences</p><p>39:58 Underrated Horror Films</p><p>41:19 Creating a Cybersecurity Monster</p>
]]></description>
      <pubDate>Tue, 20 Jan 2026 05:00:00 +0000</pubDate>
      <author>rex2@cyberflorida.org (Rob Hughes, Jack Clabby, Yazzel Corona, Rex Wilson, Ernie Ferraresso, Kayley Melton, Devin Malice, cyber florida, Carlton Fields, Cognitive Security Institute, Alex Vanscoy)</author>
      <link>https://no-password-required.simplecast.com/episodes/no-password-required-podcast-episode-68-rob-hughes-33JbL2Sn</link>
      <media:thumbnail height="720" url="https://image.simplecastcdn.com/images/d43689d3-22e4-45dd-97ad-4c2145bc601b/ac121bbc-bf64-4a23-8c0d-5a55897a64bd/youtube-template-rob-20hughes.jpg" width="1280"/>
      <content:encoded><![CDATA[<p><strong>Rob Hughes — CISO at RSA and Champion of a Passwordless Future</strong></p><p>No Password Required Season 7:  Episode 1 - Rob Hughes</p><p>Rob Hughes, the CISO at RSA, has more than 25 years of experience leading security and cloud infrastructure teams. In this episode, he reflects on his unconventional career path, from co-founding the original <a href="http://geek.com/" target="_blank">Geek.com</a> and serving as its Chief Technologist during the early days of the internet, to leading security and systems design at Philips Home Monitoring.</p><p>Jack Clabby of Carlton Fields, P.A. and Kayley Melton welcome Rob for a wide-ranging conversation on identity, leadership, and the realities of modern cybersecurity. Rob currently leads RSA’s Security and Risk Office, overseeing cybersecurity, information security governance, and risk across both RSA’s products and corporate environment.</p><p>Rob explains his dream for a passwordless future. He unpacks why passwords remain one of the largest sources of cyber risk, how real-world incidents and password-spraying attacks have accelerated change, and why phishing-resistant technologies like passkeys may finally be reaching a tipping point. <br /> </p><p>The episode wraps with the Lifestyle Polygraph, where Rob lightens the conversation with stories about gaming with his kids, underrated horror films, and classic cars.</p><p>Follow Rob on LinkedIn: <a href="https://www.linkedin.com/in/robert-hughes-816067a4/" target="_blank">https://www.linkedin.com/in/robert-hughes-816067a4/</a></p><p><i><strong>Chapters: </strong></i></p><p>00:00 Introduction to No Password Required</p><p>01:43 Meet Rob Hughes, CISO at RSA</p><p>02:05 The Role of a CISO in a Security Company</p><p>05:09 Transitioning to the CISO Role</p><p>08:00 The Early Days of Geek.com</p><p>12:14 Launching a Startup During the Dot Com Boom</p><p>14:30 The Push for a Passwordless Future</p><p>18:21 Tipping Point for Passwordless Adoption</p><p>20:20 Ongoing Learning in Cybersecurity</p><p>26:09 Managing Stress in High-Pressure Environments</p><p>33:46 The Lifestyle Polygraph Begins</p><p>34:15 Career Insights in Cybersecurity</p><p>36:08 Dream Cars and Personal Preferences</p><p>39:58 Underrated Horror Films</p><p>41:19 Creating a Cybersecurity Monster</p>
]]></content:encoded>
      <enclosure length="43131689" type="audio/mpeg" url="https://dts.podtrac.com/redirect.mp3/cdn.simplecast.com/audio/ba5244e0-cb0d-4762-b681-e884e01b43fb/episodes/52e4589b-7f3f-4223-be80-11753e54b3f6/audio/37c9aa69-ff47-4786-95f0-7f7e0bc0198a/default_tc.mp3?aid=rss_feed&amp;feed=YGJgknbK"/>
      <itunes:title>No Password Required Podcast Episode 68 — Rob Hughes</itunes:title>
      <itunes:author>Rob Hughes, Jack Clabby, Yazzel Corona, Rex Wilson, Ernie Ferraresso, Kayley Melton, Devin Malice, cyber florida, Carlton Fields, Cognitive Security Institute, Alex Vanscoy</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/d43689d3-22e4-45dd-97ad-4c2145bc601b/22f1c42d-69f4-4a2a-b2bb-e99b57795594/3000x3000/rob-20hughes-episode-art.jpg?aid=rss_feed"/>
      <itunes:duration>00:44:51</itunes:duration>
      <itunes:summary>Rob Hughes — CISO at RSA and Champion of a Passwordless Future 
 
No Password Required Season 7:  Episode 1 - Rob Hughes 

Rob Hughes, the CISO at RSA, has more than 25 years of experience leading security and cloud infrastructure teams. In this episode, he reflects on his unconventional career path, from co-founding the original Geek.com and serving as its Chief Technologist during the early days of the internet, to leading security and systems design at Philips Home Monitoring.

Jack Clabby of Carlton Fields, P.A. and Kayley Melton welcome Rob for a wide-ranging conversation on identity, leadership, and the realities of modern cybersecurity. Rob currently leads RSA’s Security and Risk Office, overseeing cybersecurity, information security governance, and risk across both RSA’s products and corporate environment. 
 
Rob explains his dream for a passwordless future. He unpacks why passwords remain one of the largest sources of cyber risk, how real-world incidents and password-spraying attacks have accelerated change, and why phishing-resistant technologies like passkeys may finally be reaching a tipping point.  

The episode wraps with the Lifestyle Polygraph, where Rob lightens the conversation with stories about gaming with his kids, underrated horror films, and classic cars. 

Follow Rob on LinkedIn: https://www.linkedin.com/in/robert-hughes-816067a4/ </itunes:summary>
      <itunes:subtitle>Rob Hughes — CISO at RSA and Champion of a Passwordless Future 
 
No Password Required Season 7:  Episode 1 - Rob Hughes 

Rob Hughes, the CISO at RSA, has more than 25 years of experience leading security and cloud infrastructure teams. In this episode, he reflects on his unconventional career path, from co-founding the original Geek.com and serving as its Chief Technologist during the early days of the internet, to leading security and systems design at Philips Home Monitoring.

Jack Clabby of Carlton Fields, P.A. and Kayley Melton welcome Rob for a wide-ranging conversation on identity, leadership, and the realities of modern cybersecurity. Rob currently leads RSA’s Security and Risk Office, overseeing cybersecurity, information security governance, and risk across both RSA’s products and corporate environment. 
 
Rob explains his dream for a passwordless future. He unpacks why passwords remain one of the largest sources of cyber risk, how real-world incidents and password-spraying attacks have accelerated change, and why phishing-resistant technologies like passkeys may finally be reaching a tipping point.  

The episode wraps with the Lifestyle Polygraph, where Rob lightens the conversation with stories about gaming with his kids, underrated horror films, and classic cars. 

Follow Rob on LinkedIn: https://www.linkedin.com/in/robert-hughes-816067a4/ </itunes:subtitle>
      <itunes:keywords>breach response, data governance, soc, critical infrastructure, security metrics, incident response, security architecture design, passwordless, enterprise iam, early internet, grc, geek.com, operational risk, enterprise security, credential management, cyber accountability, ciso life, attack surface, risk management, compliance, security culture, fido, phishing, access management, user identity, saas security, alert fatigue, cybersecurity podcast, login security, data protection, technical leadership, cyber leadership, fido2, password security, cybersecurity leadership, zero trust, passwordless future, cloud identity, tech startups, security innovation, authentication flows, identity management, cybersecurity best practices, cybersecurity, deprovisioning, authentication standards, cloud security, privileged access, account takeover, security controls, provisioning, threat detection, supply chain security, executive security, rsa, security frameworks, identity sprawl, it operations, cloud infrastructure, patch management, security architecture, security tooling, security teams, third party risk, mfa, life safety systems, cyber resilience, identity silos, secure by design, user experience security, systems reliability, internal security, cyber hygiene, identity lifecycle, vulnerability management, defense in depth, authentication methods, least privilege, password spraying, identity governance, security platforms, digital identity, privacy programs, security maturity, credential stuffing, security standards, directory services, infosec, security operations, security engineering, platform security, identity security, physical security, product security, federation, passkeys, dot com era, security policies, no password required, security monitoring, security operations center, executive decision making, board level security, vendor security, enterprise it, security fundamentals, user authentication, access reviews, digital trust, iam, security leadership roles, philips home monitoring, behavioral analytics, audit readiness, regulatory requirements, authentication, sso, cybersecurity careers, infrastructure security, passkey adoption, information security, phishing attacks, password risk, tech history, security debt, hybrid environments, ciso, secure access, cyber risk, breach prevention, saas access, security strategy, brute force attacks, security awareness, access control, threat landscape, rob hughes, it security, security governance, corporate security, business risk, anomaly detection</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>68</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">f6385d26-aa85-4585-ab4f-c263e61e018a</guid>
      <title>No Password Required Podcast Episode 67 — Gina Yacone</title>
      <description><![CDATA[<p><strong>Gina Yacone — Virtual CISO at Trace3 and Roller Derby Penalty Box Visitor</strong></p><p>Live from B-Sides Jacksonville, No Password Required welcomes Gina Yacone, Virtual CISO at Trace3. Jack Clabby of Carlton Fields, P.A. and Sarina Gandy, host and producer of the CyberBay Podcast, host a conversation on Gina’s unconventional career path, leadership under pressure, and the power of community in cybersecurity. With career stops in private investigation, digital forensics, and executive security, Gina brings a people-first, purpose-driven perspective to complex cyber risk.</p><p>Gina shares how her early work as a private investigator on high-profile criminal defense cases laid the foundation for her success in cybersecurity. She also reflects on raising her hand for big challenges, the rewards and risks of always saying yes, and how authenticity has guided her. She offers insight on why conference hallway conversations can be just as impactful as keynote sessions.</p><p>A visible advocate for the cybersecurity community, Gina speaks openly about setting healthy mentorship boundaries and building resilient professional networks.</p><p>The episode wraps with the Lifestyle Polygraph, where Gina lightens the mood with stories from her roller derby days, dream Amazing Race partners, and why John Wick might just be the ultimate executive assistant.</p><p>Follow Gina on LinkedIn: <strong>https://www.linkedin.com/in/ginayacone/</strong></p><p> </p><p><strong>Chapters:</strong></p><p>00:00 Introduction to Cybersecurity and B-Sides Jacksonville</p><p>01:16 Gina Yacone's Unique Journey to Cybersecurity</p><p>06:22 Navigating Burnout in Cybersecurity</p><p>08:06 The Importance of Raising Your Hand</p><p>10:04 Adapting Leadership Styles in Different Roles </p><p>14:03 Being a Role Model for Women in Cybersecurity</p><p>16:34 How to Establish a Good Mentee and Mentor Relationship</p><p>18:50 Feedback and Constructive Criticism</p><p>22:55  The Value of Hallway Conversations</p><p>26:19 The Lifestyle Polygraph: Fun and Insights</p><p>38:54 Conclusion and Future Connections</p>
]]></description>
      <pubDate>Sun, 21 Dec 2025 05:00:00 +0000</pubDate>
      <author>rex2@cyberflorida.org (Gina Yacone, Ernie Ferraresso, Sarina Gandy, Alex Vanscoy, Jack Clabby, Cyber Florida, Yazzel Corona, Rex Wilson, Trace3, Devin Malice)</author>
      <link>https://no-password-required.simplecast.com/episodes/no-password-required-podcast-episode-67-gina-yacone-c7ui_TWT</link>
      <media:thumbnail height="720" url="https://image.simplecastcdn.com/images/d43689d3-22e4-45dd-97ad-4c2145bc601b/f91903f7-8f46-4f4b-b098-d1642d5bf1e8/youtube-template-gina-20yacone.jpg" width="1280"/>
      <content:encoded><![CDATA[<p><strong>Gina Yacone — Virtual CISO at Trace3 and Roller Derby Penalty Box Visitor</strong></p><p>Live from B-Sides Jacksonville, No Password Required welcomes Gina Yacone, Virtual CISO at Trace3. Jack Clabby of Carlton Fields, P.A. and Sarina Gandy, host and producer of the CyberBay Podcast, host a conversation on Gina’s unconventional career path, leadership under pressure, and the power of community in cybersecurity. With career stops in private investigation, digital forensics, and executive security, Gina brings a people-first, purpose-driven perspective to complex cyber risk.</p><p>Gina shares how her early work as a private investigator on high-profile criminal defense cases laid the foundation for her success in cybersecurity. She also reflects on raising her hand for big challenges, the rewards and risks of always saying yes, and how authenticity has guided her. She offers insight on why conference hallway conversations can be just as impactful as keynote sessions.</p><p>A visible advocate for the cybersecurity community, Gina speaks openly about setting healthy mentorship boundaries and building resilient professional networks.</p><p>The episode wraps with the Lifestyle Polygraph, where Gina lightens the mood with stories from her roller derby days, dream Amazing Race partners, and why John Wick might just be the ultimate executive assistant.</p><p>Follow Gina on LinkedIn: <strong>https://www.linkedin.com/in/ginayacone/</strong></p><p> </p><p><strong>Chapters:</strong></p><p>00:00 Introduction to Cybersecurity and B-Sides Jacksonville</p><p>01:16 Gina Yacone's Unique Journey to Cybersecurity</p><p>06:22 Navigating Burnout in Cybersecurity</p><p>08:06 The Importance of Raising Your Hand</p><p>10:04 Adapting Leadership Styles in Different Roles </p><p>14:03 Being a Role Model for Women in Cybersecurity</p><p>16:34 How to Establish a Good Mentee and Mentor Relationship</p><p>18:50 Feedback and Constructive Criticism</p><p>22:55  The Value of Hallway Conversations</p><p>26:19 The Lifestyle Polygraph: Fun and Insights</p><p>38:54 Conclusion and Future Connections</p>
]]></content:encoded>
      <enclosure length="38907634" type="audio/mpeg" url="https://dts.podtrac.com/redirect.mp3/cdn.simplecast.com/audio/ba5244e0-cb0d-4762-b681-e884e01b43fb/episodes/79916da6-2619-471c-99a6-45a4b26e6abc/audio/36fd6adb-fce2-4b8f-84c7-dab3d4e53f4f/default_tc.mp3?aid=rss_feed&amp;feed=YGJgknbK"/>
      <itunes:title>No Password Required Podcast Episode 67 — Gina Yacone</itunes:title>
      <itunes:author>Gina Yacone, Ernie Ferraresso, Sarina Gandy, Alex Vanscoy, Jack Clabby, Cyber Florida, Yazzel Corona, Rex Wilson, Trace3, Devin Malice</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/d43689d3-22e4-45dd-97ad-4c2145bc601b/fc943dc9-eab2-4ef3-86ae-d0e60cee90c5/3000x3000/gina-20yacone-episode-art.jpg?aid=rss_feed"/>
      <itunes:duration>00:40:17</itunes:duration>
      <itunes:summary>Gina Yacone — Virtual CISO at Trace3 and Roller Derby Penalty Box Visitor

Live from B-Sides Jacksonville, No Password Required welcomes Gina Yacone, Virtual CISO at Trace3. Jack Clabby of Carlton Fields, P.A. and Sarina Gandy, host and producer of the CyberBay Podcast, host a conversation on Gina’s unconventional career path, leadership under pressure, and the power of community in cybersecurity. With career stops in private investigation, digital forensics, and executive security, Gina brings a people-first, purpose-driven perspective to complex cyber risk.

Gina shares how her early work as a private investigator on high-profile criminal defense cases laid the foundation for her success in cybersecurity. She also reflects on raising her hand for big challenges, the rewards and risks of always saying yes, and how authenticity has guided her. She offers insight on why conference hallway conversations can be just as impactful as keynote sessions.

A visible advocate for the cybersecurity community, Gina speaks openly about setting healthy mentorship boundaries and building resilient professional networks.

The episode wraps with the Lifestyle Polygraph, where Gina lightens the mood with stories from her roller derby days, dream Amazing Race partners, and why John Wick might just be the ultimate executive assistant.

Follow Gina on LinkedIn: https://www.linkedin.com/in/ginayacone/
</itunes:summary>
      <itunes:subtitle>Gina Yacone — Virtual CISO at Trace3 and Roller Derby Penalty Box Visitor

Live from B-Sides Jacksonville, No Password Required welcomes Gina Yacone, Virtual CISO at Trace3. Jack Clabby of Carlton Fields, P.A. and Sarina Gandy, host and producer of the CyberBay Podcast, host a conversation on Gina’s unconventional career path, leadership under pressure, and the power of community in cybersecurity. With career stops in private investigation, digital forensics, and executive security, Gina brings a people-first, purpose-driven perspective to complex cyber risk.

Gina shares how her early work as a private investigator on high-profile criminal defense cases laid the foundation for her success in cybersecurity. She also reflects on raising her hand for big challenges, the rewards and risks of always saying yes, and how authenticity has guided her. She offers insight on why conference hallway conversations can be just as impactful as keynote sessions.

A visible advocate for the cybersecurity community, Gina speaks openly about setting healthy mentorship boundaries and building resilient professional networks.

The episode wraps with the Lifestyle Polygraph, where Gina lightens the mood with stories from her roller derby days, dream Amazing Race partners, and why John Wick might just be the ultimate executive assistant.

Follow Gina on LinkedIn: https://www.linkedin.com/in/ginayacone/
</itunes:subtitle>
      <itunes:keywords>virtual ciso, career advancement tips, industry networking, networking strategies, leadership authenticity, cyber community, risk management, mentorship guidance, security culture, cyber threat analysis, digital forensics, digital investigations, cyber career advice, women in it, cyber problem solving, cyber event highlights, cyber careers, networking, investigative techniques, technical leadership, leadership challenges, cyber leadership, professional authenticity, vciso, women in tech leadership, digital security leadership, tech inspiration, tech role models, personal growth in tech, leadership lessons, investigative skills, professional development, female cisos, social engineering, career pivot, cybersecurity tips, leadership strategies, cyber investigations, digital forensics skills, cybersecurity humor, cybersecurity, executive coaching, b-sides jacksonville, governance risk compliance, cybersecurity growth, trace3, cybersecurity journey, executive security, career development tips, authentic leadership, workplace resilience, cybersecurity conferences, gina yacone, conference hallway chats, tech burnout, burnout, leadership insights, cybersecurity challenges, cyber education, professional resilience, cyber resilience, cybersecurity networking, high-profile investigations, professional boundaries, cybersecurity inspiration, cybersecurity mentorship, tech community engagement, professional growth, security operations, mentorship, security awareness tips, career transitions, community building, women leaders in tech, ethical hacking, no password required, tech empowerment, work-life integration, women in cybersecurity, women in leadership, executive mentorship, conference networking tips, role models in tech, tech community, investigative problem solving, conference culture, public speaking in tech, cyber strategy, leadership development, ciso insights, work-life balance in cybersecurity, cyber risk, security strategy, fantasy cyber team, security awareness, cyber community building, threat landscape, career mentorship, female executives in tech, cybersecurity storytelling, tech leadership, career growth, tech career insights, professional networking tips</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>67</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">59e1a047-d5dd-4e76-953d-364823de5727</guid>
      <title>No Password Required Podcast Episode 66 — Danny Jenkins</title>
      <description><![CDATA[<p><strong>Danny Jenkins — Founder of ThreatLocker and the Zero-Trust Revolution</strong></p><p>Danny Jenkins is the CEO of ThreatLocker, the leading cybersecurity company that he built alongside his wife. Hosts Jack Clabby of Carlton Fields, P.A., and Kayley Melton of the Cognitive Security Institute follow Danny’s journey from a scrappy IT consultant to leading one of the fastest-growing cybersecurity companies in the world.</p><p>Danny shares the moment everything changed: watching a small business nearly collapse after a catastrophic ransomware attack. That experience reshaped his mission and ultimately sparked the creation of ThreatLocker. He also reflects on the gritty early days—cold-calling from his living room, coding through the night, and taking on debt before finally landing their first $5,000 customer.</p><p>Danny explains the origins of Zero Trust World, his passion for educating IT teams, and why adopting a hacker mindset is essential for modern defenders.</p><p>In the Lifestyle Polygraph, Danny relates his early “revenge tech” against school bullies, the place he escapes to when celebrating big wins, and the movie franchise he insists is absolutely a Christmas classic.</p><p>Follow Danny on LinkedIn: <a href="https://www.linkedin.com/in/dannyjenkins/">https://www.linkedin.com/in/dannyjenkins/</a></p><p> </p><p>00:00 Introduction to Cybersecurity and ThreatLocker</p><p>02:26 The Birth of ThreatLocker: A Personal Journey</p><p>05:42 The Evolution of Zero Trust Security</p><p>08:35 Real-World Impact of Cyber Attacks</p><p>11:25 The Importance of a Hacker Mindset</p><p>14:46 The Role of SOC Teams in Cybersecurity</p><p>17:34 Building a Culture of Security</p><p>20:23 Hiring for Passion and Skill in Cybersecurity</p><p>23:44 Understanding Zero Trust: Trust No One</p><p>26:32 Lifestyle Polygraph: Personal Insights and Fun</p><p>29:41 Conclusion and Future of ThreatLocker</p>
]]></description>
      <pubDate>Wed, 3 Dec 2025 05:00:00 +0000</pubDate>
      <author>rex2@cyberflorida.org (Danny Jenkins, cyber bay, John McClane, Yazzel Corona, Threat Locker, Jack Clabby, Kayley Melton, Alex Vanscoy, cyber florida, Rex Wilson, cyberbay, Ernie Ferraresso)</author>
      <link>https://no-password-required.simplecast.com/episodes/danny-jenkins-YEQHIMdZ</link>
      <media:thumbnail height="720" url="https://image.simplecastcdn.com/images/d43689d3-22e4-45dd-97ad-4c2145bc601b/f93ee506-0a2d-4ff6-8194-28d3304df7be/youtube-template-danny.jpg" width="1280"/>
      <content:encoded><![CDATA[<p><strong>Danny Jenkins — Founder of ThreatLocker and the Zero-Trust Revolution</strong></p><p>Danny Jenkins is the CEO of ThreatLocker, the leading cybersecurity company that he built alongside his wife. Hosts Jack Clabby of Carlton Fields, P.A., and Kayley Melton of the Cognitive Security Institute follow Danny’s journey from a scrappy IT consultant to leading one of the fastest-growing cybersecurity companies in the world.</p><p>Danny shares the moment everything changed: watching a small business nearly collapse after a catastrophic ransomware attack. That experience reshaped his mission and ultimately sparked the creation of ThreatLocker. He also reflects on the gritty early days—cold-calling from his living room, coding through the night, and taking on debt before finally landing their first $5,000 customer.</p><p>Danny explains the origins of Zero Trust World, his passion for educating IT teams, and why adopting a hacker mindset is essential for modern defenders.</p><p>In the Lifestyle Polygraph, Danny relates his early “revenge tech” against school bullies, the place he escapes to when celebrating big wins, and the movie franchise he insists is absolutely a Christmas classic.</p><p>Follow Danny on LinkedIn: <a href="https://www.linkedin.com/in/dannyjenkins/">https://www.linkedin.com/in/dannyjenkins/</a></p><p> </p><p>00:00 Introduction to Cybersecurity and ThreatLocker</p><p>02:26 The Birth of ThreatLocker: A Personal Journey</p><p>05:42 The Evolution of Zero Trust Security</p><p>08:35 Real-World Impact of Cyber Attacks</p><p>11:25 The Importance of a Hacker Mindset</p><p>14:46 The Role of SOC Teams in Cybersecurity</p><p>17:34 Building a Culture of Security</p><p>20:23 Hiring for Passion and Skill in Cybersecurity</p><p>23:44 Understanding Zero Trust: Trust No One</p><p>26:32 Lifestyle Polygraph: Personal Insights and Fun</p><p>29:41 Conclusion and Future of ThreatLocker</p>
]]></content:encoded>
      <enclosure length="35539293" type="audio/mpeg" url="https://dts.podtrac.com/redirect.mp3/cdn.simplecast.com/audio/ba5244e0-cb0d-4762-b681-e884e01b43fb/episodes/a984066b-9995-4352-8183-14593f7e68cd/audio/6edf6724-fd1e-496e-9621-2d35d732b3b7/default_tc.mp3?aid=rss_feed&amp;feed=YGJgknbK"/>
      <itunes:title>No Password Required Podcast Episode 66 — Danny Jenkins</itunes:title>
      <itunes:author>Danny Jenkins, cyber bay, John McClane, Yazzel Corona, Threat Locker, Jack Clabby, Kayley Melton, Alex Vanscoy, cyber florida, Rex Wilson, cyberbay, Ernie Ferraresso</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/d43689d3-22e4-45dd-97ad-4c2145bc601b/ebc4b5c7-ba10-40cb-ad66-8059b5434066/3000x3000/danny-episode-art.jpg?aid=rss_feed"/>
      <itunes:duration>00:36:58</itunes:duration>
      <itunes:summary>Danny Jenkins — Founder of ThreatLocker and the Zero-Trust Revolution

Danny Jenkins is the CEO of ThreatLocker, the leading cybersecurity company that he built alongside his wife. Hosts Jack Clabby of Carlton Fields, P.A., and Kayley Melton of the Cognitive Security Institute follow Danny’s journey from a scrappy IT consultant to leading one of the fastest-growing cybersecurity companies in the world.

Danny shares the moment everything changed: watching a small business nearly collapse after a catastrophic ransomware attack. That experience reshaped his mission and ultimately sparked the creation of ThreatLocker. He also reflects on the gritty early days—cold-calling from his living room, coding through the night, and taking on debt before finally landing their first $5,000 customer.

Danny explains the origins of Zero Trust World, his passion for educating IT teams, and why adopting a hacker mindset is essential for modern defenders.

In the Lifestyle Polygraph, Danny relates his early “revenge tech” against school bullies, the place he escapes to when celebrating big wins, and the movie franchise he insists is absolutely a Christmas classic. 

Follow Danny on LinkedIn: https://www.linkedin.com/in/dannyjenkins/
</itunes:summary>
      <itunes:subtitle>Danny Jenkins — Founder of ThreatLocker and the Zero-Trust Revolution

Danny Jenkins is the CEO of ThreatLocker, the leading cybersecurity company that he built alongside his wife. Hosts Jack Clabby of Carlton Fields, P.A., and Kayley Melton of the Cognitive Security Institute follow Danny’s journey from a scrappy IT consultant to leading one of the fastest-growing cybersecurity companies in the world.

Danny shares the moment everything changed: watching a small business nearly collapse after a catastrophic ransomware attack. That experience reshaped his mission and ultimately sparked the creation of ThreatLocker. He also reflects on the gritty early days—cold-calling from his living room, coding through the night, and taking on debt before finally landing their first $5,000 customer.

Danny explains the origins of Zero Trust World, his passion for educating IT teams, and why adopting a hacker mindset is essential for modern defenders.

In the Lifestyle Polygraph, Danny relates his early “revenge tech” against school bullies, the place he escapes to when celebrating big wins, and the movie franchise he insists is absolutely a Christmas classic. 

Follow Danny on LinkedIn: https://www.linkedin.com/in/dannyjenkins/
</itunes:subtitle>
      <itunes:keywords>cyber bay summit, cybersecurity strategy, support, zero trust world, employee access, incident response, cybersecurity movies, reality shift, antivirus, hurricane, cybersecurity education, cyber defense, risk management, soc team, malware, work ethic, trust model, christmas movie, least privilege principle, threatlocker studio, passion, family business, data protection, company culture, cybersecurity innovation, cyber florida, podcast, hiring, lifestyle polygraph, small business security, cybersecurity leadership, hacker mindset, zero trust, windows 3.1, system hardening, leadership, danny jenkins, configuration issues, ransomware recovery, autoexec.bat, configuration checks, tampa florida., helicopter demo, threat prevention, revenge hack, cybersecurity, cloud security, webinars, security controls, coo, wi-fi pineapple, school computers, smart employees, problem solving, it operations, burnout, work-life balance, floppy disks, software updates, mdr, application whitelisting, network security, data recovery, tampa florida, swordfish, teamwork, diy projects, least privilege, free trial, resilience, ransomware, product care, jack klabby, defense strategy, cyber attacks, corporate it, hr, threatlocker events, die hard, family, cognitive security institute, hacking mindset, edr, prevention, ethical hacking, endpoint protection, no password required, motivation, threatlocker, swimming pool, privilege management, cybersecurity squad, demo, home renovation, hacking, kayley milton, humor, spouse partnership, security awareness, configuration management, access control, carlton fields</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>66</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">69557e29-d846-40d3-b0fd-32b886f3d041</guid>
      <title>No Password Required Podcast Episode 65 — Steve Orrin</title>
      <description><![CDATA[<p>Summary</p><p>In this episode of No Password Required, host Jack Clabby and Kayley Melton engage with Steve Orrin, the federal CTO at Intel, discussing the evolving landscape of cybersecurity, the importance of diverse teams, and the intersection of technology and security. Steve shares insights from his extensive career, including his experiences in the startup scene, the significance of AI and IoT, and the critical blind spots in cybersecurity practices. The conversation also touches on nurturing talent in technology and offers valuable advice for young professionals entering the field.</p><p>Chapters</p><p>00:00 Introduction to Cybersecurity and the Edge</p><p>01:48 Steve Orrin's Role at Intel</p><p>04:51 The Evolution of Security Technology</p><p>09:07 The Startup Scene in the 90s</p><p>13:00 The Intersection of Biology and Technology</p><p>15:52 The Importance of AI and IoT</p><p>20:30 Blind Spots in Cybersecurity</p><p>25:38 Nurturing Talent in Technology</p><p>28:57 Advice for Young Cybersecurity Professionals</p><p>32:10 Lifestyle Polygraph: Fun Questions with Steve</p>
]]></description>
      <pubDate>Tue, 4 Nov 2025 05:00:00 +0000</pubDate>
      <author>rex2@cyberflorida.org (Yazzel Corona, Steve Orrin, Intel, Lead Cenobite, Pinhead, Hellraiser, Kenny Rogers, H. P. Lovecraft, Star Wars, Jedi, Jack Clabby, Rex Wilson, Carlton Fields, Alex Vanscoy, Devin Malice, Ernie Ferraresso, Cognitive Security Institute, cyber florida)</author>
      <link>https://no-password-required.simplecast.com/episodes/no-password-required-podcast-episode-65-steve-orrin-gb9Kuo71</link>
      <media:thumbnail height="720" url="https://image.simplecastcdn.com/images/d43689d3-22e4-45dd-97ad-4c2145bc601b/b76af733-18c4-4282-be53-6f2261d1cf7c/youtube-template-steve-20orrin.jpg" width="1280"/>
      <content:encoded><![CDATA[<p>Summary</p><p>In this episode of No Password Required, host Jack Clabby and Kayley Melton engage with Steve Orrin, the federal CTO at Intel, discussing the evolving landscape of cybersecurity, the importance of diverse teams, and the intersection of technology and security. Steve shares insights from his extensive career, including his experiences in the startup scene, the significance of AI and IoT, and the critical blind spots in cybersecurity practices. The conversation also touches on nurturing talent in technology and offers valuable advice for young professionals entering the field.</p><p>Chapters</p><p>00:00 Introduction to Cybersecurity and the Edge</p><p>01:48 Steve Orrin's Role at Intel</p><p>04:51 The Evolution of Security Technology</p><p>09:07 The Startup Scene in the 90s</p><p>13:00 The Intersection of Biology and Technology</p><p>15:52 The Importance of AI and IoT</p><p>20:30 Blind Spots in Cybersecurity</p><p>25:38 Nurturing Talent in Technology</p><p>28:57 Advice for Young Cybersecurity Professionals</p><p>32:10 Lifestyle Polygraph: Fun Questions with Steve</p>
]]></content:encoded>
      <enclosure length="43128095" type="audio/mpeg" url="https://dts.podtrac.com/redirect.mp3/cdn.simplecast.com/audio/ba5244e0-cb0d-4762-b681-e884e01b43fb/episodes/ee67a00d-17ac-45de-99f2-6168f0defe99/audio/83382bc5-c8bc-4893-8c98-4f075c80fbec/default_tc.mp3?aid=rss_feed&amp;feed=YGJgknbK"/>
      <itunes:title>No Password Required Podcast Episode 65 — Steve Orrin</itunes:title>
      <itunes:author>Yazzel Corona, Steve Orrin, Intel, Lead Cenobite, Pinhead, Hellraiser, Kenny Rogers, H. P. Lovecraft, Star Wars, Jedi, Jack Clabby, Rex Wilson, Carlton Fields, Alex Vanscoy, Devin Malice, Ernie Ferraresso, Cognitive Security Institute, cyber florida</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/d43689d3-22e4-45dd-97ad-4c2145bc601b/bd23ca33-8917-4ede-84c6-a6d55ba86d29/3000x3000/steve-20orrin-episode-art.jpg?aid=rss_feed"/>
      <itunes:duration>00:44:51</itunes:duration>
      <itunes:summary>Steve Orrin — From Biology to the Edge: Building Trust at Intel and the Poker Table

Steve Orrin, Federal Chief Technologist at Intel Corporation, has forged a career that bridges biology, cybersecurity startups, and large-scale technology leadership. In this episode, hosts Jack Clabby of Carlton Fields, P.A., and Kayley Melton of the Cognitive Security Institute explore Steve’s journey—from early hacking and biochemistry research to founding startups and shaping the future of secure innovation at Intel.
Steve explains how “the Edge” has evolved from basic IoT devices into a powerful ecosystem driving everything from aircraft to MRI machines. He shares hard-won lessons on building high-performing teams, nurturing talent, and embedding security from the very start—never as an afterthought.

In the Lifestyle Polygraph, Steve reveals the ambitious “counter-AI” project he’d launch with an unlimited Intel budget and shares the best poker tell he’s ever spotted at the World Series of Poker.

Follow Steve on LinkedIn: https://www.linkedin.com/in/sorrin/ 
</itunes:summary>
      <itunes:subtitle>Steve Orrin — From Biology to the Edge: Building Trust at Intel and the Poker Table

Steve Orrin, Federal Chief Technologist at Intel Corporation, has forged a career that bridges biology, cybersecurity startups, and large-scale technology leadership. In this episode, hosts Jack Clabby of Carlton Fields, P.A., and Kayley Melton of the Cognitive Security Institute explore Steve’s journey—from early hacking and biochemistry research to founding startups and shaping the future of secure innovation at Intel.
Steve explains how “the Edge” has evolved from basic IoT devices into a powerful ecosystem driving everything from aircraft to MRI machines. He shares hard-won lessons on building high-performing teams, nurturing talent, and embedding security from the very start—never as an afterthought.

In the Lifestyle Polygraph, Steve reveals the ambitious “counter-AI” project he’d launch with an unlimited Intel budget and shares the best poker tell he’s ever spotted at the World Series of Poker.

Follow Steve on LinkedIn: https://www.linkedin.com/in/sorrin/ 
</itunes:subtitle>
      <itunes:keywords>pattern recognition, ai deception detection, government technology, authenticity verification, call of cthulhu, misinformation, pinhead, fantasy cybersecurity squad, security design, research awareness, the edge, emerging technologies, learning from failure, federal government, collaboration, iot, poker, predictive analytics, customer focus, technology and imagination, internet of things, cryptography, attacker mindset, human factors in cybersecurity, next-generation ai training, compliance, innovation culture, team building, phishing, linkedin networking, horror movie analogy, project ownership, ai manipulation, biochemistry background, code cracking, sci-fi artifacts, human psychology, data protection, cybersecurity awareness., networking, trust in ai, hacker versus engineer, intel corporation, cellular systems, kali linux, hacker mindset, hiring experts, zero trust, ai security, usability in cybersecurity, threat intelligence, intel public sector, reliability engineering, governance, leadership philosophy, social engineering, pathfinding, solving real problems, applied ai, machine learning, llm monitoring, cybersecurity, experiential learning, startup culture, team dynamics, jim collins, fedramp, diversity of thought, continuous monitoring, mathematicians and probability, edge computing, exploit discovery, teaching the hacker mindset, deception detection, buffer overflow, hesitation cues, hacker mentality, def con, ai at the edge, world series of poker, steve orrin, firmware innovation, technology leadership, deployment at scale, failure analysis, innovation, ease of adoption, performance optimization, quality of service, artificial intelligence, listening to customers, nurturing talent, mainframe security, bruce schneier, adversarial ai, lovecraft, east coast tech, creative collaboration, ai ethics, hardware security, cloud computing, built to last, leadership roles, mentorship, cross-domain collaboration, engineers and logic, physical security, intelligence community, humor in tech, cybersecurity parallels, body language, web security, homeland security, hacking mindset, hands-on learning, generative ai, ethical hacking, military communications, surrounding yourself with smart people, hackathons, gambler’s mindset, break then build, destructive thinking, ai experts, interdisciplinary teamwork, veterans administration, puzzle box, deepfakes, security fundamentals, foresight in technology, autonomy, innovation through collaboration, secure development lifecycle, collectibles, hardware hacking village, critical thinking, good to great, poker tells, federal programs, innovation driven by customer needs, career journey, hellraiser, firmware, ai governance, ai path prediction, security blind spots, podcast outro, right people on the bus, startups, counter-ai, cybersecurity career advice, department of defense, encryption, family and learning, culture of security, intel federal cto, capture the flag, pop culture and cybersecurity, diversity of background, community engagement, behavioral analysis, scalability, technological foresight, innovation versus invention</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>65</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">e81b94dd-3699-4886-9924-3fd50cd4cee5</guid>
      <title>No Password Required Podcast Episode 64 — DeMarcus Williams</title>
      <description><![CDATA[<p>Starbucks’ Security Pro Went from Cyber Competitions to Corporate Red Teaming</p><p>DeMarcus Williams, a senior security engineer at Starbucks, has built a career defined by creativity, intuition, and persistence. With roles at the U.S. Department of Defense, AWS/Amazon, and now Starbucks, he specializes in offensive security, red teaming, and adversary emulation. In this episode, DeMarcus joins Jack Clabby of Carlton Fields, P.A. and Cyber Florida’s Sarina Gandy (guesting hosting) to share how his love of video games first sparked his cybersecurity journey—and how competitions like the Southeast Collegiate Cyber Defense Competition (SECCDC) cemented his path.</p><p>DeMarcus opens up about overcoming imposter syndrome, the unique work-life balance he’s found at Starbucks, and why half of his red teaming comes down to gut instinct. He shares the difference between penetration testing and red teaming, what it’s like preparing for full-scale global operations, and the hacker mindset that still kicks in whenever he walks into a Starbucks café.</p><p>In the Lifestyle Polygraph segment, Sarina poses the ultimate face-off: what’s the bigger moment—the walk-up to a boxing ring or to the DEF CON keynote stage? And, between Stone Cold, The Rock, and The Undertaker, who would dominate in a Capture the Flag competition?</p><p>Follow DeMarcus on Twitter: https://x.com/medarkus_  @ medarkus_</p><p> </p><p>Chapters</p><p>00:00 Introduction to Cybersecurity and Curiosity</p><p>02:47 Day-to-Day Life of a Senior Security Engineer</p><p>05:30 The Role of Gut Instinct in Cybersecurity</p><p>08:31 Early Inspirations and the Journey into Cybersecurity</p><p>11:35 The Importance of Competitions in Career Development</p><p>14:33 Transitioning from Student to Professional</p><p>17:34 The Red Team Experience and Its Impact</p><p>20:25 Recruitment Opportunities in Cybersecurity Competitions</p><p>23:33 Navigating Corporate Culture in Cybersecurity</p><p>26:31 Mentorship and People-First Approach</p><p>29:11 Lifestyle Polygraph and Fun Insights</p>
]]></description>
      <pubDate>Mon, 29 Sep 2025 04:05:00 +0000</pubDate>
      <author>rex2@cyberflorida.org (DeMarcus Williams, The Rock, Dwayne Johnson, Stone Cold Steve Austin, Starbucks, The Undertaker, caffeine, CCDC, SECCDC, Alex Vanscoy, Cognitive Security Institute, Carlton Fields, Devin Malice, Ernie Ferraresso, Kayley Melton, Sarina Gandy, Rex Wilson, Jack Clabby)</author>
      <link>https://no-password-required.simplecast.com/episodes/no-password-required-podcast-episode-64-demarcus-williams-ykyJCw_B</link>
      <media:thumbnail height="720" url="https://image.simplecastcdn.com/images/d43689d3-22e4-45dd-97ad-4c2145bc601b/3b8e7502-b05b-4bee-a2cb-f3d88f3b7a4d/youtube-template-demarcus.jpg" width="1280"/>
      <content:encoded><![CDATA[<p>Starbucks’ Security Pro Went from Cyber Competitions to Corporate Red Teaming</p><p>DeMarcus Williams, a senior security engineer at Starbucks, has built a career defined by creativity, intuition, and persistence. With roles at the U.S. Department of Defense, AWS/Amazon, and now Starbucks, he specializes in offensive security, red teaming, and adversary emulation. In this episode, DeMarcus joins Jack Clabby of Carlton Fields, P.A. and Cyber Florida’s Sarina Gandy (guesting hosting) to share how his love of video games first sparked his cybersecurity journey—and how competitions like the Southeast Collegiate Cyber Defense Competition (SECCDC) cemented his path.</p><p>DeMarcus opens up about overcoming imposter syndrome, the unique work-life balance he’s found at Starbucks, and why half of his red teaming comes down to gut instinct. He shares the difference between penetration testing and red teaming, what it’s like preparing for full-scale global operations, and the hacker mindset that still kicks in whenever he walks into a Starbucks café.</p><p>In the Lifestyle Polygraph segment, Sarina poses the ultimate face-off: what’s the bigger moment—the walk-up to a boxing ring or to the DEF CON keynote stage? And, between Stone Cold, The Rock, and The Undertaker, who would dominate in a Capture the Flag competition?</p><p>Follow DeMarcus on Twitter: https://x.com/medarkus_  @ medarkus_</p><p> </p><p>Chapters</p><p>00:00 Introduction to Cybersecurity and Curiosity</p><p>02:47 Day-to-Day Life of a Senior Security Engineer</p><p>05:30 The Role of Gut Instinct in Cybersecurity</p><p>08:31 Early Inspirations and the Journey into Cybersecurity</p><p>11:35 The Importance of Competitions in Career Development</p><p>14:33 Transitioning from Student to Professional</p><p>17:34 The Red Team Experience and Its Impact</p><p>20:25 Recruitment Opportunities in Cybersecurity Competitions</p><p>23:33 Navigating Corporate Culture in Cybersecurity</p><p>26:31 Mentorship and People-First Approach</p><p>29:11 Lifestyle Polygraph and Fun Insights</p>
]]></content:encoded>
      <enclosure length="41331452" type="audio/mpeg" url="https://dts.podtrac.com/redirect.mp3/cdn.simplecast.com/audio/ba5244e0-cb0d-4762-b681-e884e01b43fb/episodes/96e32603-2589-43ce-ba82-a0c54a346dcd/audio/f417792d-2183-499b-9611-037e6e5b50b4/default_tc.mp3?aid=rss_feed&amp;feed=YGJgknbK"/>
      <itunes:title>No Password Required Podcast Episode 64 — DeMarcus Williams</itunes:title>
      <itunes:author>DeMarcus Williams, The Rock, Dwayne Johnson, Stone Cold Steve Austin, Starbucks, The Undertaker, caffeine, CCDC, SECCDC, Alex Vanscoy, Cognitive Security Institute, Carlton Fields, Devin Malice, Ernie Ferraresso, Kayley Melton, Sarina Gandy, Rex Wilson, Jack Clabby</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/d43689d3-22e4-45dd-97ad-4c2145bc601b/1c8fa1e4-04a4-41e9-a728-c33fd6b9d8f2/3000x3000/demarcus-episode-art.jpg?aid=rss_feed"/>
      <itunes:duration>00:42:59</itunes:duration>
      <itunes:summary>DeMarcus Williams — Starbucks’ Security Pro Went from Cyber Competitions to Corporate Red Teaming

DeMarcus Williams, a senior security engineer at Starbucks, has built a career defined by creativity, intuition, and persistence. With roles at the U.S. Department of Defense, AWS/Amazon, and now Starbucks, he specializes in offensive security, red teaming, and adversary emulation. In this episode, DeMarcus joins Jack Clabby of Carlton Fields, P.A. and Cyber Florida’s Sarina Gandy (guesting hosting) to share how his love of video games first sparked his cybersecurity journey—and how competitions like the Southeast Collegiate Cyber Defense Competition (SECCDC) cemented his path.

DeMarcus opens up about overcoming imposter syndrome, the unique work-life balance he’s found at Starbucks, and why half of his red teaming comes down to gut instinct. He shares the difference between penetration testing and red teaming, what it’s like preparing for full-scale global operations, and the hacker mindset that still kicks in whenever he walks into a Starbucks café.

In the Lifestyle Polygraph segment, Sarina poses the ultimate face-off: what’s the bigger moment—the walk-up to a boxing ring or to the DEF CON keynote stage? And, between Stone Cold, The Rock, and The Undertaker, who would dominate in a Capture the Flag competition?

Follow DeMarcus on Twitter: https://x.com/medarkus_  @ medarkus_
</itunes:summary>
      <itunes:subtitle>DeMarcus Williams — Starbucks’ Security Pro Went from Cyber Competitions to Corporate Red Teaming

DeMarcus Williams, a senior security engineer at Starbucks, has built a career defined by creativity, intuition, and persistence. With roles at the U.S. Department of Defense, AWS/Amazon, and now Starbucks, he specializes in offensive security, red teaming, and adversary emulation. In this episode, DeMarcus joins Jack Clabby of Carlton Fields, P.A. and Cyber Florida’s Sarina Gandy (guesting hosting) to share how his love of video games first sparked his cybersecurity journey—and how competitions like the Southeast Collegiate Cyber Defense Competition (SECCDC) cemented his path.

DeMarcus opens up about overcoming imposter syndrome, the unique work-life balance he’s found at Starbucks, and why half of his red teaming comes down to gut instinct. He shares the difference between penetration testing and red teaming, what it’s like preparing for full-scale global operations, and the hacker mindset that still kicks in whenever he walks into a Starbucks café.

In the Lifestyle Polygraph segment, Sarina poses the ultimate face-off: what’s the bigger moment—the walk-up to a boxing ring or to the DEF CON keynote stage? And, between Stone Cold, The Rock, and The Undertaker, who would dominate in a Capture the Flag competition?

Follow DeMarcus on Twitter: https://x.com/medarkus_  @ medarkus_
</itunes:subtitle>
      <itunes:keywords>fantasy cybersecurity squad, raytheon, red vs blue team, incident response, corporate cybersecurity, lacroix, student to professional, stone cold steve austin, doritos, cyber career journey, university of south alabama, aws, dragon ball z scouter, mental toughness, wwe, cybersecurity podcast, cyber careers, cyber florida, intuition in cybersecurity, temp out magazine, senior security engineer, amazon, video games, penetration testing, video games to cybersecurity, starbucks, mentorship in cybersecurity, seccdc, infosec community, cybersecurity, retail security, ccdc, cyber competitions, home labs, offensive security, reverse engineering, open wi-fi risks, corporate culture, ctf competitions, work-life balance, people-first culture, cyber hygiene, defcon keynote, competitions, demarcus williams, government vs corporate, net spooky, hacking community, sarina gandy, mentorship, gut instinct, imposter syndrome, cyberbay podcast, boxing, hacking mindset, red team, no password required., underdog team, security engineer, no password required podcast, hacker snacks, cybersecurity recruiting, career development, career in cyber, cybersecurity careers, government contracting, hacking, alexa source code</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>64</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">2473aab1-722d-4aa0-9adb-bc3145d5d2da</guid>
      <title>No Password Required Podcast Episode 63 — Jon Schipp</title>
      <description><![CDATA[<p>Summary</p><p>In this episode of No Password Required, host Jack Clabby and co-host Kayleigh Melton engage in a lively conversation with John Shipp, a product strategist at Rapid7. They explore John's unique journey from a metalhead to a cybersecurity expert, discussing the importance of passion in career development, the intricacies of product management, and the significance of customer insights in shaping cybersecurity solutions. John shares his early experiences in hacking, the influence of music on his life, and the value of building strong teams and company culture. The episode concludes with a fun segment called the Lifestyle Polygraph, where John answers quirky questions about his ideal cyber team and his dream day with Ric Flair.</p><p>Chapters</p><p>00:00 Introduction to Cybersecurity and Personal Journeys</p><p>02:49 The Role of Passion in Career Development</p><p>05:21 Navigating Product Management and Market Strategy</p><p>08:23 The Evolution of Cybersecurity Skills</p><p>11:37 The Importance of Customer Insights in Product Development</p><p>14:35 Early Experiences in Hacking and Cybersecurity</p><p>17:24 The Influence of Music on Personal and Professional Life</p><p>20:19 Building Teams and Company Culture</p><p>23:10 Startup Life and Risk Management</p><p>26:08 Lifestyle Polygraph: Fun Questions and Insights</p><p>29:13 Final Thoughts and Connections</p><p> </p>
]]></description>
      <pubDate>Mon, 25 Aug 2025 04:05:00 +0000</pubDate>
      <author>rex2@cyberflorida.org (Ric Flair, tampa, Jon Schipp, Rapid7, Metallica, Bob Ross of InfoSec, Ric Flair of cybersecurity, Leslie Knope, Cognitive Security Institute, Jack Clabby, Ernie Ferraresso, Kayley Melton, Devin Malice, Rex Wilson, Alex Vanscoy, Carlton Fields, Cyber Florida)</author>
      <link>https://no-password-required.simplecast.com/episodes/no-password-required-podcast-episode-63-jon-schipp-fuYBlVmb</link>
      <media:thumbnail height="720" url="https://image.simplecastcdn.com/images/d43689d3-22e4-45dd-97ad-4c2145bc601b/233cc0a4-1af6-45ef-94a3-91b46527cf0c/youtube-template-jon-20schipp.jpg" width="1280"/>
      <content:encoded><![CDATA[<p>Summary</p><p>In this episode of No Password Required, host Jack Clabby and co-host Kayleigh Melton engage in a lively conversation with John Shipp, a product strategist at Rapid7. They explore John's unique journey from a metalhead to a cybersecurity expert, discussing the importance of passion in career development, the intricacies of product management, and the significance of customer insights in shaping cybersecurity solutions. John shares his early experiences in hacking, the influence of music on his life, and the value of building strong teams and company culture. The episode concludes with a fun segment called the Lifestyle Polygraph, where John answers quirky questions about his ideal cyber team and his dream day with Ric Flair.</p><p>Chapters</p><p>00:00 Introduction to Cybersecurity and Personal Journeys</p><p>02:49 The Role of Passion in Career Development</p><p>05:21 Navigating Product Management and Market Strategy</p><p>08:23 The Evolution of Cybersecurity Skills</p><p>11:37 The Importance of Customer Insights in Product Development</p><p>14:35 Early Experiences in Hacking and Cybersecurity</p><p>17:24 The Influence of Music on Personal and Professional Life</p><p>20:19 Building Teams and Company Culture</p><p>23:10 Startup Life and Risk Management</p><p>26:08 Lifestyle Polygraph: Fun Questions and Insights</p><p>29:13 Final Thoughts and Connections</p><p> </p>
]]></content:encoded>
      <enclosure length="50727561" type="audio/mpeg" url="https://dts.podtrac.com/redirect.mp3/cdn.simplecast.com/audio/ba5244e0-cb0d-4762-b681-e884e01b43fb/episodes/8a69e5e8-051a-484a-b96c-6a7974108d8a/audio/f3a1396a-4761-4642-acc5-850ab78e9eea/default_tc.mp3?aid=rss_feed&amp;feed=YGJgknbK"/>
      <itunes:title>No Password Required Podcast Episode 63 — Jon Schipp</itunes:title>
      <itunes:author>Ric Flair, tampa, Jon Schipp, Rapid7, Metallica, Bob Ross of InfoSec, Ric Flair of cybersecurity, Leslie Knope, Cognitive Security Institute, Jack Clabby, Ernie Ferraresso, Kayley Melton, Devin Malice, Rex Wilson, Alex Vanscoy, Carlton Fields, Cyber Florida</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/d43689d3-22e4-45dd-97ad-4c2145bc601b/431795ce-4e91-4b94-a286-2aaada16ba50/3000x3000/jon-20schipp-episode-art.jpg?aid=rss_feed"/>
      <itunes:duration>00:52:45</itunes:duration>
      <itunes:summary>Jon Schipp — From Heavy Metal to the Front Lines of Cyber Innovation

Jon Schipp, the “Ric Flair of Cybersecurity,” is the Senior Director of Inorganic Growth Strategy at Rapid7. Schipp mixes cyber technical mastery, business acumen, and stage presence, to identity mergers and partnerships for his company’s growing cybersecurity platform. He shares his story with hosts Jack Clabby of Carlton Fields, P.A., and, Kayley Melton, Executive Director of Operations at the Cognitive Security Institute, starting with his early days in the Midwestern heavy metal scene.

He opens up about couch-surfing his way to hacker conferences as a teenager, the role of music in shaping his professional edge, and why knowledge—not money—has always been his north star. With a background in security engineering, incident response, and software development, Schipp explains that curiosity has been the through-line in his journey and how his own startup experience prepared him to evaluate new technologies and teams. He also tells the story of a pitch so good it left the room stunned.

In the Lifestyle Polygraph segment, Jon reveals his dream guitar (an elusive LTD H-300 last seen in Evansville, Indiana) and gives the audience a crash course in heavy metal history. Plus, you’ll hear the tale of a push-up challenge that became an unforgettable part of a job interview—and meet Kayley’s cat, Little Baby, making her YouTube debut.

Follow Jon on LinkedIn: https://www.linkedin.com/in/jonschipp/
</itunes:summary>
      <itunes:subtitle>Jon Schipp — From Heavy Metal to the Front Lines of Cyber Innovation

Jon Schipp, the “Ric Flair of Cybersecurity,” is the Senior Director of Inorganic Growth Strategy at Rapid7. Schipp mixes cyber technical mastery, business acumen, and stage presence, to identity mergers and partnerships for his company’s growing cybersecurity platform. He shares his story with hosts Jack Clabby of Carlton Fields, P.A., and, Kayley Melton, Executive Director of Operations at the Cognitive Security Institute, starting with his early days in the Midwestern heavy metal scene.

He opens up about couch-surfing his way to hacker conferences as a teenager, the role of music in shaping his professional edge, and why knowledge—not money—has always been his north star. With a background in security engineering, incident response, and software development, Schipp explains that curiosity has been the through-line in his journey and how his own startup experience prepared him to evaluate new technologies and teams. He also tells the story of a pitch so good it left the room stunned.

In the Lifestyle Polygraph segment, Jon reveals his dream guitar (an elusive LTD H-300 last seen in Evansville, Indiana) and gives the audience a crash course in heavy metal history. Plus, you’ll hear the tale of a push-up challenge that became an unforgettable part of a job interview—and meet Kayley’s cat, Little Baby, making her YouTube debut.

Follow Jon on LinkedIn: https://www.linkedin.com/in/jonschipp/
</itunes:subtitle>
      <itunes:keywords>dial-up internet, nmap, fantasy cybersecurity squad, cybersecurity career journey, incident response, touring struggles, piracy, robes and wrestling, curiosity, cybersecurity community, startup exit, team culture, metallica, dcc bots, slackware, war driving, sleeping on floors, music, risk tolerance, detection and response, death metal, cyber career advice, bureaucracy, ethics, communication skills, now you see me, diy mindset, cybersecurity innovation, lifestyle polygraph, product strategy, irc, tampa tech scene, board advisory, penetration testing, cybersecurity, market evangelism, metalcore, startup acquisition, parks and rec, visual basic, ric flair of cybersecurity, touring stories, heavy metal, work-life balance, rapid7, black hat, the wire, innovation, myspace, cybersecurity tools, dexter, vulnerability management, teamwork, surface command, hacking origins, startup journey, hacker conferences, cigars, mentorship, band life, soar product, ybor city, arp spoofing, leslie knope, cybersecurity product growth, hacker nostalgia, hacker community, asset management, entrepreneurship, programming, angsty teenager, partnerships, stolen guitar, punk rock, go-to-market, hardcore, resume transfers, metal bands, acquisition, ric flair, push-up contest, relationship building, guitar, mergers and acquisitions, interview stories, hacker culture, attack surface management, startups, tampa, ltd h300, customer research, bob ross of infosec, venture capital, internal and external asm</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>63</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">13489b73-dae7-4835-b59d-443d98c6d24b</guid>
      <title>No Password Required Podcast Episode 62 — Kurt Sanger</title>
      <description><![CDATA[<p>Summary</p><p>In this episode of No Password Required, hosts Jack Clabby and Kayley Melton sit down with Kurt Sanger — former Deputy General Counsel at U.S. Cyber Command — to talk about the evolving world of cyber law, the wild ride from government service to private sector strategy, and what keeps him grounded in a field that’s constantly shifting. Kurt dives into the fast-growing cybersecurity scene in Tampa, the power of mentorship, and why people still get cyber law so wrong. Plus: insights on responding to incidents under pressure and what role the government should (and shouldn’t) play in the digital fight.</p><p> </p><p>Chapters</p><p>00:00 NPR S6E7 Kurt Sanger</p><p>52:53 NPR S6E7 Kurt Sanger</p><p>01:45:47 Introduction to Cybersecurity Conversations</p><p>01:48:22 Transitioning from Military to Private Sector Cybersecurity</p><p>01:51:11 The Growth of Tampa as a Cybersecurity Hub</p><p>01:54:05 Understanding Cybersecurity Misconceptions</p><p>01:57:15 The Role of Mentorship in Cybersecurity Careers</p><p>02:00:24 Military vs. Civilian Cybersecurity Law</p><p>02:03:07 The Excitement of Cyber Command vs. Private Sector</p><p>02:13:52 High Stakes in Cybersecurity for Small Organizations</p><p>02:15:44 The Role of Legal Experts in Cybersecurity</p><p>02:17:21 Translating Technical Jargon for Clients</p><p>02:18:57 Challenges of Explaining Cyber Operations to Commanders</p><p>02:22:43 Lifestyle Polygraph: Fun Questions and Insights</p><p>02:23:30 The 10,000 Hour Rule in Cybersecurity</p><p>02:29:34 Creative Freedom with LEGO Bricks</p><p>02:31:27 Tampa's Culinary Delights and Local Favorites</p>
]]></description>
      <pubDate>Tue, 29 Jul 2025 04:00:00 +0000</pubDate>
      <author>rex2@cyberflorida.org (Jack Clabby, Rex Wilson, Alex Vanscoy, Kayley Melton, Ernie Ferraresso, Carlton Fields, Cyber Florida, Cognitive Security Institute, Buchanan Ingersoll &amp; Rooney, Devin Malice)</author>
      <link>https://no-password-required.simplecast.com/episodes/no-password-required-podcast-episode-62-kurt-sanger-fxqSB7nr</link>
      <media:thumbnail height="720" url="https://image.simplecastcdn.com/images/d43689d3-22e4-45dd-97ad-4c2145bc601b/4f585ec1-9e26-41aa-b98d-9a15ac099e3e/youtube-template-kurt-20sanger.jpg" width="1280"/>
      <content:encoded><![CDATA[<p>Summary</p><p>In this episode of No Password Required, hosts Jack Clabby and Kayley Melton sit down with Kurt Sanger — former Deputy General Counsel at U.S. Cyber Command — to talk about the evolving world of cyber law, the wild ride from government service to private sector strategy, and what keeps him grounded in a field that’s constantly shifting. Kurt dives into the fast-growing cybersecurity scene in Tampa, the power of mentorship, and why people still get cyber law so wrong. Plus: insights on responding to incidents under pressure and what role the government should (and shouldn’t) play in the digital fight.</p><p> </p><p>Chapters</p><p>00:00 NPR S6E7 Kurt Sanger</p><p>52:53 NPR S6E7 Kurt Sanger</p><p>01:45:47 Introduction to Cybersecurity Conversations</p><p>01:48:22 Transitioning from Military to Private Sector Cybersecurity</p><p>01:51:11 The Growth of Tampa as a Cybersecurity Hub</p><p>01:54:05 Understanding Cybersecurity Misconceptions</p><p>01:57:15 The Role of Mentorship in Cybersecurity Careers</p><p>02:00:24 Military vs. Civilian Cybersecurity Law</p><p>02:03:07 The Excitement of Cyber Command vs. Private Sector</p><p>02:13:52 High Stakes in Cybersecurity for Small Organizations</p><p>02:15:44 The Role of Legal Experts in Cybersecurity</p><p>02:17:21 Translating Technical Jargon for Clients</p><p>02:18:57 Challenges of Explaining Cyber Operations to Commanders</p><p>02:22:43 Lifestyle Polygraph: Fun Questions and Insights</p><p>02:23:30 The 10,000 Hour Rule in Cybersecurity</p><p>02:29:34 Creative Freedom with LEGO Bricks</p><p>02:31:27 Tampa's Culinary Delights and Local Favorites</p>
]]></content:encoded>
      <enclosure length="50860823" type="audio/mpeg" url="https://dts.podtrac.com/redirect.mp3/cdn.simplecast.com/audio/ba5244e0-cb0d-4762-b681-e884e01b43fb/episodes/2f9ae041-8d70-4008-86fb-5a84a185fc92/audio/aa982988-f10f-4012-b2c4-40aa0eb0f794/default_tc.mp3?aid=rss_feed&amp;feed=YGJgknbK"/>
      <itunes:title>No Password Required Podcast Episode 62 — Kurt Sanger</itunes:title>
      <itunes:author>Jack Clabby, Rex Wilson, Alex Vanscoy, Kayley Melton, Ernie Ferraresso, Carlton Fields, Cyber Florida, Cognitive Security Institute, Buchanan Ingersoll &amp; Rooney, Devin Malice</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/d43689d3-22e4-45dd-97ad-4c2145bc601b/66a7d0ed-45cb-42f0-881c-a14880a368ba/3000x3000/kurt-20sanger-episode-art.jpg?aid=rss_feed"/>
      <itunes:duration>00:52:53</itunes:duration>
      <itunes:summary>Kurt Sanger —Former Lead Attorney at U.S. Cyber Command, Cyber Law Strategist, and Appreciator of Mad Men Hats 
On this episode, hosts Jack Clabby, of Carlton Fields, P.A., and Kayley Melton, Executive Director of Operations at the Cognitive Security Institute, sit down with Kurt Sanger—a seasoned cyber law leader and former Deputy General Counsel at U.S. Cyber Command.
Kurt, who now advised clients at Buchanan Ingersoll &amp; Rooney, reflects on his 23+ years in the U.S. Marine Corps and how the adrenaline of cyber operations and policy has translated into the private sector, where he now helps clients navigate legal risk in an increasingly tech-driven world. He opens up about the difference between the proactive pace of military cyber law and the more reactive nature of corporate advisory work—and why that shift surprised him.

He also shares how moving to the Tampa Bay area shattered his assumptions about where cyber talent lives, explaining why it’s one of the most vibrant and underrated cybersecurity communities in the country. From quoting The Godfather on nation-state threats to challenging the 10,000-hour mastery rule, Kurt gives us an honest look at the evolving cyber legal landscape—and what it means for newcomers entering the field.

In the Lifestyle Polygraph segment, Kurt settles the ultimate Chicago food debate and declares a clear winner among the Windy City’s top three treats (will he choose the casserole masquerading as pizza?). He also  explains his appreciation for the stylish hats of Mad Men that he believes should make a comeback and turns the tables with a Tampa-themed question for Jack.

https://www.linkedin.com/in/kurt-sanger-311970115/
</itunes:summary>
      <itunes:subtitle>Kurt Sanger —Former Lead Attorney at U.S. Cyber Command, Cyber Law Strategist, and Appreciator of Mad Men Hats 
On this episode, hosts Jack Clabby, of Carlton Fields, P.A., and Kayley Melton, Executive Director of Operations at the Cognitive Security Institute, sit down with Kurt Sanger—a seasoned cyber law leader and former Deputy General Counsel at U.S. Cyber Command.
Kurt, who now advised clients at Buchanan Ingersoll &amp; Rooney, reflects on his 23+ years in the U.S. Marine Corps and how the adrenaline of cyber operations and policy has translated into the private sector, where he now helps clients navigate legal risk in an increasingly tech-driven world. He opens up about the difference between the proactive pace of military cyber law and the more reactive nature of corporate advisory work—and why that shift surprised him.

He also shares how moving to the Tampa Bay area shattered his assumptions about where cyber talent lives, explaining why it’s one of the most vibrant and underrated cybersecurity communities in the country. From quoting The Godfather on nation-state threats to challenging the 10,000-hour mastery rule, Kurt gives us an honest look at the evolving cyber legal landscape—and what it means for newcomers entering the field.

In the Lifestyle Polygraph segment, Kurt settles the ultimate Chicago food debate and declares a clear winner among the Windy City’s top three treats (will he choose the casserole masquerading as pizza?). He also  explains his appreciation for the stylish hats of Mad Men that he believes should make a comeback and turns the tables with a Tampa-themed question for Jack.

https://www.linkedin.com/in/kurt-sanger-311970115/
</itunes:subtitle>
      <itunes:keywords>mission-driven, plaintiff attorneys, critical infrastructure, incident response, centcom, cyber law, cyberherd, usf, chicago food, civilian law, cyber florida, lifestyle polygraph, vulnerability, translation, excitement, buchanan ingersoll &amp; rooney, florida, cybersecurity misconceptions, military law, healthcare breaches, public-private partnerships., hats, cybersecurity, cybersecurity growth, synapse, mad men, cybersecurity attorney, regulation, marines, socom, ransomware, cyberattacks, private sector, mentorship, legal, offensive mindset, cognitive security institute, kayley melton, jack clabby, nation state, private defense, intelligence, tampa cybersecurity, cyber command, buchanan ingersoll, military transition, cyber operations, transition, tampa, iran, kurt sanger, network defense, digital threats, carlton fields, technical communication, national security, legal perspectives</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>62</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">59d11296-0c46-49a6-a52f-566823c39347</guid>
      <title>On No Password Required Podcast Episode 61 — Kathy Collins</title>
      <description><![CDATA[<p>Summary</p><p>In this episode of the No Password Required podcast, host Jack Clabby and co-host Kaylee Melton welcome Kathy Collins, a security consultant at Secure Ideas. Kathy shares her unique journey from working in IT to pursuing a culinary career, and then back to cybersecurity. The conversation explores the transferable skills between cooking and cybersecurity, the unpredictability of physical penetration testing, and the high-pressure situations faced in both fields. Kathy also recounts memorable experiences from her culinary career and discusses the lack of horror films centered around cybersecurity. In this engaging conversation, the speakers delve into various aspects of cybersecurity, including the use of the dark web in penetration testing, the importance of community events like B-Sides, and the fun of the Lifestyle Polygraph segment. They also share personal anecdotes about music, childhood memories, and culinary skills, creating a rich tapestry of insights and experiences in the cybersecurity field.</p><p> </p><p>Chapters</p><p>00:00 Introduction to Cybersecurity and Culinary Journeys</p><p>02:46 From IT to Culinary Arts: A Unique Transition</p><p>06:02 The Shift Back to Cybersecurity</p><p>09:00 Experiences in Physical Penetration Testing</p><p>11:48 High-Pressure Situations: Cooking vs. Cybersecurity</p><p>15:02 Unexpected Challenges in Culinary Events</p><p>17:54 The Intersection of Horror and Cybersecurity</p><p>23:32 Exploring the Dark Web in Pen Testing</p><p>25:34 Engaging with the B-Sides Community</p><p>27:09 The Lifestyle Polygraph: Fun and Games </p><p>31:09 Bonding Over Music and Childhood Memories</p><p>34:17 Culinary Skills and Competition Insights</p>
]]></description>
      <pubDate>Wed, 9 Jul 2025 04:00:00 +0000</pubDate>
      <author>rex2@cyberflorida.org (Hannibal Lecter Hannibal Lecter, secure ideas, Bobby Flay, Jack Clabby, Cognitive Security Institute, Alex Vanscoy, Rex Wilson, Carlton Fields, Devin Malice, cyber florida, Kayley Melton, Ernie Ferraresso)</author>
      <link>https://no-password-required.simplecast.com/episodes/on-no-password-required-podcast-episode-61-kathy-collins-GfCIqNFg</link>
      <media:thumbnail height="720" url="https://image.simplecastcdn.com/images/d43689d3-22e4-45dd-97ad-4c2145bc601b/e8653add-c3e2-411c-8285-261ea3f40cd7/youtube-template-kathy.jpg" width="1280"/>
      <content:encoded><![CDATA[<p>Summary</p><p>In this episode of the No Password Required podcast, host Jack Clabby and co-host Kaylee Melton welcome Kathy Collins, a security consultant at Secure Ideas. Kathy shares her unique journey from working in IT to pursuing a culinary career, and then back to cybersecurity. The conversation explores the transferable skills between cooking and cybersecurity, the unpredictability of physical penetration testing, and the high-pressure situations faced in both fields. Kathy also recounts memorable experiences from her culinary career and discusses the lack of horror films centered around cybersecurity. In this engaging conversation, the speakers delve into various aspects of cybersecurity, including the use of the dark web in penetration testing, the importance of community events like B-Sides, and the fun of the Lifestyle Polygraph segment. They also share personal anecdotes about music, childhood memories, and culinary skills, creating a rich tapestry of insights and experiences in the cybersecurity field.</p><p> </p><p>Chapters</p><p>00:00 Introduction to Cybersecurity and Culinary Journeys</p><p>02:46 From IT to Culinary Arts: A Unique Transition</p><p>06:02 The Shift Back to Cybersecurity</p><p>09:00 Experiences in Physical Penetration Testing</p><p>11:48 High-Pressure Situations: Cooking vs. Cybersecurity</p><p>15:02 Unexpected Challenges in Culinary Events</p><p>17:54 The Intersection of Horror and Cybersecurity</p><p>23:32 Exploring the Dark Web in Pen Testing</p><p>25:34 Engaging with the B-Sides Community</p><p>27:09 The Lifestyle Polygraph: Fun and Games </p><p>31:09 Bonding Over Music and Childhood Memories</p><p>34:17 Culinary Skills and Competition Insights</p>
]]></content:encoded>
      <enclosure length="38688868" type="audio/mpeg" url="https://dts.podtrac.com/redirect.mp3/cdn.simplecast.com/audio/ba5244e0-cb0d-4762-b681-e884e01b43fb/episodes/154e3bd9-bbd3-4c0f-8a19-ab223d7e14de/audio/2f72f447-6f2a-410e-adf5-b0e66f92ea95/default_tc.mp3?aid=rss_feed&amp;feed=YGJgknbK"/>
      <itunes:title>On No Password Required Podcast Episode 61 — Kathy Collins</itunes:title>
      <itunes:author>Hannibal Lecter Hannibal Lecter, secure ideas, Bobby Flay, Jack Clabby, Cognitive Security Institute, Alex Vanscoy, Rex Wilson, Carlton Fields, Devin Malice, cyber florida, Kayley Melton, Ernie Ferraresso</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/d43689d3-22e4-45dd-97ad-4c2145bc601b/b6d347aa-e517-4546-9cd3-87e1f5c6a8e6/3000x3000/kathy-20collins-episode-art.jpg?aid=rss_feed"/>
      <itunes:duration>00:40:15</itunes:duration>
      <itunes:summary>Kathy Collins — From AOL to Award-Winning Cuisine to High-Stakes Hacking

Recorded live at the 2025 Sunshine Cyber Conference in Tampa, Jack Clabby of Carlton Fields, P.A., and resident cybersecurity expert Kayley Melton, Executive Director of Operations at the Cognitive Security Institute, sit down with Kathy Collins, Security Consultant at Secure Ideas. Kathy shares her extraordinary journey, which began at the AOL help desk, took a flavorful detour through award-winning kitchens, and ultimately landed in the high-stakes world of penetration testing.

Kathy explains how the intensity, precision, and discipline of her 15 years in fine dining prepared her for the unpredictable demands of cybersecurity. She recounts a particularly memorable physical pen test involving a rainy golf cart getaway—and a very unimpressed police officer.

The conversation highlights Kathy’s passion for community building through events like BSides Jacksonville, where she encourages newcomers to dive in and get involved. In the Lifestyle Polygraph segment, Kayley throws Kathy two horror-themed questions with bite: which movie soundtrack best scores a pen test, and which fictional villain she’d trust most on an engagement. Fava beans and a nice Chianti may follow a successful test.

https://www.linkedin.com/in/kathyvcollins/
</itunes:summary>
      <itunes:subtitle>Kathy Collins — From AOL to Award-Winning Cuisine to High-Stakes Hacking

Recorded live at the 2025 Sunshine Cyber Conference in Tampa, Jack Clabby of Carlton Fields, P.A., and resident cybersecurity expert Kayley Melton, Executive Director of Operations at the Cognitive Security Institute, sit down with Kathy Collins, Security Consultant at Secure Ideas. Kathy shares her extraordinary journey, which began at the AOL help desk, took a flavorful detour through award-winning kitchens, and ultimately landed in the high-stakes world of penetration testing.

Kathy explains how the intensity, precision, and discipline of her 15 years in fine dining prepared her for the unpredictable demands of cybersecurity. She recounts a particularly memorable physical pen test involving a rainy golf cart getaway—and a very unimpressed police officer.

The conversation highlights Kathy’s passion for community building through events like BSides Jacksonville, where she encourages newcomers to dive in and get involved. In the Lifestyle Polygraph segment, Kayley throws Kathy two horror-themed questions with bite: which movie soundtrack best scores a pen test, and which fictional villain she’d trust most on an engagement. Fava beans and a nice Chianti may follow a successful test.

https://www.linkedin.com/in/kathyvcollins/
</itunes:subtitle>
      <itunes:keywords>live podcast, 2024 sunshine cyber conference, pen testing stories, dark web, fantasy cyber squad, newcomer advice, cooking shows, live flame, reality shift, cybersecurity community, career reinvention, food service management, florida theater, surveillance systems, culinary school, risk management, chef culture, get out of jail free card, easy bake oven, communication breakdown, stealth operations, propane burner fire, fullstack academy, kitchen chaos, cybersecurity podcast, cybersecurity bootcamp, cyber florida, lifestyle polygraph, parenting, bobby flay, ai thriller, hacker mindset, jaws soundtrack, hospitality to tech, horror movie villains, cybersecurity blog, childhood toys, restaurant experience, kitchen stress, social engineering, tropical storm, vinyl records, career pivot, piggybacking, the beekeeper, high-stakes testing, planning vs improvisation, credential harvesting, cybersecurity, b-sides jacksonville, corporate chef, thriller, culinary institute of america, food television, jacksonville, hannibal lecter, gender bias, culinary background, fear.com, physical security flaws, tampa florida, eggs for 200, restaurant industry, cybersecurity horror, secure ideas, transparent pricing, catering disaster, blue team, event logistics, cybersecurity parallels, red team, crisis management, security guards, hospital security, scaling food service, no password required podcast, bootcamp, music bonding, historic venue, women in kitchens, culinary arts, aol help desk, dark web monitoring, threatlocker, hell’s kitchen, improvisation, law enforcement, working from home, pressure situations, working moms, open kitchen, physical penetration testing, cybersecurity careers, horror movies, pen testing, flare tool, emotional intelligence, cooking under pressure, transferable skills, storytelling in cybersecurity, gordon ramsay, reality tv, competition shows, cooking competition, carlton fields, shrimp and grits</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>61</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">a34c8da9-5abd-4848-bbe5-42bd35524521</guid>
      <title>No Password Required Podcast Episode 60 — Reginald Andre</title>
      <description><![CDATA[<p>Summary</p><p>In this episode, Jack Clabby and Kayley Melton discuss their conversation with Reginald Andre, a cybersecurity expert and CEO of ARK Solvers. They explore themes of mentorship, the evolution of cybersecurity businesses, the impact of AI, team culture, and community engagement. Andre shares his journey from aspiring English teacher to successful entrepreneur, emphasizing the importance of mentorship and personal growth in the cybersecurity field. In this engaging conversation, the speakers delve into the importance of mentorship, innovative teaching methods, and the role of AI in personal and professional development. They share personal anecdotes about mentoring students and children, emphasizing hands-on learning and real-world applications. The discussion also touches on the fun and insightful lifestyle polygraph segment, where the guest answers quirky questions that reveal his personality and approach to challenges.</p><p>Chapters</p><p>00:00 Introduction to Cybersecurity Mentorship</p><p>01:56 The Journey of Reginald Andre</p><p>05:58 From IT to Cybersecurity: A Business Evolution</p><p>11:55 The Impact of AI on Cybersecurity</p><p>17:52 Building a Strong Team Culture</p><p>22:05 Community Engagement and Personal Growth</p><p>27:39 Mentorship and Impact</p><p>30:21 Innovative Teaching Approaches</p><p>34:04 Lifestyle Polygraph: Fun and Insightful Questions</p>
]]></description>
      <pubDate>Mon, 9 Jun 2025 04:00:00 +0000</pubDate>
      <author>rex2@cyberflorida.org (Steve Jobs, AI, Pat Riley, ARK Solvers, Grant Cardone, CompUSA, Ernie Ferraresso, Rex Wilson, Carlton Fields, Kayley Melton, cyber florida, Devin Malice, Jack Clabby, Cognitive Security Institute, Alex Vanscoy, Reginald Andre)</author>
      <link>https://no-password-required.simplecast.com/episodes/no-password-required-podcast-episode-60-reginald-andre-W2TtKzf5</link>
      <media:thumbnail height="720" url="https://image.simplecastcdn.com/images/d43689d3-22e4-45dd-97ad-4c2145bc601b/06da5cb9-d007-43e8-96ed-3ebba1e8f383/youtube-template-reginald-20andre.jpg" width="1280"/>
      <content:encoded><![CDATA[<p>Summary</p><p>In this episode, Jack Clabby and Kayley Melton discuss their conversation with Reginald Andre, a cybersecurity expert and CEO of ARK Solvers. They explore themes of mentorship, the evolution of cybersecurity businesses, the impact of AI, team culture, and community engagement. Andre shares his journey from aspiring English teacher to successful entrepreneur, emphasizing the importance of mentorship and personal growth in the cybersecurity field. In this engaging conversation, the speakers delve into the importance of mentorship, innovative teaching methods, and the role of AI in personal and professional development. They share personal anecdotes about mentoring students and children, emphasizing hands-on learning and real-world applications. The discussion also touches on the fun and insightful lifestyle polygraph segment, where the guest answers quirky questions that reveal his personality and approach to challenges.</p><p>Chapters</p><p>00:00 Introduction to Cybersecurity Mentorship</p><p>01:56 The Journey of Reginald Andre</p><p>05:58 From IT to Cybersecurity: A Business Evolution</p><p>11:55 The Impact of AI on Cybersecurity</p><p>17:52 Building a Strong Team Culture</p><p>22:05 Community Engagement and Personal Growth</p><p>27:39 Mentorship and Impact</p><p>30:21 Innovative Teaching Approaches</p><p>34:04 Lifestyle Polygraph: Fun and Insightful Questions</p>
]]></content:encoded>
      <enclosure length="44915767" type="audio/mpeg" url="https://dts.podtrac.com/redirect.mp3/cdn.simplecast.com/audio/ba5244e0-cb0d-4762-b681-e884e01b43fb/episodes/c44971ea-3651-4ccd-b8ec-eee7b03de364/audio/85c049ef-a3ca-4771-b1da-83c4d66eec11/default_tc.mp3?aid=rss_feed&amp;feed=YGJgknbK"/>
      <itunes:title>No Password Required Podcast Episode 60 — Reginald Andre</itunes:title>
      <itunes:author>Steve Jobs, AI, Pat Riley, ARK Solvers, Grant Cardone, CompUSA, Ernie Ferraresso, Rex Wilson, Carlton Fields, Kayley Melton, cyber florida, Devin Malice, Jack Clabby, Cognitive Security Institute, Alex Vanscoy, Reginald Andre</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/d43689d3-22e4-45dd-97ad-4c2145bc601b/811772fe-0ef0-47ef-89e4-4c1a876ad155/3000x3000/reginald-20andre-episode-art.jpg?aid=rss_feed"/>
      <itunes:duration>00:46:43</itunes:duration>
      <itunes:summary>Reginald “Andre” Andre — CEO of ARK Solvers and Builder of Human + AI-Driven Culture

Our guest Reginald “Andre” Andre is the dynamic founder and CEO of ARK Solvers. A chance encounter at a CompUSA store sparked a series of events which eventually created ARK Solvers—now one of South Florida’s fastest-growing IT and cybersecurity companies, serving small and mid-size companies with a sharp focus on compliance and innovation.

With nearly two decades of experience, Andre shares how his company has evolved from general IT support to cybersecurity and now into the realm of AI. He reveals how creating a growth-centered environment for his team—and hiring for attitude over skill—has been crucial to ARK’s culture and success. He also reflects on how his frustration with the lack of computer classes at his son’s school led to the launch of a computer club that brought them closer together.

In the Lifestyle Polygraph segment, Andre unpacks his AI-powered board of directors—which includes Steve Jobs and Grant Cardone—and what he’d do if tasked with launching a nationwide mentorship initiative. Plus, he urges students to get aggressive with internships: “Ask early and often.” Join hosts Jack Clabby of Carlton Fields, P.A., and resident cybersecurity expert Kayley Melton, founder of Reality Shift, for this exciting podcast.

Follow Andre on LinkedIn: https://www.linkedin.com/in/reginald-andre-122ba552/
</itunes:summary>
      <itunes:subtitle>Reginald “Andre” Andre — CEO of ARK Solvers and Builder of Human + AI-Driven Culture

Our guest Reginald “Andre” Andre is the dynamic founder and CEO of ARK Solvers. A chance encounter at a CompUSA store sparked a series of events which eventually created ARK Solvers—now one of South Florida’s fastest-growing IT and cybersecurity companies, serving small and mid-size companies with a sharp focus on compliance and innovation.

With nearly two decades of experience, Andre shares how his company has evolved from general IT support to cybersecurity and now into the realm of AI. He reveals how creating a growth-centered environment for his team—and hiring for attitude over skill—has been crucial to ARK’s culture and success. He also reflects on how his frustration with the lack of computer classes at his son’s school led to the launch of a computer club that brought them closer together.

In the Lifestyle Polygraph segment, Andre unpacks his AI-powered board of directors—which includes Steve Jobs and Grant Cardone—and what he’d do if tasked with launching a nationwide mentorship initiative. Plus, he urges students to get aggressive with internships: “Ask early and often.” Join hosts Jack Clabby of Carlton Fields, P.A., and resident cybersecurity expert Kayley Melton, founder of Reality Shift, for this exciting podcast.

Follow Andre on LinkedIn: https://www.linkedin.com/in/reginald-andre-122ba552/
</itunes:subtitle>
      <itunes:keywords>rich dad mindset, break-fix, south florida business journal, ultra-rich, creativity, president, community service, office manager to sales, foreclosure, instagram, fastest growing, small team, business, ai board of directors, mindset, blessing, learning from mistakes, business evolution, tech setup, loyalty, ark solvers, team culture, chatgpt, business growth, michael, innovation culture, internships, non-compete, personal growth, efficiency, origin story, betrayal, partner fallout, innovative teaching, company culture, private school, lifestyle polygraph, headphones, encouraging failure, computer club, comeback, grit, startup, student homework, fictional mentor, role players, posting projects, data breach, grooming, pat riley, teaching tech skills, english teacher, rocky quote, success, cost savings, customer service, ai mentor, resume building, chick-fil-a feeling, reginald andre, coo, school projects, hands-on experience, client service, co-founder, don&apos;t wait, mentoring, linkedin, humble brag, roi, managed services, sources, cybersecurity degree, resilience, ransomware, ai policies, roblox, online safety, miami, teaching, get coffee, answer phones, steve jobs, staff development, volunteer, compusa, mavis beacon, hiring approach, business collapse, grant cardone, state college acceptance, business decisions, feedback, generative ai, food on the table, job, entrepreneurship, no password required, programming, it, resume, pivot, motivation, mom&apos;s work ethic, electronics store, telecom background, autonomy, internal mobility, gain experience, employee ai proficiency, middle class, paying it forward, guardrails, son, millionaire investor, github, personalities, andre, ai trainer, proactive, personality over credentials, future of cybersecurity, ai training, ai agent, portfolio, coo promotion</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>60</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">5a044a34-2ec5-4e97-b423-717d9f273f84</guid>
      <title>No Password Required Podcast Episode 59 — Mariana Padilla</title>
      <description><![CDATA[<p>Summary</p><p>In this episode of No Password Required, host Jack Clabby and co-host Kaylee Melton engage in a thought-provoking conversation with Mariana Padilla, co-founder and CEO of HACKERverse.AI. The discussion revolves around the importance of embracing failure as a learning opportunity, the role of leadership in fostering a positive work environment, and the challenges faced in the cybersecurity vendor landscape. Mariana shares her insights on the need for better communication in the industry and the importance of a beginner's mindset in driving innovation. The conversation also touches on the future of investment in cybersecurity and the necessity of rebuilding trust within the industry. In this engaging conversation, Mariana discusses the challenges of job searching in the current landscape dominated by AI and the importance of networking and personal branding. She emphasizes that building trust and connections is crucial in the cybersecurity field. The discussion transitions into a fun segment called the lifestyle polygraph, where Mariana shares her thoughts on superheroes and their relevance to personal and professional growth. The episode concludes with Mariana providing insights on how to connect with her and her work.</p><p>Chapters </p><p>00:00 Introduction to Cybersecurity Conversations</p><p>02:00 Embracing Failure as a Learning Opportunity</p><p>06:02 The Role of Leadership in Startups</p><p>09:00 The Value of a Beginner's Mindset</p><p>11:58 Understanding HACKERverse's Mission</p><p>13:59 Challenges in the Cybersecurity Vendor Landscape</p><p>17:08 Shaking Up the Status Quo in Cybersecurity</p><p>21:52 The Future of Investment in Cybersecurity</p><p>24:36 Navigating Job Searches in the Age of AI</p><p>29:35 The Importance of Personal Branding</p><p>30:23 Lifestyle Polygraph: Fun and Games</p><p>39:05 Superheroes and Their Lessons</p><p>43:45 Connecting with Mariana: Final Thoughts</p>
]]></description>
      <pubDate>Tue, 13 May 2025 04:00:00 +0000</pubDate>
      <author>rex2@cyberflorida.org (Mariana Padilla, HACKERverse.ai, Superman, Carlton Fields, Sarina Gandy, Kayley Melton, Ernie Ferraresso, Batman, Rex Wilson, Cognitive Security Institute, Alex Vanscoy, cyber florida, Jack Clabby, Devin Malice)</author>
      <link>https://no-password-required.simplecast.com/episodes/no-password-required-podcast-episode-59-mariana-padilla-tHxBIbEZ</link>
      <media:thumbnail height="720" url="https://image.simplecastcdn.com/images/d43689d3-22e4-45dd-97ad-4c2145bc601b/48a01e64-251c-4961-99ad-6079e40f2364/youtube-template-mariana-20padilla.jpg" width="1280"/>
      <content:encoded><![CDATA[<p>Summary</p><p>In this episode of No Password Required, host Jack Clabby and co-host Kaylee Melton engage in a thought-provoking conversation with Mariana Padilla, co-founder and CEO of HACKERverse.AI. The discussion revolves around the importance of embracing failure as a learning opportunity, the role of leadership in fostering a positive work environment, and the challenges faced in the cybersecurity vendor landscape. Mariana shares her insights on the need for better communication in the industry and the importance of a beginner's mindset in driving innovation. The conversation also touches on the future of investment in cybersecurity and the necessity of rebuilding trust within the industry. In this engaging conversation, Mariana discusses the challenges of job searching in the current landscape dominated by AI and the importance of networking and personal branding. She emphasizes that building trust and connections is crucial in the cybersecurity field. The discussion transitions into a fun segment called the lifestyle polygraph, where Mariana shares her thoughts on superheroes and their relevance to personal and professional growth. The episode concludes with Mariana providing insights on how to connect with her and her work.</p><p>Chapters </p><p>00:00 Introduction to Cybersecurity Conversations</p><p>02:00 Embracing Failure as a Learning Opportunity</p><p>06:02 The Role of Leadership in Startups</p><p>09:00 The Value of a Beginner's Mindset</p><p>11:58 Understanding HACKERverse's Mission</p><p>13:59 Challenges in the Cybersecurity Vendor Landscape</p><p>17:08 Shaking Up the Status Quo in Cybersecurity</p><p>21:52 The Future of Investment in Cybersecurity</p><p>24:36 Navigating Job Searches in the Age of AI</p><p>29:35 The Importance of Personal Branding</p><p>30:23 Lifestyle Polygraph: Fun and Games</p><p>39:05 Superheroes and Their Lessons</p><p>43:45 Connecting with Mariana: Final Thoughts</p>
]]></content:encoded>
      <enclosure length="43641448" type="audio/mpeg" url="https://dts.podtrac.com/redirect.mp3/cdn.simplecast.com/audio/ba5244e0-cb0d-4762-b681-e884e01b43fb/episodes/4446a106-670c-4d57-b050-c10098330ad3/audio/2087d1fd-a0d7-49e6-8bf1-fa739a0e598e/default_tc.mp3?aid=rss_feed&amp;feed=YGJgknbK"/>
      <itunes:title>No Password Required Podcast Episode 59 — Mariana Padilla</itunes:title>
      <itunes:author>Mariana Padilla, HACKERverse.ai, Superman, Carlton Fields, Sarina Gandy, Kayley Melton, Ernie Ferraresso, Batman, Rex Wilson, Cognitive Security Institute, Alex Vanscoy, cyber florida, Jack Clabby, Devin Malice</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/d43689d3-22e4-45dd-97ad-4c2145bc601b/52aeddef-10c2-44be-94c4-dcc360e22918/3000x3000/mariana-20padilla-episode-art.jpg?aid=rss_feed"/>
      <itunes:duration>00:45:23</itunes:duration>
      <itunes:summary>Mariana Padilla — CEO of HACKERverse.ai, Disruptor of Cybersecurity Sales and Most Other Things

We sit down with Mariana Padilla, CEO and Co-Founder of HACKERverse.ai—an AI-driven platform transforming how cybersecurity solutions are tested and purchased. From her early days in education and nonprofits to building a career in cybersecurity marketing, Mariana has always sought to challenge inefficiency and champion innovation. From the helm of HACKERverse, she’s helping security buyers make smarter, data-driven decisions while eliminating the friction of traditional vendor sales.
 
She joins hosts Jack Clabby of Carlton Fields, P.A., and resident cybersecurity expert Kayley Melton, Director of Strategic Initiatives at the Cognitive Security Institute, to explore how her self-proclaimed status as a &quot;bad employee&quot; shaped her leadership approach, why passive aggression is her ultimate pet peeve, and how adopting a beginner’s mindset has helped her scale quickly in a complex industry. Mariana also reveals how her team is tackling the trust gap in cybersecurity sales—by letting the product speak for itself.
 
In the Lifestyle Polygraph segment, Kayley asks Mariana who she would hire if resumes for Superman and Batman landed on her desk. Her answer took us down a dark-night path we didn’t see coming.
 
Follow Mariana Padilla on LinkedIn: https://www.linkedin.com/in/marianapadilla/
</itunes:summary>
      <itunes:subtitle>Mariana Padilla — CEO of HACKERverse.ai, Disruptor of Cybersecurity Sales and Most Other Things

We sit down with Mariana Padilla, CEO and Co-Founder of HACKERverse.ai—an AI-driven platform transforming how cybersecurity solutions are tested and purchased. From her early days in education and nonprofits to building a career in cybersecurity marketing, Mariana has always sought to challenge inefficiency and champion innovation. From the helm of HACKERverse, she’s helping security buyers make smarter, data-driven decisions while eliminating the friction of traditional vendor sales.
 
She joins hosts Jack Clabby of Carlton Fields, P.A., and resident cybersecurity expert Kayley Melton, Director of Strategic Initiatives at the Cognitive Security Institute, to explore how her self-proclaimed status as a &quot;bad employee&quot; shaped her leadership approach, why passive aggression is her ultimate pet peeve, and how adopting a beginner’s mindset has helped her scale quickly in a complex industry. Mariana also reveals how her team is tackling the trust gap in cybersecurity sales—by letting the product speak for itself.
 
In the Lifestyle Polygraph segment, Kayley asks Mariana who she would hire if resumes for Superman and Batman landed on her desk. Her answer took us down a dark-night path we didn’t see coming.
 
Follow Mariana Padilla on LinkedIn: https://www.linkedin.com/in/marianapadilla/
</itunes:subtitle>
      <itunes:keywords>vaporware, interoperability, fashion design, bad employee, go-go boots, hackerverse ai, hackerverse, superman, ciso alignment, crm pain points, regulatory compliance, hands-on trials, ai and automation, cybersecurity industry, ai in cybersecurity., spiked shoulder pads, alert fatigue, scrappy mindset, board communication, cybersecurity podcast, proof of value, sales process, networking, lifestyle polygraph, burning man boots, jersey aggressive, security stack bloat, sandbox environments, homelander, shelfware, outsider perspective, leadership, cybersecurity communication gaps, superheroes, marketing communications, transparency, failure as learning, kaylee melton, change resistance, targeted ads, security risks, seattle culture, product concept testing, vendor relationships, cybersecurity, smoke and mirrors, startup culture, ai, pets, straight shooter, emotional connection, state regulation, geography, the boys, linkedin, change agent, innovation, deep sea, multi-tool evaluation, passive-aggressive vs aggressive, vendor trust, licensing complexity, long sales cycle, try-before-you-buy, vendor risk management, mentorship, product evaluation, the pat test, aggressive aggressive, internal champion loss, jack clabby, frictionless demos, human-centered design, no password required, process improvement, career advice, job search, trust in vendor space, outer space, threat evolution, mariana padilla, signal gaps, test drive analogy, marketing challenges, hacker culture, communication, failure, startups, fresh eyes, viewmaster, personal branding, investment, batman, old guard mentality, beginner&apos;s mindset, conference outfits, satire, cyber ranges, rsa fashion, leadership by example</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>59</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">61c4b27a-09ff-4660-881d-e5ff447c452b</guid>
      <title>No Password Required Podcast Episode 58 — Trevor Hilligoss</title>
      <description><![CDATA[<p>Summary</p><p>In this episode of No Password Required, host Jack Clabby and guest Trevor Hilligoss discuss various aspects of cybersecurity, including the transition from military service to the private sector, the importance of leadership in tech, and the misconceptions surrounding cyber threats. Trevor shares insights from his career, emphasizing the need for a proactive approach to cybersecurity and the value of empowering teams to innovate and learn from failures. In this engaging conversation, the speakers delve into memorable experiences in cybersecurity, including impactful interactions and the importance of sharing knowledge. They explore personal preferences through a fun lifestyle polygraph segment, discussing walk-up songs, breakfast favorites, and nerd culture. The conversation also touches on the lighter side of cybersecurity with prank calls and the dynamics of building an escape room team. The episode concludes with contact information and an invitation to connect further.</p><p> </p><p>Chapters</p><p>00:00 Introduction to Cybersecurity Insights</p><p>02:54 Career Path and Unexpected Experiences</p><p>05:55 Transitioning from Military to Cybersecurity</p><p>09:07 Daily Life at Spy Cloud</p><p>12:12 Leadership Philosophy and Management Style</p><p>14:53 The Nature of Cyber Threats</p><p>17:50 Technical Skills in Leadership</p><p>20:52 Misconceptions About Cyber Criminals</p><p>25:32 Memorable Cybersecurity Interactions</p><p>28:12 Lifestyle Polygraph Introduction</p><p>28:35 Walk-Up Songs and Personal Preferences</p><p>32:07 Breakfast Favorites and Culinary Influences</p><p>34:40 Building the Ultimate Escape Room Team</p><p>37:36 Nerd Culture and Personal Interests</p><p>39:02 Prank Calls and Culinary Competitions</p><p>41:20 Closing Thoughts and Contact Information</p>
]]></description>
      <pubDate>Mon, 14 Apr 2025 04:00:00 +0000</pubDate>
      <author>rex2@cyberflorida.org (gordon ramsay, Trevor Hilligoss, Alex Vanscoy, Cognitive Security Institute, cyber florida, red hot chili peppers, Sarina Gandy, Kayley Melton, Carlton Fields, Devin Malice, Rex Wilson, Ernie Ferraresso, Bob Ross, Jack Clabby)</author>
      <link>https://no-password-required.simplecast.com/episodes/no-password-required-podcast-episode-58-trevor-hilligoss-CiTZUzh2</link>
      <media:thumbnail height="720" url="https://image.simplecastcdn.com/images/d43689d3-22e4-45dd-97ad-4c2145bc601b/74268211-6709-4a66-b9c4-1ae45400f2c7/youtube-template-trevor-20hilligoss.jpg" width="1280"/>
      <content:encoded><![CDATA[<p>Summary</p><p>In this episode of No Password Required, host Jack Clabby and guest Trevor Hilligoss discuss various aspects of cybersecurity, including the transition from military service to the private sector, the importance of leadership in tech, and the misconceptions surrounding cyber threats. Trevor shares insights from his career, emphasizing the need for a proactive approach to cybersecurity and the value of empowering teams to innovate and learn from failures. In this engaging conversation, the speakers delve into memorable experiences in cybersecurity, including impactful interactions and the importance of sharing knowledge. They explore personal preferences through a fun lifestyle polygraph segment, discussing walk-up songs, breakfast favorites, and nerd culture. The conversation also touches on the lighter side of cybersecurity with prank calls and the dynamics of building an escape room team. The episode concludes with contact information and an invitation to connect further.</p><p> </p><p>Chapters</p><p>00:00 Introduction to Cybersecurity Insights</p><p>02:54 Career Path and Unexpected Experiences</p><p>05:55 Transitioning from Military to Cybersecurity</p><p>09:07 Daily Life at Spy Cloud</p><p>12:12 Leadership Philosophy and Management Style</p><p>14:53 The Nature of Cyber Threats</p><p>17:50 Technical Skills in Leadership</p><p>20:52 Misconceptions About Cyber Criminals</p><p>25:32 Memorable Cybersecurity Interactions</p><p>28:12 Lifestyle Polygraph Introduction</p><p>28:35 Walk-Up Songs and Personal Preferences</p><p>32:07 Breakfast Favorites and Culinary Influences</p><p>34:40 Building the Ultimate Escape Room Team</p><p>37:36 Nerd Culture and Personal Interests</p><p>39:02 Prank Calls and Culinary Competitions</p><p>41:20 Closing Thoughts and Contact Information</p>
]]></content:encoded>
      <enclosure length="40898216" type="audio/mpeg" url="https://dts.podtrac.com/redirect.mp3/cdn.simplecast.com/audio/ba5244e0-cb0d-4762-b681-e884e01b43fb/episodes/e17d8332-7bf2-43cc-9ee2-cd0ae1df1b24/audio/80806fd0-7b69-4f4a-baf8-05b26d82f457/default_tc.mp3?aid=rss_feed&amp;feed=YGJgknbK"/>
      <itunes:title>No Password Required Podcast Episode 58 — Trevor Hilligoss</itunes:title>
      <itunes:author>gordon ramsay, Trevor Hilligoss, Alex Vanscoy, Cognitive Security Institute, cyber florida, red hot chili peppers, Sarina Gandy, Kayley Melton, Carlton Fields, Devin Malice, Rex Wilson, Ernie Ferraresso, Bob Ross, Jack Clabby</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/d43689d3-22e4-45dd-97ad-4c2145bc601b/d2c7dd81-7155-4c39-a18b-bc5be4e4f1e0/3000x3000/trevor-20hilligoss-episode-art.jpg?aid=rss_feed"/>
      <itunes:duration>00:42:32</itunes:duration>
      <itunes:summary>Trevor Hilligoss — SVP at SpyCloud Labs, Former Army Investigator,  and an elite metaphor creator

On this episode, we sit down with Trevor Hilligoss, Director of Security Research and the Research &amp; Innovation division of SpyCloud Labs. From his beginnings in the Army Criminal Investigation Division to his leadership role in cybersecurity’s private sector, Trevor shares how investigative instincts and military discipline shaped his approach to digital forensics, leadership, and fighting cybercrime.

Hosts Jack Clabby of Carlton Fields, P.A., and Kayley Melton, Director of Strategic Initiatives at the Cognitive Security Institute and founder of Reality Shift, explore with Trevor the biggest misconceptions about cybercriminals, why micromanagement is a leadership pitfall, and how proactive cybersecurity strategies can change the game before an attack even happens.

Plus, in the Lifestyle Polygraph segment, Trevor talks about adding Tony Hawk to his ultimate escape room team, his boardroom walk-up song, and his East Coast-meets-West Coast breakfast—because balance is key in cybersecurity and in starting the day off right.

Follow Trevor Hilligoss on LinkedIn: https://www.linkedin.com/in/thilligoss/ 
</itunes:summary>
      <itunes:subtitle>Trevor Hilligoss — SVP at SpyCloud Labs, Former Army Investigator,  and an elite metaphor creator

On this episode, we sit down with Trevor Hilligoss, Director of Security Research and the Research &amp; Innovation division of SpyCloud Labs. From his beginnings in the Army Criminal Investigation Division to his leadership role in cybersecurity’s private sector, Trevor shares how investigative instincts and military discipline shaped his approach to digital forensics, leadership, and fighting cybercrime.

Hosts Jack Clabby of Carlton Fields, P.A., and Kayley Melton, Director of Strategic Initiatives at the Cognitive Security Institute and founder of Reality Shift, explore with Trevor the biggest misconceptions about cybercriminals, why micromanagement is a leadership pitfall, and how proactive cybersecurity strategies can change the game before an attack even happens.

Plus, in the Lifestyle Polygraph segment, Trevor talks about adding Tony Hawk to his ultimate escape room team, his boardroom walk-up song, and his East Coast-meets-West Coast breakfast—because balance is key in cybersecurity and in starting the day off right.

Follow Trevor Hilligoss on LinkedIn: https://www.linkedin.com/in/thilligoss/ 
</itunes:subtitle>
      <itunes:keywords>cybersecurity strategy, cybersecurity culture, public speaking, learning from failure, layered security, spycloud labs, knowledge sharing, usf, cyber defense, investigative instincts, networking in cybersecurity, management style, digital forensics, personal growth, military to tech, trevor hilligoss, cybersecurity podcast, walk-up songs, cyber florida, personal achievements, lifestyle polygraph, technical leadership, technology, cybercrime, cybersecurity leadership, sports, cybersecurity insights, leadership, american culture, prank calls, cyber threat misconceptions, cybersecurity humor, red hot chili peppers, proactive cybersecurity, cybersecurity, military experience, cybersecurity lifestyle, spy cloud, innovation, nerd culture, army criminal investigation division, tech addiction, breakfast favorites, culinary competitions, infosec, cybersecurity career path, threat actors, escape room team, cyber threats, cognitive security institute, kayley melton, star wars, jack clabby, breakfast culture, backpack security, private sector cybersecurity, no password required, career transition, memorable interactions, no password required podcast, empowering teams, misconceptions, micromanagement, cybercriminals, gordon ramsay, industry challenges, tony hawk, ai threats, carlton fields</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>58</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">f937dd6f-cd58-4f07-b2bc-644b9752f7c0</guid>
      <title>No Password Required Podcast Episode 57 — Rob Allen</title>
      <description><![CDATA[<p>Summary</p><p>In this episode of the No Password Required podcast, host Jack Klabby engages with cybersecurity experts Kaylee Melton and Rob Allen, discussing Rob's journey to ThreatLocker, the importance of overcoming public speaking fears, and the principles of Zero Trust security. They explore common mistakes organizations make when implementing Zero Trust, the future of cybersecurity in relation to AI threats, and the public's perception of cybersecurity incidents. The conversation also touches on the significance of layered security approaches and personal experiences in the industry, culminating in a fun lifestyle polygraph segment. In this engaging conversation, the speakers delve into their personal tech addictions, particularly focusing on extravagant purchases like the Vision Pro. They explore the future of wearable technology and its integration into daily life. The discussion shifts to the uniquely American experience of visiting Buc-ee's, a gas station that offers much more than fuel. They also debate the joy derived from sports victories versus personal achievements like hitting a hole in one. Finally, the conversation wraps up with a humorous take on the challenges of mastering DIY skills.</p><p>Chapters</p><p>00:00 Introduction to Cybersecurity Insights</p><p>03:05 Rob Allen's Journey to ThreatLocker</p><p>05:49 Overcoming Public Speaking Fears</p><p>08:55 Understanding Zero Trust Security</p><p>12:12 Common Mistakes in Zero Trust Implementation</p><p>15:02 The Future of Zero Trust and AI Threats</p><p>18:05 Public Perception of Cybersecurity</p><p>21:08 Layered Security Approaches</p><p>24:02 Personal Experiences and Lessons Learned</p><p>26:58 Lifestyle Polygraph and Fun Questions</p><p>27:11 Tech Addictions and Unnecessary Purchases</p><p>32:05 The Future of Wearable Technology</p><p>34:08 Experiencing Buc-ee's: The Most American Gas Station</p><p>36:44 Joyful Moments: Sports Wins vs. Personal Achievements</p><p>39:03 Mastering DIY Skills: A Personal Journey</p>
]]></description>
      <pubDate>Mon, 17 Mar 2025 04:00:00 +0000</pubDate>
      <author>rex2@cyberflorida.org (steve jobs, apple, Carlton Fields, Kayley Melton, Ernie Ferraresso, Devin Malice, Jack Clabby, Cyber Florida, Sarina Gandy, Rex Wilson)</author>
      <link>https://no-password-required.simplecast.com/episodes/no-password-required-podcast-episode-57-rob-allen-pgQEMT7Q</link>
      <media:thumbnail height="720" url="https://image.simplecastcdn.com/images/d43689d3-22e4-45dd-97ad-4c2145bc601b/99bf15e1-258c-4600-8795-0ffd43180c99/youtube-template-rob-20allen.jpg" width="1280"/>
      <content:encoded><![CDATA[<p>Summary</p><p>In this episode of the No Password Required podcast, host Jack Klabby engages with cybersecurity experts Kaylee Melton and Rob Allen, discussing Rob's journey to ThreatLocker, the importance of overcoming public speaking fears, and the principles of Zero Trust security. They explore common mistakes organizations make when implementing Zero Trust, the future of cybersecurity in relation to AI threats, and the public's perception of cybersecurity incidents. The conversation also touches on the significance of layered security approaches and personal experiences in the industry, culminating in a fun lifestyle polygraph segment. In this engaging conversation, the speakers delve into their personal tech addictions, particularly focusing on extravagant purchases like the Vision Pro. They explore the future of wearable technology and its integration into daily life. The discussion shifts to the uniquely American experience of visiting Buc-ee's, a gas station that offers much more than fuel. They also debate the joy derived from sports victories versus personal achievements like hitting a hole in one. Finally, the conversation wraps up with a humorous take on the challenges of mastering DIY skills.</p><p>Chapters</p><p>00:00 Introduction to Cybersecurity Insights</p><p>03:05 Rob Allen's Journey to ThreatLocker</p><p>05:49 Overcoming Public Speaking Fears</p><p>08:55 Understanding Zero Trust Security</p><p>12:12 Common Mistakes in Zero Trust Implementation</p><p>15:02 The Future of Zero Trust and AI Threats</p><p>18:05 Public Perception of Cybersecurity</p><p>21:08 Layered Security Approaches</p><p>24:02 Personal Experiences and Lessons Learned</p><p>26:58 Lifestyle Polygraph and Fun Questions</p><p>27:11 Tech Addictions and Unnecessary Purchases</p><p>32:05 The Future of Wearable Technology</p><p>34:08 Experiencing Buc-ee's: The Most American Gas Station</p><p>36:44 Joyful Moments: Sports Wins vs. Personal Achievements</p><p>39:03 Mastering DIY Skills: A Personal Journey</p>
]]></content:encoded>
      <enclosure length="45005269" type="audio/mpeg" url="https://dts.podtrac.com/redirect.mp3/cdn.simplecast.com/audio/ba5244e0-cb0d-4762-b681-e884e01b43fb/episodes/9d3a88f4-64d1-4070-85fd-6f65a9a738b5/audio/a1eaeca4-83eb-4bc6-8fde-b9ae98da1b70/default_tc.mp3?aid=rss_feed&amp;feed=YGJgknbK"/>
      <itunes:title>No Password Required Podcast Episode 57 — Rob Allen</itunes:title>
      <itunes:author>steve jobs, apple, Carlton Fields, Kayley Melton, Ernie Ferraresso, Devin Malice, Jack Clabby, Cyber Florida, Sarina Gandy, Rex Wilson</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/d43689d3-22e4-45dd-97ad-4c2145bc601b/c20415a9-765f-475e-8c13-6b463809b1fa/3000x3000/rob-20allen-episode-art.jpg?aid=rss_feed"/>
      <itunes:duration>00:46:50</itunes:duration>
      <itunes:summary>On this episode, we sit down with Rob Allen, the Chief Marketing Officer at ThreatLocker, live from the 2024 Sunshine Cyber Conference. From his early days “locked” in an IT closet to his current role in the C-suite, Rob’s journey is one of curiosity, adaptation, and a passion for cybersecurity. At ThreatLocker, he takes customer ideas and use cases and transforms them into solutions for organizations of all sizes. 

Rob shares why businesses shouldn’t fear the “deny by default” approach, explaining how the zero-trust mindset is essential in today’s threat landscape. He also discusses with hosts Jack Clabby of Carlton Fields, P.A., and Kayley Melton, Director for Strategic Initiatives at the Cognitive Security Institute and the Bob Ross of infosec, how media coverage often distorts public perception of cybersecurity by only highlighting major breaches and incidents. 

In the Lifestyle Polygraph segment, Rob reveals his love for Apple products, why he wishes he could have met Steve Jobs, and his obsession with Buc-ee’s brisket sandwiches. He also shares a hilarious (and perhaps exaggerated) story about the Cyber Florida team “infiltrating” ThreatLocker and taking his backpack back to Tampa!

You can learn more about ThreatLocker, here: https://www.threatlocker.com
You can follow Rob Allen on LinkedIn here: https://www.linkedin.com/in/threatlockerrob/
</itunes:summary>
      <itunes:subtitle>On this episode, we sit down with Rob Allen, the Chief Marketing Officer at ThreatLocker, live from the 2024 Sunshine Cyber Conference. From his early days “locked” in an IT closet to his current role in the C-suite, Rob’s journey is one of curiosity, adaptation, and a passion for cybersecurity. At ThreatLocker, he takes customer ideas and use cases and transforms them into solutions for organizations of all sizes. 

Rob shares why businesses shouldn’t fear the “deny by default” approach, explaining how the zero-trust mindset is essential in today’s threat landscape. He also discusses with hosts Jack Clabby of Carlton Fields, P.A., and Kayley Melton, Director for Strategic Initiatives at the Cognitive Security Institute and the Bob Ross of infosec, how media coverage often distorts public perception of cybersecurity by only highlighting major breaches and incidents. 

In the Lifestyle Polygraph segment, Rob reveals his love for Apple products, why he wishes he could have met Steve Jobs, and his obsession with Buc-ee’s brisket sandwiches. He also shares a hilarious (and perhaps exaggerated) story about the Cyber Florida team “infiltrating” ThreatLocker and taking his backpack back to Tampa!

You can learn more about ThreatLocker, here: https://www.threatlocker.com
You can follow Rob Allen on LinkedIn here: https://www.linkedin.com/in/threatlockerrob/
</itunes:subtitle>
      <itunes:keywords>public speaking, layered security, usf, personal growth, vision pro, backpack, cyber florida, personal achievements, lifestyle polygraph, technology, sports, zero trust, cybersecurity insights, deny by default, american culture, buc-ee&apos;s, wearables, cybersecurity, tech addiction, infosec, steve jobs, kayley melton, jack clabby, backpack security, diy, no password required podcast, threatlocker, apple, industry challenges, ai threats, rob allen</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>57</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">bdefec0a-0a68-4c6d-a2e2-c4b2e96fe9c6</guid>
      <title>No Password Required Podcast Episode 56 - Anmol Agarwal</title>
      <description><![CDATA[<p>Summary</p><p>In this episode of No Password Required, host Jack Clabby and cybersecurity expert Dr. Anmol Agarwal discuss the evolving landscape of cybersecurity, focusing on the challenges and innovations surrounding 5G and 6G networks, the integration of AI and quantum computing, and the importance of global collaboration in addressing cybersecurity threats. Dr. Agarwal shares her insights on the significance of creativity in the field, offers advice for those entering the cybersecurity space, and engages in a fun lifestyle polygraph segment that highlights her personal interests and professional aspirations.</p><p>Chapters</p><p>00:00 Introduction to Cybersecurity Insights</p><p>02:30 Exploring 5G and 6G Security Challenges</p><p>11:10 The Intersection of AI, Quantum Computing, and Cybersecurity</p><p>18:00 Global Collaboration in Cybersecurity</p><p>24:57 Advice for Aspiring Cybersecurity Professionals</p><p>26:48 The Role of Creativity in Cybersecurity</p><p>31:27 Lifestyle Polygraph: Fun and Insightful Questions</p>
]]></description>
      <pubDate>Tue, 4 Feb 2025 05:00:00 +0000</pubDate>
      <author>rex2@cyberflorida.org (Anmol Agarwal, 6G, 5G, Kayley Melton, Sarina Gandy, Devin Malice, Rex Wilson, Julia Blyke, Jack Clabby, Ernie Ferraresso, Cyber Florida, Carlton Fields)</author>
      <link>https://no-password-required.simplecast.com/episodes/no-password-required-podcast-episode-56-anmol-agarwal-ogueELP6</link>
      <content:encoded><![CDATA[<p>Summary</p><p>In this episode of No Password Required, host Jack Clabby and cybersecurity expert Dr. Anmol Agarwal discuss the evolving landscape of cybersecurity, focusing on the challenges and innovations surrounding 5G and 6G networks, the integration of AI and quantum computing, and the importance of global collaboration in addressing cybersecurity threats. Dr. Agarwal shares her insights on the significance of creativity in the field, offers advice for those entering the cybersecurity space, and engages in a fun lifestyle polygraph segment that highlights her personal interests and professional aspirations.</p><p>Chapters</p><p>00:00 Introduction to Cybersecurity Insights</p><p>02:30 Exploring 5G and 6G Security Challenges</p><p>11:10 The Intersection of AI, Quantum Computing, and Cybersecurity</p><p>18:00 Global Collaboration in Cybersecurity</p><p>24:57 Advice for Aspiring Cybersecurity Professionals</p><p>26:48 The Role of Creativity in Cybersecurity</p><p>31:27 Lifestyle Polygraph: Fun and Insightful Questions</p>
]]></content:encoded>
      <enclosure length="45656578" type="audio/mpeg" url="https://dts.podtrac.com/redirect.mp3/cdn.simplecast.com/audio/ba5244e0-cb0d-4762-b681-e884e01b43fb/episodes/6f6bc628-3eee-4160-b125-a85adbbef050/audio/ae1adf26-91d7-4a42-aeb3-74d7935248e6/default_tc.mp3?aid=rss_feed&amp;feed=YGJgknbK"/>
      <itunes:title>No Password Required Podcast Episode 56 - Anmol Agarwal</itunes:title>
      <itunes:author>Anmol Agarwal, 6G, 5G, Kayley Melton, Sarina Gandy, Devin Malice, Rex Wilson, Julia Blyke, Jack Clabby, Ernie Ferraresso, Cyber Florida, Carlton Fields</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/d43689d3-22e4-45dd-97ad-4c2145bc601b/ed7c8c50-9efb-4e03-98e0-e502e5947f49/3000x3000/anmol-20agarwal-episode-art.jpg?aid=rss_feed"/>
      <itunes:duration>00:47:29</itunes:duration>
      <itunes:summary>Anmol Agarwal — Senior Security Researcher at Nokia and Guardian of Secure AI Networks

On this episode, Jack Clabby of Carlton Fields, P.A., and resident cybersecurity expert Kayley Melton, founder of Reality Shift, chat with Dr. Anmol Agarwal, a senior security researcher at Nokia. With deep expertise in AI security, adversarial machine learning, and privacy-preserving technologies, she is advancing innovation in next-generation communications. Her career began with a focus on health management, where her exposure to the transformative power of technology in patient care sparked a passion for cybersecurity. Dr. Agarwal previously managed federal enterprise risks at the U.S. Cybersecurity and Infrastructure Security Agency (CISA) and now shares her knowledge as an adjunct professor at George Washington University. Committed to community engagement, she mentors aspiring cybersecurity professionals through WiCyS and other initiatives, empowering the leaders of tomorrow in the ever-evolving cyber landscape. 
 
In the Lifestyle Polygraph segment, Dr. Agarwal gave us some insight about her life away from all things cybersecurity including a passion for British baking competitions and why should wouldn&apos;t mind adding a couple journalist to her team. 

The show begins with Jack Clabby of Carlton Fields, P.A., joined by resident cybersecurity expert Kayley Melton, analyzing what they learned in this weeks insightful episode with Dr. Anmol Agarwal 

Follow Anmol Agarwal on LinkedIn:  https://www.linkedin.com/in/anmolsagarwal/ 

X: @anmolspeaker 

YT: @anmolspeaker </itunes:summary>
      <itunes:subtitle>Anmol Agarwal — Senior Security Researcher at Nokia and Guardian of Secure AI Networks

On this episode, Jack Clabby of Carlton Fields, P.A., and resident cybersecurity expert Kayley Melton, founder of Reality Shift, chat with Dr. Anmol Agarwal, a senior security researcher at Nokia. With deep expertise in AI security, adversarial machine learning, and privacy-preserving technologies, she is advancing innovation in next-generation communications. Her career began with a focus on health management, where her exposure to the transformative power of technology in patient care sparked a passion for cybersecurity. Dr. Agarwal previously managed federal enterprise risks at the U.S. Cybersecurity and Infrastructure Security Agency (CISA) and now shares her knowledge as an adjunct professor at George Washington University. Committed to community engagement, she mentors aspiring cybersecurity professionals through WiCyS and other initiatives, empowering the leaders of tomorrow in the ever-evolving cyber landscape. 
 
In the Lifestyle Polygraph segment, Dr. Agarwal gave us some insight about her life away from all things cybersecurity including a passion for British baking competitions and why should wouldn&apos;t mind adding a couple journalist to her team. 

The show begins with Jack Clabby of Carlton Fields, P.A., joined by resident cybersecurity expert Kayley Melton, analyzing what they learned in this weeks insightful episode with Dr. Anmol Agarwal 

Follow Anmol Agarwal on LinkedIn:  https://www.linkedin.com/in/anmolsagarwal/ 

X: @anmolspeaker 

YT: @anmolspeaker </itunes:subtitle>
      <itunes:keywords>the future, robots, career path, computer science, 5g, cybersecurity, global security standardization, global, ai, nokia, mentorship, 6g, women in cybersecurity, research, carlton fields</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>56</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">343c558f-a483-40a2-980a-a063ad9f05e5</guid>
      <title>No Password Required Podcast Special Episode - Tanya Janca</title>
      <description><![CDATA[<p>In this conversation, Tanya Janca discusses the importance of secure coding in the cybersecurity landscape, sharing her journey and experiences as both a developer and educator. She emphasizes the need for software developers to understand security principles, the role of OWASP in providing resources, and the challenges of balancing user experience with security measures. Tanya also highlights the significance of validation in development and the implications of implied trust in cybersecurity practices.</p>
]]></description>
      <pubDate>Thu, 23 Jan 2025 05:00:00 +0000</pubDate>
      <author>rex2@cyberflorida.org (Sarina Gandy, Tanya Janca, Kayley Melton, Ernie Ferraresso, Julia Blyke, Rex Wilson, Jack Clabby, Carlton Fields, Canada)</author>
      <link>https://no-password-required.simplecast.com/episodes/no-password-required-podcast-special-episode-tanya-janca-1_CZSf1N</link>
      <content:encoded><![CDATA[<p>In this conversation, Tanya Janca discusses the importance of secure coding in the cybersecurity landscape, sharing her journey and experiences as both a developer and educator. She emphasizes the need for software developers to understand security principles, the role of OWASP in providing resources, and the challenges of balancing user experience with security measures. Tanya also highlights the significance of validation in development and the implications of implied trust in cybersecurity practices.</p>
]]></content:encoded>
      <enclosure length="32744942" type="audio/mpeg" url="https://dts.podtrac.com/redirect.mp3/cdn.simplecast.com/audio/ba5244e0-cb0d-4762-b681-e884e01b43fb/episodes/08c3f9c8-75ed-4011-9725-6c2ba1cbd94a/audio/6bf7a293-ef26-43be-bbc5-53adb86985a7/default_tc.mp3?aid=rss_feed&amp;feed=YGJgknbK"/>
      <itunes:title>No Password Required Podcast Special Episode - Tanya Janca</itunes:title>
      <itunes:author>Sarina Gandy, Tanya Janca, Kayley Melton, Ernie Ferraresso, Julia Blyke, Rex Wilson, Jack Clabby, Carlton Fields, Canada</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/d43689d3-22e4-45dd-97ad-4c2145bc601b/9da9572a-59c2-4201-9613-ed71e2723190/3000x3000/tanyajanca-episode-art-recovered.jpg?aid=rss_feed"/>
      <itunes:duration>00:34:05</itunes:duration>
      <itunes:summary>Tanya Janca — Education lead at Semgrep, cybersecurity trailblazer and author dedicated to
&quot;securing all the things” 
Tanya Janca, widely known as SheHacksPurple, is the Head of Community and Education at Semgrep and the best-selling author of Alice and Bob Learn Application Security. With over 25 years of experience in coding and IT, Tanya has become a leading advocate for secure software practices.
Her highly anticipated sequel, Alice and Bob Learn Secure Coding, takes a deeper dive into building secure software from the ground up. This new book equips developers with practical techniques to integrate security at every stage of the development process. Tanya&apos;s passion for teaching secure practices stems from her extensive career, which began in the Canadian government. Starting as a software developer, she later transitioned to election security and served as the IT Security Coordinator (CISO equivalent) for the 42nd General Election in Canada. Driven by her mission to &quot;secure all the things,&quot; Tanya continues to inspire and empower the global developer community, ensuring that security becomes a foundational element of software development.









You can follow Tanya Janca on LinkedIn here: https://www.linkedin.com/in/tanya-janca/
You can follow Tanya Janca on Twitter here: @shehackspurple
You can learn more about Semgrep Academy here: https://academy.semgrep.dev/













</itunes:summary>
      <itunes:subtitle>Tanya Janca — Education lead at Semgrep, cybersecurity trailblazer and author dedicated to
&quot;securing all the things” 
Tanya Janca, widely known as SheHacksPurple, is the Head of Community and Education at Semgrep and the best-selling author of Alice and Bob Learn Application Security. With over 25 years of experience in coding and IT, Tanya has become a leading advocate for secure software practices.
Her highly anticipated sequel, Alice and Bob Learn Secure Coding, takes a deeper dive into building secure software from the ground up. This new book equips developers with practical techniques to integrate security at every stage of the development process. Tanya&apos;s passion for teaching secure practices stems from her extensive career, which began in the Canadian government. Starting as a software developer, she later transitioned to election security and served as the IT Security Coordinator (CISO equivalent) for the 42nd General Election in Canada. Driven by her mission to &quot;secure all the things,&quot; Tanya continues to inspire and empower the global developer community, ensuring that security becomes a foundational element of software development.









You can follow Tanya Janca on LinkedIn here: https://www.linkedin.com/in/tanya-janca/
You can follow Tanya Janca on Twitter here: @shehackspurple
You can learn more about Semgrep Academy here: https://academy.semgrep.dev/













</itunes:subtitle>
      <itunes:keywords>threat modeling, user experience, cybersecurity, governance risk compliance, implied trust, owasp, application security, secure coding, software development, documentary, validation, carlton fields</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>bonus</itunes:episodeType>
    </item>
    <item>
      <guid isPermaLink="false">5dc43dcd-344a-4847-b49d-5cc9c8fb6965</guid>
      <title>No Password Required Podcast Episode 55 — Zabrina Mcintyre</title>
      <description><![CDATA[<p>Summary</p><p>This conversation explores the U.S. Army's investment in cybersecurity compliance for small businesses, the importance of mentorship in the defense industry, and the unique career path of Sabrina McIntyre at KPMG. Sabrina discusses her transition from art to cybersecurity, the challenges of navigating compliance standards, and her advocacy for women in the field. The episode also touches on the intersection of art and cybersecurity, the vision for a cybersecurity museum, and fun personal insights from Zabrina's life.</p><p> </p><p>Chapters</p><p>00:00 Introduction to the Next Generation Commercial Operations Program</p><p>02:51 The Importance of Cybersecurity Compliance for Small Businesses</p><p>05:45 Zabrina McIntyre's Role at KPMG</p><p>08:54 Zabrina's Unique Career Path</p><p>11:51 Navigating Cybersecurity Standards</p><p>14:48 Advice for Aspiring Cybersecurity Professionals</p><p>17:58 Women in Cybersecurity: Building Community</p><p>20:59 The Intersection of Art and Cybersecurity</p><p>24:04 Zabrina's Vision for a Cybersecurity Museum</p><p>27:02 Lifestyle Polygraph: Fun Questions with Zabrina</p><p>30:09 Key Takeaways and Closing Thoughts</p><p> </p>
]]></description>
      <pubDate>Mon, 30 Dec 2024 05:00:00 +0000</pubDate>
      <author>rex2@cyberflorida.org (princess leia organa, Zabrina Mcintyre, Carlton Fields, Devin Malice, Jack Clabby, Sarina Gandy, Julia Blyke, Rex Wilson, Cyber Florida, Kayley Melton)</author>
      <link>https://no-password-required.simplecast.com/episodes/no-password-required-podcast-episode-55-zabrina-mcintyre-ko9NlRN6</link>
      <media:thumbnail height="720" url="https://image.simplecastcdn.com/images/d43689d3-22e4-45dd-97ad-4c2145bc601b/4faa3e34-e309-4a40-95c4-7435595ba74e/youtube-template-zabrina-20mcintyre.jpg" width="1280"/>
      <content:encoded><![CDATA[<p>Summary</p><p>This conversation explores the U.S. Army's investment in cybersecurity compliance for small businesses, the importance of mentorship in the defense industry, and the unique career path of Sabrina McIntyre at KPMG. Sabrina discusses her transition from art to cybersecurity, the challenges of navigating compliance standards, and her advocacy for women in the field. The episode also touches on the intersection of art and cybersecurity, the vision for a cybersecurity museum, and fun personal insights from Zabrina's life.</p><p> </p><p>Chapters</p><p>00:00 Introduction to the Next Generation Commercial Operations Program</p><p>02:51 The Importance of Cybersecurity Compliance for Small Businesses</p><p>05:45 Zabrina McIntyre's Role at KPMG</p><p>08:54 Zabrina's Unique Career Path</p><p>11:51 Navigating Cybersecurity Standards</p><p>14:48 Advice for Aspiring Cybersecurity Professionals</p><p>17:58 Women in Cybersecurity: Building Community</p><p>20:59 The Intersection of Art and Cybersecurity</p><p>24:04 Zabrina's Vision for a Cybersecurity Museum</p><p>27:02 Lifestyle Polygraph: Fun Questions with Zabrina</p><p>30:09 Key Takeaways and Closing Thoughts</p><p> </p>
]]></content:encoded>
      <enclosure length="40831336" type="audio/mpeg" url="https://dts.podtrac.com/redirect.mp3/cdn.simplecast.com/audio/ba5244e0-cb0d-4762-b681-e884e01b43fb/episodes/a5eeeefb-c9d7-4946-ab6b-36746a423cb6/audio/d51e3ce8-c7fc-42c5-90c8-d20ee8968f33/default_tc.mp3?aid=rss_feed&amp;feed=YGJgknbK"/>
      <itunes:title>No Password Required Podcast Episode 55 — Zabrina Mcintyre</itunes:title>
      <itunes:author>princess leia organa, Zabrina Mcintyre, Carlton Fields, Devin Malice, Jack Clabby, Sarina Gandy, Julia Blyke, Rex Wilson, Cyber Florida, Kayley Melton</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/d43689d3-22e4-45dd-97ad-4c2145bc601b/c166f1f1-ae4e-45d9-a097-7920df62333d/3000x3000/zabrina-20mcintyre-episode-art.jpg?aid=rss_feed"/>
      <itunes:duration>00:42:29</itunes:duration>
      <itunes:summary>Zabrina Mcintyre — Director and Cybersecurity Advisor at KPMG and Rain Culture Authority 

Zabrina Mcintyre is a Director and Cybersecurity Advisor at KPMG, where she leverages her diverse expertise in cybersecurity, risk management, and strategic project leadership. 

She brings a unique blend of creativity and expertise to her work by combining a Master of Arts (MA), Art Business, a specialized MBA program with international focus with extensive professional experience in the creative and cybersecurity industries. She has worked at three major animation studios, bringing a fresh perspective to her role in cybersecurity. A passionate advocate for women in cybersecurity, Zabrina serves as a founding member and past president of the WiCyS Western Washington Affiliate. She continues to contribute to the industry as a board member of the National Women in Cybersecurity (WiCyS) BISO Affiliate. Additionally, she is known for her unique understanding of rain culture, shaped by her time living in the rainy cities of Seattle and London.

 The show begins with Jack Clabby of Carlton Fields, P.A., joined by resident cybersecurity expert Kayley Melton, analyzing a new U.S army initiative to support small businesses in meeting cybersecurity requirements and ensuring a secure and resilient network of partners critical to national security.

Follow Zabrina Mcintyre on LinkedIn: https://www.linkedin.com/in/zmcintyre/
</itunes:summary>
      <itunes:subtitle>Zabrina Mcintyre — Director and Cybersecurity Advisor at KPMG and Rain Culture Authority 

Zabrina Mcintyre is a Director and Cybersecurity Advisor at KPMG, where she leverages her diverse expertise in cybersecurity, risk management, and strategic project leadership. 

She brings a unique blend of creativity and expertise to her work by combining a Master of Arts (MA), Art Business, a specialized MBA program with international focus with extensive professional experience in the creative and cybersecurity industries. She has worked at three major animation studios, bringing a fresh perspective to her role in cybersecurity. A passionate advocate for women in cybersecurity, Zabrina serves as a founding member and past president of the WiCyS Western Washington Affiliate. She continues to contribute to the industry as a board member of the National Women in Cybersecurity (WiCyS) BISO Affiliate. Additionally, she is known for her unique understanding of rain culture, shaped by her time living in the rainy cities of Seattle and London.

 The show begins with Jack Clabby of Carlton Fields, P.A., joined by resident cybersecurity expert Kayley Melton, analyzing a new U.S army initiative to support small businesses in meeting cybersecurity requirements and ensuring a secure and resilient network of partners critical to national security.

Follow Zabrina Mcintyre on LinkedIn: https://www.linkedin.com/in/zmcintyre/
</itunes:subtitle>
      <itunes:keywords>johannes vermeer, pacific north west, small businesses, do we belong here, compliance, kpmg, do we belong here documentary, career path, leadership, standards, cybersecurity, museum design, museum, coffee, regional parade, mentorship, london, star wars, seattle, smithsonian, animation, stolen artwork, rain culture, zabrina mcintyre, art, carlton fields</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>55</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">5f03b672-6317-4e18-9f62-87b9872c7fd5</guid>
      <title>No Password Required Podcast Episode 54 — Dr. Sunny Wear</title>
      <description><![CDATA[<p>Summary</p><p>In this episode, the conversation begins with a significant data breach at Star Health Insurance, affecting over 31 million individuals. The discussion delves into the complexities of insider threats, particularly focusing on the alleged involvement of the company's CISO. The episode transitions to an introduction of Dr. Sunny Ware, a web application penetration tester, who shares her journey from software development to cybersecurity. Dr. Sunny discusses her role in penetration testing, the importance of understanding application logic, and the use of AI in her work. The episode concludes with a lifestyle polygraph segment, where Dr. Sunny shares personal insights and experiences, emphasizing the importance of mentorship in cybersecurity. </p><p>Chapters</p><p>00:00 Data Breach at Star Health Insurance</p><p>06:06 Insider Threats and Whistleblowers</p><p>07:05 Introduction to Dr. Sunny Ware</p><p>30:14 Dr. Sunny's Career Path and Penetration Testing</p><p>37:00 Lifestyle Polygraph with Dr. Sunny</p><p>48:55 Key Takeaways and Closing Thoughts</p>
]]></description>
      <pubDate>Tue, 10 Dec 2024 05:00:00 +0000</pubDate>
      <author>rex2@cyberflorida.org (Dr. Sunny Ware, Boba Fett, Ernie Ferraresso, Sarina Gandy, Julia Blyke, Carlton Fields, Kayley Melton, Jack Clabby, Cyber Florida, Rex Wilson)</author>
      <link>https://no-password-required.simplecast.com/episodes/no-password-required-podcast-episode-54-dr-sunny-wear-5E_8nczh</link>
      <content:encoded><![CDATA[<p>Summary</p><p>In this episode, the conversation begins with a significant data breach at Star Health Insurance, affecting over 31 million individuals. The discussion delves into the complexities of insider threats, particularly focusing on the alleged involvement of the company's CISO. The episode transitions to an introduction of Dr. Sunny Ware, a web application penetration tester, who shares her journey from software development to cybersecurity. Dr. Sunny discusses her role in penetration testing, the importance of understanding application logic, and the use of AI in her work. The episode concludes with a lifestyle polygraph segment, where Dr. Sunny shares personal insights and experiences, emphasizing the importance of mentorship in cybersecurity. </p><p>Chapters</p><p>00:00 Data Breach at Star Health Insurance</p><p>06:06 Insider Threats and Whistleblowers</p><p>07:05 Introduction to Dr. Sunny Ware</p><p>30:14 Dr. Sunny's Career Path and Penetration Testing</p><p>37:00 Lifestyle Polygraph with Dr. Sunny</p><p>48:55 Key Takeaways and Closing Thoughts</p>
]]></content:encoded>
      <enclosure length="49400543" type="audio/mpeg" url="https://dts.podtrac.com/redirect.mp3/cdn.simplecast.com/audio/ba5244e0-cb0d-4762-b681-e884e01b43fb/episodes/cee9a891-d8af-4d84-8655-c6593043f3c9/audio/5e1208b4-54b7-41c3-a2fb-448b69a712b8/default_tc.mp3?aid=rss_feed&amp;feed=YGJgknbK"/>
      <itunes:title>No Password Required Podcast Episode 54 — Dr. Sunny Wear</itunes:title>
      <itunes:author>Dr. Sunny Ware, Boba Fett, Ernie Ferraresso, Sarina Gandy, Julia Blyke, Carlton Fields, Kayley Melton, Jack Clabby, Cyber Florida, Rex Wilson</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/d43689d3-22e4-45dd-97ad-4c2145bc601b/83db970d-efaf-4a04-a4b5-25ede8ac8e65/3000x3000/sunny-20wear-episode-art.jpg?aid=rss_feed"/>
      <itunes:duration>00:51:24</itunes:duration>
      <itunes:summary>Dr. Sunny Wear — Application penetration tester, author, and bug bounty enthusiast
Dr. Sunny Wear began her career as a developer, spending countless hours maintaining others&apos; code—a humbling experience, as she describes it. Realizing she wanted a different path, a friend suggested exploring cybersecurity at just the right time. Together, they tackled the CISSP exam, which Dr. Sunny passed, igniting her passion for application penetration testing.
Now an accomplished author and proud bird mom, Dr. Sunny discusses her Burp Suite Cookbook, a practical guide to identifying, testing, and exploiting vulnerabilities in web applications and APIs.
The show begins with Jack Clabby of Carlton Fields, P.A., joined by resident cybersecurity expert Kayley Melton, analyzing the Star Health Insurance (India) data breach, where an alleged cybercriminal accused the company’s CISO has been accused of selling sensitive data for $43,000.
.
Follow Dr. Sunny on LinkedIn: https://www.linkedin.com/in/sunny-wear/
Follow Dr. Sunny on Twitter: https://x.com/SunnyWear
Learn more about Sunshine Solutions: https://www.sunsolsec.com/










</itunes:summary>
      <itunes:subtitle>Dr. Sunny Wear — Application penetration tester, author, and bug bounty enthusiast
Dr. Sunny Wear began her career as a developer, spending countless hours maintaining others&apos; code—a humbling experience, as she describes it. Realizing she wanted a different path, a friend suggested exploring cybersecurity at just the right time. Together, they tackled the CISSP exam, which Dr. Sunny passed, igniting her passion for application penetration testing.
Now an accomplished author and proud bird mom, Dr. Sunny discusses her Burp Suite Cookbook, a practical guide to identifying, testing, and exploiting vulnerabilities in web applications and APIs.
The show begins with Jack Clabby of Carlton Fields, P.A., joined by resident cybersecurity expert Kayley Melton, analyzing the Star Health Insurance (India) data breach, where an alleged cybercriminal accused the company’s CISO has been accused of selling sensitive data for $43,000.
.
Follow Dr. Sunny on LinkedIn: https://www.linkedin.com/in/sunny-wear/
Follow Dr. Sunny on Twitter: https://x.com/SunnyWear
Learn more about Sunshine Solutions: https://www.sunsolsec.com/










</itunes:subtitle>
      <itunes:keywords>creativity, bug bounty programs, dr. sunny ware, happiness, white hat hacker, ai in cybersecurity, do we belong here documentary, data breach, florida, penetration testing, vulnerability disclosure, cybersafe foundation, api security, cybersecurity, insider threats, education, star health insurance, personal experiences, carlton fields</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>54</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">012a36b1-c266-459c-9697-efb1edd0f4db</guid>
      <title>No Password Required Podcast Episode 53 — Confidence Staveley</title>
      <description><![CDATA[]]></description>
      <pubDate>Thu, 24 Oct 2024 04:05:00 +0000</pubDate>
      <author>rex2@cyberflorida.org (Confidence Staveley, Julia Blyke, Prudence Chukwunwe, Cybersafe Foundation, Ernie Ferraresso, Kayley Melton, Devin Malice, Jack Clabby, Tanya Janca, Rex Wilson, Cyber Florida, Sarina Gandy)</author>
      <link>https://no-password-required.simplecast.com/episodes/no-password-required-podcast-episode-53-confidence-staveley-z0jpBXDj</link>
      <media:thumbnail height="720" url="https://image.simplecastcdn.com/images/d43689d3-22e4-45dd-97ad-4c2145bc601b/fab40d1c-f011-4188-9766-d37b413beb03/youtube-template-confidence-20staveley.jpg" width="1280"/>
      <content:encoded><![CDATA[]]></content:encoded>
      <enclosure length="33868247" type="audio/mpeg" url="https://dts.podtrac.com/redirect.mp3/cdn.simplecast.com/audio/ba5244e0-cb0d-4762-b681-e884e01b43fb/episodes/89313882-76ea-4250-98be-061f64366acd/audio/a6e37103-0c05-4f17-b700-23acac22c76d/default_tc.mp3?aid=rss_feed&amp;feed=YGJgknbK"/>
      <itunes:title>No Password Required Podcast Episode 53 — Confidence Staveley</itunes:title>
      <itunes:author>Confidence Staveley, Julia Blyke, Prudence Chukwunwe, Cybersafe Foundation, Ernie Ferraresso, Kayley Melton, Devin Malice, Jack Clabby, Tanya Janca, Rex Wilson, Cyber Florida, Sarina Gandy</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/d43689d3-22e4-45dd-97ad-4c2145bc601b/56244f54-73e5-460b-885b-5940a91f5acb/3000x3000/confidence-staveley-episode-art.jpg?aid=rss_feed"/>
      <itunes:duration>00:35:14</itunes:duration>
      <itunes:summary>No Password Required Podcast Episode 53 — Confidence Staveley

Confidence Staveley — The Founder of CyberSafe Foundation and a Person Who Is Comfortable in the API Kitchen.

Confidence Staveley is the founder and CEO of CyberSafe Foundation, Africa&apos;s leading non-governmental organization in digital development. Her mission in this initiative is to ensure inclusive and safe digital access across Africa.

Confidence discovered her passion for computer science during a gap year after high school when she first touched a computer keyboard. She then convinced her parents—who had envisioned a medical career for her—to support her new career by presenting hand-drawn slides and a twinkle in her eye. Since then, Confidence has become a leader in application security. She has also founded multiple businesses, starred in the &quot;API Kitchen&quot; series of videos.

Follow Confidence Staveley on LinkedIn. https://www.linkedin.com/in/confidencestaveley/

Learn more about Cybersafe Foundation. https://cybersafefoundation.org/

Watch API Kitchen on YouTube. https://www.youtube.com/playlist?list=PLfi0VCyZDkUYDGYOQHxZybGGZjTbjng2B</itunes:summary>
      <itunes:subtitle>No Password Required Podcast Episode 53 — Confidence Staveley

Confidence Staveley — The Founder of CyberSafe Foundation and a Person Who Is Comfortable in the API Kitchen.

Confidence Staveley is the founder and CEO of CyberSafe Foundation, Africa&apos;s leading non-governmental organization in digital development. Her mission in this initiative is to ensure inclusive and safe digital access across Africa.

Confidence discovered her passion for computer science during a gap year after high school when she first touched a computer keyboard. She then convinced her parents—who had envisioned a medical career for her—to support her new career by presenting hand-drawn slides and a twinkle in her eye. Since then, Confidence has become a leader in application security. She has also founded multiple businesses, starred in the &quot;API Kitchen&quot; series of videos.

Follow Confidence Staveley on LinkedIn. https://www.linkedin.com/in/confidencestaveley/

Learn more about Cybersafe Foundation. https://cybersafefoundation.org/

Watch API Kitchen on YouTube. https://www.youtube.com/playlist?list=PLfi0VCyZDkUYDGYOQHxZybGGZjTbjng2B</itunes:subtitle>
      <itunes:keywords>api kitchen, creativity, cciso, marvel, happiness, white hat hacker, passion, nigeria, cissp, cybersecurity woman of the year, leadership, florida, cybersafe foundation, api security, cybersecurity, africa, talent, simplicity, mentorship, csslp, education, merklefence, personal journey, confidence staveley, twinkle in her eye, empowerment, carlton fields</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>53</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">33f17107-a20d-4a3c-a024-ea4808aa10d6</guid>
      <title>No Password Required Podcast Episode 52 — Dr. Thomas Hyslip</title>
      <description><![CDATA[<p>Summary: </p><p>A new school in San Antonio called Nukudu offers a paid training program followed by a guaranteed job in cybersecurity. The program aims to address the shortage of cyber jobs and provides hands-on training to ensure candidates are prepared for the workforce. </p><p>Our guest, Dr. Thomas Hyslop, an assistant professor at the University of South Florida, shares his experience in law enforcement and the importance of interagency collaboration in combating cybercrime. He also discusses the Master of Science in Cybercrime program at USF, which focuses on digital forensics and criminal investigation. The future of cybercrime is concerning as large criminal organizations are becoming more sophisticated and mimicking nation states in their capabilities. Investigating international cybercrime is challenging due to the need for cooperation between countries and the slow response times. Changes in international treaties and agreements are needed to expedite investigations. Dr. Highslip ran a museum of vintage technology and is looking for a place to house it permanently. He enjoys swimming in Mirror Lake, biking on Champs-Elysees, and running in DC for his ideal triathlon. His favorite junk food treat is Bit-O-Honey and he loves all kinds of pies. Guns N' Roses is his favorite hair metal band and his favorite song is Paradise City. He enjoys playing metal songs at social gatherings and believes that Appetite for Destruction is a timeless album. Dr. Highslip has what it takes to join the fantasy cybersecurity squad and is a force multiplier with his expertise in incident response and alternative theories for obtaining information from foreign governments.</p><p>Chapters</p><p>00:00 Nukudu: A New School Offering Paid Training and Guaranteed Job Placement in Cybersecurity</p><p>06:21 The Role of Interagency Collaboration in Combating Cybercrime</p><p>19:07 The Master of Science in Cybercrime Program at the University of South Florida</p><p>25:48 Emphasizing Team Building and Collaboration in Cybersecurity Education</p><p>26:42 The Future of Cybercrime</p><p>27:11 Investigating International Cybercrime</p><p>31:25 Preserving Vintage Technology</p><p>37:30 The Ideal Triathlon</p><p>43:03 Indulging in Junk Food</p><p>45:23 Rocking Out with Guns N' Roses</p><p>49:11 Dr. Highslip: A Valuable Addition to the Fantasy Cybersecurity Squad</p>
]]></description>
      <pubDate>Wed, 4 Sep 2024 04:00:00 +0000</pubDate>
      <author>rex2@cyberflorida.org (Thomas Hyslip, Bob Ross, Atari, NukuDo, Phil Collins, USF, Derek Hines, Sarina Gandy, Devin Malice, Jack Clabby, Scott Wachtler, Kayley Melton, Cyber Florida, Rex Wilson, Carlton Fields)</author>
      <link>https://no-password-required.simplecast.com/episodes/no-password-required-podcast-episode-52-dr-thomas-hyslip-50MVbnaN</link>
      <media:thumbnail height="720" url="https://image.simplecastcdn.com/images/d43689d3-22e4-45dd-97ad-4c2145bc601b/d5e940d5-e11a-46f6-b9e6-f462154943df/youtube-template-hyslip.jpg" width="1280"/>
      <content:encoded><![CDATA[<p>Summary: </p><p>A new school in San Antonio called Nukudu offers a paid training program followed by a guaranteed job in cybersecurity. The program aims to address the shortage of cyber jobs and provides hands-on training to ensure candidates are prepared for the workforce. </p><p>Our guest, Dr. Thomas Hyslop, an assistant professor at the University of South Florida, shares his experience in law enforcement and the importance of interagency collaboration in combating cybercrime. He also discusses the Master of Science in Cybercrime program at USF, which focuses on digital forensics and criminal investigation. The future of cybercrime is concerning as large criminal organizations are becoming more sophisticated and mimicking nation states in their capabilities. Investigating international cybercrime is challenging due to the need for cooperation between countries and the slow response times. Changes in international treaties and agreements are needed to expedite investigations. Dr. Highslip ran a museum of vintage technology and is looking for a place to house it permanently. He enjoys swimming in Mirror Lake, biking on Champs-Elysees, and running in DC for his ideal triathlon. His favorite junk food treat is Bit-O-Honey and he loves all kinds of pies. Guns N' Roses is his favorite hair metal band and his favorite song is Paradise City. He enjoys playing metal songs at social gatherings and believes that Appetite for Destruction is a timeless album. Dr. Highslip has what it takes to join the fantasy cybersecurity squad and is a force multiplier with his expertise in incident response and alternative theories for obtaining information from foreign governments.</p><p>Chapters</p><p>00:00 Nukudu: A New School Offering Paid Training and Guaranteed Job Placement in Cybersecurity</p><p>06:21 The Role of Interagency Collaboration in Combating Cybercrime</p><p>19:07 The Master of Science in Cybercrime Program at the University of South Florida</p><p>25:48 Emphasizing Team Building and Collaboration in Cybersecurity Education</p><p>26:42 The Future of Cybercrime</p><p>27:11 Investigating International Cybercrime</p><p>31:25 Preserving Vintage Technology</p><p>37:30 The Ideal Triathlon</p><p>43:03 Indulging in Junk Food</p><p>45:23 Rocking Out with Guns N' Roses</p><p>49:11 Dr. Highslip: A Valuable Addition to the Fantasy Cybersecurity Squad</p>
]]></content:encoded>
      <enclosure length="50756587" type="audio/mpeg" url="https://dts.podtrac.com/redirect.mp3/cdn.simplecast.com/audio/ba5244e0-cb0d-4762-b681-e884e01b43fb/episodes/aa5419fe-75ed-4ee2-9760-bc37342c9cd5/audio/89b3fda0-f626-41d7-840a-48ea93ee7d1c/default_tc.mp3?aid=rss_feed&amp;feed=YGJgknbK"/>
      <itunes:title>No Password Required Podcast Episode 52 — Dr. Thomas Hyslip</itunes:title>
      <itunes:author>Thomas Hyslip, Bob Ross, Atari, NukuDo, Phil Collins, USF, Derek Hines, Sarina Gandy, Devin Malice, Jack Clabby, Scott Wachtler, Kayley Melton, Cyber Florida, Rex Wilson, Carlton Fields</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/d43689d3-22e4-45dd-97ad-4c2145bc601b/d4173245-fd54-4091-a14f-4a88c0caffad/3000x3000/thomas-hyslip-episode-art.jpg?aid=rss_feed"/>
      <itunes:duration>00:52:47</itunes:duration>
      <itunes:summary>Dr. Thomas Hyslip — USF cybercrime professor, former federal agent, and vintage computer archivist.

Dr. Hyslip teaches at USF&apos;s Master of Science in Cybercrime program, where he blends of criminology, digital forensics, and incident response coursework.

A retired U.S. Army Colonel, Dr. Hyslip&apos;s career spans 23 years across the Defense Criminal Investigative Service (DCIS), the United States Secret Service, and the Environmental Protection Agency&apos;s Criminal Investigation Division. In these roles, he has experienced unforgettable moments, like an adventure involving hotdogs, home runs, and a secure Presidential phone at Wrigley Field. Dr. Hyslip also shares his favorite metal hair band and when it’s the perfect time to indulge in their sounds—spoiler alert, it’s always.

The show kicks off with Jack Clabby from Carlton Fields, P.A., and our resident cybersecurity mercenary, Kayley Melton, as they discuss NukuDo Cybersecurity School&apos;s expansion into the American market. They also break down the benefits of NukuDo’s unique cybersecurity talent development model, which could soon become a widespread strategy.

Follow Thomas Hyslip on LinkedIn: https://www.linkedin.com/in/thyslip/ 
Learn more about USF’s Department of Criminology: https://www.usf.edu/cbcs/criminology/
</itunes:summary>
      <itunes:subtitle>Dr. Thomas Hyslip — USF cybercrime professor, former federal agent, and vintage computer archivist.

Dr. Hyslip teaches at USF&apos;s Master of Science in Cybercrime program, where he blends of criminology, digital forensics, and incident response coursework.

A retired U.S. Army Colonel, Dr. Hyslip&apos;s career spans 23 years across the Defense Criminal Investigative Service (DCIS), the United States Secret Service, and the Environmental Protection Agency&apos;s Criminal Investigation Division. In these roles, he has experienced unforgettable moments, like an adventure involving hotdogs, home runs, and a secure Presidential phone at Wrigley Field. Dr. Hyslip also shares his favorite metal hair band and when it’s the perfect time to indulge in their sounds—spoiler alert, it’s always.

The show kicks off with Jack Clabby from Carlton Fields, P.A., and our resident cybersecurity mercenary, Kayley Melton, as they discuss NukuDo Cybersecurity School&apos;s expansion into the American market. They also break down the benefits of NukuDo’s unique cybersecurity talent development model, which could soon become a widespread strategy.

Follow Thomas Hyslip on LinkedIn: https://www.linkedin.com/in/thyslip/ 
Learn more about USF’s Department of Criminology: https://www.usf.edu/cbcs/criminology/
</itunes:subtitle>
      <itunes:keywords>fantasy cybersecurity squad, international cybercrime, vintage technology museum, u.s. army colonel, digital forensics, training program, favorite hair metal band, criminology, cybercrime, criminal investigation, large criminal organizations, leadership, cyber jobs, united states secret service, purple heart, cybersecurity, ideal triathlon, job placement, bronze star, assistant professor of instruction at university of south florida, defense criminal investigative service, master of science in cybercrime, infosec, university of south florida, bit-o-honey, interagency collaboration, law enforcement, favorite junk food treat, combat action badge, future of cybercrime, nukudu</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>52</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">c51416f6-0966-4125-b4ae-c56a5f723891</guid>
      <title>No Password Required Podcast Episode 51 — Maretta Morovitz</title>
      <description><![CDATA[<p>Summary</p><p>Kenya's efforts to enhance its cybersecurity and technological progress through partnerships with the US and major tech companies. The focus is on responsible state behavior in cyberspace and addressing mobile app security. The role of public-private partnerships in promoting a robust digital economy and infrastructure. The conversation then transitions to an interview with Maretta Morovitz, a cybersecurity expert at MITRE, discussing her career path, the importance of mentorship, and the impact of ADHD on her work. The discussion also covers MITRE Engage, which focuses on cyber denial, deception, and adversary engagement, and highlights the use of simple yet effective techniques like decoy credentials. In this conversation, Maretta Morovitz discusses the importance of thinking creatively and outside the box when it comes to cybersecurity solutions, especially for organizations with limited budgets. She emphasizes the need for simplicity and proactive measures in cybersecurity. Maretta also highlights the value of interdisciplinary collaboration in the field, involving professionals from various backgrounds such as human behavioral scientists and graphic designers. She shares a successful collaboration between MITRE and HSBC in the field of deception operations. Maretta also talks about her passion for dance and her unique talent of reciting the alphabet backwards.</p><p>Follow Maretta Morovitz on LinkedIn: <a href="https://nam04.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwww.linkedin.com%2Fin%2Fmjmorovitz&data=05%7C02%7Crex2%40cyberflorida.org%7Ca602e4dbd3e443d1ebc208dc9cfdafb2%7C741bf7dee2e546df8d6782607df9deaa%7C0%7C0%7C638557860610153143%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C0%7C%7C%7C&sdata=07m%2BLBm8%2Fuo2BmOt%2B0mVvaYHgw04fzmFw39fDh0U7Vk%3D&reserved=0">Maretta Morovitz</a></p><p>Follow MITRE on Twitter: <a href="https://nam04.safelinks.protection.outlook.com/?url=https%3A%2F%2Ftwitter.com%2FMITREcorp&data=05%7C02%7Crex2%40cyberflorida.org%7Ca602e4dbd3e443d1ebc208dc9cfdafb2%7C741bf7dee2e546df8d6782607df9deaa%7C0%7C0%7C638557860610171607%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C0%7C%7C%7C&sdata=FY%2FirReh%2BkquyNu83wcGXkIKZXmaUySyNQndLuGS%2BFc%3D&reserved=0">@MITREcorp</a></p><p>Learn more about MITRE Engage: <a href="https://nam04.safelinks.protection.outlook.com/?url=https%3A%2F%2Fengage.mitre.org%2Fdefenders&data=05%7C02%7Crex2%40cyberflorida.org%7Ca602e4dbd3e443d1ebc208dc9cfdafb2%7C741bf7dee2e546df8d6782607df9deaa%7C0%7C0%7C638557860610188053%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C0%7C%7C%7C&sdata=hh3bKy43BjrNdk%2BgMOHOIT6YOe7ouitIJWSUg3MAA9o%3D&reserved=0">MITRE Engage</a></p><p> </p><p>Chapters</p><p>00:00 Kenya's Cybersecurity Partnerships</p><p>03:24 Addressing Mobile App Security</p><p>07:13 Interview with Maretta Morovitz</p><p>11:35 Cyber Deception and Adversary Engagement</p><p>29:12 The Importance of Simplicity and Proactive Measures</p><p>30:07 Interdisciplinary Collaboration in Cybersecurity</p><p>31:06 Successful Collaboration in Deception Operations</p><p>34:44 Bringing Unique Perspectives and Skills to Cybersecurity</p>
]]></description>
      <pubDate>Mon, 8 Jul 2024 04:00:00 +0000</pubDate>
      <author>rex2@cyberflorida.org (MITRE, Dr. Stan Barr, Kenya, Maretta Morovitz, Kevin McCallister, MITRE Engage, Harry Potter, John and Abigail Adams, Maretta&apos;s Dad, Rex Wilson, Cyber Florida, Ernie Ferraresso, Sarina Gandy, Devin Malice, Jack Clabby, Carlton Fields, Kayley Melton)</author>
      <link>https://no-password-required.simplecast.com/episodes/no-password-required-podcast-episode-51-maretta-morovitz-zR5fLhw_</link>
      <media:thumbnail height="720" url="https://image.simplecastcdn.com/images/d43689d3-22e4-45dd-97ad-4c2145bc601b/1b563ac9-f8d4-4c94-9949-1592f0c78ddc/maretta-youtube.jpg" width="1280"/>
      <content:encoded><![CDATA[<p>Summary</p><p>Kenya's efforts to enhance its cybersecurity and technological progress through partnerships with the US and major tech companies. The focus is on responsible state behavior in cyberspace and addressing mobile app security. The role of public-private partnerships in promoting a robust digital economy and infrastructure. The conversation then transitions to an interview with Maretta Morovitz, a cybersecurity expert at MITRE, discussing her career path, the importance of mentorship, and the impact of ADHD on her work. The discussion also covers MITRE Engage, which focuses on cyber denial, deception, and adversary engagement, and highlights the use of simple yet effective techniques like decoy credentials. In this conversation, Maretta Morovitz discusses the importance of thinking creatively and outside the box when it comes to cybersecurity solutions, especially for organizations with limited budgets. She emphasizes the need for simplicity and proactive measures in cybersecurity. Maretta also highlights the value of interdisciplinary collaboration in the field, involving professionals from various backgrounds such as human behavioral scientists and graphic designers. She shares a successful collaboration between MITRE and HSBC in the field of deception operations. Maretta also talks about her passion for dance and her unique talent of reciting the alphabet backwards.</p><p>Follow Maretta Morovitz on LinkedIn: <a href="https://nam04.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwww.linkedin.com%2Fin%2Fmjmorovitz&data=05%7C02%7Crex2%40cyberflorida.org%7Ca602e4dbd3e443d1ebc208dc9cfdafb2%7C741bf7dee2e546df8d6782607df9deaa%7C0%7C0%7C638557860610153143%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C0%7C%7C%7C&sdata=07m%2BLBm8%2Fuo2BmOt%2B0mVvaYHgw04fzmFw39fDh0U7Vk%3D&reserved=0">Maretta Morovitz</a></p><p>Follow MITRE on Twitter: <a href="https://nam04.safelinks.protection.outlook.com/?url=https%3A%2F%2Ftwitter.com%2FMITREcorp&data=05%7C02%7Crex2%40cyberflorida.org%7Ca602e4dbd3e443d1ebc208dc9cfdafb2%7C741bf7dee2e546df8d6782607df9deaa%7C0%7C0%7C638557860610171607%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C0%7C%7C%7C&sdata=FY%2FirReh%2BkquyNu83wcGXkIKZXmaUySyNQndLuGS%2BFc%3D&reserved=0">@MITREcorp</a></p><p>Learn more about MITRE Engage: <a href="https://nam04.safelinks.protection.outlook.com/?url=https%3A%2F%2Fengage.mitre.org%2Fdefenders&data=05%7C02%7Crex2%40cyberflorida.org%7Ca602e4dbd3e443d1ebc208dc9cfdafb2%7C741bf7dee2e546df8d6782607df9deaa%7C0%7C0%7C638557860610188053%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C0%7C%7C%7C&sdata=hh3bKy43BjrNdk%2BgMOHOIT6YOe7ouitIJWSUg3MAA9o%3D&reserved=0">MITRE Engage</a></p><p> </p><p>Chapters</p><p>00:00 Kenya's Cybersecurity Partnerships</p><p>03:24 Addressing Mobile App Security</p><p>07:13 Interview with Maretta Morovitz</p><p>11:35 Cyber Deception and Adversary Engagement</p><p>29:12 The Importance of Simplicity and Proactive Measures</p><p>30:07 Interdisciplinary Collaboration in Cybersecurity</p><p>31:06 Successful Collaboration in Deception Operations</p><p>34:44 Bringing Unique Perspectives and Skills to Cybersecurity</p>
]]></content:encoded>
      <enclosure length="52671253" type="audio/mpeg" url="https://dts.podtrac.com/redirect.mp3/cdn.simplecast.com/audio/ba5244e0-cb0d-4762-b681-e884e01b43fb/episodes/e94d4709-8c3b-4a48-a9d9-adbe9a115218/audio/6880ec0a-9bc0-45fe-bfe7-fe304f757cf1/default_tc.mp3?aid=rss_feed&amp;feed=YGJgknbK"/>
      <itunes:title>No Password Required Podcast Episode 51 — Maretta Morovitz</itunes:title>
      <itunes:author>MITRE, Dr. Stan Barr, Kenya, Maretta Morovitz, Kevin McCallister, MITRE Engage, Harry Potter, John and Abigail Adams, Maretta&apos;s Dad, Rex Wilson, Cyber Florida, Ernie Ferraresso, Sarina Gandy, Devin Malice, Jack Clabby, Carlton Fields, Kayley Melton</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/d43689d3-22e4-45dd-97ad-4c2145bc601b/ed3c84ed-33de-4a01-b80f-e980e032da86/3000x3000/maretta-morovitz-episode-art.jpg?aid=rss_feed"/>
      <itunes:duration>00:54:49</itunes:duration>
      <itunes:summary>Maretta Morovitz — MITRE Engage Lead, Innovator in Cyber Deception, and Dance Community Builder

Maretta Morovitz is the Engage Lead at MITRE, where she simplifies the planning of adversary engagement for cyber defenders. Maretta likens her cyber defense work to the movie Home Alone, setting a series of traps for the cyber adversary akin to those of Kevin McCallister.

Maretta began her career at MITRE with an internship, where she met her mentor, Dr. Stan Barr, the MITRE Engage chief scientist: “He was always there to pull me out if I was floundering and drowning, but he gave me the space I needed to make mistakes, learn from them, and figure out how to not make them again.”

Despite having a computer scientist father, Maretta discovered her passion for the industry only in college. After observing a friend who was a computer science major, she found that maybe her dad (and computer science) were cooler than she had initially thought. Maretta also shares on the podcast the importance of her Boston roots and her unique connection to John and Abigail Adams.

To kick off the show, Jack Clabby from Carlton Fields, P.A., and Kayley Melton from KnowBe4 discuss Kenya’s efforts to improve national cybersecurity to protect its fast-growing digital economy. They also cover how the United States and the private sector are contributing to the Kenyan model for digital transformation in Africa, particularly through a dynamic digital ecosystem known as the ‘Silicon Savannah.’</itunes:summary>
      <itunes:subtitle>Maretta Morovitz — MITRE Engage Lead, Innovator in Cyber Deception, and Dance Community Builder

Maretta Morovitz is the Engage Lead at MITRE, where she simplifies the planning of adversary engagement for cyber defenders. Maretta likens her cyber defense work to the movie Home Alone, setting a series of traps for the cyber adversary akin to those of Kevin McCallister.

Maretta began her career at MITRE with an internship, where she met her mentor, Dr. Stan Barr, the MITRE Engage chief scientist: “He was always there to pull me out if I was floundering and drowning, but he gave me the space I needed to make mistakes, learn from them, and figure out how to not make them again.”

Despite having a computer scientist father, Maretta discovered her passion for the industry only in college. After observing a friend who was a computer science major, she found that maybe her dad (and computer science) were cooler than she had initially thought. Maretta also shares on the podcast the importance of her Boston roots and her unique connection to John and Abigail Adams.

To kick off the show, Jack Clabby from Carlton Fields, P.A., and Kayley Melton from KnowBe4 discuss Kenya’s efforts to improve national cybersecurity to protect its fast-growing digital economy. They also cover how the United States and the private sector are contributing to the Kenyan model for digital transformation in Africa, particularly through a dynamic digital ecosystem known as the ‘Silicon Savannah.’</itunes:subtitle>
      <itunes:keywords>responsible state behavior, home alone, public-private partnerships, proactive measures, digital economy, career path, viennese waltz, bean town, interview, deception operations, boston, cyber denial, deception, decoy credentials, cybersecurity, infrastructure, howwarts, dance, technological progress, kevin mccallister, adversary engagement, talent, simplicity, mentorship, low budget solutions, partnerships, mitre engage, mobile app security, interdisciplinary collaboration, adhd, tripwire, silicon savannah, kenya</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>51</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">4e6ac5e8-e8f7-42c7-a81b-78ec04456cb5</guid>
      <title>No Password Required Podcast Episode 50 — Tanya Janca</title>
      <description><![CDATA[<p>Summary:</p><p>The conversation discusses the extradition case of Julian Assange and the role of the US prison system in the decision. It also explores Tanya Janca's role at Semgrep and her passion for affordable cybersecurity education. Additionally, it touches on Tanya's experience in election security and the importance of transparency in the process. Tanya discusses her volunteer work with the Canadian government, where she helps educate students about cybersecurity. She talks about the importance of teaching young people about privacy, protecting digital devices, and understanding cyber threats. Tanya also mentions her involvement in the Cyber Titan competition and her efforts to promote cybersecurity as a career. She shares her experience writing the book 'Alice and Bob Learn Application Security' and her unique approach to making technical concepts accessible through stories and different learning styles. Tanya also talks about the importance of mentoring and how she has benefited from mentors throughout her career.</p><p>Chapters</p><p>00:00 The Extradition Case of Julian Assange</p><p>08:18 Affordable Cybersecurity Education at Semgrep</p><p>30:40 Tanya's Volunteer Work with the Canadian Government</p><p>31:35 Promoting Cybersecurity as a Career</p><p>34:02 Making Technical Concepts Accessible: 'Alice and Bob Learn Application Security'</p><p>39:45 The Value of Mentoring</p>
]]></description>
      <pubDate>Tue, 28 May 2024 04:00:00 +0000</pubDate>
      <author>rex2@cyberflorida.org (Julian Assange, Tanya Janca, Semgrep, Canada, Jack Clabby, Devin Malice, Cyber Florida, KnowBe4, Ernie Ferraresso, Kayley Melton, Sarina Gandy, Rex Wilson, SheHacksPurple, Alice and Bob)</author>
      <link>https://no-password-required.simplecast.com/episodes/no-password-required-podcast-episode-50-tanya-janca-Eubst8bG</link>
      <media:thumbnail height="720" url="https://image.simplecastcdn.com/images/d43689d3-22e4-45dd-97ad-4c2145bc601b/d220fbc2-77e3-45f7-8ace-32d0a7db0250/screenshot-2024-05-17-at-11-14-53-am.jpg" width="1280"/>
      <content:encoded><![CDATA[<p>Summary:</p><p>The conversation discusses the extradition case of Julian Assange and the role of the US prison system in the decision. It also explores Tanya Janca's role at Semgrep and her passion for affordable cybersecurity education. Additionally, it touches on Tanya's experience in election security and the importance of transparency in the process. Tanya discusses her volunteer work with the Canadian government, where she helps educate students about cybersecurity. She talks about the importance of teaching young people about privacy, protecting digital devices, and understanding cyber threats. Tanya also mentions her involvement in the Cyber Titan competition and her efforts to promote cybersecurity as a career. She shares her experience writing the book 'Alice and Bob Learn Application Security' and her unique approach to making technical concepts accessible through stories and different learning styles. Tanya also talks about the importance of mentoring and how she has benefited from mentors throughout her career.</p><p>Chapters</p><p>00:00 The Extradition Case of Julian Assange</p><p>08:18 Affordable Cybersecurity Education at Semgrep</p><p>30:40 Tanya's Volunteer Work with the Canadian Government</p><p>31:35 Promoting Cybersecurity as a Career</p><p>34:02 Making Technical Concepts Accessible: 'Alice and Bob Learn Application Security'</p><p>39:45 The Value of Mentoring</p>
]]></content:encoded>
      <enclosure length="58347652" type="audio/mpeg" url="https://dts.podtrac.com/redirect.mp3/cdn.simplecast.com/audio/ba5244e0-cb0d-4762-b681-e884e01b43fb/episodes/cffe1601-d38b-4562-8aed-8198bdc64cae/audio/1b836867-83e9-42ec-afd6-d549bbe4dfe2/default_tc.mp3?aid=rss_feed&amp;feed=YGJgknbK"/>
      <itunes:title>No Password Required Podcast Episode 50 — Tanya Janca</itunes:title>
      <itunes:author>Julian Assange, Tanya Janca, Semgrep, Canada, Jack Clabby, Devin Malice, Cyber Florida, KnowBe4, Ernie Ferraresso, Kayley Melton, Sarina Gandy, Rex Wilson, SheHacksPurple, Alice and Bob</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/d43689d3-22e4-45dd-97ad-4c2145bc601b/64d030e1-ac53-407c-99f7-510c6ccf5850/3000x3000/tanya-janca-episode-art.jpg?aid=rss_feed"/>
      <itunes:duration>01:00:44</itunes:duration>
      <itunes:summary>Tanya Janca — Education lead at Semgrep and an infosec parody song enthusiast
 
Tanya Janca, also known as SheHacksPurple, is the Head of Community and Education at Semgrep and the best-selling author of &quot;Alice and Bob Learn Application Security.&quot; With over twenty-five years of experience in coding, application security, and IT, Tanya has dedicated herself to &quot;securing all the things.”

Tanya&apos;s career journey began in the Canadian government, where she initially served as a software developer before transitioning to elections security, eventually becoming the IT Security Coordinator (CISO equivalent) of the 42nd General Election in Canada.

Her time in the public sector led her to a pivotal career hack. Tanya refused to let her agency&apos;s limited travel budget hinder her cybersecurity education, so she seized countless speaking opportunities at cyber conferences in exchange for the free ticket. These conferences ignited her passion for educating future cybersecurity professionals. Today, having pivoted to the private sector, all of Tanya’s educational materials are freely available at Semgrep Academy, fulfilling a dream of hers.

To kick off the show, Jack Clabby from Carlton Fields, P.A., and Kayley Melton from KnowBe4 discuss the potential extradition of Julian Assange to the United States. Assange faces an 18-count indictment, including allegations of conspiracy to commit computer crimes and violations of the Espionage Act. The discussion also delves into the negotiation surrounding Assange&apos;s extradition, particularly concerning the worlds’ view of the U.S. prison system.

You can follow Tanya Janca on LinkedIn here: https://www.linkedin.com/in/tanya-janca/
You can follow Tanya Janca on Twitter here: @shehackspurple
You can learn more about Semgrep Academy here: https://academy.semgrep.dev/</itunes:summary>
      <itunes:subtitle>Tanya Janca — Education lead at Semgrep and an infosec parody song enthusiast
 
Tanya Janca, also known as SheHacksPurple, is the Head of Community and Education at Semgrep and the best-selling author of &quot;Alice and Bob Learn Application Security.&quot; With over twenty-five years of experience in coding, application security, and IT, Tanya has dedicated herself to &quot;securing all the things.”

Tanya&apos;s career journey began in the Canadian government, where she initially served as a software developer before transitioning to elections security, eventually becoming the IT Security Coordinator (CISO equivalent) of the 42nd General Election in Canada.

Her time in the public sector led her to a pivotal career hack. Tanya refused to let her agency&apos;s limited travel budget hinder her cybersecurity education, so she seized countless speaking opportunities at cyber conferences in exchange for the free ticket. These conferences ignited her passion for educating future cybersecurity professionals. Today, having pivoted to the private sector, all of Tanya’s educational materials are freely available at Semgrep Academy, fulfilling a dream of hers.

To kick off the show, Jack Clabby from Carlton Fields, P.A., and Kayley Melton from KnowBe4 discuss the potential extradition of Julian Assange to the United States. Assange faces an 18-count indictment, including allegations of conspiracy to commit computer crimes and violations of the Espionage Act. The discussion also delves into the negotiation surrounding Assange&apos;s extradition, particularly concerning the worlds’ view of the U.S. prison system.

You can follow Tanya Janca on LinkedIn here: https://www.linkedin.com/in/tanya-janca/
You can follow Tanya Janca on Twitter here: @shehackspurple
You can learn more about Semgrep Academy here: https://academy.semgrep.dev/</itunes:subtitle>
      <itunes:keywords>kindness, cyber florida, technology, comedy, advocating for oneself, gratitude, 42nd general election in canada, election security, leadership, florida, semgrep, cybersecurity, mentor mondays, flowers, mentoring, espionage act, mentors, fun, infosec, parody songs, tanya janca, shehackspurple, alice and bob learn application security, cyber threats, imposter syndrome, women in cybersecurity, butter tarts, free training, farm living, ciso, tech, julian assange, free cybersecurity training</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>50</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">e76c4b2c-34e5-4c4d-a3cf-078f7a5e5b97</guid>
      <title>No Password Required Podcast Episode 49 — Tamiko Fletcher LIVE from Sunshine Cyber Con</title>
      <description><![CDATA[<p>Summary</p><p>In this episode of the No Password Required podcast, host Jack Clabby and co-host Kayley Melton interview Tamiko Fletcher, the CISO at Kennedy Space Center. Tamiko shares her journey from a small town in South Carolina to working at NASA and discusses her role as a CISO. She emphasizes the importance of mentorship, outreach, and diversity in the cybersecurity field. Tamiko also talks about the unique challenges of cybersecurity at NASA, such as patching during launches and balancing innovation with security. </p><p>She emphasizes the need to know and learn about individuals' strengths, interests, and motivations in order to effectively place them on teams and utilize their skills. Tamiko also shares her experiences working at NASA and the changes she has witnessed over the years, including the evolution of IT and the increasing diversity at the Kennedy Space Center. She highlights the excitement and pride she feels when witnessing a launch and the impact of NASA's work on the world.</p><p>Chapters</p><p>00:00 Introduction and Welcome to the Podcast</p><p>08:00 Education and Career Trajectory</p><p>25:48 Challenges and Innovations in Cybersecurity at NASA</p><p>34:4 8Building a Team and Emphasizing Diversity</p><p>41:30 The Diversity of the Cyber Team at NASA</p><p>54:25 Instilling Values in Teams to Change the Work Environment</p>
]]></description>
      <pubDate>Tue, 30 Apr 2024 04:00:00 +0000</pubDate>
      <author>rex2@cyberflorida.org (Tamiko Fletcher, NASA, Kennedy Space Center, Sunshine Cyber Con, Jack Clabby, Rex Wilson, KnowBe4, Devin Malice, Sarina Gandy, Cyber Florida, Carlton Fields, Ernie Ferraresso, Kayley Melton)</author>
      <link>https://no-password-required.simplecast.com/episodes/no-password-required-podcast-episode-49-tamiko-fletcher-live-from-sunshine-cyber-con-I_GDd6G6</link>
      <content:encoded><![CDATA[<p>Summary</p><p>In this episode of the No Password Required podcast, host Jack Clabby and co-host Kayley Melton interview Tamiko Fletcher, the CISO at Kennedy Space Center. Tamiko shares her journey from a small town in South Carolina to working at NASA and discusses her role as a CISO. She emphasizes the importance of mentorship, outreach, and diversity in the cybersecurity field. Tamiko also talks about the unique challenges of cybersecurity at NASA, such as patching during launches and balancing innovation with security. </p><p>She emphasizes the need to know and learn about individuals' strengths, interests, and motivations in order to effectively place them on teams and utilize their skills. Tamiko also shares her experiences working at NASA and the changes she has witnessed over the years, including the evolution of IT and the increasing diversity at the Kennedy Space Center. She highlights the excitement and pride she feels when witnessing a launch and the impact of NASA's work on the world.</p><p>Chapters</p><p>00:00 Introduction and Welcome to the Podcast</p><p>08:00 Education and Career Trajectory</p><p>25:48 Challenges and Innovations in Cybersecurity at NASA</p><p>34:4 8Building a Team and Emphasizing Diversity</p><p>41:30 The Diversity of the Cyber Team at NASA</p><p>54:25 Instilling Values in Teams to Change the Work Environment</p>
]]></content:encoded>
      <enclosure length="68802096" type="audio/mpeg" url="https://dts.podtrac.com/redirect.mp3/cdn.simplecast.com/audio/ba5244e0-cb0d-4762-b681-e884e01b43fb/episodes/c5fc1165-3b98-4ac6-b33c-2ca9a8bb7c10/audio/276aceea-e917-4ee4-ab65-e6ed04b0facb/default_tc.mp3?aid=rss_feed&amp;feed=YGJgknbK"/>
      <itunes:title>No Password Required Podcast Episode 49 — Tamiko Fletcher LIVE from Sunshine Cyber Con</itunes:title>
      <itunes:author>Tamiko Fletcher, NASA, Kennedy Space Center, Sunshine Cyber Con, Jack Clabby, Rex Wilson, KnowBe4, Devin Malice, Sarina Gandy, Cyber Florida, Carlton Fields, Ernie Ferraresso, Kayley Melton</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/d43689d3-22e4-45dd-97ad-4c2145bc601b/95076115-4982-4819-92fc-3202a2498866/3000x3000/tamiko-episode-art.jpg?aid=rss_feed"/>
      <itunes:duration>01:11:40</itunes:duration>
      <itunes:summary>Tamiko Fletcher —CISO at Kennedy Space Center with a heart of gratitude 

Tamiko Fletcher’s career at NASA began in 1999 as a cooperative education student. Her journey to CISO over the following 20 years is nothing short of inspiring. As CISO, Tamiko is responsible for minimizing the Center’s cybersecurity risk, maintaining visibility into cybersecurity operations, and providing guidance for compliance with NASA’s cybersecurity standards and federal regulations.

In this episode, recorded live from Sunshine Cyber Con, Tamiko joins Carlton Fields, P.A.’s Jack Clabby, and KnowBe4’s V.P. of Remote Publishing Teams, Kayley Melton, to share her passion for mentoring the next generation of cybersecurity leaders. She also reveals how her brother’s career with Xerox and computer-building hobby inspired her own career in tech — shhhh, she doesn’t want him to get too much credit. Tamiko also details how her small-town upbringing has given her a heart of gratitude in every aspect of her life, including leading others.

And in a first for the Podcast, Tamiko answers direct questions from the live audience. Tune in to gain insights into Tamiko’s journey and the invaluable lessons she&apos;s learned along the way.

You can follow Tamiko Fletcher on LinkedIn here: https://www.linkedin.com/in/tamiko-n-fletcher-93b21b2/

You can learn more about Kennedy Space Center here: https://www.kennedyspacecenter.com/</itunes:summary>
      <itunes:subtitle>Tamiko Fletcher —CISO at Kennedy Space Center with a heart of gratitude 

Tamiko Fletcher’s career at NASA began in 1999 as a cooperative education student. Her journey to CISO over the following 20 years is nothing short of inspiring. As CISO, Tamiko is responsible for minimizing the Center’s cybersecurity risk, maintaining visibility into cybersecurity operations, and providing guidance for compliance with NASA’s cybersecurity standards and federal regulations.

In this episode, recorded live from Sunshine Cyber Con, Tamiko joins Carlton Fields, P.A.’s Jack Clabby, and KnowBe4’s V.P. of Remote Publishing Teams, Kayley Melton, to share her passion for mentoring the next generation of cybersecurity leaders. She also reveals how her brother’s career with Xerox and computer-building hobby inspired her own career in tech — shhhh, she doesn’t want him to get too much credit. Tamiko also details how her small-town upbringing has given her a heart of gratitude in every aspect of her life, including leading others.

And in a first for the Podcast, Tamiko answers direct questions from the live audience. Tune in to gain insights into Tamiko’s journey and the invaluable lessons she&apos;s learned along the way.

You can follow Tamiko Fletcher on LinkedIn here: https://www.linkedin.com/in/tamiko-n-fletcher-93b21b2/

You can learn more about Kennedy Space Center here: https://www.kennedyspacecenter.com/</itunes:subtitle>
      <itunes:keywords>xerox, female leadership, undefeated, cyber florida, technology, advocating for oneself, gratitude, leadership, heart of gratitude, florida, cybersecurity, work-life balance, launches, understanding people, innovation, ufos, teamwork, tamiko fletcher, patching, infosec, kennedy space center, mentorship, south carolina, security, opportunity, national champions, family, education, career trajectory, outreach, bbq, small town, impact, it evolution, ciso, computer programming, personal experiences, nasa</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>49</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">b86dbec1-880a-4406-9c22-12b7e3629b7b</guid>
      <title>No Password Required Podcast Episode 48 — Roman Sannikov</title>
      <description><![CDATA[<p>Summary</p><p>Roman Sanikov, is the president of Constellation Cyber and specializes in cyber threat intelligence. In this episode, Roman discusses the importance of collaboration and transparency in the cybersecurity industry, particularly in combating ransomware attacks. He also emphasizes the need for a holistic approach to cybersecurity, involving education and empowerment for both employees and consumers. In this episode, Roman Reinhart shares his experiences as an undercover agent in the cybercrime world. He discusses maintaining a persona, dealing with forum behavior, and memorable arrests. He also emphasizes the importance of redemption and second chances. Roman also talks about his involvement with Helpster USA, an organization dedicated to providing life-saving treatment to young people in developing economies. He shares his hobbies of mushrooming and highlights the satisfying moments at work. Finally, he reflects on the cultural differences he experienced after moving overseas.</p><p>Chapters</p><p>00:00 Introduction to Pig Butchering Schemes (opening conversation)</p><p>02:18 Online Scams and Exploitation</p><p>03:41 Forced Labor and Human Trafficking</p><p>04:41 Approaching Scams with Compassion</p><p>05:39 Guest Introduction: Roman Sanikov</p><p>07:01 Roman's Role at Constellation Cyber</p><p>08:22 Promoting Transparency in Ransomware Incidents</p><p>10:17 Mitigating Secondary and Tertiary Impacts of Ransomware Attacks</p><p>11:14 The Ripple Effect of Ransomware Attacks</p><p>13:10 The Importance of Collaboration in Cybersecurity</p><p>14:58 Roman's Career Path and Background</p><p>19:34 Educating and Empowering Employees and Consumers</p><p>21:28 Avoiding Victim-Blaming in Cybersecurity</p><p>24:16 The Need for Collaboration and Transparency in the Industry</p><p>25:10 Balancing Non-Traditional Pursuits with College</p><p>26:37 Undercover Work and Building Relationships</p><p>33:07 Maintaining a Persona</p><p>36:25 Dealing with Forum Behavior</p><p>38:18 Memorable Arrests</p><p>41:25 Redemption and Second Chances</p><p>45:13 Helpster USA</p><p>48:16 Eccentricities of NHL Players</p><p>50:56 Life's Unexpected Moments</p><p>56:19 The Joy of Mushrooming</p><p>58:43 Satisfying Moments at Work</p><p>01:01:04 Learning Politeness in America</p>
]]></description>
      <pubDate>Tue, 26 Mar 2024 04:00:00 +0000</pubDate>
      <author>rex2@cyberflorida.org (Roman Sanikov, Constellation Cyber, Derek Hines, Helpster USA, John Oliver, NHL Goalies, Devin Malice, Cyber Florida, Jack Clabby, Carlton Fields, Rex Wilson, KnowBe4, Kayley Melton, Scott Wachtler, Sarina Gandy)</author>
      <link>https://no-password-required.simplecast.com/episodes/no-password-required-podcast-episode-48-roman-sannikov-1VtFswHu</link>
      <media:thumbnail height="720" url="https://image.simplecastcdn.com/images/d43689d3-22e4-45dd-97ad-4c2145bc601b/ee8ce5a5-d8aa-47f6-bc1e-a3a2d289d4e3/youtube-roman.jpg" width="1280"/>
      <content:encoded><![CDATA[<p>Summary</p><p>Roman Sanikov, is the president of Constellation Cyber and specializes in cyber threat intelligence. In this episode, Roman discusses the importance of collaboration and transparency in the cybersecurity industry, particularly in combating ransomware attacks. He also emphasizes the need for a holistic approach to cybersecurity, involving education and empowerment for both employees and consumers. In this episode, Roman Reinhart shares his experiences as an undercover agent in the cybercrime world. He discusses maintaining a persona, dealing with forum behavior, and memorable arrests. He also emphasizes the importance of redemption and second chances. Roman also talks about his involvement with Helpster USA, an organization dedicated to providing life-saving treatment to young people in developing economies. He shares his hobbies of mushrooming and highlights the satisfying moments at work. Finally, he reflects on the cultural differences he experienced after moving overseas.</p><p>Chapters</p><p>00:00 Introduction to Pig Butchering Schemes (opening conversation)</p><p>02:18 Online Scams and Exploitation</p><p>03:41 Forced Labor and Human Trafficking</p><p>04:41 Approaching Scams with Compassion</p><p>05:39 Guest Introduction: Roman Sanikov</p><p>07:01 Roman's Role at Constellation Cyber</p><p>08:22 Promoting Transparency in Ransomware Incidents</p><p>10:17 Mitigating Secondary and Tertiary Impacts of Ransomware Attacks</p><p>11:14 The Ripple Effect of Ransomware Attacks</p><p>13:10 The Importance of Collaboration in Cybersecurity</p><p>14:58 Roman's Career Path and Background</p><p>19:34 Educating and Empowering Employees and Consumers</p><p>21:28 Avoiding Victim-Blaming in Cybersecurity</p><p>24:16 The Need for Collaboration and Transparency in the Industry</p><p>25:10 Balancing Non-Traditional Pursuits with College</p><p>26:37 Undercover Work and Building Relationships</p><p>33:07 Maintaining a Persona</p><p>36:25 Dealing with Forum Behavior</p><p>38:18 Memorable Arrests</p><p>41:25 Redemption and Second Chances</p><p>45:13 Helpster USA</p><p>48:16 Eccentricities of NHL Players</p><p>50:56 Life's Unexpected Moments</p><p>56:19 The Joy of Mushrooming</p><p>58:43 Satisfying Moments at Work</p><p>01:01:04 Learning Politeness in America</p>
]]></content:encoded>
      <enclosure length="62976184" type="audio/mpeg" url="https://dts.podtrac.com/redirect.mp3/cdn.simplecast.com/audio/ba5244e0-cb0d-4762-b681-e884e01b43fb/episodes/014e006c-2d17-487d-a1be-14e662bd57f4/audio/5e215515-6dd0-48d4-9506-d206961f4d3f/default_tc.mp3?aid=rss_feed&amp;feed=YGJgknbK"/>
      <itunes:title>No Password Required Podcast Episode 48 — Roman Sannikov</itunes:title>
      <itunes:author>Roman Sanikov, Constellation Cyber, Derek Hines, Helpster USA, John Oliver, NHL Goalies, Devin Malice, Cyber Florida, Jack Clabby, Carlton Fields, Rex Wilson, KnowBe4, Kayley Melton, Scott Wachtler, Sarina Gandy</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/d43689d3-22e4-45dd-97ad-4c2145bc601b/4488022e-e623-48d1-8f3b-2bfa06f38f53/3000x3000/roman-sannikov-episode-art.jpg?aid=rss_feed"/>
      <itunes:duration>01:05:33</itunes:duration>
      <itunes:summary>Roman Sannikov — President at Constellation Cyber, former FBI translator, and a finder of non-magical mushrooms
 
Roman Sannikov is the President of Constellation Cyber LLC, a boutique consulting firm specializing in cyber-threat intelligence and analysis. In addition to building Constellation from the ground up, he also serves as a Research and Intelligence Advisor for CYBERA and Venation, two digital security and resilience companies that offer innovative solutions to protect organizations and individuals from cyber threats.
 
Roman joins Carlton Fields, P.A.’s Jack Clabby, and KnowBe4’s V.P. of Remote Publishing Teams, Kayley Melton, to discuss his career journey, which started during his college years when he worked as a freelance Russian-language translator for the FBI. Throughout his journey, Roman has encountered thrilling adventures, such as scaling a cargo ship via a frozen rope ladder from a speedboat to aid in a death investigation, and enduring tense moments while safeguarding a cooperating witness from within the confines of a sealed, sweltering van.
 
Roman&apos;s passion for a collaborative and transparent approach to cybersecurity shines through as he emphasizes the need for innovation beyond just tools and money. Roman unravels the complexities of the cybersecurity landscape, highlighting the importance of collective action in safeguarding organizations and individuals from evolving threats. 
 
To start the show, Jack and Kayley discuss John Oliver&apos;s &quot;Last Week Tonight&quot; segment on “pig butchering.” They explore the broader implications of this often-overlooked issue, suggesting that there might be more victims entangled in this complex crime than meets the eye.

You can follow Roman Sannikov on LinkedIn here: https://www.linkedin.com/in/roman-y-sannikov-bb9815/
You can follow Roman Sannikov on Twitter here: @RYSannikov
You can learn more about Helpster USA here: https://helpstercharity.org/</itunes:summary>
      <itunes:subtitle>Roman Sannikov — President at Constellation Cyber, former FBI translator, and a finder of non-magical mushrooms
 
Roman Sannikov is the President of Constellation Cyber LLC, a boutique consulting firm specializing in cyber-threat intelligence and analysis. In addition to building Constellation from the ground up, he also serves as a Research and Intelligence Advisor for CYBERA and Venation, two digital security and resilience companies that offer innovative solutions to protect organizations and individuals from cyber threats.
 
Roman joins Carlton Fields, P.A.’s Jack Clabby, and KnowBe4’s V.P. of Remote Publishing Teams, Kayley Melton, to discuss his career journey, which started during his college years when he worked as a freelance Russian-language translator for the FBI. Throughout his journey, Roman has encountered thrilling adventures, such as scaling a cargo ship via a frozen rope ladder from a speedboat to aid in a death investigation, and enduring tense moments while safeguarding a cooperating witness from within the confines of a sealed, sweltering van.
 
Roman&apos;s passion for a collaborative and transparent approach to cybersecurity shines through as he emphasizes the need for innovation beyond just tools and money. Roman unravels the complexities of the cybersecurity landscape, highlighting the importance of collective action in safeguarding organizations and individuals from evolving threats. 
 
To start the show, Jack and Kayley discuss John Oliver&apos;s &quot;Last Week Tonight&quot; segment on “pig butchering.” They explore the broader implications of this often-overlooked issue, suggesting that there might be more victims entangled in this complex crime than meets the eye.

You can follow Roman Sannikov on LinkedIn here: https://www.linkedin.com/in/roman-y-sannikov-bb9815/
You can follow Roman Sannikov on Twitter here: @RYSannikov
You can learn more about Helpster USA here: https://helpstercharity.org/</itunes:subtitle>
      <itunes:keywords>last week tonight, awkward birthday, constellation cyber, cybersecurity landscape, redemption, cyber florida, lifestyle polygraph, adventure, technology, goalies, leadership, roman sannikov, thrilling adventures, cybersecurity, pig butchering, collaborative, ethical considerations, trust, non-magical mushrooms, nhl, ransomware, fbi, infosec, friendship, helping others, russian-language translator, cyber-threat intelligence, frozen rope ladder</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>48</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">7ef9278b-317e-4547-b7f9-f6d8aa65deeb</guid>
      <title>No Password Required Podcast Episode 47 — Jo Anna Parker Martin</title>
      <description><![CDATA[<p>Summary</p><p>In this episode, Jo Anna joins Carlton Fields P.A. Jack Clabby and KnowBe4’s VP of Remote Publishing Teams Kayley Melton to tell the story of how her career has changed since starting at Rice University 17 years ago. From her early days as a receptionist at a hair salon to her current role as a security analyst, Jo Anna shares her journey in the cyber world and her fascination with artificial intelligence, stemming from her compliance-related responsibilities. Emphasizing a realism-based view on AI, she passionately advocates for a comprehensive understanding of AI, emphasizing that it’s neither inherently good nor bad.</p><p>Chapters</p><p>00:00 Stolen Recordings and Cyber Criminals</p><p>01:29 Arrest of a Florida Man and Stolen Rap Recordings</p><p>02:27 The Allegations and Nicknames</p><p>03:26 The Connection Between Cyber Crime and Rap Music</p><p>04:23 Real-Life Consequences of Cybersecurity Crimes</p><p>05:52 The Role of Law Enforcement in Cybersecurity Crimes</p><p>06:50 Introduction of Guest Joanna Parker-Martin</p><p>07:18 Joanna's Role at Rice University</p><p>08:15 Protecting Data at Rice University</p><p>09:08 Joanna's Journey into Cybersecurity</p><p>10:04 Overcoming Challenges and Changing Career Paths</p><p>18:14 Joanna's Interest in Artificial Intelligence</p><p>19:22 The Intersection of Cybersecurity and AI</p><p>20:46 The Challenges of Assessing AI Risk</p><p>21:13 The Inevitability of AI</p><p>22:37 The Risks of Facial Recognition Technology</p><p>27:26 Joanna's Involvement with WiCys</p><p>29:48 Community Outreach and Cybersecurity Education</p><p>30:10 Misconceptions About Cybersecurity Professionals</p><p>32:32 The Lifestyle Polygraph</p><p>43:35 Joanna's Preference for Sponge Cake in Strawberry Shortcake</p>
]]></description>
      <pubDate>Tue, 27 Feb 2024 05:00:00 +0000</pubDate>
      <author>rex2@cyberflorida.org (Rice University, University of South Florida, WiCys, Jo Anna Parker Martin, Cyber Florida, Sarina Gandy, Jack Clabby, Carlton Fields, Ernie Ferraresso, Rex Wilson, Devin Malice, KnowBe4, Scott Wachtler, Kayley Melton)</author>
      <link>https://no-password-required.simplecast.com/episodes/no-password-required-podcast-episode-47-jo-anna-parker-martin-50jek5nM</link>
      <media:thumbnail height="720" url="https://image.simplecastcdn.com/images/d43689d3-22e4-45dd-97ad-4c2145bc601b/c492d24b-da7e-41f3-848e-17ce23b57a3b/jpm-youtube.jpg" width="1280"/>
      <content:encoded><![CDATA[<p>Summary</p><p>In this episode, Jo Anna joins Carlton Fields P.A. Jack Clabby and KnowBe4’s VP of Remote Publishing Teams Kayley Melton to tell the story of how her career has changed since starting at Rice University 17 years ago. From her early days as a receptionist at a hair salon to her current role as a security analyst, Jo Anna shares her journey in the cyber world and her fascination with artificial intelligence, stemming from her compliance-related responsibilities. Emphasizing a realism-based view on AI, she passionately advocates for a comprehensive understanding of AI, emphasizing that it’s neither inherently good nor bad.</p><p>Chapters</p><p>00:00 Stolen Recordings and Cyber Criminals</p><p>01:29 Arrest of a Florida Man and Stolen Rap Recordings</p><p>02:27 The Allegations and Nicknames</p><p>03:26 The Connection Between Cyber Crime and Rap Music</p><p>04:23 Real-Life Consequences of Cybersecurity Crimes</p><p>05:52 The Role of Law Enforcement in Cybersecurity Crimes</p><p>06:50 Introduction of Guest Joanna Parker-Martin</p><p>07:18 Joanna's Role at Rice University</p><p>08:15 Protecting Data at Rice University</p><p>09:08 Joanna's Journey into Cybersecurity</p><p>10:04 Overcoming Challenges and Changing Career Paths</p><p>18:14 Joanna's Interest in Artificial Intelligence</p><p>19:22 The Intersection of Cybersecurity and AI</p><p>20:46 The Challenges of Assessing AI Risk</p><p>21:13 The Inevitability of AI</p><p>22:37 The Risks of Facial Recognition Technology</p><p>27:26 Joanna's Involvement with WiCys</p><p>29:48 Community Outreach and Cybersecurity Education</p><p>30:10 Misconceptions About Cybersecurity Professionals</p><p>32:32 The Lifestyle Polygraph</p><p>43:35 Joanna's Preference for Sponge Cake in Strawberry Shortcake</p>
]]></content:encoded>
      <enclosure length="45653139" type="audio/mpeg" url="https://dts.podtrac.com/redirect.mp3/cdn.simplecast.com/audio/ba5244e0-cb0d-4762-b681-e884e01b43fb/episodes/00f67ce0-a7cf-483f-b23c-7c809993f91f/audio/681e7576-3819-4d88-b2df-0ca5372187b6/default_tc.mp3?aid=rss_feed&amp;feed=YGJgknbK"/>
      <itunes:title>No Password Required Podcast Episode 47 — Jo Anna Parker Martin</itunes:title>
      <itunes:author>Rice University, University of South Florida, WiCys, Jo Anna Parker Martin, Cyber Florida, Sarina Gandy, Jack Clabby, Carlton Fields, Ernie Ferraresso, Rex Wilson, Devin Malice, KnowBe4, Scott Wachtler, Kayley Melton</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/d43689d3-22e4-45dd-97ad-4c2145bc601b/836d008d-77fa-4480-b0ab-92263ce83e3c/3000x3000/joanna-episode-art.jpg?aid=rss_feed"/>
      <itunes:duration>00:47:31</itunes:duration>
      <itunes:summary>Jo Anna Parker Martin — Security analyst at Rice University and No Password Required’s poet laureate
 
Jo Anna Parker Martin, a security analyst at Rice University, protects students, faculty, and their data from outside threats. When she’s away from Rice University’s networks, she can be found researching AI while listening to the iconic Trolls movie soundtrack. 
 
In this episode, Jo Anna joins Carlton Fields P.A. Jack Clabby and KnowBe4’s VP of Remote Publishing Teams Kayley Melton to tell the story of how her career has changed since starting at Rice University 17 years ago. From her early days as a receptionist at a hair salon to her current role as a security analyst, Jo Anna shares her journey in the cyber world and her fascination with artificial intelligence, stemming from her compliance-related responsibilities. Emphasizing a realism-based view on AI, she passionately advocates for a comprehensive understanding of AI, emphasizing that it’s neither inherently good nor bad.
 
To kick off the episode, Jack and Kayley recount a recent “Florida man story” in which a 19-year-old was charged in a SIM-swapping spree to steal cryptocurrency, collaborating with the hacking group 0ktapus.
 
You can follow Jo Anna Parker Martin on LinkedIn here: https://www.linkedin.com/in/joannapm/
 
</itunes:summary>
      <itunes:subtitle>Jo Anna Parker Martin — Security analyst at Rice University and No Password Required’s poet laureate
 
Jo Anna Parker Martin, a security analyst at Rice University, protects students, faculty, and their data from outside threats. When she’s away from Rice University’s networks, she can be found researching AI while listening to the iconic Trolls movie soundtrack. 
 
In this episode, Jo Anna joins Carlton Fields P.A. Jack Clabby and KnowBe4’s VP of Remote Publishing Teams Kayley Melton to tell the story of how her career has changed since starting at Rice University 17 years ago. From her early days as a receptionist at a hair salon to her current role as a security analyst, Jo Anna shares her journey in the cyber world and her fascination with artificial intelligence, stemming from her compliance-related responsibilities. Emphasizing a realism-based view on AI, she passionately advocates for a comprehensive understanding of AI, emphasizing that it’s neither inherently good nor bad.
 
To kick off the episode, Jack and Kayley recount a recent “Florida man story” in which a 19-year-old was charged in a SIM-swapping spree to steal cryptocurrency, collaborating with the hacking group 0ktapus.
 
You can follow Jo Anna Parker Martin on LinkedIn here: https://www.linkedin.com/in/joannapm/
 
</itunes:subtitle>
      <itunes:keywords>trolls movie soundtrack, creativity, conversation starters, career change, lifestyle polygraph, book club, florida man story, 0ktapus, cybersecurity, poetry, ai, poet laureate, cyber poem, strawberry shortcakes, higher education, infosec, cryptocurrency, community outreach, research, sim-swapping, jo anna parker martin, second career</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>47</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">79522d8a-5e0c-4c07-8c69-eb688e537657</guid>
      <title>No Password Required Podcast Episode 46 — Dr. Diana Burley</title>
      <description><![CDATA[<p>Summary</p><p>The conversation discusses the arrest of Ola Segun Simpson Adagorin, a Nigerian national facing US federal charges for a business email compromise scheme. The collaboration between the FBI and Ghana is highlighted, along with the role of the legal attache job in solving crimes with international impact. The scheme and indictment details are explored, emphasizing the sophistication of the attack. Dr. Diana Burley, Vice Provost for Research and Innovation at American University, shares insights on cybersecurity education and workforce readiness. The importance of understanding human behavior in cybersecurity is discussed, along with strategies for engaging in conversations and addressing the search for cyber unicorns. In this episode, the importance of password security and the various methods to enhance it are discussed. The conversation covers common password mistakes, the use of password managers, multi-factor authentication, biometric authentication, and the future of password security.</p><p>Chapters</p><p>00:00 Introduction and Arrest of Ola Segun Simpson Adagorin</p><p>01:24 Collaboration between FBI and Ghana</p><p>03:15 Scheme and Indictment Details</p><p>04:44 Legal Attache Job and Collaboration</p><p>06:10 Deterrence and Sealed Indictments</p><p>07:36 Introduction of Dr. Diana Burley</p><p>08:31 Dr. Burley's Background and Role at American University</p><p>09:23 Interest in Cybersecurity and Technology</p><p>10:21 American University's Role in Educating Policymakers</p><p>12:15 Engaging with Leaders and Shaping Policy</p><p>13:36 Engaging with Students and Future Leaders</p><p>14:28 American University's Focus on Policy and Research</p><p>15:27 Misconceptions about the Cybersecurity Workforce</p><p>16:23 Digital Literacy and Foundational Cybersecurity Skills</p><p>18:45 Retaining Skilled Members in the Academic Environment</p><p>19:43 Benefits of Engaging as a University Faculty Member</p><p>20:37 Understanding Human Behavior in Cybersecurity</p><p>22:05 Insights from Research on Human Behavior</p><p>23:25 Understanding Employee Behavior in Cybersecurity</p><p>24:47 Creating a Culture of Cybersecurity</p><p>27:08 Strategies for Initiating Conversations with Strangers</p><p>31:50 The Cyber Unicorn Project</p><p>35:08 Addressing the Search for Cyber Unicorns</p><p>41:45 Lifestyle Polygraph</p><p>50:57 Understanding Irrational Behavior and Self-Awareness</p><p>53:37 Engaging in Conversations with Strangers</p><p>02:30 The Importance of Password Security</p><p>10:15 Common Password Mistakes</p><p>18:45 Password Managers</p><p>27:10 Multi-Factor Authentication</p><p>35:40 Biometric Authentication</p><p>44:20 Passwordless Authentication</p><p>52:30 Future of Password Security</p><p>58:21 Conclusion</p>
]]></description>
      <pubDate>Wed, 31 Jan 2024 05:00:00 +0000</pubDate>
      <author>rex2@cyberflorida.org (Dr. Diana Burley, American University, Cyber Florida, KnowBe4, Kayley Melton, Ernie Ferraresso, Rex Wilson, Carlton Fields, Scott Wachtler, Jack Clabby, Sarina Gandy)</author>
      <link>https://no-password-required.simplecast.com/episodes/no-password-required-podcast-episode-46-dr-diana-burley-dgMz8r1q</link>
      <media:thumbnail height="720" url="https://image.simplecastcdn.com/images/d43689d3-22e4-45dd-97ad-4c2145bc601b/eda3e34c-e3c4-4b3e-b949-fdeae2d09b1b/screenshot-2024-01-29-at-10-16-03-am.jpg" width="1280"/>
      <content:encoded><![CDATA[<p>Summary</p><p>The conversation discusses the arrest of Ola Segun Simpson Adagorin, a Nigerian national facing US federal charges for a business email compromise scheme. The collaboration between the FBI and Ghana is highlighted, along with the role of the legal attache job in solving crimes with international impact. The scheme and indictment details are explored, emphasizing the sophistication of the attack. Dr. Diana Burley, Vice Provost for Research and Innovation at American University, shares insights on cybersecurity education and workforce readiness. The importance of understanding human behavior in cybersecurity is discussed, along with strategies for engaging in conversations and addressing the search for cyber unicorns. In this episode, the importance of password security and the various methods to enhance it are discussed. The conversation covers common password mistakes, the use of password managers, multi-factor authentication, biometric authentication, and the future of password security.</p><p>Chapters</p><p>00:00 Introduction and Arrest of Ola Segun Simpson Adagorin</p><p>01:24 Collaboration between FBI and Ghana</p><p>03:15 Scheme and Indictment Details</p><p>04:44 Legal Attache Job and Collaboration</p><p>06:10 Deterrence and Sealed Indictments</p><p>07:36 Introduction of Dr. Diana Burley</p><p>08:31 Dr. Burley's Background and Role at American University</p><p>09:23 Interest in Cybersecurity and Technology</p><p>10:21 American University's Role in Educating Policymakers</p><p>12:15 Engaging with Leaders and Shaping Policy</p><p>13:36 Engaging with Students and Future Leaders</p><p>14:28 American University's Focus on Policy and Research</p><p>15:27 Misconceptions about the Cybersecurity Workforce</p><p>16:23 Digital Literacy and Foundational Cybersecurity Skills</p><p>18:45 Retaining Skilled Members in the Academic Environment</p><p>19:43 Benefits of Engaging as a University Faculty Member</p><p>20:37 Understanding Human Behavior in Cybersecurity</p><p>22:05 Insights from Research on Human Behavior</p><p>23:25 Understanding Employee Behavior in Cybersecurity</p><p>24:47 Creating a Culture of Cybersecurity</p><p>27:08 Strategies for Initiating Conversations with Strangers</p><p>31:50 The Cyber Unicorn Project</p><p>35:08 Addressing the Search for Cyber Unicorns</p><p>41:45 Lifestyle Polygraph</p><p>50:57 Understanding Irrational Behavior and Self-Awareness</p><p>53:37 Engaging in Conversations with Strangers</p><p>02:30 The Importance of Password Security</p><p>10:15 Common Password Mistakes</p><p>18:45 Password Managers</p><p>27:10 Multi-Factor Authentication</p><p>35:40 Biometric Authentication</p><p>44:20 Passwordless Authentication</p><p>52:30 Future of Password Security</p><p>58:21 Conclusion</p>
]]></content:encoded>
      <enclosure length="56544602" type="audio/mpeg" url="https://dts.podtrac.com/redirect.mp3/cdn.simplecast.com/audio/ba5244e0-cb0d-4762-b681-e884e01b43fb/episodes/c08217fb-63a1-47cc-804b-bf14daad4e42/audio/869627e6-04f9-441a-98ee-dd8bb135f574/default_tc.mp3?aid=rss_feed&amp;feed=YGJgknbK"/>
      <itunes:title>No Password Required Podcast Episode 46 — Dr. Diana Burley</itunes:title>
      <itunes:author>Dr. Diana Burley, American University, Cyber Florida, KnowBe4, Kayley Melton, Ernie Ferraresso, Rex Wilson, Carlton Fields, Scott Wachtler, Jack Clabby, Sarina Gandy</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/d43689d3-22e4-45dd-97ad-4c2145bc601b/2e0824b5-a41f-476b-aa98-96c0ab612585/3000x3000/burley-episode-art.jpg?aid=rss_feed"/>
      <itunes:duration>00:58:51</itunes:duration>
      <itunes:summary>No Password Required Podcast Episode 46 — Dr. Diana Burley

Dr. Diana Burley — Vice Provost for Research and Innovation at American University and a researcher of unicorns (the cybersecurity kind)

Dr. Diana Burley has nearly 30 years of experience driving digital transformation by leading cross-sector teams to drive education, research, and strategic innovation. As the American University’s chief research officer and innovation officer, she is responsible for establishing the strategic vision and supporting faculty-led scholarship across all disciplines.

In this episode, Dr. Burley joins Carlton Fields, P.A.’s Jack Clabby, and KnowBe4’s V.P. of Remote Publishing Teams, Kayley Melton, to discuss her role in educating policymakers and her research into the misconceptions about the cybersecurity workforce.

Dr. Burley goes into one of her current research projects, “The Cyber Unicorn Challenge,” a collaboration between Dr. Burley and Cyber Florida. This study aims to gather data to confirm the challenge of finding cyber unicorns, delve into the reasons behind inflated requirements, and understand why the search for cyber unicorns persists.
 
To start the show, Jack and Kayley discuss the Alleged Nigerian cybercriminal arrested for stealing $7.5M from charities. Jack also breaks down the job of an FBI Legal Attaché. 

You can follow Dr. Diana Burley on LinkedIn here: https://www.linkedin.com/in/dianaburley
You can follow Dr. Diana Burley on Twitter here: @dianaburley
You can learn more about American University here: https://www.american.edu/</itunes:summary>
      <itunes:subtitle>No Password Required Podcast Episode 46 — Dr. Diana Burley

Dr. Diana Burley — Vice Provost for Research and Innovation at American University and a researcher of unicorns (the cybersecurity kind)

Dr. Diana Burley has nearly 30 years of experience driving digital transformation by leading cross-sector teams to drive education, research, and strategic innovation. As the American University’s chief research officer and innovation officer, she is responsible for establishing the strategic vision and supporting faculty-led scholarship across all disciplines.

In this episode, Dr. Burley joins Carlton Fields, P.A.’s Jack Clabby, and KnowBe4’s V.P. of Remote Publishing Teams, Kayley Melton, to discuss her role in educating policymakers and her research into the misconceptions about the cybersecurity workforce.

Dr. Burley goes into one of her current research projects, “The Cyber Unicorn Challenge,” a collaboration between Dr. Burley and Cyber Florida. This study aims to gather data to confirm the challenge of finding cyber unicorns, delve into the reasons behind inflated requirements, and understand why the search for cyber unicorns persists.
 
To start the show, Jack and Kayley discuss the Alleged Nigerian cybercriminal arrested for stealing $7.5M from charities. Jack also breaks down the job of an FBI Legal Attaché. 

You can follow Dr. Diana Burley on LinkedIn here: https://www.linkedin.com/in/dianaburley
You can follow Dr. Diana Burley on Twitter here: @dianaburley
You can learn more about American University here: https://www.american.edu/</itunes:subtitle>
      <itunes:keywords>the cyber unicorn challenge, creativity, female leadership, conversation starters, fbi legal attaché, ghana, team building, ecape rooms, lifestyle polygraph, thought leader, cybersecurity workforce, cyber uincorn, educating policymakers, email scam, human behavior, cybersecurity, multi-factor authentication, fbi, biometrics, infosec, american university, digital literacy, secret cherry blossoms, behavorial science, research, fall</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>46</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">5db9eea2-196b-47d5-b8b6-ec2e74c2ac5e</guid>
      <title>No Password Required Podcast Episode 45 — Lisa Plaggemier</title>
      <description><![CDATA[<p><strong>Summary</strong></p><p>In this episode, Jack Clabby and Kayley Melton discuss the upcoming Sunshine Cyber Conference and their collaboration with Winn Schwartau. They also talk about the importance of diverse cybersecurity talent and their plans for a joint session at the conference. The hosts then interview Lisa Plaggemier, the executive director at the National Cybersecurity Alliance, who shares her career journey and the role of creativity and curiosity in cybersecurity. They also discuss the impact of COVID-19 on the cybersecurity industry and the importance of humor and satire in cybersecurity training. The episode concludes with a lifestyle polygraph segment. In this episode, the conversation covers various topics related to comedy, storytelling, and implementing change in organizations. The power of the internet is discussed, highlighting the potential consequences of online content. The guest shares her favorite comedy movies, emphasizing the comedic element in her expertise. The use of humor in training and awareness programs is explored, along with the challenges of implementing change in organizations. Dealing with roadblocks in security and the passion for security awareness are also discussed. The episode concludes with information on how to get in touch with the guest and a recap of what was learned.</p><p><strong>Chapters</strong></p><p>00:00 Introduction</p><p>01:28 Fishing for Potential, the RTFM Guide to Diverse Cybersecurity Talent</p><p>02:25 Live On-Site Remote Recording and Keynote Speakers</p><p>03:51 Sunshine Cyber Conference and Registration</p><p>04:46 Interview with Lisa Plaggemier</p><p>05:15 Background and Role at the National Cybersecurity Alliance</p><p>05:53 Transition to Security and Marketing Collaboration</p><p>06:22 Incident Response and Training and Awareness</p><p>07:20 Leadership and Skills in Cybersecurity</p><p>08:18 Kubikle Series and Creativity in Security</p><p>09:17 Curiosity and Creativity in Cybersecurity</p><p>10:48 Naming and Shaming in Pen Tests and Phishing Testing</p><p>11:41 DDoS Attack and Incident Response</p><p>12:38 Neurodiversity and Cybersecurity</p><p>13:21 Leading a Team During COVID-19</p><p>14:21 Creating Engaging Training Content</p><p>15:19 Global Data and Data Privacy Laws</p><p>16:18 Humor and Satire in Cybersecurity Training</p><p>18:47 Kubikle Series and Satire in Cybersecurity</p><p>20:41 Creating Kubikle Series and Future Plans</p><p>23:03Trust in Password Managers</p><p>24:22 The Importance of Curiosity in Cybersecurity</p><p>25:52 The Oh Behave Report and Behavioral Science</p><p>26:50 Communicating Security Information Effectively</p><p>28:44 Naming and Shaming in Phishing Testing</p><p>29:39 Accepting Risk and Escalation Plans</p><p>30:38 The Role of Security Teams and HR</p><p>32:35 Building Trust in Password Managers</p><p>33:32 Global Data and Cybersecurity Awareness</p><p>36:51 The Importance of Curiosity in Cybersecurity Hiring</p><p>40:03 The Underground Student-Led Newspaper</p><p>41:12 The Significance of Curiosity and Creativity in Career</p><p>50:44 The Power of the Internet</p><p>51:14 Favorite Comedy Movies</p><p>52:12 Using Humor in Training and Awareness</p><p>53:38 Implementing Change in Organizations</p><p>54:55 Dealing with Roadblocks in Security</p><p>55:45 Passion for Security Awareness</p><p>56:06 How to Get in Touch</p><p>56:37 What Was Learned</p><p>57:11 Closing Remarks</p>
]]></description>
      <pubDate>Wed, 10 Jan 2024 05:05:00 +0000</pubDate>
      <author>rex2@cyberflorida.org (Lisa Plaggemier, National Cybersecurity Alliance, Kubikle, Ernie Ferraresso, No Password Required, KnowBe4, Allan Liska, Cyber Florida, Devin Malice, Bianca Lewis, Kayley Melton, Rex Wilson, Scott Wachtler, Sarina Gandy, Carlton Fields, Jack Clabby, Winn Schwartau, Jar Jar Binks)</author>
      <link>https://no-password-required.simplecast.com/episodes/no-password-required-podcast-episode-45-lisa-plaggemier-40R3Sxzl</link>
      <media:thumbnail height="720" url="https://image.simplecastcdn.com/images/d43689d3-22e4-45dd-97ad-4c2145bc601b/c52c3c8d-7299-42c0-a4db-22c7e7071fb0/screenshot-2024-01-08-at-12-00-25-pm.jpg" width="1280"/>
      <content:encoded><![CDATA[<p><strong>Summary</strong></p><p>In this episode, Jack Clabby and Kayley Melton discuss the upcoming Sunshine Cyber Conference and their collaboration with Winn Schwartau. They also talk about the importance of diverse cybersecurity talent and their plans for a joint session at the conference. The hosts then interview Lisa Plaggemier, the executive director at the National Cybersecurity Alliance, who shares her career journey and the role of creativity and curiosity in cybersecurity. They also discuss the impact of COVID-19 on the cybersecurity industry and the importance of humor and satire in cybersecurity training. The episode concludes with a lifestyle polygraph segment. In this episode, the conversation covers various topics related to comedy, storytelling, and implementing change in organizations. The power of the internet is discussed, highlighting the potential consequences of online content. The guest shares her favorite comedy movies, emphasizing the comedic element in her expertise. The use of humor in training and awareness programs is explored, along with the challenges of implementing change in organizations. Dealing with roadblocks in security and the passion for security awareness are also discussed. The episode concludes with information on how to get in touch with the guest and a recap of what was learned.</p><p><strong>Chapters</strong></p><p>00:00 Introduction</p><p>01:28 Fishing for Potential, the RTFM Guide to Diverse Cybersecurity Talent</p><p>02:25 Live On-Site Remote Recording and Keynote Speakers</p><p>03:51 Sunshine Cyber Conference and Registration</p><p>04:46 Interview with Lisa Plaggemier</p><p>05:15 Background and Role at the National Cybersecurity Alliance</p><p>05:53 Transition to Security and Marketing Collaboration</p><p>06:22 Incident Response and Training and Awareness</p><p>07:20 Leadership and Skills in Cybersecurity</p><p>08:18 Kubikle Series and Creativity in Security</p><p>09:17 Curiosity and Creativity in Cybersecurity</p><p>10:48 Naming and Shaming in Pen Tests and Phishing Testing</p><p>11:41 DDoS Attack and Incident Response</p><p>12:38 Neurodiversity and Cybersecurity</p><p>13:21 Leading a Team During COVID-19</p><p>14:21 Creating Engaging Training Content</p><p>15:19 Global Data and Data Privacy Laws</p><p>16:18 Humor and Satire in Cybersecurity Training</p><p>18:47 Kubikle Series and Satire in Cybersecurity</p><p>20:41 Creating Kubikle Series and Future Plans</p><p>23:03Trust in Password Managers</p><p>24:22 The Importance of Curiosity in Cybersecurity</p><p>25:52 The Oh Behave Report and Behavioral Science</p><p>26:50 Communicating Security Information Effectively</p><p>28:44 Naming and Shaming in Phishing Testing</p><p>29:39 Accepting Risk and Escalation Plans</p><p>30:38 The Role of Security Teams and HR</p><p>32:35 Building Trust in Password Managers</p><p>33:32 Global Data and Cybersecurity Awareness</p><p>36:51 The Importance of Curiosity in Cybersecurity Hiring</p><p>40:03 The Underground Student-Led Newspaper</p><p>41:12 The Significance of Curiosity and Creativity in Career</p><p>50:44 The Power of the Internet</p><p>51:14 Favorite Comedy Movies</p><p>52:12 Using Humor in Training and Awareness</p><p>53:38 Implementing Change in Organizations</p><p>54:55 Dealing with Roadblocks in Security</p><p>55:45 Passion for Security Awareness</p><p>56:06 How to Get in Touch</p><p>56:37 What Was Learned</p><p>57:11 Closing Remarks</p>
]]></content:encoded>
      <enclosure length="55596784" type="audio/mpeg" url="https://dts.podtrac.com/redirect.mp3/cdn.simplecast.com/audio/ba5244e0-cb0d-4762-b681-e884e01b43fb/episodes/2b0c7da6-165d-4b55-b7cd-6a9cc2b7a6fe/audio/e8e82443-ad50-4c3d-87c8-ea3287839aff/default_tc.mp3?aid=rss_feed&amp;feed=YGJgknbK"/>
      <itunes:title>No Password Required Podcast Episode 45 — Lisa Plaggemier</itunes:title>
      <itunes:author>Lisa Plaggemier, National Cybersecurity Alliance, Kubikle, Ernie Ferraresso, No Password Required, KnowBe4, Allan Liska, Cyber Florida, Devin Malice, Bianca Lewis, Kayley Melton, Rex Wilson, Scott Wachtler, Sarina Gandy, Carlton Fields, Jack Clabby, Winn Schwartau, Jar Jar Binks</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/d43689d3-22e4-45dd-97ad-4c2145bc601b/69fa01e3-73aa-4164-9246-80018d4a872d/3000x3000/lisa-plaggemier-episode-art.jpg?aid=rss_feed"/>
      <itunes:duration>00:57:50</itunes:duration>
      <itunes:summary>Lisa Plaggemier — Executive Director at National Cyber Security Alliance, a people-first leader, and a cyber satirist
 
Lisa Plaggemier is the Executive Director of the National Cybersecurity Alliance. Renowned for her people-first leadership style, Lisa’s passions for collaboration and humor drive transformative change for personal and corporate cybersecurity.
 
In this episode, Lisa joins Carlton Fields P.A.&apos;s Jack Clabby and KnowBe4’s VP of Remote Publishing Teams Kayley Melton to discuss best practices for effective communication in the cybersecurity industry, sharing along the way Lisa&apos;s journey from marketing executive to cybersecurity leadership. Lisa explains the story behind the creation of “Kubikle” - a cybersecurity-based comedy series that is a much-watch for fans of satire and technology. Lisa also unveils the NCA’s “Oh, Behave!” Report, which this year presents the results of a survey of over 6,000 people in the United States and internationally on their cybersecurity attitudes and behaviors. With wit and style, this report emphasizes the vital role that behavioral science plays in strengthening cybersecurity. 
 
To start off the last episode of 2023, Jack and Kayley discuss an upcoming highlight in the cybersecurity calendar: the 2024 Sunshine Cyber Conference! Brace yourselves for this exciting event, featuring a roster of distinguished No Password alumni, including a session with our very own Kayley Melton and cybersecurity rock star Winn Schwartau. 
 
Join the No Password Required team at the conference: https://cyberflorida.org/sunshine/
 
You can follow Lisa on LinkedIn here: https://www.linkedin.com/in/lisaplaggemier/
 
You can follow Lisa on Twitter here: @LisaPlaggemier
 
You can learn more about the National Cybersecurity Alliance, and download the Oh, Behave! report here: https://staysafeonline.org/</itunes:summary>
      <itunes:subtitle>Lisa Plaggemier — Executive Director at National Cyber Security Alliance, a people-first leader, and a cyber satirist
 
Lisa Plaggemier is the Executive Director of the National Cybersecurity Alliance. Renowned for her people-first leadership style, Lisa’s passions for collaboration and humor drive transformative change for personal and corporate cybersecurity.
 
In this episode, Lisa joins Carlton Fields P.A.&apos;s Jack Clabby and KnowBe4’s VP of Remote Publishing Teams Kayley Melton to discuss best practices for effective communication in the cybersecurity industry, sharing along the way Lisa&apos;s journey from marketing executive to cybersecurity leadership. Lisa explains the story behind the creation of “Kubikle” - a cybersecurity-based comedy series that is a much-watch for fans of satire and technology. Lisa also unveils the NCA’s “Oh, Behave!” Report, which this year presents the results of a survey of over 6,000 people in the United States and internationally on their cybersecurity attitudes and behaviors. With wit and style, this report emphasizes the vital role that behavioral science plays in strengthening cybersecurity. 
 
To start off the last episode of 2023, Jack and Kayley discuss an upcoming highlight in the cybersecurity calendar: the 2024 Sunshine Cyber Conference! Brace yourselves for this exciting event, featuring a roster of distinguished No Password alumni, including a session with our very own Kayley Melton and cybersecurity rock star Winn Schwartau. 
 
Join the No Password Required team at the conference: https://cyberflorida.org/sunshine/
 
You can follow Lisa on LinkedIn here: https://www.linkedin.com/in/lisaplaggemier/
 
You can follow Lisa on Twitter here: @LisaPlaggemier
 
You can learn more about the National Cybersecurity Alliance, and download the Oh, Behave! report here: https://staysafeonline.org/</itunes:subtitle>
      <itunes:keywords>cyberattack, creativity, female leadership, 2024 sunshine cyber conference, curiosity, oh behave report, executive director at national cyber security alliance, kubikle, live podcast recording, lifestyle polygraph, thought leader, comedy, hacker, school newspaper, leadership, executive director, monty python and the holy grail, cybersecurity, parody, bs, human, 2024, ddos, national cyber security alliance, marketing, creative, infosec, behavorial science, human factor, hack, humor, satire, leader, people-first leadership style</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>45</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">50484caf-f663-48cc-bfe3-ccec0a0f6064</guid>
      <title>No Password Required Podcast Episode 44 — Jayson Street</title>
      <description><![CDATA[Jayson Street — Chief Adversarial Officer at Secure Yeti, a DEF CON Groups Global Ambassador, and a world-class awkward hugger

Jayson Street, the dynamic Chief Adversarial Officer at Secure Yeti, has worn many masks throughout his life and career. He was once named a “World-Class Hacker” on the National Geographic series "Breakthrough Cyber-Terror," but he prefers the simpler title of Hacker, Helper, and Human.

In this episode, Jayson joins Carlton Fields P.A.’s Jack Clabby and KnowBe4’s VP of Remote Publishing Teams Kayley Melton to talk about his journey of self-discovery that led him from being an award-winning janitor at McDonald's to one of the world’s most infamous ethical hackers.

 From his early childhood, Jayson has embraced hacking as a way of life, embodying the spirit of relentless exploration, innovation, and resilience. Like our favorite co-host Kayley, Jayson uncovered a new layer of his identity in his adulthood when he discovered that he is neurodivergent. He dives deep into how this new understanding altered his perception of himself, allowed him to embrace the various “masks” he wears throughout life, and discovered that his unique mind is actually his superpower. He also shares extraordinary stories of how he gained entry into some of the hardest-to-access cyber targets in the world.

To start off the show, Jack and Kayley talk about the celebrity that’s topping the Hacker Celebrity Hot List as the celeb whose name is used most by cybercriminals when creating online scams. Hint: he’s just Ken…

You can follow Jayson on LinkedIn here: https://www.linkedin.com/in/jstreet/

You can follow Jayson on Twitter here: @jaysonstreet

You can learn more about Jayson here: https://jaysonestreet.com

You can learn more about Secure Yeti here: https://www.secureyeti.com/  
]]></description>
      <pubDate>Mon, 11 Dec 2023 13:00:00 +0000</pubDate>
      <author>rex2@cyberflorida.org (Jayson Street, McDonald&apos;s, Secure Yeti, Banks, Bank Robber, Pepsi, KnowBe4, Sarina Gandy, Rex Wilson, Kayley Melton, Jack Clabby, Devin Malice, Ernie Ferraresso, Carlton Fields, No Password Required, Scott Wachtler, Cyber Florida)</author>
      <link>https://cyberflorida.org/pod/</link>
      <enclosure length="62955700" type="audio/mpeg" url="https://dts.podtrac.com/redirect.mp3/cdn.simplecast.com/audio/ba5244e0-cb0d-4762-b681-e884e01b43fb/episodes/6d89d02d-15ab-4144-aebc-3258dbab0fdb/audio/7fca019a-dd9e-41c4-99c4-9c752b7ff3f0/default_tc.mp3?aid=rss_feed&amp;feed=YGJgknbK"/>
      <itunes:title>No Password Required Podcast Episode 44 — Jayson Street</itunes:title>
      <itunes:author>Jayson Street, McDonald&apos;s, Secure Yeti, Banks, Bank Robber, Pepsi, KnowBe4, Sarina Gandy, Rex Wilson, Kayley Melton, Jack Clabby, Devin Malice, Ernie Ferraresso, Carlton Fields, No Password Required, Scott Wachtler, Cyber Florida</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/d43689d3-22e4-45dd-97ad-4c2145bc601b/832bb1c2-1539-481b-92e4-0b22b3f48dda/3000x3000/jayson-street-episode-art.jpg?aid=rss_feed"/>
      <itunes:duration>01:05:32</itunes:duration>
      <itunes:summary>Jayson Street — Chief Adversarial Officer at Secure Yeti, a DEF CON Groups Global Ambassador, and a world-class awkward hugger

Jayson Street, the dynamic Chief Adversarial Officer at Secure Yeti, has worn many masks throughout his life and career. He was once named a “World-Class Hacker” on the National Geographic series &quot;Breakthrough Cyber-Terror,&quot; but he prefers the simpler title of Hacker, Helper, and Human.

In this episode, Jayson joins Carlton Fields P.A.’s Jack Clabby and KnowBe4’s VP of Remote Publishing Teams Kayley Melton to talk about his journey of self-discovery that led him from being an award-winning janitor at McDonald&apos;s to one of the world’s most infamous ethical hackers.

 From his early childhood, Jayson has embraced hacking as a way of life, embodying the spirit of relentless exploration, innovation, and resilience. Like our favorite co-host Kayley, Jayson uncovered a new layer of his identity in his adulthood when he discovered that he is neurodivergent. He dives deep into how this new understanding altered his perception of himself, allowed him to embrace the various “masks” he wears throughout life, and discovered that his unique mind is actually his superpower. He also shares extraordinary stories of how he gained entry into some of the hardest-to-access cyber targets in the world.

To start off the show, Jack and Kayley talk about the celebrity that’s topping the Hacker Celebrity Hot List as the celeb whose name is used most by cybercriminals when creating online scams. Hint: he’s just Ken…

You can follow Jayson on LinkedIn here: https://www.linkedin.com/in/jstreet/

You can follow Jayson on Twitter here: @jaysonstreet

You can learn more about Jayson here: https://jaysonestreet.com

You can learn more about Secure Yeti here: https://www.secureyeti.com/ </itunes:summary>
      <itunes:subtitle>Jayson Street — Chief Adversarial Officer at Secure Yeti, a DEF CON Groups Global Ambassador, and a world-class awkward hugger

Jayson Street, the dynamic Chief Adversarial Officer at Secure Yeti, has worn many masks throughout his life and career. He was once named a “World-Class Hacker” on the National Geographic series &quot;Breakthrough Cyber-Terror,&quot; but he prefers the simpler title of Hacker, Helper, and Human.

In this episode, Jayson joins Carlton Fields P.A.’s Jack Clabby and KnowBe4’s VP of Remote Publishing Teams Kayley Melton to talk about his journey of self-discovery that led him from being an award-winning janitor at McDonald&apos;s to one of the world’s most infamous ethical hackers.

 From his early childhood, Jayson has embraced hacking as a way of life, embodying the spirit of relentless exploration, innovation, and resilience. Like our favorite co-host Kayley, Jayson uncovered a new layer of his identity in his adulthood when he discovered that he is neurodivergent. He dives deep into how this new understanding altered his perception of himself, allowed him to embrace the various “masks” he wears throughout life, and discovered that his unique mind is actually his superpower. He also shares extraordinary stories of how he gained entry into some of the hardest-to-access cyber targets in the world.

To start off the show, Jack and Kayley talk about the celebrity that’s topping the Hacker Celebrity Hot List as the celeb whose name is used most by cybercriminals when creating online scams. Hint: he’s just Ken…

You can follow Jayson on LinkedIn here: https://www.linkedin.com/in/jstreet/

You can follow Jayson on Twitter here: @jaysonstreet

You can learn more about Jayson here: https://jaysonestreet.com

You can learn more about Secure Yeti here: https://www.secureyeti.com/ </itunes:subtitle>
      <itunes:keywords>cyberattack, hacker tools, online scams, iem, worth doing right, work pride, national geographic, bank robber, one degree away from kevin bacon, lifestyle polygraph, technology, cissp, hacker, ceh, breakthrough cyber-terror, infamous, cybersecurity, gsec, gcih, secure yeti, def con, security+, neurodivergent, innovation, human, hacker celebrity hot list, janitor, infosec, awkward hugs, clipboard, gcfa, ryan gosling, just ken, ethical hacking, hard work, helper, human factor, iam, wearing masks, elite, hacking</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>44</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">5966802c-a3f0-4b41-974f-9606e2503723</guid>
      <title>No Password Required Podcast Episode 43 — Kristin Demoranville</title>
      <description><![CDATA[Kristin Demoranville  — CEO and Founder of AnzenSage, defender of the food sector, and friend to primates
 
What is the role of cybersecurity in food safety? Kristin Demoranville, CEO and Founder of AnzenSage, is committed to shielding the food sector from potential cybersecurity threats and ensuring the resilience of the entire food supply chain. Her dedication is not just a professional pursuit; it's a mission to prevent any compromise to public health. In this episode, Carlton Fields Cybersecurity Attorney Jack Clabby and No Password Required producer Rex Wilson speak with Kristin about everything from the deployment of autonomous tractors to the secure refrigeration of airport food, and Kristin sheds light on the other facets of daily life that are linked to the food supply chain. Kristen also shares how her love for wildlife led to her working with primates at the Louisville Zoo before making the transition into cybersecurity, and the value that podcasting has brought to her life. Kristen’s podcast, the Bites & Bytes Podcast, is her platform for discussing cybersecurity and food safety, and is recommended listening for fans of No Password Required. Bites & Bytes has fast become a medium for Kristin to share insights, connect with audiences, and explore the intersections of her diverse interests. Jack and Rex also delve into the intricacies of the Environmental Protection Agency's recent decision not to include cybersecurity in water system audits, and the questions this may raise about the security of water utility infrastructure.

You can follow Kristin on LinkedIn here: https://www.linkedin.com/in/demoranvillekristin/ 

You can follow Kristin on Twitter here: @demokris 

You can learn more about AnzenSage here: https://www.anzensage.com/ 
]]></description>
      <pubDate>Mon, 20 Nov 2023 11:00:00 +0000</pubDate>
      <author>rex2@cyberflorida.org (The Zoo, AnzenSage, monkeys, Kristin Demoranville, KnowBe4, Cyber Florida, Devin Malice, Kayley Melton, Rex Wilson, Scott Wachtler, Sarina Gandy, Carlton Fields, Jack Clabby, Ernie Ferraresso, No Password Required, the rock, george clooney)</author>
      <link>https://cyberflorida.org/pod/</link>
      <enclosure length="60376121" type="audio/mpeg" url="https://dts.podtrac.com/redirect.mp3/cdn.simplecast.com/audio/ba5244e0-cb0d-4762-b681-e884e01b43fb/episodes/75181a85-9bb5-4d2d-a356-666b22737ef1/audio/fec1820f-09bc-4a22-a4de-ece7cb313c4c/default_tc.mp3?aid=rss_feed&amp;feed=YGJgknbK"/>
      <itunes:title>No Password Required Podcast Episode 43 — Kristin Demoranville</itunes:title>
      <itunes:author>The Zoo, AnzenSage, monkeys, Kristin Demoranville, KnowBe4, Cyber Florida, Devin Malice, Kayley Melton, Rex Wilson, Scott Wachtler, Sarina Gandy, Carlton Fields, Jack Clabby, Ernie Ferraresso, No Password Required, the rock, george clooney</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/d43689d3-22e4-45dd-97ad-4c2145bc601b/6ad18b22-c8fa-4fcf-bcb2-33e38b1e8af4/3000x3000/kristin-episode-art.jpg?aid=rss_feed"/>
      <itunes:duration>01:02:53</itunes:duration>
      <itunes:summary>Kristin Demoranville  — CEO and Founder of AnzenSage, defender of the food sector, and friend to primates
 
What is the role of cybersecurity in food safety? Kristin Demoranville, CEO and Founder of AnzenSage, is committed to shielding the food sector from potential cybersecurity threats and ensuring the resilience of the entire food supply chain. Her dedication is not just a professional pursuit; it&apos;s a mission to prevent any compromise to public health. In this episode, Carlton Fields Cybersecurity Attorney Jack Clabby and No Password Required producer Rex Wilson speak with Kristin about everything from the deployment of autonomous tractors to the secure refrigeration of airport food, and Kristin sheds light on the other facets of daily life that are linked to the food supply chain. Kristen also shares how her love for wildlife led to her working with primates at the Louisville Zoo before making the transition into cybersecurity, and the value that podcasting has brought to her life. Kristen’s podcast, the Bites &amp; Bytes Podcast, is her platform for discussing cybersecurity and food safety, and is recommended listening for fans of No Password Required. Bites &amp; Bytes has fast become a medium for Kristin to share insights, connect with audiences, and explore the intersections of her diverse interests. Jack and Rex also delve into the intricacies of the Environmental Protection Agency&apos;s recent decision not to include cybersecurity in water system audits, and the questions this may raise about the security of water utility infrastructure.

You can follow Kristin on LinkedIn here: https://www.linkedin.com/in/demoranvillekristin/ 

You can follow Kristin on Twitter here: @demokris 

You can learn more about AnzenSage here: https://www.anzensage.com/</itunes:summary>
      <itunes:subtitle>Kristin Demoranville  — CEO and Founder of AnzenSage, defender of the food sector, and friend to primates
 
What is the role of cybersecurity in food safety? Kristin Demoranville, CEO and Founder of AnzenSage, is committed to shielding the food sector from potential cybersecurity threats and ensuring the resilience of the entire food supply chain. Her dedication is not just a professional pursuit; it&apos;s a mission to prevent any compromise to public health. In this episode, Carlton Fields Cybersecurity Attorney Jack Clabby and No Password Required producer Rex Wilson speak with Kristin about everything from the deployment of autonomous tractors to the secure refrigeration of airport food, and Kristin sheds light on the other facets of daily life that are linked to the food supply chain. Kristen also shares how her love for wildlife led to her working with primates at the Louisville Zoo before making the transition into cybersecurity, and the value that podcasting has brought to her life. Kristen’s podcast, the Bites &amp; Bytes Podcast, is her platform for discussing cybersecurity and food safety, and is recommended listening for fans of No Password Required. Bites &amp; Bytes has fast become a medium for Kristin to share insights, connect with audiences, and explore the intersections of her diverse interests. Jack and Rex also delve into the intricacies of the Environmental Protection Agency&apos;s recent decision not to include cybersecurity in water system audits, and the questions this may raise about the security of water utility infrastructure.

You can follow Kristin on LinkedIn here: https://www.linkedin.com/in/demoranvillekristin/ 

You can follow Kristin on Twitter here: @demokris 

You can learn more about AnzenSage here: https://www.anzensage.com/</itunes:subtitle>
      <itunes:keywords>cyberattack, food supply chain, toughness, career change, cyber florida, lifestyle polygraph, thought leader, technology, hacker, food security, anzensage, cybersecurity, hawaii, strawberry jelly, infrastructure, public health, monkey business, horseback riding, kristin demoranville, passion fruit, infosec, ceo, a seat at the table, ethical hacking, bites &amp; bytes podcast, the joker, pineapple, story time, food, batman, hacking</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>43</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">9bdab2d7-422f-40c0-aa7b-3b944ca63357</guid>
      <title>No Password Required Podcast Episode 42 — Jessica Gulick</title>
      <description><![CDATA[Jessica Gulick — Founder and Commissioner of the US Cyber Games, CEO of the cyber marketing firm Katzcy, and someone who values perseverance over perfection 

Jessica Gulick is a woman of many trades. She is the Founder and CEO of the cyber marketing firm Katzcy, the Founder and Commissioner of the US Cyber Games, and a trailblazer who is working to make cybersecurity a sport that thrives. In this episode, Jessica joins Carlton Fields P.A.’s Jack Clabby and KnowBe4’s Kayley Melton to share her experiences as a female entrepreneur and the role that perseverance has played throughout her career. She also talks about the inception of the US Cyber Games, its commitment to bringing together elite cyber athletes, coaches, and industry leaders, and the purpose she hopes it will serve in the cyber world. Jack and Kayley also discuss the recent developments of Droidish, which may sound like a new Star Trek language but is actually the language being developed by the US military to allow AI drones to communicate with one another to become useful “tools” for many different purposes.

You can follow Jessica on LinkedIn here: https://www.linkedin.com/in/jessicagulick/ 

You can follow Jessica on Twitter here: @CyberRiskLady

You can learn more about US Cyber Games here: https://www.playcyber.com/ 


 
]]></description>
      <pubDate>Fri, 27 Oct 2023 04:00:00 +0000</pubDate>
      <author>rex2@cyberflorida.org (Jessica Gulick, Tony Urbanovich, Jessica&apos;s Son, Jessica&apos;s Family, Katzcy, US Cyber Team, US Cyber Games, Play Cyber, Matt DeVos, Bob Gorley, Carlton Fields, Ernie Ferraresso, Jack Clabby, Kayley Melton, Cyber Florida, Scott Wachtler, Mario, Sarina Gandy, Rex Wilson)</author>
      <link>https://cyberflorida.org/pod/</link>
      <enclosure length="53660345" type="audio/mpeg" url="https://dts.podtrac.com/redirect.mp3/cdn.simplecast.com/audio/ba5244e0-cb0d-4762-b681-e884e01b43fb/episodes/b648f4c8-8f87-49ee-8df6-41715f76fbc2/audio/909cbaff-16e9-423a-8301-f9599bd0aed9/default_tc.mp3?aid=rss_feed&amp;feed=YGJgknbK"/>
      <itunes:title>No Password Required Podcast Episode 42 — Jessica Gulick</itunes:title>
      <itunes:author>Jessica Gulick, Tony Urbanovich, Jessica&apos;s Son, Jessica&apos;s Family, Katzcy, US Cyber Team, US Cyber Games, Play Cyber, Matt DeVos, Bob Gorley, Carlton Fields, Ernie Ferraresso, Jack Clabby, Kayley Melton, Cyber Florida, Scott Wachtler, Mario, Sarina Gandy, Rex Wilson</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/d43689d3-22e4-45dd-97ad-4c2145bc601b/9a0a48fa-b094-4859-a8d7-e577e4cc0393/3000x3000/jessica-gulick-episode-art.jpg?aid=rss_feed"/>
      <itunes:duration>00:55:53</itunes:duration>
      <itunes:summary>Jessica Gulick — Founder and Commissioner of the US Cyber Games, CEO of the cyber marketing firm Katzcy, and someone who values perseverance over perfection 

Jessica Gulick is a woman of many trades. She is the Founder and CEO of the cyber marketing firm Katzcy, the Founder and Commissioner of the US Cyber Games, and a trailblazer who is working to make cybersecurity a sport that thrives. In this episode, Jessica joins Carlton Fields P.A.’s Jack Clabby and KnowBe4’s Kayley Melton to share her experiences as a female entrepreneur and the role that perseverance has played throughout her career. She also talks about the inception of the US Cyber Games, its commitment to bringing together elite cyber athletes, coaches, and industry leaders, and the purpose she hopes it will serve in the cyber world. Jack and Kayley also discuss the recent developments of Droidish, which may sound like a new Star Trek language but is actually the language being developed by the US military to allow AI drones to communicate with one another to become useful “tools” for many different purposes.

You can follow Jessica on LinkedIn here: https://www.linkedin.com/in/jessicagulick/ 

You can follow Jessica on Twitter here: @CyberRiskLady

You can learn more about US Cyber Games here: https://www.playcyber.com/ 


</itunes:summary>
      <itunes:subtitle>Jessica Gulick — Founder and Commissioner of the US Cyber Games, CEO of the cyber marketing firm Katzcy, and someone who values perseverance over perfection 

Jessica Gulick is a woman of many trades. She is the Founder and CEO of the cyber marketing firm Katzcy, the Founder and Commissioner of the US Cyber Games, and a trailblazer who is working to make cybersecurity a sport that thrives. In this episode, Jessica joins Carlton Fields P.A.’s Jack Clabby and KnowBe4’s Kayley Melton to share her experiences as a female entrepreneur and the role that perseverance has played throughout her career. She also talks about the inception of the US Cyber Games, its commitment to bringing together elite cyber athletes, coaches, and industry leaders, and the purpose she hopes it will serve in the cyber world. Jack and Kayley also discuss the recent developments of Droidish, which may sound like a new Star Trek language but is actually the language being developed by the US military to allow AI drones to communicate with one another to become useful “tools” for many different purposes.

You can follow Jessica on LinkedIn here: https://www.linkedin.com/in/jessicagulick/ 

You can follow Jessica on Twitter here: @CyberRiskLady

You can learn more about US Cyber Games here: https://www.playcyber.com/ 


</itunes:subtitle>
      <itunes:keywords>ctf, mission, you can be too nice, yeah we bring the flames, nist, recruit top talent, usa, strategy, us cyber women&apos;s team, jessica gulick, cybersecurity marketing, red vs. blue, us cyber team, leadership, competition, train. compete. win., gaming, advice, cyber patriot, us cyber games, sportsmanship, service, women in infosec, women, teamwork, women in tech, infosec, women in cyber, ceo, how did you learn to play mario?, diversity, nice, family, women in cybersecurity, hack factory, esports, ciso, games, cybersecurity as a sport</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>42</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">6801d879-7837-4501-9613-44fe7dbea1d6</guid>
      <title>No Password Required Podcast Episode 41 — Allan Liska</title>
      <description><![CDATA[Allan Liska —Threat Intelligence Analyst at Recorded Future, the Ransomware Sommelier, and a guy with a mildly exciting expense account

Allan Liska is a Threat Intelligence Analyst at Recorded Future. In this episode, Allan returns to No Password Required to talk with Carlton Fields Attorney Jack Clabby and KnowBe4’s Kayley Melton about his experiences in the ever-evolving battlefield of cyber threats, what has changed in ransomware since his first time on the show, and his perspective on the power of AI in the battle against cyber threats. He also updates us on his passion project: the upcoming release of the Yours Truly, Johnny Dollar comic book. In this thrilling new venture, Allan breathes new life into iconic insurance investigator Johnny Dollar by casting him in a role that hits close to home: a ransomware investigator. The best part was that he gifted the No Password Required team the chance to act out a scene from the comic. Jack and Kayley also talk about the dismantling of Qakbot, marking one of the largest-ever U.S.-led enforcement actions against a botnet (and also marking one of the best U.S. mission titles - Operation Duck Hunt.) 

You can follow Allan on LinkedIn here: https://www.linkedin.com/in/allan2/ 
You can follow Allan on Twitter here: @uuallan 
You can learn more about Recorded Future here: https://www.recordedfuture.com/ 
 
]]></description>
      <pubDate>Tue, 26 Sep 2023 04:05:00 +0000</pubDate>
      <author>rex2@cyberflorida.org (Johnny Dollar, Green Arrow, Batman, Sherlock Holmes, Moon Girl, Recorded Future, Ransomware Sommelier, Rex Wilson, Ernie Ferraresso, Carlton Fields, KnowBe4, Allan Liska, Cyber Florida, Jack Clabby, Kayley Melton, Scott Wachtler, Sarina Gandy)</author>
      <link>https://cyberflorida.org/pod/</link>
      <enclosure length="54983704" type="audio/mpeg" url="https://dts.podtrac.com/redirect.mp3/cdn.simplecast.com/audio/ba5244e0-cb0d-4762-b681-e884e01b43fb/episodes/19cb4667-b960-494e-9b48-93f6d14e29ef/audio/16b2b38c-7037-4a5b-8c69-cc53131b01c9/default_tc.mp3?aid=rss_feed&amp;feed=YGJgknbK"/>
      <itunes:title>No Password Required Podcast Episode 41 — Allan Liska</itunes:title>
      <itunes:author>Johnny Dollar, Green Arrow, Batman, Sherlock Holmes, Moon Girl, Recorded Future, Ransomware Sommelier, Rex Wilson, Ernie Ferraresso, Carlton Fields, KnowBe4, Allan Liska, Cyber Florida, Jack Clabby, Kayley Melton, Scott Wachtler, Sarina Gandy</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/d43689d3-22e4-45dd-97ad-4c2145bc601b/3177de93-fecb-41a0-8f67-4422602d8c64/3000x3000/liska-episode-art.jpg?aid=rss_feed"/>
      <itunes:duration>00:57:16</itunes:duration>
      <itunes:summary>Allan Liska —Threat Intelligence Analyst at Recorded Future, the Ransomware Sommelier, and a guy with a mildly exciting expense account

Allan Liska is a Threat Intelligence Analyst at Recorded Future. In this episode, Allan returns to No Password Required to talk with Carlton Fields Attorney Jack Clabby and KnowBe4’s Kayley Melton about his experiences in the ever-evolving battlefield of cyber threats, what has changed in ransomware since his first time on the show, and his perspective on the power of AI in the battle against cyber threats. He also updates us on his passion project: the upcoming release of the Yours Truly, Johnny Dollar comic book. In this thrilling new venture, Allan breathes new life into iconic insurance investigator Johnny Dollar by casting him in a role that hits close to home: a ransomware investigator. The best part was that he gifted the No Password Required team the chance to act out a scene from the comic. Jack and Kayley also talk about the dismantling of Qakbot, marking one of the largest-ever U.S.-led enforcement actions against a botnet (and also marking one of the best U.S. mission titles - Operation Duck Hunt.) 

You can follow Allan on LinkedIn here: https://www.linkedin.com/in/allan2/ 
You can follow Allan on Twitter here: @uuallan 
You can learn more about Recorded Future here: https://www.recordedfuture.com/ 
</itunes:summary>
      <itunes:subtitle>Allan Liska —Threat Intelligence Analyst at Recorded Future, the Ransomware Sommelier, and a guy with a mildly exciting expense account

Allan Liska is a Threat Intelligence Analyst at Recorded Future. In this episode, Allan returns to No Password Required to talk with Carlton Fields Attorney Jack Clabby and KnowBe4’s Kayley Melton about his experiences in the ever-evolving battlefield of cyber threats, what has changed in ransomware since his first time on the show, and his perspective on the power of AI in the battle against cyber threats. He also updates us on his passion project: the upcoming release of the Yours Truly, Johnny Dollar comic book. In this thrilling new venture, Allan breathes new life into iconic insurance investigator Johnny Dollar by casting him in a role that hits close to home: a ransomware investigator. The best part was that he gifted the No Password Required team the chance to act out a scene from the comic. Jack and Kayley also talk about the dismantling of Qakbot, marking one of the largest-ever U.S.-led enforcement actions against a botnet (and also marking one of the best U.S. mission titles - Operation Duck Hunt.) 

You can follow Allan on LinkedIn here: https://www.linkedin.com/in/allan2/ 
You can follow Allan on Twitter here: @uuallan 
You can learn more about Recorded Future here: https://www.recordedfuture.com/ 
</itunes:subtitle>
      <itunes:keywords>allan liska, cyberattack, tabel read, “arch-nemeses, is batman a superhero?, lifestyle polygraph, technology, dwell time, war games, care bears, comic book, threat intelligence, computer science, two-time guest, recorded future, johnny dollar, ethical considerations, ai, ransomware, fbi, infosec, ethical hacking, operation duck hunt, ransomware sommelier, superhero team dynamics, qakbot, thwarted a cyber attack, botnet, hacking, comics, mildly exciting expense account, privacy</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>41</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">8a211eb1-f382-4411-ab20-3c6676a6514d</guid>
      <title>No Password Required Podcast Episode 40 - Courtney H. Jackson</title>
      <description><![CDATA[Courtney H. Jackson — CEO of Paragon Cyber Solutions, family-night game champion, and calculated-risk taker

Courtney H. Jackson is the CEO of Paragon Cyber Solutions, a Tampa-based cybersecurity solutions provider. If Courtney’s name sounds familiar, that may be because she was awarded the Global 2022 Cybersecurity Woman Entrepreneur of the Year! In addition, Courtney is a 2023 Business Woman of the Year Honoree and a veteran of the U.S. Navy, where she was introduced to the world of cyber and IT. In this episode of No Password Required, Courtney joins Carlton Fields P.A. Jack Clabby and KnowBe4’s Kayley Melton to talk about her path to becoming a CEO, the resources that she wished she’d had when starting her career in this industry, how she uses a Cybersecurity Apprenticeship program approved by the Department of Education and Department of Veterans Affairs and SkillBridge to fill her growing team with talent, and the “one” family-night game that brings out her family’s competitive spirit.

Jack and Kayley also talk about the unlikely duo behind the 2016 Bitfinex hack - one of whom is most known by her persona as the aspiring rapper “Razzlekhan.”

 
You can follow Courtney on LinkedIn here: https://www.linkedin.com/in/courtneyhjackson/ 
You can follow Courtney on Twitter here: @mrschjackson 
You can learn more about Paragon Cyber Solutions here: https://paragoncybersolutions.com/ 
]]></description>
      <pubDate>Tue, 5 Sep 2023 04:00:00 +0000</pubDate>
      <author>rex2@cyberflorida.org (Courtney H. Jackson, Oprah, Mattel via UNO, Paragon Cyber Solutions, Mayor Jane Castor, Lucifer Morningstar, Kayley Melton, Cyber Florida, Devin Malice, Sarina Gandy, Scott Wachtler, Rex Wilson, Jack Clabby)</author>
      <link>https://no-password-required.simplecast.com/episodes/no-password-required-podcast-episode-40-courtney-h-jackson-pP5WSW9m</link>
      <enclosure length="44115000" type="audio/mpeg" url="https://dts.podtrac.com/redirect.mp3/cdn.simplecast.com/audio/ba5244e0-cb0d-4762-b681-e884e01b43fb/episodes/7fd6ae7d-e13f-4f41-b57b-1dd4f89549c8/audio/11d304fe-ff49-46fc-844b-fbcfba51cc9e/default_tc.mp3?aid=rss_feed&amp;feed=YGJgknbK"/>
      <itunes:title>No Password Required Podcast Episode 40 - Courtney H. Jackson</itunes:title>
      <itunes:author>Courtney H. Jackson, Oprah, Mattel via UNO, Paragon Cyber Solutions, Mayor Jane Castor, Lucifer Morningstar, Kayley Melton, Cyber Florida, Devin Malice, Sarina Gandy, Scott Wachtler, Rex Wilson, Jack Clabby</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/d43689d3-22e4-45dd-97ad-4c2145bc601b/b037cad6-6178-4b7f-90e6-ad9b8ec34763/3000x3000/courtney-episode-art.jpg?aid=rss_feed"/>
      <itunes:duration>00:45:56</itunes:duration>
      <itunes:summary>Courtney H. Jackson — CEO of Paragon Cyber Solutions, family-night game champion, and calculated-risk taker

Courtney H. Jackson is the CEO of Paragon Cyber Solutions, a Tampa-based cybersecurity solutions provider. If Courtney’s name sounds familiar, that may be because she was awarded the Global 2022 Cybersecurity Woman Entrepreneur of the Year! In addition, Courtney is a 2023 Business Woman of the Year Honoree and a veteran of the U.S. Navy, where she was introduced to the world of cyber and IT. In this episode of No Password Required, Courtney joins Carlton Fields P.A. Jack Clabby and KnowBe4’s Kayley Melton to talk about her path to becoming a CEO, the resources that she wished she’d had when starting her career in this industry, how she uses a Cybersecurity Apprenticeship program approved by the Department of Education and Department of Veterans Affairs and SkillBridge to fill her growing team with talent, and the “one” family-night game that brings out her family’s competitive spirit.

Jack and Kayley also talk about the unlikely duo behind the 2016 Bitfinex hack - one of whom is most known by her persona as the aspiring rapper “Razzlekhan.”

 
You can follow Courtney on LinkedIn here: https://www.linkedin.com/in/courtneyhjackson/ 
You can follow Courtney on Twitter here: @mrschjackson 
You can learn more about Paragon Cyber Solutions here: https://paragoncybersolutions.com/</itunes:summary>
      <itunes:subtitle>Courtney H. Jackson — CEO of Paragon Cyber Solutions, family-night game champion, and calculated-risk taker

Courtney H. Jackson is the CEO of Paragon Cyber Solutions, a Tampa-based cybersecurity solutions provider. If Courtney’s name sounds familiar, that may be because she was awarded the Global 2022 Cybersecurity Woman Entrepreneur of the Year! In addition, Courtney is a 2023 Business Woman of the Year Honoree and a veteran of the U.S. Navy, where she was introduced to the world of cyber and IT. In this episode of No Password Required, Courtney joins Carlton Fields P.A. Jack Clabby and KnowBe4’s Kayley Melton to talk about her path to becoming a CEO, the resources that she wished she’d had when starting her career in this industry, how she uses a Cybersecurity Apprenticeship program approved by the Department of Education and Department of Veterans Affairs and SkillBridge to fill her growing team with talent, and the “one” family-night game that brings out her family’s competitive spirit.

Jack and Kayley also talk about the unlikely duo behind the 2016 Bitfinex hack - one of whom is most known by her persona as the aspiring rapper “Razzlekhan.”

 
You can follow Courtney on LinkedIn here: https://www.linkedin.com/in/courtneyhjackson/ 
You can follow Courtney on Twitter here: @mrschjackson 
You can learn more about Paragon Cyber Solutions here: https://paragoncybersolutions.com/</itunes:subtitle>
      <itunes:keywords>paragon cyber solutions, curiosity, lucifer morningstar, uno, growth, entrepreneur, cyber florida, mentor, leadership, florida, chief security officer, cybersecurity, draw four, risk taker, united states navy, infosec, oprah, community, sports mom, @mrschjackson, tampa, soccer mom</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>40</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">f25cccc8-6b96-4fca-9405-77fbc0fae2ae</guid>
      <title>No Password Required Podcast Episode 39 - Lisa Ventura MBE</title>
      <description><![CDATA[Lisa Ventura — founder of Cyber Security Unity, Member of the Order of the British Empire, and appreciator of 80s soap operas

Lisa Ventura MBE is the founder of Cyber Security Unity, a UK-based organization seeking to unite the cyber security industry globally. In this episode of No Password Required, Lisa joins Carlton Fields, P.A.’s Jack Clabby and KnowBe4’s Kayley Melton to share how she went from working on the UK version of “Who Wants to be a Millionaire?” to becoming an award-winning leader in the cybersecurity industry. She also tells us about receiving her honorary award from the British Parliament, her love of 1980s U.S. soap operas, and the sci-fi world she’d most want to live in.
 
Jack and Kayley discuss the drastic increase in the amount of cash Americans lost to text-messaging scams in recent years. Why is this type of attack showing so much growth? How can consumers continue moving forward? They talk about all of that and more.

A special thanks to the great Sarina Gandy for producing this episode. 

You can connect with Lisa on Twitter here: @cybergeekgirl

You can connect with Lisa on her personal website here: https://lisaventura.co.uk/ 

You can learn more about Cyber Security Unity here: https://csu.org.uk/ 
 
]]></description>
      <pubDate>Wed, 19 Jul 2023 04:00:00 +0000</pubDate>
      <author>rex2@cyberflorida.org (Lisa Ventura MBE, JR Ewing, regis philbin, Cyber Florida, Carlton Fields, Devin Malice, Sarina Gandy, Kayley Melton, Ernie Ferraresso, Scott Wachtler, Jack Clabby, Rex Wilson)</author>
      <link>https://no-password-required.simplecast.com/episodes/no-password-required-podcast-episode-39-lisa-ventura-mbe-ioWbIouN</link>
      <enclosure length="56059566" type="audio/mpeg" url="https://dts.podtrac.com/redirect.mp3/cdn.simplecast.com/audio/ba5244e0-cb0d-4762-b681-e884e01b43fb/episodes/c731ba92-88b3-49a4-a1a3-80c3f199d0b1/audio/a7d6bf7c-c425-4218-a4fb-18a9050a8ade/default_tc.mp3?aid=rss_feed&amp;feed=YGJgknbK"/>
      <itunes:title>No Password Required Podcast Episode 39 - Lisa Ventura MBE</itunes:title>
      <itunes:author>Lisa Ventura MBE, JR Ewing, regis philbin, Cyber Florida, Carlton Fields, Devin Malice, Sarina Gandy, Kayley Melton, Ernie Ferraresso, Scott Wachtler, Jack Clabby, Rex Wilson</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/d43689d3-22e4-45dd-97ad-4c2145bc601b/7836fe44-10e3-4918-beef-cfb372f923a3/3000x3000/lisa-episode-art.jpg?aid=rss_feed"/>
      <itunes:duration>00:58:22</itunes:duration>
      <itunes:summary>Lisa Ventura — founder of Cyber Security Unity, Member of the Order of the British Empire, and appreciator of 80s soap operas

Lisa Ventura MBE is the founder of Cyber Security Unity, a UK-based organization seeking to unite the cyber security industry globally. In this episode of No Password Required, Lisa joins Carlton Fields, P.A.’s Jack Clabby and KnowBe4’s Kayley Melton to share how she went from working on the UK version of “Who Wants to be a Millionaire?” to becoming an award-winning leader in the cybersecurity industry. She also tells us about receiving her honorary award from the British Parliament, her love of 1980s U.S. soap operas, and the sci-fi world she’d most want to live in.
 
Jack and Kayley discuss the drastic increase in the amount of cash Americans lost to text-messaging scams in recent years. Why is this type of attack showing so much growth? How can consumers continue moving forward? They talk about all of that and more.

A special thanks to the great Sarina Gandy for producing this episode. 

You can connect with Lisa on Twitter here: @cybergeekgirl

You can connect with Lisa on her personal website here: https://lisaventura.co.uk/ 

You can learn more about Cyber Security Unity here: https://csu.org.uk/ 
</itunes:summary>
      <itunes:subtitle>Lisa Ventura — founder of Cyber Security Unity, Member of the Order of the British Empire, and appreciator of 80s soap operas

Lisa Ventura MBE is the founder of Cyber Security Unity, a UK-based organization seeking to unite the cyber security industry globally. In this episode of No Password Required, Lisa joins Carlton Fields, P.A.’s Jack Clabby and KnowBe4’s Kayley Melton to share how she went from working on the UK version of “Who Wants to be a Millionaire?” to becoming an award-winning leader in the cybersecurity industry. She also tells us about receiving her honorary award from the British Parliament, her love of 1980s U.S. soap operas, and the sci-fi world she’d most want to live in.
 
Jack and Kayley discuss the drastic increase in the amount of cash Americans lost to text-messaging scams in recent years. Why is this type of attack showing so much growth? How can consumers continue moving forward? They talk about all of that and more.

A special thanks to the great Sarina Gandy for producing this episode. 

You can connect with Lisa on Twitter here: @cybergeekgirl

You can connect with Lisa on her personal website here: https://lisaventura.co.uk/ 

You can learn more about Cyber Security Unity here: https://csu.org.uk/ 
</itunes:subtitle>
      <itunes:keywords>american soap operas, curiosity, who wants to be a millionaire, text-messaging scams, soaps, 1980s, career change, chocolate, cyber florida, leadership, text, slot cars, blogging, cybersecurity, cyber criminals, american candy, risks, neurodivergent, nerd culture, dallas, make the world better, infosec, cyber security unity, autism, nerd, member of the order of the british empire, 80s soap operas, salted caramel, adhd, @cybergeekgirl, hacking, tech, carlton fields</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>39</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">4d469019-d2c2-47f6-85ec-ef1c995ebb29</guid>
      <title>No Password Required Podcast Episode 38 - Nick Biasini</title>
      <description><![CDATA[Nick Biasini - Threat researcher at Cisco Talos and a veteran of the highest profile cyber incidents who roasts his own coffee beans

Nick Biasini leads a team of threat researchers at Cisco Talos who patrol the cutting edge of the threat landscape. Not only has he investigated some of the most significant cyberattacks in history, but he also has hands-on experience with the 1980 Olympic bobsled track. In this episode of No Password Required, Nick joins Carlton Fields’s Jack Clabby and KnowBe4’s Kayley Melton to talk about his start as an FAA security analyst, some of his top discoveries during his threat research days, and the value of getting comfortable with failure. He shares his story of investigating the SamSam ransomware and his predictions for how AI might be able to support businesses in the future. Kayley and Jack break down the $10 million reward for information leading to the arrest or conviction of alleged Russian ransomware affiliate Mikhail Matveev.

You can connect with Nick on Twitter here: @infosec_nick

Check it out on YouTube here: https://tinyurl.com/4mtbd4ed 
]]></description>
      <pubDate>Tue, 20 Jun 2023 04:05:00 +0000</pubDate>
      <author>rex2@cyberflorida.org (Nick Biasini, rage against the machine, coffee, Devin Malice, Sarina Gandy, Jack Clabby, Rex Wilson, Cisco Talos, Carlton Fields, KnowBe4, Cyber Florida, Scott Wachtler)</author>
      <link>https://cyberflorida.org/pod/</link>
      <enclosure length="44645243" type="audio/mpeg" url="https://dts.podtrac.com/redirect.mp3/cdn.simplecast.com/audio/ba5244e0-cb0d-4762-b681-e884e01b43fb/episodes/606d01fd-4a87-4fe1-9eb4-a5cbf2e6180c/audio/2c202d77-3aa7-41fc-9c58-9582c29ad239/default_tc.mp3?aid=rss_feed&amp;feed=YGJgknbK"/>
      <itunes:title>No Password Required Podcast Episode 38 - Nick Biasini</itunes:title>
      <itunes:author>Nick Biasini, rage against the machine, coffee, Devin Malice, Sarina Gandy, Jack Clabby, Rex Wilson, Cisco Talos, Carlton Fields, KnowBe4, Cyber Florida, Scott Wachtler</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/d43689d3-22e4-45dd-97ad-4c2145bc601b/1a1d10fa-279f-407f-8f14-1dcc5d847bee/3000x3000/nick-episode-art.jpg?aid=rss_feed"/>
      <itunes:duration>00:46:28</itunes:duration>
      <itunes:summary>Nick Biasini - Threat researcher at Cisco Talos and a veteran of the highest profile cyber incidents who roasts his own coffee beans

Nick Biasini leads a team of threat researchers at Cisco Talos who patrol the cutting edge of the threat landscape. Not only has he investigated some of the most significant cyberattacks in history, but he also has hands-on experience with the 1980 Olympic bobsled track. In this episode of No Password Required, Nick joins Carlton Fields’s Jack Clabby and KnowBe4’s Kayley Melton to talk about his start as an FAA security analyst, some of his top discoveries during his threat research days, and the value of getting comfortable with failure. He shares his story of investigating the SamSam ransomware and his predictions for how AI might be able to support businesses in the future. Kayley and Jack break down the $10 million reward for information leading to the arrest or conviction of alleged Russian ransomware affiliate Mikhail Matveev.

You can connect with Nick on Twitter here: @infosec_nick

Check it out on YouTube here: https://tinyurl.com/4mtbd4ed</itunes:summary>
      <itunes:subtitle>Nick Biasini - Threat researcher at Cisco Talos and a veteran of the highest profile cyber incidents who roasts his own coffee beans

Nick Biasini leads a team of threat researchers at Cisco Talos who patrol the cutting edge of the threat landscape. Not only has he investigated some of the most significant cyberattacks in history, but he also has hands-on experience with the 1980 Olympic bobsled track. In this episode of No Password Required, Nick joins Carlton Fields’s Jack Clabby and KnowBe4’s Kayley Melton to talk about his start as an FAA security analyst, some of his top discoveries during his threat research days, and the value of getting comfortable with failure. He shares his story of investigating the SamSam ransomware and his predictions for how AI might be able to support businesses in the future. Kayley and Jack break down the $10 million reward for information leading to the arrest or conviction of alleged Russian ransomware affiliate Mikhail Matveev.

You can connect with Nick on Twitter here: @infosec_nick

Check it out on YouTube here: https://tinyurl.com/4mtbd4ed</itunes:subtitle>
      <itunes:keywords>olympics, public speaking, curiosity, lake placid, team, samsam, threat hunter, sam sam, talos, cyber florida, risk, leadership, federal aviation administration, success, miracle on ice, cybersecurity, coffee, ransomware, gateway computers, r and d, faa, bobsled, outreach, no password required podcast, failure, threat landscape, carlton fields, cisco</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>38</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">00f739eb-cc54-4744-ac37-947142c6f439</guid>
      <title>Gautam ‘Gotham’ Sharma – a cybersecurity consultant and comedian who injects fun into infosec</title>
      <description><![CDATA[Gotham Sharma is a cybersecurity consultant, writer, educator, and stand-up comic. He’s on a mission to help folks build successful careers in information security through his latest venture, AccessCyber.co. In his training, Gotham leverages humor to make security awareness and education relatable to audiences of various technical backgrounds. Inspired by satire publications like The Onion, Gotham recently launched an infosec magazine called Brute Farce Attack, one of the many projects on his growing list of side hustles. In this episode of No Password Required, Gotham joins Carlton Fields’s Jack Clabby and KnowBe4’s Kayley Melton to share how his life changed after a well-intentioned anti-mentor inspired him. Jack and Kayley discuss IARPA’s plan to hack hackers’ brains as the agency considers reimagining security with cyberpsychology-informed network defenses.

You can connect with Gotham on Twitter here: @GothamJSharma

You can learn more about AccessCyber here: https://accesscyber.co/ 

You can learn more about Brute Farce Attack here: https://www.brutefarceattack.com/ 

 
]]></description>
      <pubDate>Tue, 2 May 2023 04:05:00 +0000</pubDate>
      <author>rex2@cyberflorida.org (Gotham Sharma, Brute Farce Attack, The Onion, IARPA, AccessCyber.co, jerry seinfeld, Gotham&apos;s Mom, Jack Clabby, Scott Wachtler, Carlton Fields, Cyber Florida, Rex Wilson, Devin Malice, Sarina Gandy)</author>
      <link>https://cyberflorida.org/pod/</link>
      <enclosure length="44615844" type="audio/mpeg" url="https://dts.podtrac.com/redirect.mp3/cdn.simplecast.com/audio/ba5244e0-cb0d-4762-b681-e884e01b43fb/episodes/34789c9c-77c5-4613-a186-040288b5598f/audio/6a655046-2c48-4af0-a3f6-6f84081b73d2/default_tc.mp3?aid=rss_feed&amp;feed=YGJgknbK"/>
      <itunes:title>Gautam ‘Gotham’ Sharma – a cybersecurity consultant and comedian who injects fun into infosec</itunes:title>
      <itunes:author>Gotham Sharma, Brute Farce Attack, The Onion, IARPA, AccessCyber.co, jerry seinfeld, Gotham&apos;s Mom, Jack Clabby, Scott Wachtler, Carlton Fields, Cyber Florida, Rex Wilson, Devin Malice, Sarina Gandy</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/d43689d3-22e4-45dd-97ad-4c2145bc601b/567d066a-e5fe-4c8d-b78d-07573b394d5e/3000x3000/gotham-sharma-episode-art.jpg?aid=rss_feed"/>
      <itunes:duration>00:46:25</itunes:duration>
      <itunes:summary>Gotham Sharma is a cybersecurity consultant, writer, educator, and stand-up comic. He’s on a mission to help folks build successful careers in information security through his latest venture, AccessCyber.co. In his training, Gotham leverages humor to make security awareness and education relatable to audiences of various technical backgrounds. Inspired by satire publications like The Onion, Gotham recently launched an infosec magazine called Brute Farce Attack, one of the many projects on his growing list of side hustles. In this episode of No Password Required, Gotham joins Carlton Fields’s Jack Clabby and KnowBe4’s Kayley Melton to share how his life changed after a well-intentioned anti-mentor inspired him. Jack and Kayley discuss IARPA’s plan to hack hackers’ brains as the agency considers reimagining security with cyberpsychology-informed network defenses.

You can connect with Gotham on Twitter here: @GothamJSharma

You can learn more about AccessCyber here: https://accesscyber.co/ 

You can learn more about Brute Farce Attack here: https://www.brutefarceattack.com/ 

</itunes:summary>
      <itunes:subtitle>Gotham Sharma is a cybersecurity consultant, writer, educator, and stand-up comic. He’s on a mission to help folks build successful careers in information security through his latest venture, AccessCyber.co. In his training, Gotham leverages humor to make security awareness and education relatable to audiences of various technical backgrounds. Inspired by satire publications like The Onion, Gotham recently launched an infosec magazine called Brute Farce Attack, one of the many projects on his growing list of side hustles. In this episode of No Password Required, Gotham joins Carlton Fields’s Jack Clabby and KnowBe4’s Kayley Melton to share how his life changed after a well-intentioned anti-mentor inspired him. Jack and Kayley discuss IARPA’s plan to hack hackers’ brains as the agency considers reimagining security with cyberpsychology-informed network defenses.

You can connect with Gotham on Twitter here: @GothamJSharma

You can learn more about AccessCyber here: https://accesscyber.co/ 

You can learn more about Brute Farce Attack here: https://www.brutefarceattack.com/ 

</itunes:subtitle>
      <itunes:keywords>parental apt, the onion, accesscyber.co, bake a cyber cake, cyber florida, mentor, comedy, florida, mom, cybersecurity, cyberpsychology, jerry seinfeld, brute farce attack, iarpa, infosec, anti-mentor, education, dare, proud dropout, florida-man headline, hacking, encryption, humor, stand-up comic, carlton fields, lessons</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>37</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">969c5f6f-8287-4c09-a7ed-8dab357f0735</guid>
      <title>Bianca Lewis – the teenage hacker who is as comfortable on a stage as she is on a keyboard</title>
      <description><![CDATA[Bianca Lewis, also known by her hacker handle BiaSciLab, is a next-generation teenage hacker and the CEO of Girls Who Hack. Bianca’s cybersecurity journey started at age 11 when she was part of a team who successfully compromised a simulated election-reporting system at DEF CON 26. In this episode of No Password Required, Bianca joins Jack Clabby and KnowBe4’s Kayley Melton to share her experiences as a teenage hacker, her advice for being a confident public speaker, and her other biggest passion in life: the theatre. Jack and Kayley discuss the joint investigation between German police, the FBI, and law enforcement in Ukraine and the Netherlands and how they took down the DoppelPaymer ransomware group.

You can connect with Bianca on Twitter here: @BiaSciLab 
]]></description>
      <pubDate>Wed, 5 Apr 2023 04:05:00 +0000</pubDate>
      <author>rex2@cyberflorida.org (Bianca Lewis, Barbie, William Shakespeare, DEF CON, Cyber Florida, Scott Wachtler, Sarina Gandy, KnowBe4, Rex Wilson, Jack Clabby, Ernie Ferraresso, Devin Malice, Carlton Fields)</author>
      <link>https://no-password-required.simplecast.com/episodes/bianca-lewis-imNnfmZH</link>
      <enclosure length="50018254" type="audio/mpeg" url="https://dts.podtrac.com/redirect.mp3/cdn.simplecast.com/audio/ba5244e0-cb0d-4762-b681-e884e01b43fb/episodes/db5fbcd0-ddf0-4707-bf97-c4e5a28f1fe6/audio/d707707a-e30a-4802-a1cc-d89b1a98ddeb/default_tc.mp3?aid=rss_feed&amp;feed=YGJgknbK"/>
      <itunes:title>Bianca Lewis – the teenage hacker who is as comfortable on a stage as she is on a keyboard</itunes:title>
      <itunes:author>Bianca Lewis, Barbie, William Shakespeare, DEF CON, Cyber Florida, Scott Wachtler, Sarina Gandy, KnowBe4, Rex Wilson, Jack Clabby, Ernie Ferraresso, Devin Malice, Carlton Fields</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/d43689d3-22e4-45dd-97ad-4c2145bc601b/a885ab60-c1ed-43cc-92ee-c3c9eba78a33/3000x3000/bianca-lewis-episode-art.jpg?aid=rss_feed"/>
      <itunes:duration>00:52:05</itunes:duration>
      <itunes:summary>Bianca Lewis, also known by her hacker handle BiaSciLab, is a next-generation teenage hacker and the CEO of Girls Who Hack. Bianca’s cybersecurity journey started at age 11 when she was part of a team who successfully compromised a simulated election-reporting system at DEF CON 26. In this episode of No Password Required, Bianca joins Jack Clabby and KnowBe4’s Kayley Melton to share her experiences as a teenage hacker, her advice for being a confident public speaker, and her other biggest passion in life: the theatre. Jack and Kayley discuss the joint investigation between German police, the FBI, and law enforcement in Ukraine and the Netherlands and how they took down the DoppelPaymer ransomware group.

You can connect with Bianca on Twitter here: @BiaSciLab</itunes:summary>
      <itunes:subtitle>Bianca Lewis, also known by her hacker handle BiaSciLab, is a next-generation teenage hacker and the CEO of Girls Who Hack. Bianca’s cybersecurity journey started at age 11 when she was part of a team who successfully compromised a simulated election-reporting system at DEF CON 26. In this episode of No Password Required, Bianca joins Jack Clabby and KnowBe4’s Kayley Melton to share her experiences as a teenage hacker, her advice for being a confident public speaker, and her other biggest passion in life: the theatre. Jack and Kayley discuss the joint investigation between German police, the FBI, and law enforcement in Ukraine and the Netherlands and how they took down the DoppelPaymer ransomware group.

You can connect with Bianca on Twitter here: @BiaSciLab</itunes:subtitle>
      <itunes:keywords>cybersecurity culture, public speaking, college, cyber florida, technology, teenager, leadership, florida, success, cybersecurity, i want to do everything, problem solving, def con, william shakespeare, girls who hack, adulty, ceo, teaching, family, star wars, education, gap year, theatre, hacking, carlton fields</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>36</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">0b47aab9-48d6-459f-b612-3d0e91d8ec2b</guid>
      <title>Louis Nyffenegger – a security engineer and budding surfer who took PentesterLab from side hustle to global success</title>
      <description><![CDATA[Louis Nyffenegger is the founder and CEO of PentesterLab. On this episode of No Password Required, Louis shares how he built his penetration-testing training company, why empathy is crucial to application security, and what can be learned from having hobbies you’re not good at. He also tells us his favorite pen testing story, explains the early days of smartwatch security, and describes his journey from France to Australia. The entire No Password Required team (Ernie, Jack, Rex, Devin, and Sarina) celebrate Ernie’s final episode by participating in a game show challenge about his life. Learn how many tattoos he has, how many countries he’s been to, and more juicy facts that we’ve all been dying to know.
 
You can connect with Louis on Twitter here: @snyff
 
You can learn more about the PentesterLab here: https://www.pentesterlab.com/ 
]]></description>
      <pubDate>Wed, 1 Mar 2023 05:05:00 +0000</pubDate>
      <author>rex2@cyberflorida.org (Louis Nyffenegger, Johnny Utah, Bodhi, PentesterLab, Australian stuff that will kill you, Cyber Florida, Scott Wachtler, Jack Clabby, Carlton Fields, Ernie Ferraresso, Rex Wilson, Devin Malice, Sarina Gandy)</author>
      <link>https://no-password-required.simplecast.com/episodes/louis-nyffenegger-a-security-engineer-and-budding-surfer-who-took-pentesterlab-from-side-hustle-to-global-success-_qwRwbvD</link>
      <enclosure length="51537593" type="audio/mpeg" url="https://dts.podtrac.com/redirect.mp3/cdn.simplecast.com/audio/ba5244e0-cb0d-4762-b681-e884e01b43fb/episodes/8e8ced87-86ea-4329-8530-76413e2ac0fc/audio/a5825bca-38e4-4ffd-a8fd-30c584c5fe87/default_tc.mp3?aid=rss_feed&amp;feed=YGJgknbK"/>
      <itunes:title>Louis Nyffenegger – a security engineer and budding surfer who took PentesterLab from side hustle to global success</itunes:title>
      <itunes:author>Louis Nyffenegger, Johnny Utah, Bodhi, PentesterLab, Australian stuff that will kill you, Cyber Florida, Scott Wachtler, Jack Clabby, Carlton Fields, Ernie Ferraresso, Rex Wilson, Devin Malice, Sarina Gandy</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/d43689d3-22e4-45dd-97ad-4c2145bc601b/fafac552-fb15-4ecf-94c5-f6a2a1ef47c7/3000x3000/louis-nyffenegger-episode-art.jpg?aid=rss_feed"/>
      <itunes:duration>00:53:38</itunes:duration>
      <itunes:summary>Louis Nyffenegger is the founder and CEO of PentesterLab. On this episode of No Password Required, Louis shares how he built his penetration-testing training company, why empathy is crucial to application security, and what can be learned from having hobbies you’re not good at. He also tells us his favorite pen testing story, explains the early days of smartwatch security, and describes his journey from France to Australia. The entire No Password Required team (Ernie, Jack, Rex, Devin, and Sarina) celebrate Ernie’s final episode by participating in a game show challenge about his life. Learn how many tattoos he has, how many countries he’s been to, and more juicy facts that we’ve all been dying to know.
 
You can connect with Louis on Twitter here: @snyff
 
You can learn more about the PentesterLab here: https://www.pentesterlab.com/</itunes:summary>
      <itunes:subtitle>Louis Nyffenegger is the founder and CEO of PentesterLab. On this episode of No Password Required, Louis shares how he built his penetration-testing training company, why empathy is crucial to application security, and what can be learned from having hobbies you’re not good at. He also tells us his favorite pen testing story, explains the early days of smartwatch security, and describes his journey from France to Australia. The entire No Password Required team (Ernie, Jack, Rex, Devin, and Sarina) celebrate Ernie’s final episode by participating in a game show challenge about his life. Learn how many tattoos he has, how many countries he’s been to, and more juicy facts that we’ve all been dying to know.
 
You can connect with Louis on Twitter here: @snyff
 
You can learn more about the PentesterLab here: https://www.pentesterlab.com/</itunes:subtitle>
      <itunes:keywords>iot, empathy, happiness, family business, cyber florida, technology, leadership, florida, smart watch, success, cybersecurity, don&apos;t be a jerk, stickers, infosec, ceo, meta skills, australia, customer support, pentesterlab, prince of persia, down under, pen testing, pizza, carlton fields</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>35</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">1cc305dd-59ad-4b01-85df-de7227051428</guid>
      <title>Joey deVilla - a developer advocate with Auth0 and an &quot;Accordion Guy&quot; with rockstar aspirations</title>
      <description><![CDATA[Joey deVilla is a Senior R&D Content Engineer at Auth0, a division of Okta. After hours, Joey is known as the Accordion Guy and spends his time playing music and sharing his nerdy takes on his two personal blogs. In this episode, Joey joins Jack and guest-host Tashya Denose (host of the Do We Belong Here podcast) to talk about his love for the tech community, his unique assortment of passions, hobbies, and jobs, and how he continues to trust the serendipity of his life even when the path seems unclear. Tashya and Jack talk about DoNotPay’s $1 million offer to lawyers to let AI take their place before the Supreme Court and what this kind of technology could mean for the future.
 
You can connect with Joey here: globalnerdy.com  and here: joeydevilla.com
 
You can learn more about the Legendary Nanaimo Bar here: https://www.nanaimo.ca/about-nanaimo/nanaimo-bars 
]]></description>
      <pubDate>Wed, 1 Feb 2023 05:05:00 +0000</pubDate>
      <author>rex2@cyberflorida.org (Joey Devilla, Auth0, Han Solo, Jack Clabby, Tashya Denose, Ernie Ferraresso, Cyber Florida, Devin Malice, Rex Wilson, Scott Wachtler, Carlton Fields, Sarina Gandy, trent reznor, weird al yankovic, van wilder)</author>
      <link>https://no-password-required.simplecast.com/episodes/joey-devilla-a-developer-advocate-with-auth0-and-an-accordion-guy-with-rockstar-aspirations-w1Hu5s5i</link>
      <enclosure length="55330923" type="audio/mpeg" url="https://dts.podtrac.com/redirect.mp3/cdn.simplecast.com/audio/ba5244e0-cb0d-4762-b681-e884e01b43fb/episodes/ee322cac-31a6-4f7a-9e21-8aa4ba360118/audio/0410d331-ec90-4005-a41c-ee2b8b8575ca/default_tc.mp3?aid=rss_feed&amp;feed=YGJgknbK"/>
      <itunes:title>Joey deVilla - a developer advocate with Auth0 and an &quot;Accordion Guy&quot; with rockstar aspirations</itunes:title>
      <itunes:author>Joey Devilla, Auth0, Han Solo, Jack Clabby, Tashya Denose, Ernie Ferraresso, Cyber Florida, Devin Malice, Rex Wilson, Scott Wachtler, Carlton Fields, Sarina Gandy, trent reznor, weird al yankovic, van wilder</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/d43689d3-22e4-45dd-97ad-4c2145bc601b/dae215de-5eb6-480a-ac38-3a3f6d1234d3/3000x3000/joey-devilla-episode-art.jpg?aid=rss_feed"/>
      <itunes:duration>00:57:37</itunes:duration>
      <itunes:summary>Joey deVilla is a Senior R&amp;D Content Engineer at Auth0, a division of Okta. After hours, Joey is known as the Accordion Guy and spends his time playing music and sharing his nerdy takes on his two personal blogs. In this episode, Joey joins Jack and guest-host Tashya Denose (host of the Do We Belong Here podcast) to talk about his love for the tech community, his unique assortment of passions, hobbies, and jobs, and how he continues to trust the serendipity of his life even when the path seems unclear. Tashya and Jack talk about DoNotPay’s $1 million offer to lawyers to let AI take their place before the Supreme Court and what this kind of technology could mean for the future.
 
You can connect with Joey here: globalnerdy.com  and here: joeydevilla.com
 
You can learn more about the Legendary Nanaimo Bar here: https://www.nanaimo.ca/about-nanaimo/nanaimo-bars</itunes:summary>
      <itunes:subtitle>Joey deVilla is a Senior R&amp;D Content Engineer at Auth0, a division of Okta. After hours, Joey is known as the Accordion Guy and spends his time playing music and sharing his nerdy takes on his two personal blogs. In this episode, Joey joins Jack and guest-host Tashya Denose (host of the Do We Belong Here podcast) to talk about his love for the tech community, his unique assortment of passions, hobbies, and jobs, and how he continues to trust the serendipity of his life even when the path seems unclear. Tashya and Jack talk about DoNotPay’s $1 million offer to lawyers to let AI take their place before the Supreme Court and what this kind of technology could mean for the future.
 
You can connect with Joey here: globalnerdy.com  and here: joeydevilla.com
 
You can learn more about the Legendary Nanaimo Bar here: https://www.nanaimo.ca/about-nanaimo/nanaimo-bars</itunes:subtitle>
      <itunes:keywords>lord of the rings, serendipity, cyber florida, the legendary nanaimo bar, weird al yankovic, blogging, cybersecurity, street performers, prince, nerd culture, r and d, just say yes, chat gpt, trent reznor, nerd, nine inch nails, donotpay, accordion, tampa, carlton fields, canada</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>34</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">7029b6a4-eb0d-4145-88e3-5e3f46951615</guid>
      <title>General (Ret.) Frank McKenzie — former Commander, United States Central Command, Executive Director of Cyber Florida and an appreciator of battlefield beef enchiladas</title>
      <description><![CDATA[General (Ret.) Frank McKenzie is the Executive Director of the Global and National Security Institute at the University of South Florida and the Executive Director of Cyber Florida. In April 2022, General McKenzie retired from the Marine Corps after completing over 42 years of service. He joins the No Password Required team to discuss the evolution of his leadership style over time, a typical morning for a four-star military general, and his preference for Star Trek over Star Wars. In honor of the holidays, Ernie and Jack discuss one of the most iconic (and shocking) Christmas movies of all time - Gremlins. 
]]></description>
      <pubDate>Thu, 29 Dec 2022 05:05:00 +0000</pubDate>
      <author>rex2@cyberflorida.org (General (Ret.) Frank McKenzie, Captain Kirk, Devin Malice, Ernie Ferraresso, Cyber Florida, Rex Wilson, Scott Wachtler, Sarina Gandy, Jack Clabby)</author>
      <link>https://no-password-required.simplecast.com/episodes/general-ret-frank-mckenzie-former-commander-united-states-central-command-executive-director-of-cyber-florida-and-an-appreciator-of-battlefield-beef-enchiladas-4YxWvP_J</link>
      <enclosure length="65880441" type="audio/mpeg" url="https://dts.podtrac.com/redirect.mp3/cdn.simplecast.com/audio/ba5244e0-cb0d-4762-b681-e884e01b43fb/episodes/01f86eb7-2e5d-43b0-b97d-e914284cdac1/audio/fe0e52b4-d558-4853-93d2-8052f090790a/default_tc.mp3?aid=rss_feed&amp;feed=YGJgknbK"/>
      <itunes:title>General (Ret.) Frank McKenzie — former Commander, United States Central Command, Executive Director of Cyber Florida and an appreciator of battlefield beef enchiladas</itunes:title>
      <itunes:author>General (Ret.) Frank McKenzie, Captain Kirk, Devin Malice, Ernie Ferraresso, Cyber Florida, Rex Wilson, Scott Wachtler, Sarina Gandy, Jack Clabby</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/d43689d3-22e4-45dd-97ad-4c2145bc601b/b193d140-fdac-4d89-86c6-cf6318b9fe02/3000x3000/general-mckenzie-episode-art.jpg?aid=rss_feed"/>
      <itunes:duration>01:08:36</itunes:duration>
      <itunes:summary>General (Ret.) Frank McKenzie is the Executive Director of the Global and National Security Institute at the University of South Florida and the Executive Director of Cyber Florida. In April 2022, General McKenzie retired from the Marine Corps after completing over 42 years of service. He joins the No Password Required team to discuss the evolution of his leadership style over time, a typical morning for a four-star military general, and his preference for Star Trek over Star Wars. In honor of the holidays, Ernie and Jack discuss one of the most iconic (and shocking) Christmas movies of all time - Gremlins.</itunes:summary>
      <itunes:subtitle>General (Ret.) Frank McKenzie is the Executive Director of the Global and National Security Institute at the University of South Florida and the Executive Director of Cyber Florida. In April 2022, General McKenzie retired from the Marine Corps after completing over 42 years of service. He joins the No Password Required team to discuss the evolution of his leadership style over time, a typical morning for a four-star military general, and his preference for Star Trek over Star Wars. In honor of the holidays, Ernie and Jack discuss one of the most iconic (and shocking) Christmas movies of all time - Gremlins.</itunes:subtitle>
      <itunes:keywords>gremlins, centcom, government, united states central command, vulnerability, mentor, risk, leadership, florida, complexity, success, cybersecurity, general frank mckenzie, problem solving, star trek, mentorship, freedom, birmingham, star wars, football, auburn, education, america, marine corps, beef enchiladas, reading material, afghanistan, four-star general, middle east policy</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>33</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">347dd42e-4777-4297-b8a1-b14d52f53039</guid>
      <title>Andy Sekela - An FBI Special Agent&apos;s Journey from Submarines to Anti-Corruption to Cybersecurity</title>
      <description><![CDATA[Andy Sekela is the Private Sector Coordinator for the FBI Tampa Division, who may just be on a mission to have the world’s coolest resumé. In this episode, Andy joins the No Password Required team to talk about his diverse career path, including his time as an officer on a nuclear submarine, public corruption investigations, and his best “wow, I’m an FBI agent” story. He also explains the FBI's role in investigating cybersecurity breaches, what happens after an IC3 report, and career opportunities at the agency. Jack and Ernie discuss the dark web's recent offer for sale of 487 million WhatsApp numbers and how modern businesses handle suspected website scraping. 
]]></description>
      <pubDate>Wed, 14 Dec 2022 05:05:00 +0000</pubDate>
      <author>rex2@cyberflorida.org (Andy Sekela, f, FBI, Andrea Aprea, Darth Vader, Cyber Florida, Devin Malice, Carlton Fields, Angela Litan, Scott Wachtler, Jack Clabby, Ernie Ferraresso, Sarina Gandy, Rex Wilson)</author>
      <link>https://no-password-required.simplecast.com/episodes/andy-sekela-owner-of-the-coolest-resume-in-show-history-relevant-experience-fbi-special-agent-and-nuclear-sub-engineer-apnqBuno</link>
      <enclosure length="59275364" type="audio/mpeg" url="https://dts.podtrac.com/redirect.mp3/cdn.simplecast.com/audio/ba5244e0-cb0d-4762-b681-e884e01b43fb/episodes/60f21a9b-8985-4d28-981c-27b41ddf9cae/audio/2e2b45f2-43b3-4979-8cda-6d777c98933d/default_tc.mp3?aid=rss_feed&amp;feed=YGJgknbK"/>
      <itunes:title>Andy Sekela - An FBI Special Agent&apos;s Journey from Submarines to Anti-Corruption to Cybersecurity</itunes:title>
      <itunes:author>Andy Sekela, f, FBI, Andrea Aprea, Darth Vader, Cyber Florida, Devin Malice, Carlton Fields, Angela Litan, Scott Wachtler, Jack Clabby, Ernie Ferraresso, Sarina Gandy, Rex Wilson</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/d43689d3-22e4-45dd-97ad-4c2145bc601b/7768fcd7-8677-4670-8742-31a437ff08e1/3000x3000/andrew-episode-art-2.jpg?aid=rss_feed"/>
      <itunes:duration>01:01:43</itunes:duration>
      <itunes:summary>Andy Sekela is the Private Sector Coordinator for the FBI Tampa Division, who may just be on a mission to have the world’s coolest resumé. In this episode, Andy joins the No Password Required team to talk about his diverse career path, including his time as an officer on a nuclear submarine, public corruption investigations, and his best “wow, I’m an FBI agent” story. He also explains the FBI&apos;s role in investigating cybersecurity breaches, what happens after an IC3 report, and career opportunities at the agency. Jack and Ernie discuss the dark web&apos;s recent offer for sale of 487 million WhatsApp numbers and how modern businesses handle suspected website scraping.</itunes:summary>
      <itunes:subtitle>Andy Sekela is the Private Sector Coordinator for the FBI Tampa Division, who may just be on a mission to have the world’s coolest resumé. In this episode, Andy joins the No Password Required team to talk about his diverse career path, including his time as an officer on a nuclear submarine, public corruption investigations, and his best “wow, I’m an FBI agent” story. He also explains the FBI&apos;s role in investigating cybersecurity breaches, what happens after an IC3 report, and career opportunities at the agency. Jack and Ernie discuss the dark web&apos;s recent offer for sale of 487 million WhatsApp numbers and how modern businesses handle suspected website scraping.</itunes:subtitle>
      <itunes:keywords>navy, banking, top secret, cyber florida, technology, mentor, leadership, florida, cybersecurity, fraud, submarine, positive mindset, fbi, infosec, mentorship, overcoming obstacles, ic3, star wars, outreach, tampa, nuclear sub, hacking, carlton fields</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>32</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">ed1fef80-de51-4bc3-a205-36bdccf15f36</guid>
      <title>Hannah Sutor - a Senior Product Manager at GitLab with an Instagram alter ego that puts her in privacy superhero territory</title>
      <description><![CDATA[Hannah Sutor is the Senior Product Manager at GitLab and Digital Privacy Advocate at The Privacy Chick. Hannah joins the No Password Required team to talk about how she discovered privacy and cybersecurity in college, what she expects for the future of usernames and passwords, and her adventures while traveling in an RV with her family for a year. Bonus: she also reveals her recipe for the best pumpkin spice latte. Ernie and Jack discuss the proposed U.S. labeling program for IoT consumer devices and some potential cyber and privacy implications. 
]]></description>
      <pubDate>Tue, 15 Nov 2022 05:05:00 +0000</pubDate>
      <author>rex2@cyberflorida.org (Hannah Sutor, The Privacy Chick, GitLab, Ernie Ferraresso, Cyber Florida, Devin Malice, Rex Wilson, Scott Wachtler, Carlton Fields, Sarina Gandy, Angela Litan, Jack Clabby)</author>
      <link>https://no-password-required.simplecast.com/episodes/hannah-sutor-a-senior-product-manager-at-gitlab-with-an-instagram-alter-ego-that-puts-her-in-privacy-superhero-territory-wnEZ6YcY</link>
      <enclosure length="55768280" type="audio/mpeg" url="https://dts.podtrac.com/redirect.mp3/cdn.simplecast.com/audio/ba5244e0-cb0d-4762-b681-e884e01b43fb/episodes/e7b19101-dd7e-4b6d-9878-047322e84bf9/audio/c5908ce9-87f7-4a31-b34c-3a89adae2ad9/default_tc.mp3?aid=rss_feed&amp;feed=YGJgknbK"/>
      <itunes:title>Hannah Sutor - a Senior Product Manager at GitLab with an Instagram alter ego that puts her in privacy superhero territory</itunes:title>
      <itunes:author>Hannah Sutor, The Privacy Chick, GitLab, Ernie Ferraresso, Cyber Florida, Devin Malice, Rex Wilson, Scott Wachtler, Carlton Fields, Sarina Gandy, Angela Litan, Jack Clabby</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/d43689d3-22e4-45dd-97ad-4c2145bc601b/1fdadc16-f8b2-4629-a382-4dac3af7109d/3000x3000/hannah-episode-art.jpg?aid=rss_feed"/>
      <itunes:duration>00:58:04</itunes:duration>
      <itunes:summary>Hannah Sutor is the Senior Product Manager at GitLab and Digital Privacy Advocate at The Privacy Chick. Hannah joins the No Password Required team to talk about how she discovered privacy and cybersecurity in college, what she expects for the future of usernames and passwords, and her adventures while traveling in an RV with her family for a year. Bonus: she also reveals her recipe for the best pumpkin spice latte. Ernie and Jack discuss the proposed U.S. labeling program for IoT consumer devices and some potential cyber and privacy implications.</itunes:summary>
      <itunes:subtitle>Hannah Sutor is the Senior Product Manager at GitLab and Digital Privacy Advocate at The Privacy Chick. Hannah joins the No Password Required team to talk about how she discovered privacy and cybersecurity in college, what she expects for the future of usernames and passwords, and her adventures while traveling in an RV with her family for a year. Bonus: she also reveals her recipe for the best pumpkin spice latte. Ernie and Jack discuss the proposed U.S. labeling program for IoT consumer devices and some potential cyber and privacy implications.</itunes:subtitle>
      <itunes:keywords>cybersecurity culture, pumkin spice latte, iot, instagram, happiness, technology, risk, leadership, hannah sutor, privacy chick, success, rving, problem solving, senior product manager, infosec, family, attitude change, education, gitlab, rv, remote work, digital footprint, hacking, privacy</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>31</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">e01caae0-1a89-4d9c-85ab-a11cbd2c8747</guid>
      <title>Charles Shirer - the custom t-shirt wearing CEO who went from Nintendo to Network Security</title>
      <description><![CDATA[Charles Shirer is the Chief Executive Officer of GlobalWave Consulting, an IT and cybersecurity consultancy. Known as the @bsdbandit to his 20,000+ Twitter followers, Charles is often considered the most positive person in cybersecurity (and for good reason!). In this episode, Charles joins the No Password Required team to tell us about how his childhood love for video games led to his passion for everything computer-related, what inspires him to share motivational messages on Twitter, and the importance of striving for a positive mindset in life. Jack and Ernie discuss the United Kingdom’s potential privacy enforcement against TikTok, and the regulatory regime for collecting the personal data of minors.  
]]></description>
      <pubDate>Tue, 25 Oct 2022 04:05:00 +0000</pubDate>
      <author>rex2@cyberflorida.org (Charles Shirer, Jack Clabby, Ernie Ferraresso, Cyber Florida, Devin Malice, Rex Wilson, Sarina Gandy, Carlton Fields, mega man, zelda, pac-man, @BSDBandit, Angela Litan, Scott Wachtler)</author>
      <link>https://no-password-required.simplecast.com/episodes/charles-shirer-the-custom-t-shirt-wearing-ceo-who-went-from-nintendo-to-network-security-t16N49Nc</link>
      <enclosure length="58060177" type="audio/mpeg" url="https://dts.podtrac.com/redirect.mp3/cdn.simplecast.com/audio/ba5244e0-cb0d-4762-b681-e884e01b43fb/episodes/5bcc76b4-afe8-409c-87db-edae63727e06/audio/8b2f91eb-75ca-406a-80d7-300de6f9163e/default_tc.mp3?aid=rss_feed&amp;feed=YGJgknbK"/>
      <itunes:title>Charles Shirer - the custom t-shirt wearing CEO who went from Nintendo to Network Security</itunes:title>
      <itunes:author>Charles Shirer, Jack Clabby, Ernie Ferraresso, Cyber Florida, Devin Malice, Rex Wilson, Sarina Gandy, Carlton Fields, mega man, zelda, pac-man, @BSDBandit, Angela Litan, Scott Wachtler</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/d43689d3-22e4-45dd-97ad-4c2145bc601b/e0ee192e-4e32-4caa-8574-e08f6febc44c/3000x3000/charles-episode-art.jpg?aid=rss_feed"/>
      <itunes:duration>01:00:28</itunes:duration>
      <itunes:summary>Charles Shirer is the Chief Executive Officer of GlobalWave Consulting, an IT and cybersecurity consultancy. Known as the @bsdbandit to his 20,000+ Twitter followers, Charles is often considered the most positive person in cybersecurity (and for good reason!). In this episode, Charles joins the No Password Required team to tell us about how his childhood love for video games led to his passion for everything computer-related, what inspires him to share motivational messages on Twitter, and the importance of striving for a positive mindset in life. Jack and Ernie discuss the United Kingdom’s potential privacy enforcement against TikTok, and the regulatory regime for collecting the personal data of minors. </itunes:summary>
      <itunes:subtitle>Charles Shirer is the Chief Executive Officer of GlobalWave Consulting, an IT and cybersecurity consultancy. Known as the @bsdbandit to his 20,000+ Twitter followers, Charles is often considered the most positive person in cybersecurity (and for good reason!). In this episode, Charles joins the No Password Required team to tell us about how his childhood love for video games led to his passion for everything computer-related, what inspires him to share motivational messages on Twitter, and the importance of striving for a positive mindset in life. Jack and Ernie discuss the United Kingdom’s potential privacy enforcement against TikTok, and the regulatory regime for collecting the personal data of minors. </itunes:subtitle>
      <itunes:keywords>voltron, cybersecurity culture, pumkin spice latte, twitter, globalwave consulting, happiness, ow yip yip!, mentor, mega man, leadership, video games, cybersecurity, positive mindset, ninja turtles, tang, infosec, mentorship, ceo, ecto cooler, overcoming obstacles, tiktok, nintendo, sweet potato pie, legend of zelda, hacking</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>30</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">87ae7b6f-a68a-4709-a81c-3fa6ca95ff1c</guid>
      <title>Kayley Melton - the Bob Ross of infosec, whose secretive job at KnowBe4 solves cybersecurity’s most-urgent issues with creativity</title>
      <description><![CDATA[Kayley Melton is the Vice President of Security Awareness Company Courseware and Labs at KnowBe4. Although she can’t share too much about what the "labs" portion of her job entails, let's face it, the secrecy makes her even cooler. Kayley joins the No Password Required team to tell us about her journey from an Appalachian farm to fine arts major at a self-described “bougie” college, and from there to VP at a leading security awareness company and the challenges that she overcame to get there. Kayley also shares the story of how a Craigslist ad changed her life, who the Chewbacca is to her Han Solo, and the lessons she’s had to learn as a woman in this industry. Ernie, Jack, and Pablo discuss something likely to shock 90s babies; the cybercriminal “TarTarX” has stolen the data of 69 million Neopets users. 
]]></description>
      <pubDate>Wed, 7 Sep 2022 04:05:00 +0000</pubDate>
      <author>rex2@cyberflorida.org (Kayley Melton, Chewbacca, Han Solo, KnowBe4, Neopets, Ernie Ferraresso, Rex Wilson, Cyber Florida, Jack Clabby, Sarina Gandy, Carlton Fields, Scott Wachtler, Pablo Torres, Devin Malice, Angela Litan)</author>
      <link>https://no-password-required.simplecast.com/episodes/kayley-melton-the-bob-ross-of-infosec-whose-secretive-job-at-knowbe4-solves-cybersecuritys-most-urgent-issues-with-creativity-HXBye1gN</link>
      <enclosure length="61462553" type="audio/mpeg" url="https://dts.podtrac.com/redirect.mp3/cdn.simplecast.com/audio/ba5244e0-cb0d-4762-b681-e884e01b43fb/episodes/2e6d2535-59e7-4420-832d-9af90894be1f/audio/e1da4fe7-45bd-4f18-994d-71487f55a9fb/default_tc.mp3?aid=rss_feed&amp;feed=YGJgknbK"/>
      <itunes:title>Kayley Melton - the Bob Ross of infosec, whose secretive job at KnowBe4 solves cybersecurity’s most-urgent issues with creativity</itunes:title>
      <itunes:author>Kayley Melton, Chewbacca, Han Solo, KnowBe4, Neopets, Ernie Ferraresso, Rex Wilson, Cyber Florida, Jack Clabby, Sarina Gandy, Carlton Fields, Scott Wachtler, Pablo Torres, Devin Malice, Angela Litan</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/d43689d3-22e4-45dd-97ad-4c2145bc601b/67c15762-588d-44de-b7aa-ba891ba21cb0/3000x3000/kayley-episode-art.jpg?aid=rss_feed"/>
      <itunes:duration>01:04:00</itunes:duration>
      <itunes:summary>Kayley Melton is the Vice President of Security Awareness Company Courseware and Labs at KnowBe4. Although she can’t share too much about what the &quot;labs&quot; portion of her job entails, let&apos;s face it, the secrecy makes her even cooler. Kayley joins the No Password Required team to tell us about her journey from an Appalachian farm to fine arts major at a self-described “bougie” college, and from there to VP at a leading security awareness company and the challenges that she overcame to get there. Kayley also shares the story of how a Craigslist ad changed her life, who the Chewbacca is to her Han Solo, and the lessons she’s had to learn as a woman in this industry. Ernie, Jack, and Pablo discuss something likely to shock 90s babies; the cybercriminal “TarTarX” has stolen the data of 69 million Neopets users.</itunes:summary>
      <itunes:subtitle>Kayley Melton is the Vice President of Security Awareness Company Courseware and Labs at KnowBe4. Although she can’t share too much about what the &quot;labs&quot; portion of her job entails, let&apos;s face it, the secrecy makes her even cooler. Kayley joins the No Password Required team to tell us about her journey from an Appalachian farm to fine arts major at a self-described “bougie” college, and from there to VP at a leading security awareness company and the challenges that she overcame to get there. Kayley also shares the story of how a Craigslist ad changed her life, who the Chewbacca is to her Han Solo, and the lessons she’s had to learn as a woman in this industry. Ernie, Jack, and Pablo discuss something likely to shock 90s babies; the cybercriminal “TarTarX” has stolen the data of 69 million Neopets users.</itunes:subtitle>
      <itunes:keywords>cybersecurity culture, nft, happiness, team, top secret, technology, mentor, chewbacca, leadership, craig&apos;s list, cybersecurity, problem solving, script kiddie, neopets, design, star trek, appalachian mountains, infosec, r and d, mentorship, han solo, overcoming obstacles, star wars, education, research, knowbe4, hacking, bougie, privacy, art</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>29</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">caa69c14-5841-42fd-9c12-31ee457e3c84</guid>
      <title>Serge Jorgensen - the sailing CTO of Sylint Group who routinely defends against nation-state attacks on critical infrastructure</title>
      <description><![CDATA[Serge Jorgensen is a founding partner and CTO at Sylint Group, where he provides response and remediation guidance on international espionage incidents, cyber-security attacks, and counter cyber-warfare. An engineer by training, he has a bias for action over theory. In this episode, Serge joins the No Password Required team to talk about his time in the industry, his experience coaching sailing at the Paralympic Games, and his favorite childhood toy. Ernie, Jack, and Pablo discuss the cybercriminals that are posing as Twitter employees and journalists to breach academic and Middle East policy data. In the Technologue segment, Pablo teaches the team the history of the world’s largest hacking competition, DEF CON. 
]]></description>
      <pubDate>Wed, 17 Aug 2022 04:05:00 +0000</pubDate>
      <author>rex2@cyberflorida.org (Devin Malice, Angela Litan, Serge Jorgensen, Ernie Ferraresso, Pablo Torres, Sarina Gandy, Rex Wilson, Jack Clabby, Winn Schwartau, Jeff Moss, Sylint Group, Carlton Fields, Cyber Florida)</author>
      <link>https://no-password-required.simplecast.com/episodes/serge-jorgensen-the-action-over-theory-cto-of-sylint-group-who-routinely-defends-against-nation-state-attacks-on-critical-infrastructure-9iETdmSU</link>
      <enclosure length="66815952" type="audio/mpeg" url="https://dts.podtrac.com/redirect.mp3/cdn.simplecast.com/audio/ba5244e0-cb0d-4762-b681-e884e01b43fb/episodes/50959fdf-2771-4b99-8a1c-a684a5e37375/audio/0143bf09-1f3f-4368-99e0-2fd9b6e1fb3c/default_tc.mp3?aid=rss_feed&amp;feed=YGJgknbK"/>
      <itunes:title>Serge Jorgensen - the sailing CTO of Sylint Group who routinely defends against nation-state attacks on critical infrastructure</itunes:title>
      <itunes:author>Devin Malice, Angela Litan, Serge Jorgensen, Ernie Ferraresso, Pablo Torres, Sarina Gandy, Rex Wilson, Jack Clabby, Winn Schwartau, Jeff Moss, Sylint Group, Carlton Fields, Cyber Florida</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/d43689d3-22e4-45dd-97ad-4c2145bc601b/d2eb555a-be52-4327-a257-218399bb08d4/3000x3000/serge-episode-art.jpg?aid=rss_feed"/>
      <itunes:duration>01:09:34</itunes:duration>
      <itunes:summary>Serge Jorgensen is a founding partner and CTO at Sylint Group, where he provides response and remediation guidance on international espionage incidents, cyber-security attacks, and counter cyber-warfare. An engineer by training, he has a bias for action over theory. In this episode, Serge joins the No Password Required team to talk about his time in the industry, his experience coaching sailing at the Paralympic Games, and his favorite childhood toy. Ernie, Jack, and Pablo discuss the cybercriminals that are posing as Twitter employees and journalists to breach academic and Middle East policy data. In the Technologue segment, Pablo teaches the team the history of the world’s largest hacking competition, DEF CON.</itunes:summary>
      <itunes:subtitle>Serge Jorgensen is a founding partner and CTO at Sylint Group, where he provides response and remediation guidance on international espionage incidents, cyber-security attacks, and counter cyber-warfare. An engineer by training, he has a bias for action over theory. In this episode, Serge joins the No Password Required team to talk about his time in the industry, his experience coaching sailing at the Paralympic Games, and his favorite childhood toy. Ernie, Jack, and Pablo discuss the cybercriminals that are posing as Twitter employees and journalists to breach academic and Middle East policy data. In the Technologue segment, Pablo teaches the team the history of the world’s largest hacking competition, DEF CON.</itunes:subtitle>
      <itunes:keywords>international espionage, technologue, entrepreneur, cto, risk, leadership, success, cybersecurity, problem solving, def con, payment card security, paralympic games, infosec, sylint group, hacking, bad coffee, pizza, middle east policy</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>28</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">0f4a3d94-5d9f-4b73-a12d-0a32d9c5e81b</guid>
      <title>Tashya Denose (aka the Cyber Whisperer) - Senior Manager of Cybersecurity Analysis at Capital One and a builder of the most rad relationships in cyber</title>
      <description><![CDATA[Tashya Denose is a Senior Manager of Cybersecurity Analysis at Capital One. In this episode, Tashya joins the No Password Required team to discuss the state of the cybersecurity pipeline and what needs to be done and a LOT of other rad stuff (including her feelings about the word “rad” making a comeback!) Ernie, Jack, and Pablo discuss the rogue freelancers that were taking advantage of remote work opportunities to hide their true identities and earn money for North Korea. Pablo presents the new Technologue game show where the team attempts to answer questions about the first-ever computer worm. 
]]></description>
      <pubDate>Wed, 6 Jul 2022 04:05:00 +0000</pubDate>
      <author>rex2@cyberflorida.org (Tashya Denose, Scott Wachtler, Rex Wilson, Sarina Gandy, Ernie Ferraresso, Ted Esposito, Pablo Torres, Jack Clabby)</author>
      <link>https://no-password-required.simplecast.com/episodes/tashya-denose-aka-the-cyber-whisperer-senior-manager-of-cybersecurity-analysis-at-capital-one-and-a-builder-of-the-most-rad-relationships-in-cyber-LfizCOhw</link>
      <enclosure length="70646482" type="audio/mpeg" url="https://dts.podtrac.com/redirect.mp3/cdn.simplecast.com/audio/ba5244e0-cb0d-4762-b681-e884e01b43fb/episodes/efa3aebe-feed-40d3-8c0b-1c13dd56b024/audio/38e6d160-a3dc-4130-8213-5878850b2889/default_tc.mp3?aid=rss_feed&amp;feed=YGJgknbK"/>
      <itunes:title>Tashya Denose (aka the Cyber Whisperer) - Senior Manager of Cybersecurity Analysis at Capital One and a builder of the most rad relationships in cyber</itunes:title>
      <itunes:author>Tashya Denose, Scott Wachtler, Rex Wilson, Sarina Gandy, Ernie Ferraresso, Ted Esposito, Pablo Torres, Jack Clabby</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/d43689d3-22e4-45dd-97ad-4c2145bc601b/2eddfbe7-0015-42de-8fb2-11608a3d5d75/3000x3000/tashya-episode-art.jpg?aid=rss_feed"/>
      <itunes:duration>01:13:34</itunes:duration>
      <itunes:summary>Tashya Denose is a Senior Manager of Cybersecurity Analysis at Capital One. In this episode, Tashya joins the No Password Required team to discuss the state of the cybersecurity pipeline and what needs to be done and a LOT of other rad stuff (including her feelings about the word “rad” making a comeback!) Ernie, Jack, and Pablo discuss the rogue freelancers that were taking advantage of remote work opportunities to hide their true identities and earn money for North Korea. Pablo presents the new Technologue game show where the team attempts to answer questions about the first-ever computer worm.</itunes:summary>
      <itunes:subtitle>Tashya Denose is a Senior Manager of Cybersecurity Analysis at Capital One. In this episode, Tashya joins the No Password Required team to discuss the state of the cybersecurity pipeline and what needs to be done and a LOT of other rad stuff (including her feelings about the word “rad” making a comeback!) Ernie, Jack, and Pablo discuss the rogue freelancers that were taking advantage of remote work opportunities to hide their true identities and earn money for North Korea. Pablo presents the new Technologue game show where the team attempts to answer questions about the first-ever computer worm.</itunes:subtitle>
      <itunes:keywords>fashion, cyber, pipeline, rad, cybersecurity, swanky, education, confidence</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>27</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">a1e12e5b-3cb3-4724-aee1-72b1d915007c</guid>
      <title>Vice Admiral Mike McConnell - the former NSA director, an elite storyteller whose life resembles a Grisham novel, and an appreciator of formaldehyde-free beer</title>
      <description><![CDATA[Vice Admiral Mike McConnell is the former director of the National Security Agency (NSA) and the current Executive Director of Cyber Florida. In this two-part episode, VADM McConnell stuns the No Password Required team to silence with stories of his life, which just so happens to resemble a riveting Grisham novel. A few highlights include the reason he refuses to drink cheap beer (or formaldehyde), some iconic moments during his time at the NSA, and more. Ernie, Jack, and Pablo break down the Strengthening Cybersecurity Act and the biggest commitment one can make: cowboy boots. In the Technologue segment, Pablo discusses the importance of cloud vulnerability evolution. 
]]></description>
      <pubDate>Wed, 8 Jun 2022 04:05:00 +0000</pubDate>
      <author>rex2@cyberflorida.org (Mike McConnell, Jack Clabby, Ernie Ferraresso, Pablo Torres, Sarina Gandy, Rex Wilson, Scott Wachtler, Ted Esposito)</author>
      <link>https://no-password-required.simplecast.com/episodes/vice-admiral-mike-mcconnell-the-former-nsa-director-an-elite-storyteller-whose-life-resembles-a-grisham-novel-and-an-appreciator-of-formaldehyde-free-beer-jU9qWtgp</link>
      <enclosure length="90288487" type="audio/mpeg" url="https://dts.podtrac.com/redirect.mp3/cdn.simplecast.com/audio/ba5244e0-cb0d-4762-b681-e884e01b43fb/episodes/02846101-dd8c-479e-b5a7-a0856579fd3f/audio/97c1bc6e-626a-4722-910e-0b44ac61b678/default_tc.mp3?aid=rss_feed&amp;feed=YGJgknbK"/>
      <itunes:title>Vice Admiral Mike McConnell - the former NSA director, an elite storyteller whose life resembles a Grisham novel, and an appreciator of formaldehyde-free beer</itunes:title>
      <itunes:author>Mike McConnell, Jack Clabby, Ernie Ferraresso, Pablo Torres, Sarina Gandy, Rex Wilson, Scott Wachtler, Ted Esposito</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/d43689d3-22e4-45dd-97ad-4c2145bc601b/78c142b8-ebfa-44ee-8002-54af3ba6fb1f/3000x3000/mm-episode-art.jpg?aid=rss_feed"/>
      <itunes:duration>01:34:02</itunes:duration>
      <itunes:summary>Vice Admiral Mike McConnell is the former director of the National Security Agency (NSA) and the current Executive Director of Cyber Florida. In this two-part episode, VADM McConnell stuns the No Password Required team to silence with stories of his life, which just so happens to resemble a riveting Grisham novel. A few highlights include the reason he refuses to drink cheap beer (or formaldehyde), some iconic moments during his time at the NSA, and more. Ernie, Jack, and Pablo break down the Strengthening Cybersecurity Act and the biggest commitment one can make: cowboy boots. In the Technologue segment, Pablo discusses the importance of cloud vulnerability evolution.</itunes:summary>
      <itunes:subtitle>Vice Admiral Mike McConnell is the former director of the National Security Agency (NSA) and the current Executive Director of Cyber Florida. In this two-part episode, VADM McConnell stuns the No Password Required team to silence with stories of his life, which just so happens to resemble a riveting Grisham novel. A few highlights include the reason he refuses to drink cheap beer (or formaldehyde), some iconic moments during his time at the NSA, and more. Ernie, Jack, and Pablo break down the Strengthening Cybersecurity Act and the biggest commitment one can make: cowboy boots. In the Technologue segment, Pablo discusses the importance of cloud vulnerability evolution.</itunes:subtitle>
      <itunes:keywords>formaldehyde, storytime, history, vice admiral, cybersecurity, grisham</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>25</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">44644da3-061d-4eea-bbfd-39ca3ef024ba</guid>
      <title>Vice Admiral Mike McConnell BONUS Episode - the former NSA director, an elite storyteller whose life resembles a Grisham novel, and an appreciator of formaldehyde-free beer</title>
      <description><![CDATA[Vice Admiral Mike McConnell is the former director of the National Security Agency (NSA) and the current Executive Director of Cyber Florida. In this two-part episode, VADM McConnell stuns the No Password Required team to silence with stories of his life, which just so happens to resemble a riveting Grisham novel. A few highlights include the reason he refuses to drink cheap beer (or formaldehyde), some iconic moments during his time at the NSA, and more. Ernie, Jack, and Pablo break down the Strengthening Cybersecurity Act and the biggest commitment one can make: cowboy boots. In the Technologue segment, Pablo discusses the importance of cloud vulnerability evolution. 
]]></description>
      <pubDate>Wed, 8 Jun 2022 04:05:00 +0000</pubDate>
      <author>rex2@cyberflorida.org (Mike McConnell, Rex Wilson, Jack Clabby, Ernie Ferraresso, Pablo Torres, Sarina Gandy, Ted Esposito, Scott Wachtler)</author>
      <link>https://no-password-required.simplecast.com/episodes/vice-admiral-mike-mcconnell-bonus-episode-the-former-nsa-director-an-elite-storyteller-whose-life-resembles-a-grisham-novel-and-an-appreciator-of-formaldehyde-free-beer-jN0hQW3A</link>
      <enclosure length="14268885" type="audio/mpeg" url="https://dts.podtrac.com/redirect.mp3/cdn.simplecast.com/audio/ba5244e0-cb0d-4762-b681-e884e01b43fb/episodes/bf708bfe-a68d-4824-aea9-6834ccb2a3ac/audio/008e5f5c-2faa-4763-9d82-0b8e00e4755d/default_tc.mp3?aid=rss_feed&amp;feed=YGJgknbK"/>
      <itunes:title>Vice Admiral Mike McConnell BONUS Episode - the former NSA director, an elite storyteller whose life resembles a Grisham novel, and an appreciator of formaldehyde-free beer</itunes:title>
      <itunes:author>Mike McConnell, Rex Wilson, Jack Clabby, Ernie Ferraresso, Pablo Torres, Sarina Gandy, Ted Esposito, Scott Wachtler</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/d43689d3-22e4-45dd-97ad-4c2145bc601b/97e35981-29ab-4160-96a7-d6d4fdfffede/3000x3000/mm-episode-art.jpg?aid=rss_feed"/>
      <itunes:duration>00:14:51</itunes:duration>
      <itunes:summary>Vice Admiral Mike McConnell is the former director of the National Security Agency (NSA) and the current Executive Director of Cyber Florida. In this two-part episode, VADM McConnell stuns the No Password Required team to silence with stories of his life, which just so happens to resemble a riveting Grisham novel. A few highlights include the reason he refuses to drink cheap beer (or formaldehyde), some iconic moments during his time at the NSA, and more. Ernie, Jack, and Pablo break down the Strengthening Cybersecurity Act and the biggest commitment one can make: cowboy boots. In the Technologue segment, Pablo discusses the importance of cloud vulnerability evolution.</itunes:summary>
      <itunes:subtitle>Vice Admiral Mike McConnell is the former director of the National Security Agency (NSA) and the current Executive Director of Cyber Florida. In this two-part episode, VADM McConnell stuns the No Password Required team to silence with stories of his life, which just so happens to resemble a riveting Grisham novel. A few highlights include the reason he refuses to drink cheap beer (or formaldehyde), some iconic moments during his time at the NSA, and more. Ernie, Jack, and Pablo break down the Strengthening Cybersecurity Act and the biggest commitment one can make: cowboy boots. In the Technologue segment, Pablo discusses the importance of cloud vulnerability evolution.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>26</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">97c4fbaa-3b84-4140-a884-62908eed498d</guid>
      <title>Dr. Melissa Dark – a cybersecurity education specialist, whose passions include the forest, DIY, and deviled eggs</title>
      <description><![CDATA[Dr. Melissa Dark is the Founder of DARK Enterprises, a non-profit organization dedicated to developing and supporting cybersecurity education at the secondary level. Before that, Dr. Dark worked in graduate and college cybersecurity education for over 20 years, as a professor at Purdue University. In this episode, Dr. Dark joins the No Password Required team to discuss her career in “training the trainers,” the early days of cybersecurity education as an academic subject, and how to encourage cybersecurity awareness among today’s students. Ernie and Jack discuss the Pinellas Park, Florida, cybersecurity analyst alleged to have stolen almost $600,000 in cryptocurrency and how he supposedly did it. 
]]></description>
      <pubDate>Wed, 11 May 2022 04:00:00 +0000</pubDate>
      <author>rex2@cyberflorida.org (Dr. Melissa Dark, Jack Clabby, Ernie Ferraresso, Scott Wachtler, Sarina Gandy, Ted Esposito, Rex Wilson, Cyber Florida, Carlton Fields, DARK Enterprises)</author>
      <link>https://no-password-required.simplecast.com/episodes/dr-melissa-dark-a-cybersecurity-education-specialist-whose-passions-include-the-forest-diy-and-deviled-eggs-sV6kSZPT</link>
      <enclosure length="86741263" type="audio/mpeg" url="https://dts.podtrac.com/redirect.mp3/cdn.simplecast.com/audio/ba5244e0-cb0d-4762-b681-e884e01b43fb/episodes/079b30d6-f2e3-490a-a457-ec5dad5158e5/audio/60c0137b-bf06-4f2e-91a1-e6ce7218ad32/default_tc.mp3?aid=rss_feed&amp;feed=YGJgknbK"/>
      <itunes:title>Dr. Melissa Dark – a cybersecurity education specialist, whose passions include the forest, DIY, and deviled eggs</itunes:title>
      <itunes:author>Dr. Melissa Dark, Jack Clabby, Ernie Ferraresso, Scott Wachtler, Sarina Gandy, Ted Esposito, Rex Wilson, Cyber Florida, Carlton Fields, DARK Enterprises</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/d43689d3-22e4-45dd-97ad-4c2145bc601b/195053e0-3c6a-4a50-a06f-24d0ed681b0d/3000x3000/melissa-episode-art.jpg?aid=rss_feed"/>
      <itunes:duration>01:00:18</itunes:duration>
      <itunes:summary>Dr. Melissa Dark is the Founder of DARK Enterprises, a non-profit organization dedicated to developing and supporting cybersecurity education at the secondary level. Before that, Dr. Dark worked in graduate and college cybersecurity education for over 20 years, as a professor at Purdue University. In this episode, Dr. Dark joins the No Password Required team to discuss her career in “training the trainers,” the early days of cybersecurity education as an academic subject, and how to encourage cybersecurity awareness among today’s students. Ernie and Jack discuss the Pinellas Park, Florida, cybersecurity analyst alleged to have stolen almost $600,000 in cryptocurrency and how he supposedly did it.</itunes:summary>
      <itunes:subtitle>Dr. Melissa Dark is the Founder of DARK Enterprises, a non-profit organization dedicated to developing and supporting cybersecurity education at the secondary level. Before that, Dr. Dark worked in graduate and college cybersecurity education for over 20 years, as a professor at Purdue University. In this episode, Dr. Dark joins the No Password Required team to discuss her career in “training the trainers,” the early days of cybersecurity education as an academic subject, and how to encourage cybersecurity awareness among today’s students. Ernie and Jack discuss the Pinellas Park, Florida, cybersecurity analyst alleged to have stolen almost $600,000 in cryptocurrency and how he supposedly did it.</itunes:subtitle>
      <itunes:keywords>entrepreneur, leadership, nature, success, cybersecurity, deviled eggs, higher education, infosec, mentorship, ceo, trees, education, k-12, purdue university, ciso, hacking, information security professional</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>24</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">b5d064bd-92b4-4a29-a0db-bf63d7e49381</guid>
      <title>Thomas Vaughn - the philosopher CISO of Tallahassee who lives to help other people</title>
      <description><![CDATA[Thomas Vaughn is the current Chief Information Security Officer (CISO) of the City of Tallahassee and the former CISO of Florida. A kindhearted introvert who began his career in the Army and then the U.S. Coast Guard, Thomas thrives on helping other people however he can, whether it’s with cybersecurity practices or serving as a volunteer fireman in his spare time. In this episode, Thomas joins the No Password Required team to talk about his journey from the military to cybersecurity, the top-tier candy that he can’t live without, and the philosophical lessons that he carries with him throughout his life. Ernie, Jack, and Pablo discuss the UCF student who created an algorithm to track Elon Musk’s private jet. In the Technologue segment, Pablo explains web tracking and what it means for the everyday internet user.   
]]></description>
      <pubDate>Tue, 1 Mar 2022 05:05:00 +0000</pubDate>
      <author>rex2@cyberflorida.org (Sarina Gandy, Rex Wilson, Jack Clabby, Pablo Torres, Ernie Ferraresso, Scott Wachtler, Ted Esposito)</author>
      <link>https://no-password-required.simplecast.com/episodes/thomas-vaughn-the-philosopher-ciso-of-tallahassee-who-lives-to-help-other-people-vfF_SF8e</link>
      <enclosure length="57850733" type="audio/mpeg" url="https://dts.podtrac.com/redirect.mp3/cdn.simplecast.com/audio/ba5244e0-cb0d-4762-b681-e884e01b43fb/episodes/f2cf67a7-b4d0-4eef-b901-70ff2085b70d/audio/1c8b04bb-282c-4053-97d4-05d5ec769377/default_tc.mp3?aid=rss_feed&amp;feed=YGJgknbK"/>
      <itunes:title>Thomas Vaughn - the philosopher CISO of Tallahassee who lives to help other people</itunes:title>
      <itunes:author>Sarina Gandy, Rex Wilson, Jack Clabby, Pablo Torres, Ernie Ferraresso, Scott Wachtler, Ted Esposito</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/d43689d3-22e4-45dd-97ad-4c2145bc601b/b9fb2539-1f6e-4315-a690-93f28af02fb2/3000x3000/thomas-episode-art.jpg?aid=rss_feed"/>
      <itunes:duration>01:00:15</itunes:duration>
      <itunes:summary>Thomas Vaughn is the current Chief Information Security Officer (CISO) of the City of Tallahassee and the former CISO of Florida. A kindhearted introvert who began his career in the Army and then the U.S. Coast Guard, Thomas thrives on helping other people however he can, whether it’s with cybersecurity practices or serving as a volunteer fireman in his spare time. In this episode, Thomas joins the No Password Required team to talk about his journey from the military to cybersecurity, the top-tier candy that he can’t live without, and the philosophical lessons that he carries with him throughout his life. Ernie, Jack, and Pablo discuss the UCF student who created an algorithm to track Elon Musk’s private jet. In the Technologue segment, Pablo explains web tracking and what it means for the everyday internet user.  </itunes:summary>
      <itunes:subtitle>Thomas Vaughn is the current Chief Information Security Officer (CISO) of the City of Tallahassee and the former CISO of Florida. A kindhearted introvert who began his career in the Army and then the U.S. Coast Guard, Thomas thrives on helping other people however he can, whether it’s with cybersecurity practices or serving as a volunteer fireman in his spare time. In this episode, Thomas joins the No Password Required team to talk about his journey from the military to cybersecurity, the top-tier candy that he can’t live without, and the philosophical lessons that he carries with him throughout his life. Ernie, Jack, and Pablo discuss the UCF student who created an algorithm to track Elon Musk’s private jet. In the Technologue segment, Pablo explains web tracking and what it means for the everyday internet user.  </itunes:subtitle>
      <itunes:keywords>cyberattack, cyber, cybersecurity education, technologue, cybersecurity podcast, technology, cybercrime, elon musk, computer science, cybersecurity, science fantasy, star trek, science fiction, infosec, skittles</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>22</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">4f74e512-474f-46cb-8d2b-5467f012dd83</guid>
      <title>Chase Fopiano - a kindhearted former police officer who embodies all the qualities of a great leader</title>
      <description><![CDATA[]]></description>
      <pubDate>Fri, 28 Jan 2022 05:05:00 +0000</pubDate>
      <author>rex2@cyberflorida.org (Grand Admiral Thrawn, Yoda, Jack Clabby, Ernie Ferraresso, Pablo Torres, Sarina Gandy, Rex Wilson, Ted Esposito, Jar Jar Binks, john wooden, Scott Wachtler)</author>
      <link>https://no-password-required.simplecast.com/episodes/chase-fopiano-a-kindhearted-former-police-officer-who-embodies-all-the-qualities-of-a-great-leader-Nqh5VNlC</link>
      <content:encoded><![CDATA[]]></content:encoded>
      <enclosure length="63472020" type="audio/mpeg" url="https://dts.podtrac.com/redirect.mp3/cdn.simplecast.com/audio/ba5244e0-cb0d-4762-b681-e884e01b43fb/episodes/3824616a-6934-465c-8e1a-41965c821321/audio/3c0c9369-01d8-453a-8881-cd73d1583203/default_tc.mp3?aid=rss_feed&amp;feed=YGJgknbK"/>
      <itunes:title>Chase Fopiano - a kindhearted former police officer who embodies all the qualities of a great leader</itunes:title>
      <itunes:author>Grand Admiral Thrawn, Yoda, Jack Clabby, Ernie Ferraresso, Pablo Torres, Sarina Gandy, Rex Wilson, Ted Esposito, Jar Jar Binks, john wooden, Scott Wachtler</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/d43689d3-22e4-45dd-97ad-4c2145bc601b/1b0387b5-54cf-4669-bc0a-a6f5ef70060d/3000x3000/chase-episode-art.jpg?aid=rss_feed"/>
      <itunes:duration>01:06:07</itunes:duration>
      <itunes:summary>Chase Fopiano is the Founder of CyberTech Analytics, a cybersecurity provider that combines the worlds of both law enforcement and information security. Chase began his career as a police officer before diving headfirst into the cybersecurity world, and has since carried the lessons he learned during that time into both his life and his career. In this episode, Chase joins the No Password Required team to talk about the moment he decided to make the change to cybersecurity, his passion for learning and how it has helped him succeed, and why Yoda is the character he most relates to in life. Ernie, Jack, and Pablo discuss the cybercrime gang FIN7 and their recent attacks using malicious USB sticks designed to deliver ransomware. In the new Technologue segment, Pablo discusses the Voldemort of cyber-vulnerabilities, Log4j.</itunes:summary>
      <itunes:subtitle>Chase Fopiano is the Founder of CyberTech Analytics, a cybersecurity provider that combines the worlds of both law enforcement and information security. Chase began his career as a police officer before diving headfirst into the cybersecurity world, and has since carried the lessons he learned during that time into both his life and his career. In this episode, Chase joins the No Password Required team to talk about the moment he decided to make the change to cybersecurity, his passion for learning and how it has helped him succeed, and why Yoda is the character he most relates to in life. Ernie, Jack, and Pablo discuss the cybercrime gang FIN7 and their recent attacks using malicious USB sticks designed to deliver ransomware. In the new Technologue segment, Pablo discusses the Voldemort of cyber-vulnerabilities, Log4j.</itunes:subtitle>
      <itunes:keywords>noles, cybersecurity culture, cyberattack, florida state, gm, twitter, technologue, happiness, team, books, police, technology, mentor, cybercrime, vciso, fsu, leadership, law, robert langdon, computer science, log4j, care, cybersecurity, jar jar binks, employee recruitment, work-life balance, nerd culture, ransomware, infosec, dad life, ceo, golden eye, family, star wars, john wooden, law enforcement, tampa, tough guy, privacy, information security professional</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>21</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">26bb9377-64d9-4fef-956e-4b3ea6e095c1</guid>
      <title>Debbie Janeczek — Cyber Threat Management Leader at Wells Fargo who has a passion for the Goonies, adventure, and the shores of Lake Superior</title>
      <description><![CDATA[Debbie Janeczek is the Cyber Threat Management Leader and Technology Executive at Wells Fargo. At her core, Debbie is an outdoorswoman who is passionate about conquering the mountains of Colorado and beyond with her sidekick, her dog, Jack. In this episode, Debbie joins the No Password Required team to talk about her journey from becoming a Naval Intelligence officer where she hated all things cybersecurity to becoming a leader in the industry thanks to inspiration from the great leaders surrounding her (lucky for us!) Debbie is passionate about practicing mindfulness and embracing nature to maintain a healthy work-life balance and stay grounded in the chaos of the ever-changing cybersecurity world. Ernie and Jack (co-host Jack, not dog Jack) discuss the relaunching of the darknet market AlphaBay by one of the previous founders who escaped the bust in 2017, DeSnake, and the long-standing debate of how exactly to pronounce his name.

Follow us on Facebook, Instagram, Twitter and LinkedIn |  @NoPasswordPod 
]]></description>
      <pubDate>Thu, 9 Dec 2021 05:00:00 +0000</pubDate>
      <author>rex2@cyberflorida.org (Debbie Janeczek, Ernie Ferraresso, Ted Esposito, Jack Clabby, Sarina Gandy, Rex Wilson, Jack the Dog, Gordon Lightfoot)</author>
      <link>https://cyberflorida.org/pod/</link>
      <enclosure length="61334615" type="audio/mpeg" url="https://dts.podtrac.com/redirect.mp3/cdn.simplecast.com/audio/ba5244e0-cb0d-4762-b681-e884e01b43fb/episodes/466d780a-ca13-434f-ad60-b214402da903/audio/249618a0-c387-472a-8205-01d3fb57fa50/default_tc.mp3?aid=rss_feed&amp;feed=YGJgknbK"/>
      <itunes:title>Debbie Janeczek — Cyber Threat Management Leader at Wells Fargo who has a passion for the Goonies, adventure, and the shores of Lake Superior</itunes:title>
      <itunes:author>Debbie Janeczek, Ernie Ferraresso, Ted Esposito, Jack Clabby, Sarina Gandy, Rex Wilson, Jack the Dog, Gordon Lightfoot</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/d43689d3-22e4-45dd-97ad-4c2145bc601b/806a6141-e06f-4b22-a56e-84ee78b4f96a/3000x3000/debbie-episode-art.jpg?aid=rss_feed"/>
      <itunes:duration>01:03:52</itunes:duration>
      <itunes:summary>Debbie Janeczek is the Cyber Threat Management Leader and Technology Executive at Wells Fargo. At her core, Debbie is an outdoorswoman who is passionate about conquering the mountains of Colorado and beyond with her sidekick, her dog, Jack. In this episode, Debbie joins the No Password Required team to talk about her journey from becoming a Naval Intelligence officer where she hated all things cybersecurity to becoming a leader in the industry thanks to inspiration from the great leaders surrounding her (lucky for us!) Debbie is passionate about practicing mindfulness and embracing nature to maintain a healthy work-life balance and stay grounded in the chaos of the ever-changing cybersecurity world. Ernie and Jack (co-host Jack, not dog Jack) discuss the relaunching of the darknet market AlphaBay by one of the previous founders who escaped the bust in 2017, DeSnake, and the long-standing debate of how exactly to pronounce his name.

Follow us on Facebook, Instagram, Twitter and LinkedIn |  @NoPasswordPod</itunes:summary>
      <itunes:subtitle>Debbie Janeczek is the Cyber Threat Management Leader and Technology Executive at Wells Fargo. At her core, Debbie is an outdoorswoman who is passionate about conquering the mountains of Colorado and beyond with her sidekick, her dog, Jack. In this episode, Debbie joins the No Password Required team to talk about her journey from becoming a Naval Intelligence officer where she hated all things cybersecurity to becoming a leader in the industry thanks to inspiration from the great leaders surrounding her (lucky for us!) Debbie is passionate about practicing mindfulness and embracing nature to maintain a healthy work-life balance and stay grounded in the chaos of the ever-changing cybersecurity world. Ernie and Jack (co-host Jack, not dog Jack) discuss the relaunching of the darknet market AlphaBay by one of the previous founders who escaped the bust in 2017, DeSnake, and the long-standing debate of how exactly to pronounce his name.

Follow us on Facebook, Instagram, Twitter and LinkedIn |  @NoPasswordPod</itunes:subtitle>
      <itunes:keywords>hey you guys!, jeep girl, navy, never say die, happiness, team, air force, communication skills, mikey!, cyber threat intelligence, adventure, technology, data assurance, mentor, colorado, global warming, jeep, fort george g. meade, goonies, leadership, nature, cybersecurity, lake superior, beer, rock climbing, work-life balance, bring your experts, worm, minnesota, cyber warfare, wells fargo, picture!, hacking, privacy, information security professional</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>20</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">855a3004-3cfd-4757-a3c5-d75dc533efe0</guid>
      <title>Jack Clabby - the LOST episode that convinced us that Clabby should be on the other side of the interview</title>
      <description><![CDATA[In this lost episode from season 1 of No Password Required, Jack Clabby sits down with hosts Ernie Ferraresso and Bill McQueen to discuss cyber liabilities and the potential legal consequences that businesses face from cybersecurity breaches and, more importantly, what they can do to protect themselves. Note that this episode was recorded on 2/27/2020.

Follow us on Facebook, Instagram, Twitter and LinkedIn |  @NoPasswordPod 
]]></description>
      <pubDate>Mon, 22 Nov 2021 05:05:00 +0000</pubDate>
      <author>rex2@cyberflorida.org (Bill McQueen, Jack Clabby, Ernie Ferraresso, Rex Wilson, Sarina Gandy)</author>
      <link>https://no-password-required.simplecast.com/episodes/jack-clabby-the-lost-episode-that-convinced-us-that-clabby-should-be-on-the-other-side-of-the-interview-Cvs6gBqb</link>
      <enclosure length="47030690" type="audio/mpeg" url="https://dts.podtrac.com/redirect.mp3/cdn.simplecast.com/audio/ba5244e0-cb0d-4762-b681-e884e01b43fb/episodes/bfde4b87-9399-48ed-9802-3666f6f35730/audio/1a22bee8-1880-4bdb-ab54-a0a29eb61847/default_tc.mp3?aid=rss_feed&amp;feed=YGJgknbK"/>
      <itunes:title>Jack Clabby - the LOST episode that convinced us that Clabby should be on the other side of the interview</itunes:title>
      <itunes:author>Bill McQueen, Jack Clabby, Ernie Ferraresso, Rex Wilson, Sarina Gandy</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/d43689d3-22e4-45dd-97ad-4c2145bc601b/16b6c34f-39dd-4c91-832f-27f928dc8450/3000x3000/clabby-friday-website.jpg?aid=rss_feed"/>
      <itunes:duration>00:48:59</itunes:duration>
      <itunes:summary>In this lost episode from season 1 of No Password Required, Jack Clabby sits down with hosts Ernie Ferraresso and Bill McQueen to discuss cyber liabilities and the potential legal consequences that businesses face from cybersecurity breaches and, more importantly, what they can do to protect themselves. Note that this episode was recorded on 2/27/2020.

Follow us on Facebook, Instagram, Twitter and LinkedIn |  @NoPasswordPod</itunes:summary>
      <itunes:subtitle>In this lost episode from season 1 of No Password Required, Jack Clabby sits down with hosts Ernie Ferraresso and Bill McQueen to discuss cyber liabilities and the potential legal consequences that businesses face from cybersecurity breaches and, more importantly, what they can do to protect themselves. Note that this episode was recorded on 2/27/2020.

Follow us on Facebook, Instagram, Twitter and LinkedIn |  @NoPasswordPod</itunes:subtitle>
      <itunes:keywords>cyber law, government, law, insurance, cybersecurity, cybersecurity policies, cyber privacy</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>bonus</itunes:episodeType>
    </item>
    <item>
      <guid isPermaLink="false">37ea974b-e69f-4d59-a66f-5cd28c1f19ed</guid>
      <title>Allan Liska - the No Password Required LOST episode recorded just after everything changed</title>
      <description><![CDATA[In this early-pandemic episode, Allan Liska, a senior security architect at Recorded Future discusses ransomware, why the best cybersecurity advice will almost never land you a talk at Black Hat, and why calling someone JarJar cuts way deeper than calling them a script kitty. The team also discusses Alan's path into the cybersecurity world; we knew the No Password Required tradition of atypical paths into the cyber world was safe when he started his journey with a sociology degree and a willingness to crawl under a desk.

Follow us on Facebook, Instagram, Twitter and LinkedIn |  @NoPasswordPod 
]]></description>
      <pubDate>Mon, 22 Nov 2021 05:05:00 +0000</pubDate>
      <author>rex2@cyberflorida.org (Bill McQueen, Ernie Ferraresso, Rex Wilson, Sarina Gandy, Allan Liska)</author>
      <link>https://cyberflorida.org/pod/</link>
      <enclosure length="46633566" type="audio/mpeg" url="https://dts.podtrac.com/redirect.mp3/cdn.simplecast.com/audio/ba5244e0-cb0d-4762-b681-e884e01b43fb/episodes/a90944b5-1797-4e75-9494-500b48d1496d/audio/6d3664d1-14c7-4445-a987-1e5f8ae6bd19/default_tc.mp3?aid=rss_feed&amp;feed=YGJgknbK"/>
      <itunes:title>Allan Liska - the No Password Required LOST episode recorded just after everything changed</itunes:title>
      <itunes:author>Bill McQueen, Ernie Ferraresso, Rex Wilson, Sarina Gandy, Allan Liska</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/d43689d3-22e4-45dd-97ad-4c2145bc601b/3c1f28cf-a60a-4d46-b7c4-79cf4a221484/3000x3000/liska-friday-website.jpg?aid=rss_feed"/>
      <itunes:duration>00:48:31</itunes:duration>
      <itunes:summary>In this early-pandemic episode, Allan Liska, a senior security architect at Recorded Future discusses ransomware, why the best cybersecurity advice will almost never land you a talk at Black Hat, and why calling someone JarJar cuts way deeper than calling them a script kitty. The team also discusses Alan&apos;s path into the cybersecurity world; we knew the No Password Required tradition of atypical paths into the cyber world was safe when he started his journey with a sociology degree and a willingness to crawl under a desk.

Follow us on Facebook, Instagram, Twitter and LinkedIn |  @NoPasswordPod</itunes:summary>
      <itunes:subtitle>In this early-pandemic episode, Allan Liska, a senior security architect at Recorded Future discusses ransomware, why the best cybersecurity advice will almost never land you a talk at Black Hat, and why calling someone JarJar cuts way deeper than calling them a script kitty. The team also discusses Alan&apos;s path into the cybersecurity world; we knew the No Password Required tradition of atypical paths into the cyber world was safe when he started his journey with a sociology degree and a willingness to crawl under a desk.

Follow us on Facebook, Instagram, Twitter and LinkedIn |  @NoPasswordPod</itunes:subtitle>
      <itunes:keywords>big game hunting, cyberattack, covid, avengers assemble, technology, cybercrime, zoom, recorded future, cybersecurity, ethicalhacking, computerscience, nerd culture, ransomware, credential stuffing, infosec, blue team, red team, citrix, workforce development, script kitty, hacking, privacy</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>bonus</itunes:episodeType>
    </item>
    <item>
      <guid isPermaLink="false">60ffca7f-30a7-422f-b5e5-aa1cc1d0f484</guid>
      <title>Asim Fareeduddin — a child of the 1980s with a knack for storytelling, comedic timing, and building an elite cybersecurity team</title>
      <description><![CDATA[Asim Fareeduddin is the Vice President of IT Security & Regulatory Controls Assurance at the RELX Group. In addition to his impressive professional resume, Asim is a guy who is never afraid to take a chance - from stand-up comedy to teaching masters-level students at Georgia State University; he’s done it all. In this episode, Asim joins the No Password Required team to talk about how he went from an accountant to Vice President of a global company, how becoming a dad has changed him, and his most cherished accomplishment - high-fiving Busta Rhymes at the 2006 B.E.T. Awards. Ernie and Jack talk about why fist bumps have officially surpassed handshakes as the coolest greeting. More importantly, they discuss cyber workforce development and why right now may be the best time for new workers to join the industry.

Follow us on Facebook, Instagram, Twitter and LinkedIn |  @NoPasswordPod 
]]></description>
      <pubDate>Fri, 12 Nov 2021 05:00:00 +0000</pubDate>
      <author>rex2@cyberflorida.org (Jack Clabby, Sarina Gandy, Ernie Ferraresso, Ted Esposito, Rex Wilson, Asim Fareeduddin)</author>
      <link>https://no-password-required.simplecast.com/episodes/asim-fareeduddin-a-child-of-the-1980s-with-a-knack-for-storytelling-comedic-timing-and-building-an-elite-cybersecurity-team-NAINLhlG</link>
      <enclosure length="64146339" type="audio/mpeg" url="https://dts.podtrac.com/redirect.mp3/cdn.simplecast.com/audio/ba5244e0-cb0d-4762-b681-e884e01b43fb/episodes/197acde7-8f4e-45a7-b12c-d30df8415250/audio/5dd87212-5c44-471a-b735-a2342911abfd/default_tc.mp3?aid=rss_feed&amp;feed=YGJgknbK"/>
      <itunes:title>Asim Fareeduddin — a child of the 1980s with a knack for storytelling, comedic timing, and building an elite cybersecurity team</itunes:title>
      <itunes:author>Jack Clabby, Sarina Gandy, Ernie Ferraresso, Ted Esposito, Rex Wilson, Asim Fareeduddin</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/d43689d3-22e4-45dd-97ad-4c2145bc601b/82331719-46ff-4635-830f-231191521aa7/3000x3000/asim-episode-art.jpg?aid=rss_feed"/>
      <itunes:duration>01:06:48</itunes:duration>
      <itunes:summary>Asim Fareeduddin is the Vice President of IT Security &amp; Regulatory Controls Assurance at the RELX Group. In addition to his impressive professional resume, Asim is a guy who is never afraid to take a chance - from stand-up comedy to teaching masters-level students at Georgia State University; he’s done it all. In this episode, Asim joins the No Password Required team to talk about how he went from an accountant to Vice President of a global company, how becoming a dad has changed him, and his most cherished accomplishment - high-fiving Busta Rhymes at the 2006 B.E.T. Awards. Ernie and Jack talk about why fist bumps have officially surpassed handshakes as the coolest greeting. More importantly, they discuss cyber workforce development and why right now may be the best time for new workers to join the industry.

Follow us on Facebook, Instagram, Twitter and LinkedIn |  @NoPasswordPod</itunes:summary>
      <itunes:subtitle>Asim Fareeduddin is the Vice President of IT Security &amp; Regulatory Controls Assurance at the RELX Group. In addition to his impressive professional resume, Asim is a guy who is never afraid to take a chance - from stand-up comedy to teaching masters-level students at Georgia State University; he’s done it all. In this episode, Asim joins the No Password Required team to talk about how he went from an accountant to Vice President of a global company, how becoming a dad has changed him, and his most cherished accomplishment - high-fiving Busta Rhymes at the 2006 B.E.T. Awards. Ernie and Jack talk about why fist bumps have officially surpassed handshakes as the coolest greeting. More importantly, they discuss cyber workforce development and why right now may be the best time for new workers to join the industry.

Follow us on Facebook, Instagram, Twitter and LinkedIn |  @NoPasswordPod</itunes:subtitle>
      <itunes:keywords>retention, relx, applebee&apos;s, cisa, seat filler, communication skills, sox audits, data assurance, comedy, snow skis, georgia state university, computer science, xzibit, trapper keeper, university of florida, cism, cybersecurity, employee recruitment, 2007 bet awards, cipp, dad life, atlanta, big 4, audit, it audit teams, workforce development, busta rhymes, 1990s, data defense, ssn, high-five, transformers, privacy, it security, pimp my ride, cpa</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>19</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">3bd7188d-beeb-46bb-b132-f3d201e737fa</guid>
      <title>Winn Schwartau – an infowar expert who was almost certainly the first to pave the path from rock-and-roll to cybersecurity</title>
      <description><![CDATA[Winn Schwartau is a security, privacy, infowar, and cyber-terrorism expert who has been paving the way in cybersecurity since 1983. He is often referred to as the “Civilian Architect of Information Warfare” and is known for his straight-shooting, no-BS originality. In this episode, Winn joins the No Password Required team to talk about how he went from the world of rock-and-roll to cybersecurity, times when he pissed off the CIA, and why Louis Armstrong wasn't the best teacher he ever had (you read that right!) Ernie, Clabby, and Pablo talk about the reality of cybersecurity policies and employee training. In the Positively Cyber segment, Pablo introduces Snoop Dogg as the Dark Net Intelligence Analyst of our fictitious organization.

Follow us on Facebook, Instagram, Twitter and LinkedIn |  @NoPasswordPod 
]]></description>
      <pubDate>Fri, 8 Oct 2021 04:00:00 +0000</pubDate>
      <author>rex2@cyberflorida.org (Cyber Florida, Winn Schwartau, Snoop Dogg, Ernie Ferraresso, Jack Clabby, Scott Wachtler, Rex Wilson, Ted Esposito, Pablo Torres, Sarina Gandy)</author>
      <link>https://no-password-required.simplecast.com/episodes/winn-schwartau-an-infowar-expert-who-was-almost-certainly-the-first-to-pave-the-path-from-rock-and-roll-to-cybersecurity-8x1RYayF</link>
      <enclosure length="68622777" type="audio/mpeg" url="https://dts.podtrac.com/redirect.mp3/cdn.simplecast.com/audio/ba5244e0-cb0d-4762-b681-e884e01b43fb/episodes/3242509a-2450-46ca-8612-e2411dcb1229/audio/2f13a9df-b2f4-4718-b2e3-b192306cae5f/default_tc.mp3?aid=rss_feed&amp;feed=YGJgknbK"/>
      <itunes:title>Winn Schwartau – an infowar expert who was almost certainly the first to pave the path from rock-and-roll to cybersecurity</itunes:title>
      <itunes:author>Cyber Florida, Winn Schwartau, Snoop Dogg, Ernie Ferraresso, Jack Clabby, Scott Wachtler, Rex Wilson, Ted Esposito, Pablo Torres, Sarina Gandy</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/d43689d3-22e4-45dd-97ad-4c2145bc601b/637cbd4a-2a6a-46fe-aa49-a6312cc90c0e/3000x3000/winn-episode-art.jpg?aid=rss_feed"/>
      <itunes:duration>01:11:28</itunes:duration>
      <itunes:summary>Winn Schwartau is a security, privacy, infowar, and cyber-terrorism expert who has been paving the way in cybersecurity since 1983. He is often referred to as the “Civilian Architect of Information Warfare” and is known for his straight-shooting, no-BS originality. In this episode, Winn joins the No Password Required team to talk about how he went from the world of rock-and-roll to cybersecurity, times when he pissed off the CIA, and why Louis Armstrong wasn&apos;t the best teacher he ever had (you read that right!) Ernie, Clabby, and Pablo talk about the reality of cybersecurity policies and employee training. In the Positively Cyber segment, Pablo introduces Snoop Dogg as the Dark Net Intelligence Analyst of our fictitious organization.

Follow us on Facebook, Instagram, Twitter and LinkedIn |  @NoPasswordPod</itunes:summary>
      <itunes:subtitle>Winn Schwartau is a security, privacy, infowar, and cyber-terrorism expert who has been paving the way in cybersecurity since 1983. He is often referred to as the “Civilian Architect of Information Warfare” and is known for his straight-shooting, no-BS originality. In this episode, Winn joins the No Password Required team to talk about how he went from the world of rock-and-roll to cybersecurity, times when he pissed off the CIA, and why Louis Armstrong wasn&apos;t the best teacher he ever had (you read that right!) Ernie, Clabby, and Pablo talk about the reality of cybersecurity policies and employee training. In the Positively Cyber segment, Pablo introduces Snoop Dogg as the Dark Net Intelligence Analyst of our fictitious organization.

Follow us on Facebook, Instagram, Twitter and LinkedIn |  @NoPasswordPod</itunes:subtitle>
      <itunes:keywords>rock-and-roll, cyberterrorism, phishing, power thinker, information warfare, sac labs, lifestyle polygraph, hacker, social engineering, florida, cia, cybersecurity, snoop dogg, encyclopedia britannica, chief visionary officer, winn schwartau, def con, chaos on the electronic superhighway, black hat, nsa, infosec, security magazine, electronic pearl harbor, dark net, computers, data, password, 2019 issa international hall of fame, knowbe4, hack, tech, privacy, rsa conference, look it up</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>18</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">f19d136a-6c88-490c-ad2a-8f9cd35d79bf</guid>
      <title>Charity Wright - a Cyber Threat Intelligence Analyst who is an expert on social media trolls and Super Mario</title>
      <description><![CDATA[Charity Wright is a Cyber Threat Intelligence Analyst at Recorded Future who specializes in Chinese threats and disinformation. Charity is a Super Mario-loving extrovert who utilizes her research and inferencing skills in both of her full-time jobs; threat analyst and mom. Charity is a Chinese Linguist who often spends her workdays scrolling through social media searching for trolls and Chinese disinformation/propaganda. In this episode, Charity joins the No Password Required team to talk about how she came to be a linguist in the U.S. military, possibilities of where China will go in the future, and why curiosity has been one of the most essential aspects of her career. Ernie, Clabby, and Pablo talk about Clabby’s “Yahoo! news rule” and the channels they use to stay informed in the ever-changing cyber industry. In the Positively Cyber segment, Pablo introduces the sophisticated, yet mysterious, Jay Gatsby as the Chief Financial Officer of our fictitious cybersecurity organization.

Follow us on Facebook, Instagram, Twitter and LinkedIn |  @NoPasswordPod 
]]></description>
      <pubDate>Fri, 3 Sep 2021 04:00:00 +0000</pubDate>
      <author>rex2@cyberflorida.org (Charity Wright, Ernie Ferraresso, Scott Wachtler, Pablo Torres, Ted Esposito, Mario, Jack Clabby, Sarina Gandy, Rex Wilson)</author>
      <link>https://no-password-required.simplecast.com/episodes/charity-wright-a-cyber-threat-intelligence-analyst-who-is-an-expert-on-social-media-trolls-and-super-mario-a0t_276R</link>
      <enclosure length="67109078" type="audio/mpeg" url="https://dts.podtrac.com/redirect.mp3/cdn.simplecast.com/audio/ba5244e0-cb0d-4762-b681-e884e01b43fb/episodes/64be1283-9e35-4232-8ee4-2f81af6c7a0e/audio/2ae785e1-eaa3-41f7-b4cc-9d53c8f0829e/default_tc.mp3?aid=rss_feed&amp;feed=YGJgknbK"/>
      <itunes:title>Charity Wright - a Cyber Threat Intelligence Analyst who is an expert on social media trolls and Super Mario</itunes:title>
      <itunes:author>Charity Wright, Ernie Ferraresso, Scott Wachtler, Pablo Torres, Ted Esposito, Mario, Jack Clabby, Sarina Gandy, Rex Wilson</itunes:author>
      <itunes:duration>01:09:53</itunes:duration>
      <itunes:summary>Charity Wright is a Cyber Threat Intelligence Analyst at Recorded Future who specializes in Chinese threats and disinformation. Charity is a Super Mario-loving extrovert who utilizes her research and inferencing skills in both of her full-time jobs; threat analyst and mom. Charity is a Chinese Linguist who often spends her workdays scrolling through social media searching for trolls and Chinese disinformation/propaganda. In this episode, Charity joins the No Password Required team to talk about how she came to be a linguist in the U.S. military, possibilities of where China will go in the future, and why curiosity has been one of the most essential aspects of her career. Ernie, Clabby, and Pablo talk about Clabby’s “Yahoo! news rule” and the channels they use to stay informed in the ever-changing cyber industry. In the Positively Cyber segment, Pablo introduces the sophisticated, yet mysterious, Jay Gatsby as the Chief Financial Officer of our fictitious cybersecurity organization.

Follow us on Facebook, Instagram, Twitter and LinkedIn |  @NoPasswordPod</itunes:summary>
      <itunes:subtitle>Charity Wright is a Cyber Threat Intelligence Analyst at Recorded Future who specializes in Chinese threats and disinformation. Charity is a Super Mario-loving extrovert who utilizes her research and inferencing skills in both of her full-time jobs; threat analyst and mom. Charity is a Chinese Linguist who often spends her workdays scrolling through social media searching for trolls and Chinese disinformation/propaganda. In this episode, Charity joins the No Password Required team to talk about how she came to be a linguist in the U.S. military, possibilities of where China will go in the future, and why curiosity has been one of the most essential aspects of her career. Ernie, Clabby, and Pablo talk about Clabby’s “Yahoo! news rule” and the channels they use to stay informed in the ever-changing cyber industry. In the Positively Cyber segment, Pablo introduces the sophisticated, yet mysterious, Jay Gatsby as the Chief Financial Officer of our fictitious cybersecurity organization.

Follow us on Facebook, Instagram, Twitter and LinkedIn |  @NoPasswordPod</itunes:subtitle>
      <itunes:keywords>gatsby, soc, female leadership, mitigation, personality, computer technology, keyboard, cyber, china, positively cyber, economy, phishing, federal, lifestyle polygraph, technology, hacker, computer science, video games, mom, switch, cybersecurity, super mario, family, education, computers, intelligence, cyber insurance, computer tech, nation, hack, tech, military</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>17</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">6f663a91-23de-4d84-8dfa-6c89b32d350f</guid>
      <title>Dr. Greg Hall - a Corvette-driving Research Scientist who built his own video games because his dad knew that the Atari 800 was the beginning of the computer revolution</title>
      <description><![CDATA[Dr. Greg Hall is a Research Scientist at the Institute for Human-Machine Cognition and the University of West Florida. Dr. Hall is a Corvette-driving car lover who considers ALF to be one of the classics and has great taste in hats. He also does research in full-spectrum cyber operations and contributes to the Florida Cyber Range, a digital platform that provides training and testing solutions for academic, government, military, and industry. In this episode, Dr. Hall joins the No Password Required team to discuss his research in full-spectrum cyber operations, why the sit-and-spin has made a place in history as the best (and possibly most dangerous) childhood toy, and more. Ernie, Clabby, and Pablo discuss the government’s Rewards for Justice Program and the new $10 million reward for information. In the “Positively Cyber” segment, Pablo challenges Clabby by welcoming Harvey Specter to our fictitious cybersecurity organization as a Privacy and Cybersecurity Lawyer.

Follow us on Facebook, Instagram, Twitter and LinkedIn |  @NoPasswordPod 
]]></description>
      <pubDate>Thu, 29 Jul 2021 21:00:00 +0000</pubDate>
      <author>rex2@cyberflorida.org (Rex Wilson, Scott Wachtler, ALF, Sarina Gandy, Pablo Torres, Ernie Ferraresso, Jack Clabby, Dr. Greg Hall, Ted Esposito)</author>
      <link>https://no-password-required.simplecast.com/episodes/dr-greg-hall-a-corvette-driving-research-scientist-who-built-his-own-video-games-because-his-dad-knew-that-the-atari-800-was-the-beginning-of-the-computer-revolution-tuWqY5J_</link>
      <enclosure length="68856132" type="audio/mpeg" url="https://dts.podtrac.com/redirect.mp3/cdn.simplecast.com/audio/ba5244e0-cb0d-4762-b681-e884e01b43fb/episodes/3c714dad-b35f-42b6-9990-2eb806d7cb27/audio/99581bd9-b110-40a1-896e-bbdae754360a/default_tc.mp3?aid=rss_feed&amp;feed=YGJgknbK"/>
      <itunes:title>Dr. Greg Hall - a Corvette-driving Research Scientist who built his own video games because his dad knew that the Atari 800 was the beginning of the computer revolution</itunes:title>
      <itunes:author>Rex Wilson, Scott Wachtler, ALF, Sarina Gandy, Pablo Torres, Ernie Ferraresso, Jack Clabby, Dr. Greg Hall, Ted Esposito</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/d43689d3-22e4-45dd-97ad-4c2145bc601b/a1d7ac23-48ac-4cec-ba91-ca3c56522870/3000x3000/greg-episode-art.jpg?aid=rss_feed"/>
      <itunes:duration>01:11:42</itunes:duration>
      <itunes:summary>Dr. Greg Hall is a Research Scientist at the Institute for Human-Machine Cognition and the University of West Florida. Dr. Hall is a Corvette-driving car lover who considers ALF to be one of the classics and has great taste in hats. He also does research in full-spectrum cyber operations and contributes to the Florida Cyber Range, a digital platform that provides training and testing solutions for academic, government, military, and industry. In this episode, Dr. Hall joins the No Password Required team to discuss his research in full-spectrum cyber operations, why the sit-and-spin has made a place in history as the best (and possibly most dangerous) childhood toy, and more. Ernie, Clabby, and Pablo discuss the government’s Rewards for Justice Program and the new $10 million reward for information. In the “Positively Cyber” segment, Pablo challenges Clabby by welcoming Harvey Specter to our fictitious cybersecurity organization as a Privacy and Cybersecurity Lawyer.

Follow us on Facebook, Instagram, Twitter and LinkedIn |  @NoPasswordPod</itunes:summary>
      <itunes:subtitle>Dr. Greg Hall is a Research Scientist at the Institute for Human-Machine Cognition and the University of West Florida. Dr. Hall is a Corvette-driving car lover who considers ALF to be one of the classics and has great taste in hats. He also does research in full-spectrum cyber operations and contributes to the Florida Cyber Range, a digital platform that provides training and testing solutions for academic, government, military, and industry. In this episode, Dr. Hall joins the No Password Required team to discuss his research in full-spectrum cyber operations, why the sit-and-spin has made a place in history as the best (and possibly most dangerous) childhood toy, and more. Ernie, Clabby, and Pablo discuss the government’s Rewards for Justice Program and the new $10 million reward for information. In the “Positively Cyber” segment, Pablo challenges Clabby by welcoming Harvey Specter to our fictitious cybersecurity organization as a Privacy and Cybersecurity Lawyer.

Follow us on Facebook, Instagram, Twitter and LinkedIn |  @NoPasswordPod</itunes:subtitle>
      <itunes:keywords>soc, mitigation, keyboard, cyber, positively cyber, phishing, federal, positively cyber with pablo torres, lifestyle polygraph, hacker, video games, alf, switch, sit and spin, hats, cybersecurity, rewards, regulation, policies, corvette, education, computers, intelligence, cyber insurance, harvey specter, justice, atari, hack, tech</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>16</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">6e1b0ea8-51ff-45b3-8f35-5fe2e70cab14</guid>
      <title>Dan Burke - a Cyber Practice Leader and natural optimist who believes every day is the best day</title>
      <description><![CDATA[Dan Burke is the Cyber Practice Leader at Woodruff Sawyer, one of the largest insurance brokerage and consulting firms in the US. Dan is a natural optimist and family man who believes every day is going to be the best day and the next shot will always be his greatest golf shot. In this episode, Dan joins the No Password Required team to talk about his personal connection to Colby-jack cheese, the most misunderstood things about cyber risk and insurance, and his bucket-list golfing spots. Ernie, Clabby, and Pablo discuss the recent Colonial Pipeline/Bitdefender controversy and the pros and cons of publicizing intelligence that could help ransomware victims. In the “Positively Cyber” segment, Pablo introduces the iconic Winston Wolfe to our fictitious cybersecurity organization as a Data Loss Prevention freelancer.

Follow us on Facebook, Instagram, Twitter and LinkedIn |  @NoPasswordPod 
]]></description>
      <pubDate>Thu, 24 Jun 2021 04:05:00 +0000</pubDate>
      <author>rex2@cyberflorida.org (Rex Wilson, Dan Burke, Sarina Gandy, Colby-Jack, Pablo Torres, Jack Clabby, Ernie Ferraresso)</author>
      <link>https://no-password-required.simplecast.com/episodes/dan-burke-a-cyber-practice-leader-and-natural-optimist-who-believes-every-day-is-the-best-day-EZaakxrN</link>
      <enclosure length="68944100" type="audio/mpeg" url="https://dts.podtrac.com/redirect.mp3/cdn.simplecast.com/audio/ba5244e0-cb0d-4762-b681-e884e01b43fb/episodes/ce83a91d-f565-40c3-a331-88932d973d87/audio/41fb67b6-238f-4e2c-badf-8a089ccf13d5/default_tc.mp3?aid=rss_feed&amp;feed=YGJgknbK"/>
      <itunes:title>Dan Burke - a Cyber Practice Leader and natural optimist who believes every day is the best day</itunes:title>
      <itunes:author>Rex Wilson, Dan Burke, Sarina Gandy, Colby-Jack, Pablo Torres, Jack Clabby, Ernie Ferraresso</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/d43689d3-22e4-45dd-97ad-4c2145bc601b/e67544a6-d87f-49a6-bd87-700c8c6a5723/3000x3000/burke-episode-art.jpg?aid=rss_feed"/>
      <itunes:duration>01:11:48</itunes:duration>
      <itunes:summary>Dan Burke is the Cyber Practice Leader at Woodruff Sawyer, one of the largest insurance brokerage and consulting firms in the US. Dan is a natural optimist and family man who believes every day is going to be the best day and the next shot will always be his greatest golf shot. In this episode, Dan joins the No Password Required team to talk about his personal connection to Colby-jack cheese, the most misunderstood things about cyber risk and insurance, and his bucket-list golfing spots. Ernie, Clabby, and Pablo discuss the recent Colonial Pipeline/Bitdefender controversy and the pros and cons of publicizing intelligence that could help ransomware victims. In the “Positively Cyber” segment, Pablo introduces the iconic Winston Wolfe to our fictitious cybersecurity organization as a Data Loss Prevention freelancer.

Follow us on Facebook, Instagram, Twitter and LinkedIn |  @NoPasswordPod</itunes:summary>
      <itunes:subtitle>Dan Burke is the Cyber Practice Leader at Woodruff Sawyer, one of the largest insurance brokerage and consulting firms in the US. Dan is a natural optimist and family man who believes every day is going to be the best day and the next shot will always be his greatest golf shot. In this episode, Dan joins the No Password Required team to talk about his personal connection to Colby-jack cheese, the most misunderstood things about cyber risk and insurance, and his bucket-list golfing spots. Ernie, Clabby, and Pablo discuss the recent Colonial Pipeline/Bitdefender controversy and the pros and cons of publicizing intelligence that could help ransomware victims. In the “Positively Cyber” segment, Pablo introduces the iconic Winston Wolfe to our fictitious cybersecurity organization as a Data Loss Prevention freelancer.

Follow us on Facebook, Instagram, Twitter and LinkedIn |  @NoPasswordPod</itunes:subtitle>
      <itunes:keywords>happy gilmore, soc, mitigation, colby jack cheese, san francisco, cheese, keyboard, pebble beach, cyber, ransom, positively cyber, phishing, positively cyber with pablo torres, lifestyle polygraph, solar winds, cybercrime, hacker, st andrews, computer science, social engineering, florida, john wick, golf, cybersecurity, osint, winston wolfe, open source, caddy shack, nsa, golf course, ransomware, policies, colonial pipeline, pipeline hack, education, computers, intelligence, cyber insurance, pulp fiction, augusta beach, harvey keitel, hack, tech</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>15</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">12460ca9-27ff-4173-b604-fbed6a7e76be</guid>
      <title>Phillip Tarrant — a SOC Technical Manager who builds things with keyboards and blowtorches and thrives when things go &quot;fowl&quot;</title>
      <description><![CDATA[Phillip Tarrant is the SOC Technical Manager at Compuquip Cybersecurity who is passionate about many things in life, including his pet chickens, building things both with and without a keyboard, disconnecting in nature, and welcoming people into the field of cybersecurity. In this episode, Phillip joins the No Password Required team to talk about his unique journey into the field of cybersecurity, why chicken diapers are crossing the line, why the Empire is in serious need of some data protection policies, and more. Ernie, Clabby, and Pablo discuss the presidential administration’s new cybersecurity initiatives in response to the SolarWinds attack and what they mean for the future. In the “Positively Cyber” segment, Pablo compares two members of the Mystery Incorporated gang and analyzes whether Scooby-Doo or Velma would be the better fit for our fictitious cybersecurity organization.

Follow us on Facebook, Instagram, Twitter and LinkedIn |  @NoPasswordPod 
]]></description>
      <pubDate>Thu, 20 May 2021 04:05:00 +0000</pubDate>
      <author>rex2@cyberflorida.org (Phillip Tarrant, Sarina Gandy, Pablo Torres, Ernie Ferraresso, Camilla the Chicken, Chicken, Rex Wilson, Jack Clabby)</author>
      <link>https://no-password-required.simplecast.com/episodes/phillip-tarrant-a-soc-technical-manager-who-builds-things-with-keyboards-and-blowtorches-and-thrives-when-things-go-fowl-105RGOyq</link>
      <enclosure length="75105115" type="audio/mpeg" url="https://dts.podtrac.com/redirect.mp3/cdn.simplecast.com/audio/ba5244e0-cb0d-4762-b681-e884e01b43fb/episodes/f3327337-3d65-45f4-ba20-9ceb62f48ab6/audio/598aa2f4-1ef8-4419-9317-503f90a96a68/default_tc.mp3?aid=rss_feed&amp;feed=YGJgknbK"/>
      <itunes:title>Phillip Tarrant — a SOC Technical Manager who builds things with keyboards and blowtorches and thrives when things go &quot;fowl&quot;</itunes:title>
      <itunes:author>Phillip Tarrant, Sarina Gandy, Pablo Torres, Ernie Ferraresso, Camilla the Chicken, Chicken, Rex Wilson, Jack Clabby</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/d43689d3-22e4-45dd-97ad-4c2145bc601b/14e42161-eaf1-4dca-996c-a4b32df4ca2f/3000x3000/phillip-episode-art.jpg?aid=rss_feed"/>
      <itunes:duration>01:18:13</itunes:duration>
      <itunes:summary>Phillip Tarrant is the SOC Technical Manager at Compuquip Cybersecurity who is passionate about many things in life, including his pet chickens, building things both with and without a keyboard, disconnecting in nature, and welcoming people into the field of cybersecurity. In this episode, Phillip joins the No Password Required team to talk about his unique journey into the field of cybersecurity, why chicken diapers are crossing the line, why the Empire is in serious need of some data protection policies, and more. Ernie, Clabby, and Pablo discuss the presidential administration’s new cybersecurity initiatives in response to the SolarWinds attack and what they mean for the future. In the “Positively Cyber” segment, Pablo compares two members of the Mystery Incorporated gang and analyzes whether Scooby-Doo or Velma would be the better fit for our fictitious cybersecurity organization.

Follow us on Facebook, Instagram, Twitter and LinkedIn |  @NoPasswordPod</itunes:summary>
      <itunes:subtitle>Phillip Tarrant is the SOC Technical Manager at Compuquip Cybersecurity who is passionate about many things in life, including his pet chickens, building things both with and without a keyboard, disconnecting in nature, and welcoming people into the field of cybersecurity. In this episode, Phillip joins the No Password Required team to talk about his unique journey into the field of cybersecurity, why chicken diapers are crossing the line, why the Empire is in serious need of some data protection policies, and more. Ernie, Clabby, and Pablo discuss the presidential administration’s new cybersecurity initiatives in response to the SolarWinds attack and what they mean for the future. In the “Positively Cyber” segment, Pablo compares two members of the Mystery Incorporated gang and analyzes whether Scooby-Doo or Velma would be the better fit for our fictitious cybersecurity organization.

Follow us on Facebook, Instagram, Twitter and LinkedIn |  @NoPasswordPod</itunes:subtitle>
      <itunes:keywords>soc, open source intelligence, keyboard, cyber, cybersecurity education, positively cyber, blowtorch, phishing, empire, positively cyber with pablo torres, lifestyle polygraph, solar winds, cybercrime, hacker, zoinks, velma, chicken, nature, social engineering, florida, building, minecraft, cybersecurity, osint, def con, am i on fire, computerscience, black hat, scooby snacks, mountains, students, nsa, ransomware, jinkies, policies, cars, infosec, harriet the spy, star wars, education, scooby, jeepers, sea shanty, security operations center, password safety, porsche, computers, data, password, wild turkey, scooby doo, shih tzu, hack, tech, engineering, turkey federation, turkey, chicken diapers, compuquip</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>14</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">8225d3e0-95be-4dcf-9ae6-6218ea39a9c0</guid>
      <title>Rachel Tobac — an OSINT expert who credits much of her success to her improv comedy skills and her childhood mentor, Harriet the Spy</title>
      <description><![CDATA[Rachel Tobac is the CEO and co-founder of Social Proof Security who hopes to one day work herself out of a job by improving education and awareness of social engineering attacks. In this episode, Rachel joins the No Password Required team to talk about her path from studying behavioral psychology to starting a successful cybersecurity company, why shih tzus would be the best canine cybersecurity professional, how her quirky skills serve as an asset to her company, her passion for improving diversity in the cyber and technology industries, and more. BONUS: she sings an info-sec sea shanty that is as catchy as it is informative. Clabby and Ernie talk about the recent hack on the Molson Coors Beverage Company, and in the “Positively Cyber” segment, Pablo analyzes why the Mandalorian would be the perfect fit for showing our new recruits “the way” in our fictitious cybersecurity organization. You should check this episode out soon; if Rachel is correct about the time travel butterfly effect, you may never get another chance...

Follow us on Facebook, Instagram, Twitter and LinkedIn |  @NoPasswordPod 
]]></description>
      <pubDate>Thu, 22 Apr 2021 04:05:00 +0000</pubDate>
      <author>rex2@cyberflorida.org (Ted Esposito, Rex Wilson, Rachel Tobac, Sarina Gandy, Ernie Ferraresso, Jack Clabby, Pablo Torres, Harriet the Spy)</author>
      <link>https://no-password-required.simplecast.com/episodes/rachel-tobac-an-osint-expert-who-credits-much-of-her-success-to-her-improv-comedy-skills-and-her-childhood-mentor-harriet-the-spy-1ZBVTDum</link>
      <enclosure length="58317460" type="audio/mpeg" url="https://dts.podtrac.com/redirect.mp3/cdn.simplecast.com/audio/ba5244e0-cb0d-4762-b681-e884e01b43fb/episodes/2b5bda03-3fd7-4023-9ae3-35472c7eb30f/audio/cedf0e0d-c3e8-43dd-8d62-a9904d66f58f/default_tc.mp3?aid=rss_feed&amp;feed=YGJgknbK"/>
      <itunes:title>Rachel Tobac — an OSINT expert who credits much of her success to her improv comedy skills and her childhood mentor, Harriet the Spy</itunes:title>
      <itunes:author>Ted Esposito, Rex Wilson, Rachel Tobac, Sarina Gandy, Ernie Ferraresso, Jack Clabby, Pablo Torres, Harriet the Spy</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/d43689d3-22e4-45dd-97ad-4c2145bc601b/af28a46c-e61b-4105-9b4f-443baac58b77/3000x3000/rachel.jpg?aid=rss_feed"/>
      <itunes:duration>01:00:44</itunes:duration>
      <itunes:summary>Rachel Tobac is the CEO and co-founder of Social Proof Security who hopes to one day work herself out of a job by improving education and awareness of social engineering attacks. In this episode, Rachel joins the No Password Required team to talk about her path from studying behavioral psychology to starting a successful cybersecurity company, why shih tzus would be the best canine cybersecurity professional, how her quirky skills serve as an asset to her company, her passion for improving diversity in the cyber and technology industries, and more. BONUS: she sings an info-sec sea shanty that is as catchy as it is informative. Clabby and Ernie talk about the recent hack on the Molson Coors Beverage Company, and in the “Positively Cyber” segment, Pablo analyzes why the Mandalorian would be the perfect fit for showing our new recruits “the way” in our fictitious cybersecurity organization. You should check this episode out soon; if Rachel is correct about the time travel butterfly effect, you may never get another chance...

Follow us on Facebook, Instagram, Twitter and LinkedIn |  @NoPasswordPod</itunes:summary>
      <itunes:subtitle>Rachel Tobac is the CEO and co-founder of Social Proof Security who hopes to one day work herself out of a job by improving education and awareness of social engineering attacks. In this episode, Rachel joins the No Password Required team to talk about her path from studying behavioral psychology to starting a successful cybersecurity company, why shih tzus would be the best canine cybersecurity professional, how her quirky skills serve as an asset to her company, her passion for improving diversity in the cyber and technology industries, and more. BONUS: she sings an info-sec sea shanty that is as catchy as it is informative. Clabby and Ernie talk about the recent hack on the Molson Coors Beverage Company, and in the “Positively Cyber” segment, Pablo analyzes why the Mandalorian would be the perfect fit for showing our new recruits “the way” in our fictitious cybersecurity organization. You should check this episode out soon; if Rachel is correct about the time travel butterfly effect, you may never get another chance...

Follow us on Facebook, Instagram, Twitter and LinkedIn |  @NoPasswordPod</itunes:subtitle>
      <itunes:keywords>open source intelligence, cyber, positively cyber, phishing, positively cyber with pablo torres, lifestyle polygraph, hacker, social engineering, florida, cybersecurity, mandalorian, osint, social proof security, def con, black hat, nsa, infosec, harriet the spy, mando, sea shanty, computers, data, password, shih tzu, hack, tech</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>13</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">4e60a182-ed29-4d9c-8bd0-3afc0911fca1</guid>
      <title>Roger Grimes — a believer that the key to internet safety is simple, however, having an octopus as a pet is much more complex and scary</title>
      <description><![CDATA[Roger Grimes is the defense-driven evangelist at KnowBe4 who confidently defines himself as the best in the world at defending against hackers. In this episode, Roger joins the No Password Required team to discuss how being a terrible accountant led him to the world of cybersecurity, why octopi cannot be trusted, and why music is the best way to create powerful connections. Additionally, Clabby and Pablo discuss insights from the National Security Agency’s 2020 cybersecurity year in review. In the “Positively Cyber” segment, Pablo analyzes why Hermione Granger’s work ethic and determination would make her the perfect fit for Senior Director of Threat Intelligence in our fictitious cybersecurity organization.

Follow us on Facebook, Instagram, Twitter and LinkedIn |  @NoPasswordPod 
]]></description>
      <pubDate>Thu, 18 Mar 2021 13:00:00 +0000</pubDate>
      <author>rex2@cyberflorida.org (Jack Clabby, Ernie Ferraresso, Sarina Gandy, Ted Esposito, Roger Grimes, Pablo Torres, Rex Wilson)</author>
      <link>https://no-password-required.simplecast.com/episodes/roger-grimes-a-believer-that-the-key-to-internet-safety-is-simple-however-having-an-octopus-as-a-pet-is-much-more-complex-and-scary-4W_GPbW5</link>
      <enclosure length="60363431" type="audio/mpeg" url="https://dts.podtrac.com/redirect.mp3/cdn.simplecast.com/audio/ba5244e0-cb0d-4762-b681-e884e01b43fb/episodes/878cc3b1-5483-42e4-845a-689563e2587f/audio/95e615db-fd5e-4226-8fb4-2aa0a3280bbc/default_tc.mp3?aid=rss_feed&amp;feed=YGJgknbK"/>
      <itunes:title>Roger Grimes — a believer that the key to internet safety is simple, however, having an octopus as a pet is much more complex and scary</itunes:title>
      <itunes:author>Jack Clabby, Ernie Ferraresso, Sarina Gandy, Ted Esposito, Roger Grimes, Pablo Torres, Rex Wilson</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/d43689d3-22e4-45dd-97ad-4c2145bc601b/8df0b505-5d9e-4e13-806f-3a39eba6f35e/3000x3000/roger.jpg?aid=rss_feed"/>
      <itunes:duration>01:02:53</itunes:duration>
      <itunes:summary>Roger Grimes is the defense-driven evangelist at KnowBe4 who confidently defines himself as the best in the world at defending against hackers. In this episode, Roger joins the No Password Required team to discuss how being a terrible accountant led him to the world of cybersecurity, why octopi cannot be trusted, and why music is the best way to create powerful connections. Additionally, Clabby and Pablo discuss insights from the National Security Agency’s 2020 cybersecurity year in review. In the “Positively Cyber” segment, Pablo analyzes why Hermione Granger’s work ethic and determination would make her the perfect fit for Senior Director of Threat Intelligence in our fictitious cybersecurity organization.

Follow us on Facebook, Instagram, Twitter and LinkedIn |  @NoPasswordPod</itunes:summary>
      <itunes:subtitle>Roger Grimes is the defense-driven evangelist at KnowBe4 who confidently defines himself as the best in the world at defending against hackers. In this episode, Roger joins the No Password Required team to discuss how being a terrible accountant led him to the world of cybersecurity, why octopi cannot be trusted, and why music is the best way to create powerful connections. Additionally, Clabby and Pablo discuss insights from the National Security Agency’s 2020 cybersecurity year in review. In the “Positively Cyber” segment, Pablo analyzes why Hermione Granger’s work ethic and determination would make her the perfect fit for Senior Director of Threat Intelligence in our fictitious cybersecurity organization.

Follow us on Facebook, Instagram, Twitter and LinkedIn |  @NoPasswordPod</itunes:subtitle>
      <itunes:keywords>octopi, cyber, positively cyber, phishing, positively cyber with pablo torres, lifestyle polygraph, hacker, florida, cybersecurity, nsa, infosec, hermione granger, computers, data, data-driven, knowbe4, hack, tech</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>12</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">64b4e951-b3ae-41c3-adb2-a47f97b7d29a</guid>
      <title>Shane Young — a pen tester at Rapid7 with a passion for LEGO bricks, Star Wars, and sometimes LEGO Star Wars</title>
      <description><![CDATA[Shane Young is a penetration tester at Rapid7 whose real-life acting and cyber skills would have been a great addition to the “Oceans 11” team. In this episode, Shane joins the No Password Required team to share some of his exciting stories as a penetration tester, how hacking his high school's network got him into the world of cybersecurity, and why LEGO bricks are really made for adults, not kids. Additionally, Shane, Ernie, and Clabby discuss The Mandalorian and the Star Wars universe (no spoilers!) Clabby and Ernie explore the controversial GoDaddy phishing campaign and the ethical ramifications of company phishing tests. In the “Positively Cyber” segment, Pablo Torres analyzes why Mulan has the skills and dedication to be a savvy network defender in our fictitious cybersecurity organization.

LEGO® is a trademark of the LEGO Group of companies, which doesn't sponsor, authorize, or endorse this podcast. 

Follow us on Facebook, Instagram, Twitter and LinkedIn |  @NoPasswordPod 
]]></description>
      <pubDate>Thu, 11 Feb 2021 05:10:00 +0000</pubDate>
      <author>rex2@cyberflorida.org (Sarina Gandy, Ted Esposito, Rex Wilson, Jack Clabby, Ernie Ferraresso, Pablo Torres)</author>
      <link>https://no-password-required.simplecast.com/episodes/shane-young-elg9Zup_</link>
      <enclosure length="54743552" type="audio/mpeg" url="https://dts.podtrac.com/redirect.mp3/cdn.simplecast.com/audio/ba5244e0-cb0d-4762-b681-e884e01b43fb/episodes/cba4cca5-58b8-4997-a63f-a7396237c16a/audio/d7baca2d-a980-42e7-8f7b-10c55688303f/default_tc.mp3?aid=rss_feed&amp;feed=YGJgknbK"/>
      <itunes:title>Shane Young — a pen tester at Rapid7 with a passion for LEGO bricks, Star Wars, and sometimes LEGO Star Wars</itunes:title>
      <itunes:author>Sarina Gandy, Ted Esposito, Rex Wilson, Jack Clabby, Ernie Ferraresso, Pablo Torres</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/d43689d3-22e4-45dd-97ad-4c2145bc601b/6cf0fe5d-b2fa-4585-b501-55d44dd1d7bd/3000x3000/shane.jpg?aid=rss_feed"/>
      <itunes:duration>00:57:02</itunes:duration>
      <itunes:summary>Shane Young is a penetration tester at Rapid7 whose real-life acting and cyber skills would have been a great addition to the “Oceans 11” team. In this episode, Shane joins the No Password Required team to share some of his exciting stories as a penetration tester, how hacking his high school&apos;s network got him into the world of cybersecurity, and why LEGO bricks are really made for adults, not kids. Additionally, Shane, Ernie, and Clabby discuss The Mandalorian and the Star Wars universe (no spoilers!) Clabby and Ernie explore the controversial GoDaddy phishing campaign and the ethical ramifications of company phishing tests. In the “Positively Cyber” segment, Pablo Torres analyzes why Mulan has the skills and dedication to be a savvy network defender in our fictitious cybersecurity organization.

LEGO® is a trademark of the LEGO Group of companies, which doesn&apos;t sponsor, authorize, or endorse this podcast. 

Follow us on Facebook, Instagram, Twitter and LinkedIn |  @NoPasswordPod</itunes:summary>
      <itunes:subtitle>Shane Young is a penetration tester at Rapid7 whose real-life acting and cyber skills would have been a great addition to the “Oceans 11” team. In this episode, Shane joins the No Password Required team to share some of his exciting stories as a penetration tester, how hacking his high school&apos;s network got him into the world of cybersecurity, and why LEGO bricks are really made for adults, not kids. Additionally, Shane, Ernie, and Clabby discuss The Mandalorian and the Star Wars universe (no spoilers!) Clabby and Ernie explore the controversial GoDaddy phishing campaign and the ethical ramifications of company phishing tests. In the “Positively Cyber” segment, Pablo Torres analyzes why Mulan has the skills and dedication to be a savvy network defender in our fictitious cybersecurity organization.

LEGO® is a trademark of the LEGO Group of companies, which doesn&apos;t sponsor, authorize, or endorse this podcast. 

Follow us on Facebook, Instagram, Twitter and LinkedIn |  @NoPasswordPod</itunes:subtitle>
      <itunes:keywords>ctf, hua mulan, positively cyber, legos, phishing, positively cyber with pablo torres, lifestyle polygraph, hacker, godaddy, iron mountain, cybersecurity, rapid7, apt, pen tester, firewall, hacking</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>11</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">c830225d-376c-4646-bb4e-ef6f78ab53ad</guid>
      <title>Melinda Lemke — an inherently trusting person in an inherently distrusting profession</title>
      <description><![CDATA[Melinda Lemke is the Head of Information Security at King & Spalding with a decade of leadership experience in the cyber industry. In this episode, Melinda joins the No Password Required team to talk about her experience as a woman and leader in this field, how professional mentors can enhance success, and the best yacht-rock bands of all time. Maybe most importantly, the team discusses the John Hughes movie universe and why Kevin McAllister is a better problem-solver than Ferris Bueller. Additionally, Ernie and Clabby explore the importance of password security and real-world ransomware attacks, including the ransomware attacks on Miami-Dade county schools. In the “Positively Cyber” segment, Pablo Torres explores the reasons why John Wick would be the perfect candidate for an elite penetration-tester position in our fictitious cybersecurity organization.

Follow us on Facebook, Instagram, Twitter and LinkedIn |  @NoPasswordPod 
]]></description>
      <pubDate>Thu, 11 Feb 2021 05:05:00 +0000</pubDate>
      <author>rex2@cyberflorida.org (Sarina Gandy, Ernie Ferraresso, Melinda Lemke, Pablo Torres, Rex Wilson, Ted Esposito, Jack Clabby)</author>
      <link>https://no-password-required.simplecast.com/episodes/melinda-lemke-KoOWGCSO</link>
      <enclosure length="52359094" type="audio/mpeg" url="https://dts.podtrac.com/redirect.mp3/cdn.simplecast.com/audio/ba5244e0-cb0d-4762-b681-e884e01b43fb/episodes/d9fbddca-d854-4f42-a559-9fcd6f7b548f/audio/d6aa61e9-ef02-4dcc-96ab-4f3384eb0235/default_tc.mp3?aid=rss_feed&amp;feed=YGJgknbK"/>
      <itunes:title>Melinda Lemke — an inherently trusting person in an inherently distrusting profession</itunes:title>
      <itunes:author>Sarina Gandy, Ernie Ferraresso, Melinda Lemke, Pablo Torres, Rex Wilson, Ted Esposito, Jack Clabby</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/d43689d3-22e4-45dd-97ad-4c2145bc601b/bab0741c-9619-4e08-add9-e2425394dacf/3000x3000/melinda.jpg?aid=rss_feed"/>
      <itunes:duration>00:54:33</itunes:duration>
      <itunes:summary>Melinda Lemke is the Head of Information Security at King &amp; Spalding with a decade of leadership experience in the cyber industry. In this episode, Melinda joins the No Password Required team to talk about her experience as a woman and leader in this field, how professional mentors can enhance success, and the best yacht-rock bands of all time. Maybe most importantly, the team discusses the John Hughes movie universe and why Kevin McAllister is a better problem-solver than Ferris Bueller. Additionally, Ernie and Clabby explore the importance of password security and real-world ransomware attacks, including the ransomware attacks on Miami-Dade county schools. In the “Positively Cyber” segment, Pablo Torres explores the reasons why John Wick would be the perfect candidate for an elite penetration-tester position in our fictitious cybersecurity organization.

Follow us on Facebook, Instagram, Twitter and LinkedIn |  @NoPasswordPod</itunes:summary>
      <itunes:subtitle>Melinda Lemke is the Head of Information Security at King &amp; Spalding with a decade of leadership experience in the cyber industry. In this episode, Melinda joins the No Password Required team to talk about her experience as a woman and leader in this field, how professional mentors can enhance success, and the best yacht-rock bands of all time. Maybe most importantly, the team discusses the John Hughes movie universe and why Kevin McAllister is a better problem-solver than Ferris Bueller. Additionally, Ernie and Clabby explore the importance of password security and real-world ransomware attacks, including the ransomware attacks on Miami-Dade county schools. In the “Positively Cyber” segment, Pablo Torres explores the reasons why John Wick would be the perfect candidate for an elite penetration-tester position in our fictitious cybersecurity organization.

Follow us on Facebook, Instagram, Twitter and LinkedIn |  @NoPasswordPod</itunes:subtitle>
      <itunes:keywords>big fish in a little pond, lifestyle polygraph, weird science, king &amp; spalding, boogeyman, john wick, cybersecurity, ferris bueller, air supply, mentoring, kevin mccallister, mentors, infosec, baba yaga, john hughes, keanu reeves, women in cybersecurity</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>10</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">813667c5-9f44-48a1-b6a0-271bc365c582</guid>
      <title>&quot;Scuba&quot; Steve Gary — a journey from math camp to cyber intelligence</title>
      <description><![CDATA[Stephen “Scuba” Gary is a cyber intelligence professor at the University of South Florida with over 15 years of experience in the cybersecurity industry. In this episode, Scuba joins the No Password Required team to discuss his journey in the field of cybersecurity, how one gets the nickname Scuba without scuba diving, and why math nerds throw the best parties. Scuba, Ernie, and Clabby analyze ransomware attacks in Florida, security lessons to be learned from the 2020 elections, and more. In the “Positively Cyber” segment, Pablo Torres explores why Peter Quill, aka the Star Lord, aka the leader of the Guardians of the Galaxy, would be a perfect fit for Chief Technology Officer in a fictitious cybersecurity organization.

Follow us on Facebook, Instagram, Twitter and LinkedIn |  @NoPasswordPod 
]]></description>
      <pubDate>Thu, 11 Feb 2021 05:00:00 +0000</pubDate>
      <author>rex2@cyberflorida.org (Sarina Gandy, Jack Clabby, Ted Esposito, Pablo Torres, Rex Wilson, Ernie Ferraresso)</author>
      <link>https://no-password-required.simplecast.com/episodes/scuba-steve-gary-KczOLDKV</link>
      <enclosure length="57803849" type="audio/mpeg" url="https://dts.podtrac.com/redirect.mp3/cdn.simplecast.com/audio/ba5244e0-cb0d-4762-b681-e884e01b43fb/episodes/ba3f20a2-995c-42da-9c21-b59994100014/audio/75691880-af3c-480f-8629-5216bc6bd291/default_tc.mp3?aid=rss_feed&amp;feed=YGJgknbK"/>
      <itunes:title>&quot;Scuba&quot; Steve Gary — a journey from math camp to cyber intelligence</itunes:title>
      <itunes:author>Sarina Gandy, Jack Clabby, Ted Esposito, Pablo Torres, Rex Wilson, Ernie Ferraresso</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/d43689d3-22e4-45dd-97ad-4c2145bc601b/f08f9e63-e317-4952-a79d-f8cb955a1596/3000x3000/scuba-steve.jpg?aid=rss_feed"/>
      <itunes:duration>01:00:13</itunes:duration>
      <itunes:summary>Stephen “Scuba” Gary is a cyber intelligence professor at the University of South Florida with over 15 years of experience in the cybersecurity industry. In this episode, Scuba joins the No Password Required team to discuss his journey in the field of cybersecurity, how one gets the nickname Scuba without scuba diving, and why math nerds throw the best parties. Scuba, Ernie, and Clabby analyze ransomware attacks in Florida, security lessons to be learned from the 2020 elections, and more. In the “Positively Cyber” segment, Pablo Torres explores why Peter Quill, aka the Star Lord, aka the leader of the Guardians of the Galaxy, would be a perfect fit for Chief Technology Officer in a fictitious cybersecurity organization.

Follow us on Facebook, Instagram, Twitter and LinkedIn |  @NoPasswordPod</itunes:summary>
      <itunes:subtitle>Stephen “Scuba” Gary is a cyber intelligence professor at the University of South Florida with over 15 years of experience in the cybersecurity industry. In this episode, Scuba joins the No Password Required team to discuss his journey in the field of cybersecurity, how one gets the nickname Scuba without scuba diving, and why math nerds throw the best parties. Scuba, Ernie, and Clabby analyze ransomware attacks in Florida, security lessons to be learned from the 2020 elections, and more. In the “Positively Cyber” segment, Pablo Torres explores why Peter Quill, aka the Star Lord, aka the leader of the Guardians of the Galaxy, would be a perfect fit for Chief Technology Officer in a fictitious cybersecurity organization.

Follow us on Facebook, Instagram, Twitter and LinkedIn |  @NoPasswordPod</itunes:subtitle>
      <itunes:keywords>peter quill, usf, positively cyber, positively cyber with pablo torres, lifestyle polygraph, star-lord, election security, cybersecurity, infosec, star lord</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>9</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">b4698321-13e3-453f-b123-aa0346cf2ccc</guid>
      <title>Cyber Forensics – Fighting Cybercrime with Digital Evidence</title>
      <description><![CDATA[<p>With the rise of cybercrime comes the need for cyber forensics, and this episode’s guest, Dr. LeGrande Gardner has been in the field of digital evidence for more than 30 years. Currently, he is an instructor in the Criminology Department at the University of South Florida, where he also serves as the Director of the MS in Cybercrime degree program and administrates the Graduate Certificate Program in Digital Forensics.  </p><p>Co-hosts Bill McQueen and Ernie Ferraresso joined Dr. Gardner for a discussion about digital evidence, its role in the justice community, and opportunities for the future. The field of cyber forensics started rather simply, as a way to detect and connect the pieces of a crime.  As evidence was being submitted into the justice system, a need for increased scientific methodologies and protocols grew to preserve legal integrity and the rights of the accused.  </p><p>Cyber forensic professionals are able to examine a range of devices, networks--even the cloud--to uncover criminal activity and gather evidence that can lead to legal prosecution. Dr. Gardner discusses how advances in computer science have made an impact in the ability to locate criminals. In his first example, he shares how hash algorithms are used to catch pedophiles and provide a digital footprint to catch larger pedophile rings. Next, he details the Target breach, where criminals were able to hack the nationwide retailer via their air conditioning’s computerized system. Then, he talks about how search warrants involving cybercrime uncovered how criminals were using their neighbor’s open IP addresses, putting routers unknowingly in their attics, and other deviousness that thwarted detection and capture. Unfortunately, Dr. Gardner reveals, international criminals are even more elusive, but that having solid cyber forensics can help law enforcement agencies from multiple countries coordinate efforts.</p><p>Cyber forensics now has several sub-specialties, such as cloud forensics, network forensics, malware forensics, IoT forensics, and vehicle forensics.  Many colleges and universities are developing programs and training around these expanding and evolving sub-specialties. Dr. Gardner points out that this is a great time to be a cybercriminal and there will be an increased need for cyber forensic technicians and digital evidence specialists to combat the widespread crime.  </p><p>There is a push for law enforcement officers to receive training in cyber forensics to facilitate crime scene collections, recognize patterns, and maintain protocols.  Dr. Gardner’s history in law enforcement and as a Task Force Agent with the FBI’s Cyber Crime Unit gave him a special insight to device and data collection at crime scenes and he shares his thoughts on training opportunities in police academies.  </p><p>Hackers and cyber criminals aren’t the only reasons the field of cyber forensics is growing.  Corporations are also employing their own forensic teams. Companies use digital evidence to substantiate their security and to protect themselves if a situation with an employee requires documentation.  Civil matters are increasingly including digital evidence, and professionals are being called upon to provide expert testimony.</p><p>The need for cyber forensics professionals is growing exponentially, according to Dr. Gardner. There is no end in sight for the potential of this field and the importance it will play in protecting our security and stopping crime.</p><p>TIME STAMPS</p><p>00:43  Meet Our New Co-host: Ernie Ferraresso, Associate Program Director of Cyber Florida</p><p>02:43 Who is Dr. LeGrande Gardner, Director of the MS in Cybercrime Degree Program, University of South Florida</p><p>03:15  What is Cyber Forensics and Digital Evidence?</p><p>04:47  Recognizing the field of Cyber Forensics</p><p>05:59  Following the Rules of Evidence and Procedure</p><p>06:33  The Growing Impact of Digital Evidence and Digital Exploitation  </p><p>07:35  Evolving Field of Cyber Forensic Careers</p><p>08:58  Collecting Cyber Forensic Data  </p><p>09:51  Digital Evidence as a Science</p><p>12:52 Components of Digital Evidence</p><p>13:45 Hash Algorithms, Digital DNA</p><p>14:25 Child Pornography Hash Algorithms</p><p>14:55  Hash Algorithms are like Fingerprints  </p><p>16:37  Verifying and Preserving Digital Evidence Using Scientific Protocols</p><p>18:29  Training to be a Cyber Forensic Technician or Specialists</p><p>21:34  Specialized Cyber Forensic Fields</p><p>24:01 Criminals, Digital Evidence & Law Enforcement</p><p>26:30 Training Law Enforcement for Digital Evidence Collection</p><p>28:24 Finding Breaches and Identifying Vulnerabilities</p><p>31:00 How to Start a Cyber Forensic Investigation</p><p>31:29 Cyber Forensic Incident Response</p><p>34:38  Cyber Police of the Future</p><p>35:35  Trends in Cyber Forensic Prosecutions</p><p>37:05 International Cyber Criminals and Cyber Forensics</p><p>38:19 Every Cop as a Cyber Cop</p><p>38:39 How is Cybercrime Changing  </p><p>41:26 The Future of the Cyber Forensic Field</p><p>42:24  Corporate Digital Forensic Units and Civil Courts</p><p>44:43  Cyber Forensic Academics, Digital Certifications and Careers</p>
]]></description>
      <pubDate>Fri, 13 Mar 2020 14:00:10 +0000</pubDate>
      <author>rex2@cyberflorida.org (Bill McQueen, Ernie Ferraresso)</author>
      <link>https://no-password-required.simplecast.com/episodes/cyber-forensics-fighting-cybercrime-with-digital-evidence-fqzLJsvA</link>
      <content:encoded><![CDATA[<p>With the rise of cybercrime comes the need for cyber forensics, and this episode’s guest, Dr. LeGrande Gardner has been in the field of digital evidence for more than 30 years. Currently, he is an instructor in the Criminology Department at the University of South Florida, where he also serves as the Director of the MS in Cybercrime degree program and administrates the Graduate Certificate Program in Digital Forensics.  </p><p>Co-hosts Bill McQueen and Ernie Ferraresso joined Dr. Gardner for a discussion about digital evidence, its role in the justice community, and opportunities for the future. The field of cyber forensics started rather simply, as a way to detect and connect the pieces of a crime.  As evidence was being submitted into the justice system, a need for increased scientific methodologies and protocols grew to preserve legal integrity and the rights of the accused.  </p><p>Cyber forensic professionals are able to examine a range of devices, networks--even the cloud--to uncover criminal activity and gather evidence that can lead to legal prosecution. Dr. Gardner discusses how advances in computer science have made an impact in the ability to locate criminals. In his first example, he shares how hash algorithms are used to catch pedophiles and provide a digital footprint to catch larger pedophile rings. Next, he details the Target breach, where criminals were able to hack the nationwide retailer via their air conditioning’s computerized system. Then, he talks about how search warrants involving cybercrime uncovered how criminals were using their neighbor’s open IP addresses, putting routers unknowingly in their attics, and other deviousness that thwarted detection and capture. Unfortunately, Dr. Gardner reveals, international criminals are even more elusive, but that having solid cyber forensics can help law enforcement agencies from multiple countries coordinate efforts.</p><p>Cyber forensics now has several sub-specialties, such as cloud forensics, network forensics, malware forensics, IoT forensics, and vehicle forensics.  Many colleges and universities are developing programs and training around these expanding and evolving sub-specialties. Dr. Gardner points out that this is a great time to be a cybercriminal and there will be an increased need for cyber forensic technicians and digital evidence specialists to combat the widespread crime.  </p><p>There is a push for law enforcement officers to receive training in cyber forensics to facilitate crime scene collections, recognize patterns, and maintain protocols.  Dr. Gardner’s history in law enforcement and as a Task Force Agent with the FBI’s Cyber Crime Unit gave him a special insight to device and data collection at crime scenes and he shares his thoughts on training opportunities in police academies.  </p><p>Hackers and cyber criminals aren’t the only reasons the field of cyber forensics is growing.  Corporations are also employing their own forensic teams. Companies use digital evidence to substantiate their security and to protect themselves if a situation with an employee requires documentation.  Civil matters are increasingly including digital evidence, and professionals are being called upon to provide expert testimony.</p><p>The need for cyber forensics professionals is growing exponentially, according to Dr. Gardner. There is no end in sight for the potential of this field and the importance it will play in protecting our security and stopping crime.</p><p>TIME STAMPS</p><p>00:43  Meet Our New Co-host: Ernie Ferraresso, Associate Program Director of Cyber Florida</p><p>02:43 Who is Dr. LeGrande Gardner, Director of the MS in Cybercrime Degree Program, University of South Florida</p><p>03:15  What is Cyber Forensics and Digital Evidence?</p><p>04:47  Recognizing the field of Cyber Forensics</p><p>05:59  Following the Rules of Evidence and Procedure</p><p>06:33  The Growing Impact of Digital Evidence and Digital Exploitation  </p><p>07:35  Evolving Field of Cyber Forensic Careers</p><p>08:58  Collecting Cyber Forensic Data  </p><p>09:51  Digital Evidence as a Science</p><p>12:52 Components of Digital Evidence</p><p>13:45 Hash Algorithms, Digital DNA</p><p>14:25 Child Pornography Hash Algorithms</p><p>14:55  Hash Algorithms are like Fingerprints  </p><p>16:37  Verifying and Preserving Digital Evidence Using Scientific Protocols</p><p>18:29  Training to be a Cyber Forensic Technician or Specialists</p><p>21:34  Specialized Cyber Forensic Fields</p><p>24:01 Criminals, Digital Evidence & Law Enforcement</p><p>26:30 Training Law Enforcement for Digital Evidence Collection</p><p>28:24 Finding Breaches and Identifying Vulnerabilities</p><p>31:00 How to Start a Cyber Forensic Investigation</p><p>31:29 Cyber Forensic Incident Response</p><p>34:38  Cyber Police of the Future</p><p>35:35  Trends in Cyber Forensic Prosecutions</p><p>37:05 International Cyber Criminals and Cyber Forensics</p><p>38:19 Every Cop as a Cyber Cop</p><p>38:39 How is Cybercrime Changing  </p><p>41:26 The Future of the Cyber Forensic Field</p><p>42:24  Corporate Digital Forensic Units and Civil Courts</p><p>44:43  Cyber Forensic Academics, Digital Certifications and Careers</p>
]]></content:encoded>
      <enclosure length="45809015" type="audio/mpeg" url="https://dts.podtrac.com/redirect.mp3/cdn.simplecast.com/audio/ba5244/ba5244e0-cb0d-4762-b681-e884e01b43fb/72f73007-89d5-4648-96e4-72718ed2d307/no-password-required-with-legrande-gardner_tc.mp3?aid=rss_feed&amp;feed=YGJgknbK"/>
      <itunes:title>Cyber Forensics – Fighting Cybercrime with Digital Evidence</itunes:title>
      <itunes:author>Bill McQueen, Ernie Ferraresso</itunes:author>
      <itunes:duration>00:47:38</itunes:duration>
      <itunes:summary>Cyber forensic experts unlock how cybercrimes are committed and who is responsible.  Corporations and law enforcement rely on advancements in the field to prevent further crimes and hold criminals accountable. Our guest, Dr. LeGrande Gardner, has been at the forefront of cyber forensic training and the evolution and science of digital evidence collection. </itunes:summary>
      <itunes:subtitle>Cyber forensic experts unlock how cybercrimes are committed and who is responsible.  Corporations and law enforcement rely on advancements in the field to prevent further crimes and hold criminals accountable. Our guest, Dr. LeGrande Gardner, has been at the forefront of cyber forensic training and the evolution and science of digital evidence collection. </itunes:subtitle>
      <itunes:keywords>prevent cybercrimes, using digital evidence in a legal case, iot forensics, malware forensics, digital evidence search warrant, hash algorithms, e-discovery, cybercrime, cyber archaeology, expert witness, dead box forensics, cyber forensics university programs, civil court and digital technology, cybercrime forensics, cyber criminals, computer forensics, cloud forensics, digital dna, cyber forensic protocols, digital evidence laws, digital evidence college programs, cyber forensic careers, cyber forensics, dr. legrande gardner, cyber forensic search warrant, vehicle forensics, incident response, digital evidence university programs, corporate digital forensic units, target breach through air conditioning system, hackers, digital evidence scientific protocols, digital footprints, cyber florida, hash algorithm probabilities, prosecuting cybercrimes, cyber forensic certifications, jobs in cyber forensics, digital evidence scientific standards, network forensics, child pornography, digital exploitation, cyber forensic specialist, verifying digital evidence, cyber forensics college programs, digital evidence, cyber florida podcast, cyber forensics law enforcement, cyber forensic investigation, civil court and digital evidence, cyber forensic technician, digital evidence in court room, digital evidence protocols, police and digital evidence</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>8</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">38a5f654-56b8-478e-a52e-936e9ed3255c</guid>
      <title>Securing the Cloud, VirtUE, and “Cyber Space” – the Truly Human Domain</title>
      <description><![CDATA[<p>Kerry Long’s role at IARPA is to make the Intelligence Community more secure in the tech world. His vision of the future of cloud computing is to fundamentally change the way we use computers to be more secure. His hope is to redesign how all of us interact with computers to get ahead of hackers and breaches. His program, VirtUE, will soon be released to the world as open source code to promote cloud security and ingenuity. He also philosophizes about what cyber space really means as the only truly human-created domain.</p><p>When asked what is the most critical aspect of cloud security, Mr. Long answered, “Depending on users to secure their environment.” The current shared service model has cloud hosts providing a hypervisor (or virtual machine monitor [VMM]) and physical security of the data center while the user is responsible for their own data security. Most users are not security experts and they shouldn’t be, as Long argues that the cloud providers need to take on more security responsibilities. He points out that small-to-medium-sized businesses rarely have adequate IT resources to properly secure their own servers and, therefore, the cloud is a much more secure option because of hypervisors and other systems being updated nearly every day.</p><p>Long goes on to detail how we build things without knowing the ramifications because engineers can’t fathom every possible way a user would or could use it. The problem with pre-cloud computing is that we were stuck with those decisions for decades. “What I love about the cloud is it constantly gives you a chance to do-over.The cloud is anything that we want it to be. The cloud providers change out their infrastructure every 18 months to two years with brand new hardware. They are innovating and adding new things every week, every two weeks, and taking things out that don’t work. It’s an amazing opportunity as an engineer to say ‘hey, actually I thought I was smart, but I’m smarter now.’</p><p><a href="https://www.iarpa.gov/index.php/research-programs/virtue">VirtUE (Virtuous User Environment)</a> is an IARPA program managed by Mr. Kerry Long that is an example of using the cloud and re-engineering it to be more secure for tomorrow. Traditional memory computers are running too many roles at once while in comparison cloud computing can separate roles. VirtUE is trying to engineer ways to make the separate environments function seamlessly for users while maintaining the security. This program is coming to an end soon, and will be released as open source code for the world to examine and work on.</p><p>VirtUE is related to <a href="https://www.iarpa.gov/index.php/research-programs/scite">SCITE (Scientific advances to Continuous Insider Threat Evaluation)</a></p><p>Link to IARPA: <a href="http://www.iarpa.gov">www.iarpa.gov</a> IARPA facilitates the transition of research results to their Intelligence Community customers for operational application.</p><p>Link to IARPA profile for Kerry Long: <a href="https://www.iarpa.gov/index.php/20-program-managers">https://www.iarpa.gov/index.php/20-program-managers</a></p><p> </p><p><strong>TIME STAMPS</strong></p><p>00:07 Cloud Computing</p><p>01:11 Who is Kerry Long, IARPA, Cybersecurity</p><p>02:00 Mission of IARPA</p><p>02:45 Cloud Security and Potential of Cloud Computing</p><p>03:59 Getting Ahead of Security Breaches</p><p>05:35 What is the most critical aspect of cloud security?</p><p>07:11 Cloud security options for businesses and individuals</p><p>09:58 What data is at risk of being stolen?</p><p>12:38 Cyber Engineering</p><p>13:50 Cloud Engineering & Infrastructure</p><p>15:18 What is a VirtUE – Virtuous User Environment?</p><p>18:59 How Safe is our Cyber Community?</p><p>21:00 Redesigning Computing with the Cloud</p><p>23:22 The Future of Computing</p><p>24:18 VirtUE as Open Source</p>
]]></description>
      <pubDate>Fri, 28 Feb 2020 15:00:01 +0000</pubDate>
      <author>rex2@cyberflorida.org (Kerry Long, Sarina Fazan)</author>
      <link>https://no-password-required.simplecast.com/episodes/securing-the-cloud-virtue-and-cyber-space-the-truly-human-domain-vXifo9en</link>
      <content:encoded><![CDATA[<p>Kerry Long’s role at IARPA is to make the Intelligence Community more secure in the tech world. His vision of the future of cloud computing is to fundamentally change the way we use computers to be more secure. His hope is to redesign how all of us interact with computers to get ahead of hackers and breaches. His program, VirtUE, will soon be released to the world as open source code to promote cloud security and ingenuity. He also philosophizes about what cyber space really means as the only truly human-created domain.</p><p>When asked what is the most critical aspect of cloud security, Mr. Long answered, “Depending on users to secure their environment.” The current shared service model has cloud hosts providing a hypervisor (or virtual machine monitor [VMM]) and physical security of the data center while the user is responsible for their own data security. Most users are not security experts and they shouldn’t be, as Long argues that the cloud providers need to take on more security responsibilities. He points out that small-to-medium-sized businesses rarely have adequate IT resources to properly secure their own servers and, therefore, the cloud is a much more secure option because of hypervisors and other systems being updated nearly every day.</p><p>Long goes on to detail how we build things without knowing the ramifications because engineers can’t fathom every possible way a user would or could use it. The problem with pre-cloud computing is that we were stuck with those decisions for decades. “What I love about the cloud is it constantly gives you a chance to do-over.The cloud is anything that we want it to be. The cloud providers change out their infrastructure every 18 months to two years with brand new hardware. They are innovating and adding new things every week, every two weeks, and taking things out that don’t work. It’s an amazing opportunity as an engineer to say ‘hey, actually I thought I was smart, but I’m smarter now.’</p><p><a href="https://www.iarpa.gov/index.php/research-programs/virtue">VirtUE (Virtuous User Environment)</a> is an IARPA program managed by Mr. Kerry Long that is an example of using the cloud and re-engineering it to be more secure for tomorrow. Traditional memory computers are running too many roles at once while in comparison cloud computing can separate roles. VirtUE is trying to engineer ways to make the separate environments function seamlessly for users while maintaining the security. This program is coming to an end soon, and will be released as open source code for the world to examine and work on.</p><p>VirtUE is related to <a href="https://www.iarpa.gov/index.php/research-programs/scite">SCITE (Scientific advances to Continuous Insider Threat Evaluation)</a></p><p>Link to IARPA: <a href="http://www.iarpa.gov">www.iarpa.gov</a> IARPA facilitates the transition of research results to their Intelligence Community customers for operational application.</p><p>Link to IARPA profile for Kerry Long: <a href="https://www.iarpa.gov/index.php/20-program-managers">https://www.iarpa.gov/index.php/20-program-managers</a></p><p> </p><p><strong>TIME STAMPS</strong></p><p>00:07 Cloud Computing</p><p>01:11 Who is Kerry Long, IARPA, Cybersecurity</p><p>02:00 Mission of IARPA</p><p>02:45 Cloud Security and Potential of Cloud Computing</p><p>03:59 Getting Ahead of Security Breaches</p><p>05:35 What is the most critical aspect of cloud security?</p><p>07:11 Cloud security options for businesses and individuals</p><p>09:58 What data is at risk of being stolen?</p><p>12:38 Cyber Engineering</p><p>13:50 Cloud Engineering & Infrastructure</p><p>15:18 What is a VirtUE – Virtuous User Environment?</p><p>18:59 How Safe is our Cyber Community?</p><p>21:00 Redesigning Computing with the Cloud</p><p>23:22 The Future of Computing</p><p>24:18 VirtUE as Open Source</p>
]]></content:encoded>
      <enclosure length="24303333" type="audio/mpeg" url="https://dts.podtrac.com/redirect.mp3/cdn.simplecast.com/audio/ba5244/ba5244e0-cb0d-4762-b681-e884e01b43fb/9485fd33-683a-4b7a-9a37-68def9f9f885/no-password-required-with-kerry-long_tc.mp3?aid=rss_feed&amp;feed=YGJgknbK"/>
      <itunes:title>Securing the Cloud, VirtUE, and “Cyber Space” – the Truly Human Domain</itunes:title>
      <itunes:author>Kerry Long, Sarina Fazan</itunes:author>
      <itunes:duration>00:25:16</itunes:duration>
      <itunes:summary>Our lives are changing every day because of the way that we interact in the virtual landscape.  Kerry Long, a program manager at IARPA, shares what his team is working on to make cloud computing more secure now and in the future. One reason he loves the cloud environment is because of its flexibility and the ability to innovate. Computer engineers are now able to resolve cyber risks much easier than in traditional computing infrastructures. Kerry dives into what it means to be in this human domain, how cybersecurity is evolving, and what this means for the cyber community, businesses, and individuals. He also discusses the IARPA VirtUE program and how virtuous user environments need to change to mitigate breaches.</itunes:summary>
      <itunes:subtitle>Our lives are changing every day because of the way that we interact in the virtual landscape.  Kerry Long, a program manager at IARPA, shares what his team is working on to make cloud computing more secure now and in the future. One reason he loves the cloud environment is because of its flexibility and the ability to innovate. Computer engineers are now able to resolve cyber risks much easier than in traditional computing infrastructures. Kerry dives into what it means to be in this human domain, how cybersecurity is evolving, and what this means for the cyber community, businesses, and individuals. He also discusses the IARPA VirtUE program and how virtuous user environments need to change to mitigate breaches.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>7</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">de862fd1-d834-4265-8339-d3853f46036c</guid>
      <title>Solutions to the Cybersecurity Personnel Gap</title>
      <description><![CDATA[<p>This is part two of a two-part special edition that was recorded at the 2019 Cyber Florida Conference. In the first part, a panel of cybersecurity experts discussed “Cybersecurity and the C-Suite,” while the second part discusses partnerships and opportunities that bridge the gap for qualified cybersecurity personnel and our interconnected cyber ecosystem. The panel was moderated by Sprint’s Chief Information Security Officer Mark Clancy. On the panel sat three cybersecurity professionals who have years of expertise: Diane Janosek, Commandant of NSA's National Cryptologic School; Andy Zolper, SVP, CISO, and Head of Technology at Raymond James Financial; and Terry Roberts, CEO and Founder of WhiteHawk, Inc. (To learn more about Janosek, Zolper, and Roberts, listen to the The No Password Required Podcast episode titled “Cybersecurity in the C-Suite.”)</p><p>This <i>No Password Required</i> episode began with the question, “What can the big guy do to help the small guy?” and panelists discussed the role of large corporations and technology service providers. Often small-to-mid-sized organizations are understaffed when it comes to their IT department and/or they are solely reliant on external providers for their security. Many larger organizations and service providers are making the investment to provide advanced security protocols because it impacts their products and, for some, it gives them a competitive edge in the marketplace. Larger corporations and service providers are carrying the responsibility of protecting smaller organizations, but it is a symbiotic relationship. Smaller organizations must do their part to have good cyber hygiene and understand their risks and their roles in preventing those risks.</p><p>Motivating smaller organizations to have a proactive cyber culture is often dependent on two things: communication and risk. A panelist emphasizes that the success of motivation revolves around language. The key to communicating with C-level executives and business stakeholders is to provide information as it relates to them, using their industry-specific lingo, demonstrating their profit and loss potentials, and illustrating how it impacts their community. By answering “how can we partner in a way that shows that we want to mitigate risks to a point that we’re a stronger business partner” can solve some of the gaps in cybersecurity. “Don’t wait for someone to offer, ask,” is the advice of Andy Zolper when it comes to mitigating risks.</p><p>Mark Clancy asked the panel, “How do you cyberize the CEO?” Cyberizing the CEO often begins with a review of their cybersecurity risk profile. By mapping risks to reputation and quantifying revenue to business impact can be the necessary wake-up call. “Cyberizing” was a phrase coined in part 1 of this series that is interpreted as educating/training C-level professionals to understand their company’s tech, their role in cybersecurity and operations, and their leadership in corporate cyber culture. “Cyberizing” encourages insight that helps build an adequate IT team or relationship with technology service providers. Cyberizing naturally encourages investing in employees as the greatest assets. It holds the belief that employees are responsible for maintaining good cyber hygiene, managing customer and partner relationships, and evolving with technology.</p><p>Another solution offered is “cyberizing the principal.” This involves instilling the value of cybersecurity as soon as a child is handed technology. One panelist advocates for developing educational programs that incorporate cybersecurity in programs from elementary to college, with her belief that it will carryover good cyber hygiene from the home to the public and business sectors.</p><p>Another component of closing the cybersecurity personnel gap is by encouraging information sharing in new ways, as well as, encouraging IT professionals to transition through various sectors and educational opportunities to keep their experience fresh and relevant. The panel discussed some of the current issues and possible solutions that involve sharing information, the importance of nonprofit interlocutors, the problem with classified versus unclassified information sharing, zero trust, and more. The cybersecurity experts also discussed educational opportunities, crossover through sectors and the role of leveraging academia and cyber labs to find solutions.</p><p>In the final segment of the podcast, the guests discuss some of the highlights of the 2019 Cyber Florida Conference and list topics that they would like explored at the future conferences.</p><p>You can find part 1 and 2, as well as other episodes of No Password Required Podcast, on our website at https://cyberflorida.org/podcast/. This special edition was recorded at the 2019 Cyber Florida Conference in Tampa, Florida. Learn about upcoming Cyber Florida events, including the Annual Conference, at cyberflorida.org or follow us on social media.</p><p>TIME STAMPS</p><p>01:30 Partnering Competitively & Cyber Ecosystem</p><p>07:17 Cyberizing the CEO</p><p>10:43 Cyberizing the Principal</p><p>13:48 Public-Private Partnerships</p><p>15:51 Nonprofit Interlocutor & Scaling Partnerships</p><p>17:32 Collaborating for Information Sharing</p><p>19:00 Zero Trust</p><p>24:42 Classified vs Unclassified Sharing</p><p>25:30 Surprises from the Cyber Florida Conference</p>
]]></description>
      <pubDate>Fri, 14 Feb 2020 15:00:11 +0000</pubDate>
      <author>rex2@cyberflorida.org (Andy Zolper, Bill McQueen, Diane Janosek, Terry Roberts, Mark Clancy)</author>
      <link>https://no-password-required.simplecast.com/episodes/solutions-to-the-cybersecurity-personnel-gap-7dKrrMuW</link>
      <content:encoded><![CDATA[<p>This is part two of a two-part special edition that was recorded at the 2019 Cyber Florida Conference. In the first part, a panel of cybersecurity experts discussed “Cybersecurity and the C-Suite,” while the second part discusses partnerships and opportunities that bridge the gap for qualified cybersecurity personnel and our interconnected cyber ecosystem. The panel was moderated by Sprint’s Chief Information Security Officer Mark Clancy. On the panel sat three cybersecurity professionals who have years of expertise: Diane Janosek, Commandant of NSA's National Cryptologic School; Andy Zolper, SVP, CISO, and Head of Technology at Raymond James Financial; and Terry Roberts, CEO and Founder of WhiteHawk, Inc. (To learn more about Janosek, Zolper, and Roberts, listen to the The No Password Required Podcast episode titled “Cybersecurity in the C-Suite.”)</p><p>This <i>No Password Required</i> episode began with the question, “What can the big guy do to help the small guy?” and panelists discussed the role of large corporations and technology service providers. Often small-to-mid-sized organizations are understaffed when it comes to their IT department and/or they are solely reliant on external providers for their security. Many larger organizations and service providers are making the investment to provide advanced security protocols because it impacts their products and, for some, it gives them a competitive edge in the marketplace. Larger corporations and service providers are carrying the responsibility of protecting smaller organizations, but it is a symbiotic relationship. Smaller organizations must do their part to have good cyber hygiene and understand their risks and their roles in preventing those risks.</p><p>Motivating smaller organizations to have a proactive cyber culture is often dependent on two things: communication and risk. A panelist emphasizes that the success of motivation revolves around language. The key to communicating with C-level executives and business stakeholders is to provide information as it relates to them, using their industry-specific lingo, demonstrating their profit and loss potentials, and illustrating how it impacts their community. By answering “how can we partner in a way that shows that we want to mitigate risks to a point that we’re a stronger business partner” can solve some of the gaps in cybersecurity. “Don’t wait for someone to offer, ask,” is the advice of Andy Zolper when it comes to mitigating risks.</p><p>Mark Clancy asked the panel, “How do you cyberize the CEO?” Cyberizing the CEO often begins with a review of their cybersecurity risk profile. By mapping risks to reputation and quantifying revenue to business impact can be the necessary wake-up call. “Cyberizing” was a phrase coined in part 1 of this series that is interpreted as educating/training C-level professionals to understand their company’s tech, their role in cybersecurity and operations, and their leadership in corporate cyber culture. “Cyberizing” encourages insight that helps build an adequate IT team or relationship with technology service providers. Cyberizing naturally encourages investing in employees as the greatest assets. It holds the belief that employees are responsible for maintaining good cyber hygiene, managing customer and partner relationships, and evolving with technology.</p><p>Another solution offered is “cyberizing the principal.” This involves instilling the value of cybersecurity as soon as a child is handed technology. One panelist advocates for developing educational programs that incorporate cybersecurity in programs from elementary to college, with her belief that it will carryover good cyber hygiene from the home to the public and business sectors.</p><p>Another component of closing the cybersecurity personnel gap is by encouraging information sharing in new ways, as well as, encouraging IT professionals to transition through various sectors and educational opportunities to keep their experience fresh and relevant. The panel discussed some of the current issues and possible solutions that involve sharing information, the importance of nonprofit interlocutors, the problem with classified versus unclassified information sharing, zero trust, and more. The cybersecurity experts also discussed educational opportunities, crossover through sectors and the role of leveraging academia and cyber labs to find solutions.</p><p>In the final segment of the podcast, the guests discuss some of the highlights of the 2019 Cyber Florida Conference and list topics that they would like explored at the future conferences.</p><p>You can find part 1 and 2, as well as other episodes of No Password Required Podcast, on our website at https://cyberflorida.org/podcast/. This special edition was recorded at the 2019 Cyber Florida Conference in Tampa, Florida. Learn about upcoming Cyber Florida events, including the Annual Conference, at cyberflorida.org or follow us on social media.</p><p>TIME STAMPS</p><p>01:30 Partnering Competitively & Cyber Ecosystem</p><p>07:17 Cyberizing the CEO</p><p>10:43 Cyberizing the Principal</p><p>13:48 Public-Private Partnerships</p><p>15:51 Nonprofit Interlocutor & Scaling Partnerships</p><p>17:32 Collaborating for Information Sharing</p><p>19:00 Zero Trust</p><p>24:42 Classified vs Unclassified Sharing</p><p>25:30 Surprises from the Cyber Florida Conference</p>
]]></content:encoded>
      <enclosure length="29973467" type="audio/mpeg" url="https://dts.podtrac.com/redirect.mp3/cdn.simplecast.com/audio/ba5244/ba5244e0-cb0d-4762-b681-e884e01b43fb/dc53b702-8e96-4c4c-b5d2-d1d6c6b0ab40/no-password-required-cyber-conference-part-2_tc.mp3?aid=rss_feed&amp;feed=YGJgknbK"/>
      <itunes:title>Solutions to the Cybersecurity Personnel Gap</itunes:title>
      <itunes:author>Andy Zolper, Bill McQueen, Diane Janosek, Terry Roberts, Mark Clancy</itunes:author>
      <itunes:duration>00:31:10</itunes:duration>
      <itunes:summary>This is the second part of a special edition recorded at the 2019 Cyber Florida Conference where panelists covered the topic of “Solutions to the Cybersecurity Personnel Gap.” Panelists discuss how businesses and technology service providers must work together to close security gaps, share information, and grow cybersecurity talent.</itunes:summary>
      <itunes:subtitle>This is the second part of a special edition recorded at the 2019 Cyber Florida Conference where panelists covered the topic of “Solutions to the Cybersecurity Personnel Gap.” Panelists discuss how businesses and technology service providers must work together to close security gaps, share information, and grow cybersecurity talent.</itunes:subtitle>
      <itunes:keywords>it education, cyber hygiene, cybercrime, artificial intelligence, intellectual property, cybersecurity in universities, zero trust, data sets, risk analysis, information sharing, nonprofit interlocutor, technology, infrastructure, it professionals, cybersecurity, government role in cybersecurity, it personnel, cyber florida, cyberizing, cyber florida no password required podcast, c-suite cybersecurity, profit and loss, industry security, cyber labs, cyber ecosystem, data breach, cybersecurity personnel, organizational cyber goals, classified information, fraud</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>6</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">a9a12197-7421-49be-8707-daa7295c61dc</guid>
      <title>Cybersecurity and the C-Suite</title>
      <description><![CDATA[<p>During Cyber Florida Conference 2019, a panel of respected cybersecurity experts gathered to share their insights on how cybersecurity impacts the C-level professional, changes in accountability and business models, and what it means to build a cyber-strong workforce. The panel was moderated by Mark Clancy, Chief Information Security Officer (CISO) for Sprint. The esteemed guests on the panel were Diane Janosek, NSA Commandant of the National Cryptologic School; Andy Zolper, SVP, CISO, and Head of Technology Infrastructure for Raymond James Financial; and Terry Roberts, Founder and President of WhiteHawk, Inc.</p><p>C-level professionals have been a driving force in developing business and securing infrastructures. Recent breaches resulting in CEO firings and similar repercussions are impacting the way many C-level leaders are engaging with technology and their workforce’s cyber culture. Cyber Florida took the opportunity at the conference to help both the C-level professionals and stakeholders who are part of their decision-making process with a discussion titled “Cybersecurity and the C-Suite.” The panelists discussed why it is vital for C-level executives to embrace cybersecurity education and innovation. The experts spoke to what factors C-level leadership face in their organization and workforce in relation to security, networking, and data fundamentals. A large portion of the conversation focused on identifying what it takes to onboard a workforce in this computer-centric modern life (with the phrase “cyberize” being coined to discuss the process), and understanding the crossover that is occurring because of the inter-connectivity of roles and risks.</p><p>Panelists discussed case studies and resources, such as cyber executive programs, where C-level professionals can:</p><ul><li>learn the basics of cybersecurity,</li><li>embrace accountability at the C-level,</li><li>identify the risks and opportunities of current infrastructure and future tech,</li><li>learn how certain business models are changing as a response to technology,</li><li>establish pillars for a robust cyber culture,</li><li>understand independent cyber risk ratings as a commodity,</li><li>develop a cyber-strong workforce, and</li><li>create a constructive response plan to cybersecurity attacks and cybercrimes.</li></ul><p>This is a two-part edition with the second part discussing the personnel gap in cybersecurity and what can be done about it. You can find parts 1 and 2, as well as other episodes of No Password Required podcast, on our website at <a href="https://cyberflorida.org/podcast/">https://cyberflorida.org/podcast/</a>. This special edition was recorded at Cyber Florida Conference 2019 in Tampa, Florida. Learn about upcoming Cyber Florida events, including the annual conference, at cyberflorida.org or follow us on social media.</p><p><strong>TIME STAMPS</strong></p><p>00:42 Who is Diane Janosek, Cybersecurity Expert, Cyber Security Woman of the Year</p><p>02:03 Who is Andy Zolper, CISO at Raymond James Financial</p><p>02:45 Who is Terry Roberts, Cybersecurity Exchange</p><p>03:58 How to Communicate Cybersecurity to Leadership</p><p>07:25 C-Level Accountability, Cyber Risk Ratings are a Commodity, Cyber Executive Program</p><p>09:53 Hiring a Cybersecurity Workforce and Training a Cybersecurity Culture</p><p>15:55 Innovation in Education for Cybersecurity and Cyber Risk Training</p><p>18:50 Identifying, Leading and Managing Critical Skills</p><p>21:54 Cyberize Your Team, Workforce Crossovers, and Cyber Defense Ecosystem</p><p>26:07 Business Interruption and Constructive Actions to Address Cyber Crimes</p><p>27:35 Cyber Executive Programs and Case Management</p>
]]></description>
      <pubDate>Fri, 31 Jan 2020 16:13:02 +0000</pubDate>
      <author>rex2@cyberflorida.org (Andy Zolper, Mark Clancy, Terry Roberts, Bill McQueen, Diane Janosek)</author>
      <link>https://no-password-required.simplecast.com/episodes/cybersecurity-and-the-c-suite-YIdUuf94</link>
      <content:encoded><![CDATA[<p>During Cyber Florida Conference 2019, a panel of respected cybersecurity experts gathered to share their insights on how cybersecurity impacts the C-level professional, changes in accountability and business models, and what it means to build a cyber-strong workforce. The panel was moderated by Mark Clancy, Chief Information Security Officer (CISO) for Sprint. The esteemed guests on the panel were Diane Janosek, NSA Commandant of the National Cryptologic School; Andy Zolper, SVP, CISO, and Head of Technology Infrastructure for Raymond James Financial; and Terry Roberts, Founder and President of WhiteHawk, Inc.</p><p>C-level professionals have been a driving force in developing business and securing infrastructures. Recent breaches resulting in CEO firings and similar repercussions are impacting the way many C-level leaders are engaging with technology and their workforce’s cyber culture. Cyber Florida took the opportunity at the conference to help both the C-level professionals and stakeholders who are part of their decision-making process with a discussion titled “Cybersecurity and the C-Suite.” The panelists discussed why it is vital for C-level executives to embrace cybersecurity education and innovation. The experts spoke to what factors C-level leadership face in their organization and workforce in relation to security, networking, and data fundamentals. A large portion of the conversation focused on identifying what it takes to onboard a workforce in this computer-centric modern life (with the phrase “cyberize” being coined to discuss the process), and understanding the crossover that is occurring because of the inter-connectivity of roles and risks.</p><p>Panelists discussed case studies and resources, such as cyber executive programs, where C-level professionals can:</p><ul><li>learn the basics of cybersecurity,</li><li>embrace accountability at the C-level,</li><li>identify the risks and opportunities of current infrastructure and future tech,</li><li>learn how certain business models are changing as a response to technology,</li><li>establish pillars for a robust cyber culture,</li><li>understand independent cyber risk ratings as a commodity,</li><li>develop a cyber-strong workforce, and</li><li>create a constructive response plan to cybersecurity attacks and cybercrimes.</li></ul><p>This is a two-part edition with the second part discussing the personnel gap in cybersecurity and what can be done about it. You can find parts 1 and 2, as well as other episodes of No Password Required podcast, on our website at <a href="https://cyberflorida.org/podcast/">https://cyberflorida.org/podcast/</a>. This special edition was recorded at Cyber Florida Conference 2019 in Tampa, Florida. Learn about upcoming Cyber Florida events, including the annual conference, at cyberflorida.org or follow us on social media.</p><p><strong>TIME STAMPS</strong></p><p>00:42 Who is Diane Janosek, Cybersecurity Expert, Cyber Security Woman of the Year</p><p>02:03 Who is Andy Zolper, CISO at Raymond James Financial</p><p>02:45 Who is Terry Roberts, Cybersecurity Exchange</p><p>03:58 How to Communicate Cybersecurity to Leadership</p><p>07:25 C-Level Accountability, Cyber Risk Ratings are a Commodity, Cyber Executive Program</p><p>09:53 Hiring a Cybersecurity Workforce and Training a Cybersecurity Culture</p><p>15:55 Innovation in Education for Cybersecurity and Cyber Risk Training</p><p>18:50 Identifying, Leading and Managing Critical Skills</p><p>21:54 Cyberize Your Team, Workforce Crossovers, and Cyber Defense Ecosystem</p><p>26:07 Business Interruption and Constructive Actions to Address Cyber Crimes</p><p>27:35 Cyber Executive Programs and Case Management</p>
]]></content:encoded>
      <enclosure length="31560540" type="audio/mpeg" url="https://dts.podtrac.com/redirect.mp3/cdn.simplecast.com/audio/ba5244/ba5244e0-cb0d-4762-b681-e884e01b43fb/d2dc54e0-55ed-499a-bb1a-7536b0382cbd/no-password-required-cyber-conference-part-1_tc.mp3?aid=rss_feed&amp;feed=YGJgknbK"/>
      <itunes:title>Cybersecurity and the C-Suite</itunes:title>
      <itunes:author>Andy Zolper, Mark Clancy, Terry Roberts, Bill McQueen, Diane Janosek</itunes:author>
      <itunes:duration>00:32:49</itunes:duration>
      <itunes:summary>This is a special two-part series recorded at Cyber Florida Conference 2019. In this episode, panelists cover “Cybersecurity and the C-Suite.&quot; The panel discusses how C-level executives can be educated about cyber risks, accountability, and building a cyber-aware culture. The panel dives into hiring, training, and educating a workforce with an emphasis on the tech field, critical skills, and crossover for an organization’s entire team.</itunes:summary>
      <itunes:subtitle>This is a special two-part series recorded at Cyber Florida Conference 2019. In this episode, panelists cover “Cybersecurity and the C-Suite.&quot; The panel discusses how C-level executives can be educated about cyber risks, accountability, and building a cyber-aware culture. The panel dives into hiring, training, and educating a workforce with an emphasis on the tech field, critical skills, and crossover for an organization’s entire team.</itunes:subtitle>
      <itunes:keywords>analysts, data breaches, change control, business sector, inclusion, cyberize, education, cyber hygiene, crossover, building capacity, business interruption, economic security, business model, researchers, risk recon, cybersecurity management, developers, team development, cyber executive program, c suite cybersecurity, ransomware, national security, data scientists, bitsight security scorecard, technology, enterprise, cybersecurity skill set, maersk breach, notpetya, critical thinking, webinars, cyber florida, cyber florida no password required podcast, critical infrastructure, case study method, c level cyber training, cyber psychology, ceo cyber training, security indicators, accountability, workforce training, cyber risk ratings, workforce, real-time backups, cyber culture, human resources, malware, cyber defense ecosystem, cryptographer, stock prices, leadership, business continuity models for cybersecurity, strategic thinking, data backup, e-learning, team orientation, innovation, fraud</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>5</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">8d519e74-c097-4546-a1e2-22475061fb67</guid>
      <title>How is Artificial Intelligence Changing Cyber Crime?</title>
      <description><![CDATA[<p>Cyber threat intelligence is a conceptual term with an international impact. Agencies around the world are racing to identify and stop cybercriminals from infecting and infiltrating networks to use our data against us. In this episode of No Password Required, Dr. Sagar Samtani, assistant professor of information systems and decision sciences at the University of South Florida, explains the cyber threat intelligence (CTI) life cycle and what you and/or your organization should do to help protect data assets and prevent cyberattacks.</p><p>Data is the prime target of many cybercriminals, yet what data they are searching depends on their goals. Are they scraping for social security numbers? Obtaining passwords? Collecting credit card numbers? Or worse? And why? It’s hard to imagine all the ways that data can be exploited.</p><p>Your data is widely available depending on where and how you store your data and whom you give permission to access that information. Personal choices, like having a smartphone, can be a gateway to someone collecting your data. Being on the grid with a social security number, health insurance, financial accounts, all these bits of information are housed somewhere, and cybercriminals know this. With the help of artificial intelligence (AI), cybercriminals are able to scrape data faster than ever before and with the launch of quantum machines, our security choices will be paramount to protecting our identity and data assets.</p><p>Cyber threat intelligence is helping individuals and industries protect themselves by understanding what is important, what are the exploits, and how to effectively respond. It is also helping to refine artificial intelligence algorithms to better assist in threat analytics. Dr. Samtani describes how industries are responding to industry-specific cybercrimes and developing response standards, protocols, and frameworks. He gives the example of the healthcare industry and HIPAA compliance as well as financial institutions and their evolving PCI compliance protocols. Understanding why a data asset is a target is a key facet to the cyber threat intelligence life cycle.</p><p> </p><p>What are the Four Phases of Cyber Threat Intelligence?</p><ol><li>Identify what assets you (an organization) possess that hold value, e.g., a social security number, and how to protect those assets</li><li>Data collection that is relevant to those critical cyber assets</li><li>Threat analytics – whether traditional or AI techniques are being utilized</li><li>Operational Intelligence – how is the compromised data actually used or exploited</li></ol><p>Dr. Samtani explains there are two basic types of cyber threat intelligence analytics. First are the traditional threats, such as malware analysis. The second category is quickly changing as artificial intelligence evolves: data mining, text mining, and natural language processing based on pattern and techniques. Building systems that are designed to log and report data is crucial to discovering breaches and reporting them to prevent further penetration.</p><p> </p><p>Once Data is Stolen, Where Does it Go?</p><p>Dr. Samtani discusses how hackers, cybercriminals, even geopolitical threat actors are using the data. He explains how the Dark Web is playing a role as a marketplace and toolbox for hackers. He details the four basic platforms--forums, Dark Web marketplaces, darknet carding shops, and internet relay chat--that cybercriminals use to complete their tasks and possibly grow their notoriety. Hacker behavior on the Dark Web is unlike traditional crime circuits where anonymity is preferred. There are tiers of hacker and they can use their screen names to build their reputation for monetization, credibility, and recognition. Artificial intelligence is being fine-tuned to help detect cybercriminals through intelligent predictions.</p><p> </p><p>Security Protocols and the Danger of Oversharing</p><p>Individuals, organizations, developers, and even marketers play a role in security. Developers who were once tasked in racing product to market are now evolving to build-in and protect against exploits. Cultures are changing to bring awareness of the dangers of oversharing and learning from other’s breaches and incidents. Dr. Samtani and No Password Required host Bill McQueen discuss how oversharing can be as simple as a phone call asking what version a software is on and divulging that information, likening that to handing over the keys to a car.</p><p> </p><p>The Study of Cybersecurity Science</p><p>As computing evolves, so do the crimes; the cybersecurity field is in the infancy of where it will be potentially. Developing talented professionals to stop cybercriminals, building frameworks and protocols, and advocating for strong cyber cultures at home and in the workplace will be essential to the future. There is ample opportunity for employment and research in the field of cybersecurity, cyber threat research, and cyber threat intelligence.</p><p> </p><p><strong>TIME STAMPS</strong></p><p>1:12 Who is Dr. Sagar Samtani</p><p>1:30 How Does AI Automate Cybercrime and Cyber Threat Intelligence</p><p>3:08 The Four Phases of the Cyber Threat Intelligence Life Cycle</p><p>7:43 How Do You Rate and Respond to a Cyber Threat</p><p>10:03 Industry Specific Frameworks for Threat Identification and Mitigation</p><p>10:24 Data Characteristics in Cybersecurity</p><p>11:20 Defcon and AI Village</p><p>11:48 Tuning Algorithms for Cybersecurity</p><p>12:54 How are Hackers Fighting Against AI Detection</p><p>13:53 Developing Organizational Strategies to Counter Cybercrime</p><p>15:19 Cybersecurity/AI Ethics and Rules</p><p>18:40 Dark Web & Data</p><p>19:38 Dark Web Platforms</p><p>22:53 Access to Dark Web Platforms</p><p>23:50 Hacker Notoriety – Reputation, Monetization and Detection</p><p>27:40 Developers & Cyber Security Protocols</p><p>29:35 Double-Edged Sword of Sharing Cybersecurity Capabilities</p><p>30:40 Operational Intelligence and Risk Management</p><p>31:58 Hacker Behavior on the Dark Web/Darknet</p><p>33:40 What Can We Do to Protect Ourselves? Following the CTI Lifecycle</p><p>35:44 Cybersecurity Science as a Legitimate Field</p>
]]></description>
      <pubDate>Fri, 17 Jan 2020 15:00:29 +0000</pubDate>
      <author>rex2@cyberflorida.org (Bill McQueen, Dr. Sagar Samtani)</author>
      <link>https://no-password-required.simplecast.com/episodes/how-is-artificial-intelligence-changing-cyber-crime-owEKHl2F</link>
      <content:encoded><![CDATA[<p>Cyber threat intelligence is a conceptual term with an international impact. Agencies around the world are racing to identify and stop cybercriminals from infecting and infiltrating networks to use our data against us. In this episode of No Password Required, Dr. Sagar Samtani, assistant professor of information systems and decision sciences at the University of South Florida, explains the cyber threat intelligence (CTI) life cycle and what you and/or your organization should do to help protect data assets and prevent cyberattacks.</p><p>Data is the prime target of many cybercriminals, yet what data they are searching depends on their goals. Are they scraping for social security numbers? Obtaining passwords? Collecting credit card numbers? Or worse? And why? It’s hard to imagine all the ways that data can be exploited.</p><p>Your data is widely available depending on where and how you store your data and whom you give permission to access that information. Personal choices, like having a smartphone, can be a gateway to someone collecting your data. Being on the grid with a social security number, health insurance, financial accounts, all these bits of information are housed somewhere, and cybercriminals know this. With the help of artificial intelligence (AI), cybercriminals are able to scrape data faster than ever before and with the launch of quantum machines, our security choices will be paramount to protecting our identity and data assets.</p><p>Cyber threat intelligence is helping individuals and industries protect themselves by understanding what is important, what are the exploits, and how to effectively respond. It is also helping to refine artificial intelligence algorithms to better assist in threat analytics. Dr. Samtani describes how industries are responding to industry-specific cybercrimes and developing response standards, protocols, and frameworks. He gives the example of the healthcare industry and HIPAA compliance as well as financial institutions and their evolving PCI compliance protocols. Understanding why a data asset is a target is a key facet to the cyber threat intelligence life cycle.</p><p> </p><p>What are the Four Phases of Cyber Threat Intelligence?</p><ol><li>Identify what assets you (an organization) possess that hold value, e.g., a social security number, and how to protect those assets</li><li>Data collection that is relevant to those critical cyber assets</li><li>Threat analytics – whether traditional or AI techniques are being utilized</li><li>Operational Intelligence – how is the compromised data actually used or exploited</li></ol><p>Dr. Samtani explains there are two basic types of cyber threat intelligence analytics. First are the traditional threats, such as malware analysis. The second category is quickly changing as artificial intelligence evolves: data mining, text mining, and natural language processing based on pattern and techniques. Building systems that are designed to log and report data is crucial to discovering breaches and reporting them to prevent further penetration.</p><p> </p><p>Once Data is Stolen, Where Does it Go?</p><p>Dr. Samtani discusses how hackers, cybercriminals, even geopolitical threat actors are using the data. He explains how the Dark Web is playing a role as a marketplace and toolbox for hackers. He details the four basic platforms--forums, Dark Web marketplaces, darknet carding shops, and internet relay chat--that cybercriminals use to complete their tasks and possibly grow their notoriety. Hacker behavior on the Dark Web is unlike traditional crime circuits where anonymity is preferred. There are tiers of hacker and they can use their screen names to build their reputation for monetization, credibility, and recognition. Artificial intelligence is being fine-tuned to help detect cybercriminals through intelligent predictions.</p><p> </p><p>Security Protocols and the Danger of Oversharing</p><p>Individuals, organizations, developers, and even marketers play a role in security. Developers who were once tasked in racing product to market are now evolving to build-in and protect against exploits. Cultures are changing to bring awareness of the dangers of oversharing and learning from other’s breaches and incidents. Dr. Samtani and No Password Required host Bill McQueen discuss how oversharing can be as simple as a phone call asking what version a software is on and divulging that information, likening that to handing over the keys to a car.</p><p> </p><p>The Study of Cybersecurity Science</p><p>As computing evolves, so do the crimes; the cybersecurity field is in the infancy of where it will be potentially. Developing talented professionals to stop cybercriminals, building frameworks and protocols, and advocating for strong cyber cultures at home and in the workplace will be essential to the future. There is ample opportunity for employment and research in the field of cybersecurity, cyber threat research, and cyber threat intelligence.</p><p> </p><p><strong>TIME STAMPS</strong></p><p>1:12 Who is Dr. Sagar Samtani</p><p>1:30 How Does AI Automate Cybercrime and Cyber Threat Intelligence</p><p>3:08 The Four Phases of the Cyber Threat Intelligence Life Cycle</p><p>7:43 How Do You Rate and Respond to a Cyber Threat</p><p>10:03 Industry Specific Frameworks for Threat Identification and Mitigation</p><p>10:24 Data Characteristics in Cybersecurity</p><p>11:20 Defcon and AI Village</p><p>11:48 Tuning Algorithms for Cybersecurity</p><p>12:54 How are Hackers Fighting Against AI Detection</p><p>13:53 Developing Organizational Strategies to Counter Cybercrime</p><p>15:19 Cybersecurity/AI Ethics and Rules</p><p>18:40 Dark Web & Data</p><p>19:38 Dark Web Platforms</p><p>22:53 Access to Dark Web Platforms</p><p>23:50 Hacker Notoriety – Reputation, Monetization and Detection</p><p>27:40 Developers & Cyber Security Protocols</p><p>29:35 Double-Edged Sword of Sharing Cybersecurity Capabilities</p><p>30:40 Operational Intelligence and Risk Management</p><p>31:58 Hacker Behavior on the Dark Web/Darknet</p><p>33:40 What Can We Do to Protect Ourselves? Following the CTI Lifecycle</p><p>35:44 Cybersecurity Science as a Legitimate Field</p>
]]></content:encoded>
      <enclosure length="35655976" type="audio/mpeg" url="https://dts.podtrac.com/redirect.mp3/cdn.simplecast.com/audio/ba5244/ba5244e0-cb0d-4762-b681-e884e01b43fb/ae069be4-c161-4fca-a0a6-a2b9c87d2cde/no-password-required-with-sagar-samtani_tc.mp3?aid=rss_feed&amp;feed=YGJgknbK"/>
      <itunes:title>How is Artificial Intelligence Changing Cyber Crime?</itunes:title>
      <itunes:author>Bill McQueen, Dr. Sagar Samtani</itunes:author>
      <itunes:duration>00:37:05</itunes:duration>
      <itunes:summary>In this episode of No Password Required, our guest Dr. Sagar Samtani shares his research on cyber threat intelligence and the impact that artificial intelligence (AI) is having on cybercriminals and cybersecurity.  Dr. Samtani discusses platforms on the Dark Web, hacker behavior, and operational intelligence to identify and mitigate exploits and breaches.</itunes:summary>
      <itunes:subtitle>In this episode of No Password Required, our guest Dr. Sagar Samtani shares his research on cyber threat intelligence and the impact that artificial intelligence (AI) is having on cybercriminals and cybersecurity.  Dr. Samtani discusses platforms on the Dark Web, hacker behavior, and operational intelligence to identify and mitigate exploits and breaches.</itunes:subtitle>
      <itunes:keywords>cybercrimes, cyber assets, mitre cybersecurity, hacker detection, ai predictions, dark net carding shops, defcon, cybercriminals, ai, and natural language processing, industry-specific cyber practices, cryptomarket, artificial intelligence, forums, platforms, al algorithms, developers, security by design protocols, data dig, artificial intelligence ethics, national institute of standards and technology, cyber security ethics, interpretable ai, cyber security research, monetization, data mining, darknet, ai ethics, operational intelligence, autonomous vehicles, good cyber hygiene, key threat actors, internet relay chat, hipaa compliance, industry regulations, pci compliance, cyber breach, hospitals, framework, hackers, risk management, cti lifecycle, mitre corporation, nist, cyber security, financial institutions, dark web, cyber threat intelligence, text mining, cyber culture, malware, cyber hygiene protocols, data breach, geopolitical cyber crimes, deep web carding, exploits, darknet marketplace, banking, cyber security science</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>4</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">6e8e2cd7-9e16-4dde-b6d3-85b77c30901d</guid>
      <title>Preventing the Cyber Scams That Costs Businesses Billions</title>
      <description><![CDATA[<p>Each year, businesses are losing $12-$13 billion dollars because of cybercrime. One criminal tool is called the Business E-mail Compromise (BEC), aka “The Man in the Middle Attack.” It begins when criminals use information, like that readily found on social media platforms, to target an employee. The criminal may phone or email the employee, gain their trust, steal their identity, compromise and access their emails and the business network (including human resources, banking and client accounts) and so on, all for the ultimate goal of stealing large sums of money.</p><p>In this podcast, Stacy Arruda, a cybersecurity threat specialist, provides insight on how individuals and businesses can better protect themselves against cybercriminals and take steps to prevent criminals from stealing their money or exploitation them in other ways. BECs have seen a 1300% increase since 2015, and, as Arruda says, “it’s no longer a question of 'if,' it’s 'when,' and not just 'when' but when you discover that the bad guys are inside your network.” Businesses have options and they begin with training employees and reporting problems quickly. Having a strong corporate culture that trains employees about proper handling of emails, account security, personal information, and reporting can make a tremendous difference.</p><p>Stacy Arruda is a former FBI supervisory special agent with more than 20 years of experience in cybersecurity and counterintelligence.She is the CEO of the <a href="https://arrudagroup.com/">ARRUDA Group</a>, a cyber threat consultancy firm, and the Executive Director of the not-for-profit Florida Information Sharing and Analysis Organization (FL-ISAO).</p><p>Stacy details how cyber criminals use social media to profile potential victims, building trust to gain access to networks. Anyone can be a target, and cybercriminals do their homework by connecting the dots to gain access to large payouts.</p><p>Arruda notes that women, in particular, seem to overshare information on social media, nearly every aspect of their lives, and it’s a problem. As an educator and speaker, Arruda speaks on how women can better safeguard their information, warning that online activity can escalate to physical threats and exploitation.</p><p>Children can also be targeted. Predators can use simple techniques to lure information from children and they can cross-reference social media to gain information about the family. Gaining a real name online can have a criminal scrolling a family’s social media profile and readily finding things like an email, place of work, child’s school, and after-school activities. Monitoring a child’s online activity and restricting shared information is important to the entire family’s safety.</p><p>The business email compromise,(BEC), also known as “The Man in the Middle Attack,” is a cybersecurity scam that is typically short-lived and aimed at stealing information and money. “Once they send that email, and you click on that email, the bad guy has a lot of avenues that they can go down. Once they're sitting on the network, they can steal data, they can introduce ransomware and shut down the network. They can sit on the computers and they can wait for invoices to come in and wait for payments and steal money,” states Arruda.</p><p>Well-organized criminals, terrorists and spies use the information that is innocuously shared by us to gain our trust so that they can:</p><ul><li>Target email attacks</li><li>Access compromised emails and files anywhere on the network</li><li>Access human resources</li><li>Access business accounts, such as banking</li><li>Disguise themselves as business representatives</li><li>Disguise themselves as clients</li><li>Authorize wire transfers to accounts all over the world</li><li>Change account routing information in a record or during a transaction</li></ul><p>Arruda recommends that companies should have security drills, much like fire drills, to implement a response plan and reinforce the company’s culture on security.</p><p>The FBI has a unit called the Recovery Asset Team, where companies can report a compromise for the possibility of freezing accounts to stop the wire transfer. Time is of the essence relative to how quickly a bank will process a wire transfer; two weeks is far too long, and the money will likely be unrecoverable.</p><p><strong>SOME KEY POINTS:</strong></p><p>Security is often a failure because of two factors:</p><ul><li>Human error, such as misconfiguring software, oversharing information, lack of training on how to spot and report criminal activity, and</li><li>Convenience, such as not taking the time to update system patches, using multifactor authentication, and using our own records to contact clients versus using information found in their email.</li></ul><p>For the individual, Arruda shares that human error and oversharing can be the gateway to being compromised. Having system patches up-to-date, strong passwords, and reducing one’s cyber footprint, such as oversharing personal details or falling for scams because they know our likes and dislikes, can be key to preventing cybersecurity threats at home.</p><p>Defense-in-Depth is a tactic that individuals can use to protect themselves. Having our systems patched, running a firewall, running antivirus software scans, using strong passwords are examples of how an individual or business can add layers of defense against cyber criminals.</p><p>An untrained employee is a liability and changing company culture to encourage calls to higher-ups to confirm requested transactions is a must.</p><p>BEC - 1300% increase since 2015, and it’s getting worse because “it’s an easy way for criminals to make a lot of money quickly” and defense-in-depth is one way to hinder BEC criminals.</p><p>Posting on the internet so openly, especially on social media, is creating opportunities for criminals to target and manipulate individuals. Controlling your footprint on the internet is vital, and being elusive may discourage a criminal from targeting someone.</p><p>Businesses can also add a layer of protection by not sharing/oversharing personal information about their employees, such as the CEO is married to so-and-so and their children’s names are Tom, Becky, and Mike and their ages. Criminals profile and store this information, and this creates unnecessary risk.</p><p>The FL-ISAO, which helps to build cyber resilience for the state of Florida, has an agreement with the Department of Homeland Security to encourage removing the corporate stigma of sharing information to prevent data breaches, hacking, cyber incidents, cyberattacks, and other cybercrimes. Trends show that reporting to the Internet Crime Complaint Center has increased and more and more victims are willingly coming forward. While this is critical, more can be done so the FL-ISAO is expanding to provide training, tips and business support to prevent cybercrimes. Organizations can contact Arruda via <a href="http://www.flisao.org">www.flisao.org</a> or via email at <a href="mailto:info@arrudagroup.com">info@arrudagroup.com</a></p><p> </p><p><strong>TIME STAMPS</strong></p><p>1:00 About Stacy Arruda, Cybersecurity Expert</p><p>1: 38 Oversharing on Social Media Can Compromise Your Security</p><p>2: 51 Using Email to Breach Your Network</p><p>6:41 Reporting Cyber Incidents & Breaches – Time Matters</p><p>7:14 Using Defense-In-Depth to Stop Cyber Crimes</p><p>9: 11 How Convenience Can Cost Billions</p><p>9:50 Human Error: A Major Factor in Cybercrime</p><p>12:41 BEC Crimes</p><p>19:00 Cybercrime Rings Stole $11 Million</p><p>21:28 Victims, Including Businesses, Should Break the Silence</p><p>22:26 Building a Corporate Cyber Culture to Stop Data Breaches & Cyber Crimes</p><p>27:08 Women: Targets of Cyber Crime</p><p>30:22 Cybercriminals Targeting Children</p><p>35:52 Florida Information Sharing and Analysis Organization (FL-ISAO)</p>
]]></description>
      <pubDate>Fri, 6 Dec 2019 15:00:17 +0000</pubDate>
      <author>rex2@cyberflorida.org (Stacy Arruda, Bill McQueen)</author>
      <link>https://no-password-required.simplecast.com/episodes/preventing-the-cyber-scams-that-costs-businesses-billions-cozH2JPn</link>
      <content:encoded><![CDATA[<p>Each year, businesses are losing $12-$13 billion dollars because of cybercrime. One criminal tool is called the Business E-mail Compromise (BEC), aka “The Man in the Middle Attack.” It begins when criminals use information, like that readily found on social media platforms, to target an employee. The criminal may phone or email the employee, gain their trust, steal their identity, compromise and access their emails and the business network (including human resources, banking and client accounts) and so on, all for the ultimate goal of stealing large sums of money.</p><p>In this podcast, Stacy Arruda, a cybersecurity threat specialist, provides insight on how individuals and businesses can better protect themselves against cybercriminals and take steps to prevent criminals from stealing their money or exploitation them in other ways. BECs have seen a 1300% increase since 2015, and, as Arruda says, “it’s no longer a question of 'if,' it’s 'when,' and not just 'when' but when you discover that the bad guys are inside your network.” Businesses have options and they begin with training employees and reporting problems quickly. Having a strong corporate culture that trains employees about proper handling of emails, account security, personal information, and reporting can make a tremendous difference.</p><p>Stacy Arruda is a former FBI supervisory special agent with more than 20 years of experience in cybersecurity and counterintelligence.She is the CEO of the <a href="https://arrudagroup.com/">ARRUDA Group</a>, a cyber threat consultancy firm, and the Executive Director of the not-for-profit Florida Information Sharing and Analysis Organization (FL-ISAO).</p><p>Stacy details how cyber criminals use social media to profile potential victims, building trust to gain access to networks. Anyone can be a target, and cybercriminals do their homework by connecting the dots to gain access to large payouts.</p><p>Arruda notes that women, in particular, seem to overshare information on social media, nearly every aspect of their lives, and it’s a problem. As an educator and speaker, Arruda speaks on how women can better safeguard their information, warning that online activity can escalate to physical threats and exploitation.</p><p>Children can also be targeted. Predators can use simple techniques to lure information from children and they can cross-reference social media to gain information about the family. Gaining a real name online can have a criminal scrolling a family’s social media profile and readily finding things like an email, place of work, child’s school, and after-school activities. Monitoring a child’s online activity and restricting shared information is important to the entire family’s safety.</p><p>The business email compromise,(BEC), also known as “The Man in the Middle Attack,” is a cybersecurity scam that is typically short-lived and aimed at stealing information and money. “Once they send that email, and you click on that email, the bad guy has a lot of avenues that they can go down. Once they're sitting on the network, they can steal data, they can introduce ransomware and shut down the network. They can sit on the computers and they can wait for invoices to come in and wait for payments and steal money,” states Arruda.</p><p>Well-organized criminals, terrorists and spies use the information that is innocuously shared by us to gain our trust so that they can:</p><ul><li>Target email attacks</li><li>Access compromised emails and files anywhere on the network</li><li>Access human resources</li><li>Access business accounts, such as banking</li><li>Disguise themselves as business representatives</li><li>Disguise themselves as clients</li><li>Authorize wire transfers to accounts all over the world</li><li>Change account routing information in a record or during a transaction</li></ul><p>Arruda recommends that companies should have security drills, much like fire drills, to implement a response plan and reinforce the company’s culture on security.</p><p>The FBI has a unit called the Recovery Asset Team, where companies can report a compromise for the possibility of freezing accounts to stop the wire transfer. Time is of the essence relative to how quickly a bank will process a wire transfer; two weeks is far too long, and the money will likely be unrecoverable.</p><p><strong>SOME KEY POINTS:</strong></p><p>Security is often a failure because of two factors:</p><ul><li>Human error, such as misconfiguring software, oversharing information, lack of training on how to spot and report criminal activity, and</li><li>Convenience, such as not taking the time to update system patches, using multifactor authentication, and using our own records to contact clients versus using information found in their email.</li></ul><p>For the individual, Arruda shares that human error and oversharing can be the gateway to being compromised. Having system patches up-to-date, strong passwords, and reducing one’s cyber footprint, such as oversharing personal details or falling for scams because they know our likes and dislikes, can be key to preventing cybersecurity threats at home.</p><p>Defense-in-Depth is a tactic that individuals can use to protect themselves. Having our systems patched, running a firewall, running antivirus software scans, using strong passwords are examples of how an individual or business can add layers of defense against cyber criminals.</p><p>An untrained employee is a liability and changing company culture to encourage calls to higher-ups to confirm requested transactions is a must.</p><p>BEC - 1300% increase since 2015, and it’s getting worse because “it’s an easy way for criminals to make a lot of money quickly” and defense-in-depth is one way to hinder BEC criminals.</p><p>Posting on the internet so openly, especially on social media, is creating opportunities for criminals to target and manipulate individuals. Controlling your footprint on the internet is vital, and being elusive may discourage a criminal from targeting someone.</p><p>Businesses can also add a layer of protection by not sharing/oversharing personal information about their employees, such as the CEO is married to so-and-so and their children’s names are Tom, Becky, and Mike and their ages. Criminals profile and store this information, and this creates unnecessary risk.</p><p>The FL-ISAO, which helps to build cyber resilience for the state of Florida, has an agreement with the Department of Homeland Security to encourage removing the corporate stigma of sharing information to prevent data breaches, hacking, cyber incidents, cyberattacks, and other cybercrimes. Trends show that reporting to the Internet Crime Complaint Center has increased and more and more victims are willingly coming forward. While this is critical, more can be done so the FL-ISAO is expanding to provide training, tips and business support to prevent cybercrimes. Organizations can contact Arruda via <a href="http://www.flisao.org">www.flisao.org</a> or via email at <a href="mailto:info@arrudagroup.com">info@arrudagroup.com</a></p><p> </p><p><strong>TIME STAMPS</strong></p><p>1:00 About Stacy Arruda, Cybersecurity Expert</p><p>1: 38 Oversharing on Social Media Can Compromise Your Security</p><p>2: 51 Using Email to Breach Your Network</p><p>6:41 Reporting Cyber Incidents & Breaches – Time Matters</p><p>7:14 Using Defense-In-Depth to Stop Cyber Crimes</p><p>9: 11 How Convenience Can Cost Billions</p><p>9:50 Human Error: A Major Factor in Cybercrime</p><p>12:41 BEC Crimes</p><p>19:00 Cybercrime Rings Stole $11 Million</p><p>21:28 Victims, Including Businesses, Should Break the Silence</p><p>22:26 Building a Corporate Cyber Culture to Stop Data Breaches & Cyber Crimes</p><p>27:08 Women: Targets of Cyber Crime</p><p>30:22 Cybercriminals Targeting Children</p><p>35:52 Florida Information Sharing and Analysis Organization (FL-ISAO)</p>
]]></content:encoded>
      <enclosure length="36329722" type="audio/mpeg" url="https://dts.podtrac.com/redirect.mp3/cdn.simplecast.com/audio/ba5244/ba5244e0-cb0d-4762-b681-e884e01b43fb/54af28bd-c4ae-4dd7-a9a4-c86fa889b608/no-password-required-with-stacy-arruda_tc.mp3?aid=rss_feed&amp;feed=YGJgknbK"/>
      <itunes:title>Preventing the Cyber Scams That Costs Businesses Billions</itunes:title>
      <itunes:author>Stacy Arruda, Bill McQueen</itunes:author>
      <itunes:duration>00:37:47</itunes:duration>
      <itunes:summary>Cybersecurity specialist Stacy Arruda discusses how to prevent cybercriminals from using our social media, children, and business networks to siphon billions from individuals and businesses.</itunes:summary>
      <itunes:subtitle>Cybersecurity specialist Stacy Arruda discusses how to prevent cybercriminals from using our social media, children, and business networks to siphon billions from individuals and businesses.</itunes:subtitle>
      <itunes:keywords>human error, cybercrime, corporate culture, cyber threat, fl-isao, financing, bec, child exploitation, business email compromise, stacy arruda, hacks, cybersecurity, women vulnerable online, network attack, scams, cyber incident, social media, cyber crime network, fbi, human resources, wire transfers, no password required, data breach, cyber attack, infosec, information technology, threats against women online, banking, defense-in-depth</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>3</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">ff3d463e-22a5-4df3-a16d-817990bd487e</guid>
      <title>How IoT Threats Impact Us All</title>
      <description><![CDATA[<p>From wearables, cellphones, and thermostats to point-of-sale systems, clouds, and critical infrastructure, our world is connected. We’re part of the Internet of Things (IoT) at work, at home, even in our cars and, of course, in our pockets. There are more than 27 billion devices in the world that connect in some way to the internet, and each of those items pose an access threat. Cybersecurity experts like <a href="https://www.trendmicro.com/en_us/about/leading-experts.html">Ed Cabrera</a>, the Chief Cybersecurity Officer for Trend Micro and former Secret Service officer and National Cybersecurity and Communications Integration/Homeland Security advisor, are identifying how data breaches happen and what can be done to prevent them. Ed investigates technology from every aspect, from hotspots to artificial intelligence and machine learning.</p><p><strong>More Than Your Computer Is At Risk</strong></p><p>Vulnerabilities are all around:</p><ul><li>simple connectivity through a wireless fish tank thermostat was all that was needed to access the enterprise system of a casino,</li><li>the Mirai botnet attack targets networked devices, such as home routers and IP cameras,</li><li>the apps we download,</li><li>the patches we forget, and</li><li>the sources we trust all matter.</li></ul><p>Traditionally, risk management for connectivity wasn’t first and foremost in a designer’s mind but increasingly companies’ reputations and responsibilities are being questioned and impacted by product breaches. This is affecting the way leadership and designers approach their products.</p><p>Cabrera suggests that we use the same diligence that we protect our businesses should be applied to our personal lives. Consumers need to investigate if devices that they bring into their home, like Amazon's Alexa, smart TV’s and IP cameras, even printers and smart home services, are subject to threats and what manufacturers are doing to prevent breaches.</p><p><strong>Corporate Culture & Cyber Education</strong></p><p>The evolution of cybersecurity is also changing the executive level of companies. Chief Security Officers and IT managers are keystones in understanding what their developers and researchers are finding and relaying that information to other executives and board members. Cabrera says that CSO’s need to be Chief Translating Officers to ensure decision makers understand the threats and how to prevent them.</p><p>Businesses also play a role in growing the cyber community and closing the personnel gap. There is large gap between currently taught IT and engineering skills and those needed for machine learning and AI. This gap is causing a shortage, and Cabrera estimates that there are 300,000 openings nationally right now in the cybersecurity industry. He advocates for apprenticeship models to foster a partnership between education and employment. The apprenticeship model also addresses the soft skills needed to be an integral part of a company.</p><p>These workers are needed as cybercriminals and nation-state actors are relying on automated crypto ransomware, cyberattacks, cyber manipulation, and identity theft. In 2016, automation helped cybercriminals attempt more than one billion attacks, but now criminals are being pickier to reap a larger reward. Organizations and governments of all sizes continue to be at risk.</p><p> </p><p>Chapters </p><p>What is an IoT? 02:52</p><p>Connectivity is the Door to Data Breaches 03:57</p><p>Digital Extortion 07:15</p><p>Corporate Culture 07:55</p><p>Examples of IoT Breaches 09:11</p><p>Machine Learning and AI Skill Gaps 11:34</p><p>Chief Translating Officer 14:25</p><p>Apprenticeship Models 17:22</p><p>Hacking Medical Records 22:37</p><p>Culture of Cybercriminals 24:34</p><p>Crypto Ransomware and Automation 26:25</p>
]]></description>
      <pubDate>Fri, 22 Nov 2019 15:00:20 +0000</pubDate>
      <author>rex2@cyberflorida.org (Ed Cabrera)</author>
      <link>https://no-password-required.simplecast.com/episodes/how-iot-threats-impact-us-all-11vk6LDb</link>
      <content:encoded><![CDATA[<p>From wearables, cellphones, and thermostats to point-of-sale systems, clouds, and critical infrastructure, our world is connected. We’re part of the Internet of Things (IoT) at work, at home, even in our cars and, of course, in our pockets. There are more than 27 billion devices in the world that connect in some way to the internet, and each of those items pose an access threat. Cybersecurity experts like <a href="https://www.trendmicro.com/en_us/about/leading-experts.html">Ed Cabrera</a>, the Chief Cybersecurity Officer for Trend Micro and former Secret Service officer and National Cybersecurity and Communications Integration/Homeland Security advisor, are identifying how data breaches happen and what can be done to prevent them. Ed investigates technology from every aspect, from hotspots to artificial intelligence and machine learning.</p><p><strong>More Than Your Computer Is At Risk</strong></p><p>Vulnerabilities are all around:</p><ul><li>simple connectivity through a wireless fish tank thermostat was all that was needed to access the enterprise system of a casino,</li><li>the Mirai botnet attack targets networked devices, such as home routers and IP cameras,</li><li>the apps we download,</li><li>the patches we forget, and</li><li>the sources we trust all matter.</li></ul><p>Traditionally, risk management for connectivity wasn’t first and foremost in a designer’s mind but increasingly companies’ reputations and responsibilities are being questioned and impacted by product breaches. This is affecting the way leadership and designers approach their products.</p><p>Cabrera suggests that we use the same diligence that we protect our businesses should be applied to our personal lives. Consumers need to investigate if devices that they bring into their home, like Amazon's Alexa, smart TV’s and IP cameras, even printers and smart home services, are subject to threats and what manufacturers are doing to prevent breaches.</p><p><strong>Corporate Culture & Cyber Education</strong></p><p>The evolution of cybersecurity is also changing the executive level of companies. Chief Security Officers and IT managers are keystones in understanding what their developers and researchers are finding and relaying that information to other executives and board members. Cabrera says that CSO’s need to be Chief Translating Officers to ensure decision makers understand the threats and how to prevent them.</p><p>Businesses also play a role in growing the cyber community and closing the personnel gap. There is large gap between currently taught IT and engineering skills and those needed for machine learning and AI. This gap is causing a shortage, and Cabrera estimates that there are 300,000 openings nationally right now in the cybersecurity industry. He advocates for apprenticeship models to foster a partnership between education and employment. The apprenticeship model also addresses the soft skills needed to be an integral part of a company.</p><p>These workers are needed as cybercriminals and nation-state actors are relying on automated crypto ransomware, cyberattacks, cyber manipulation, and identity theft. In 2016, automation helped cybercriminals attempt more than one billion attacks, but now criminals are being pickier to reap a larger reward. Organizations and governments of all sizes continue to be at risk.</p><p> </p><p>Chapters </p><p>What is an IoT? 02:52</p><p>Connectivity is the Door to Data Breaches 03:57</p><p>Digital Extortion 07:15</p><p>Corporate Culture 07:55</p><p>Examples of IoT Breaches 09:11</p><p>Machine Learning and AI Skill Gaps 11:34</p><p>Chief Translating Officer 14:25</p><p>Apprenticeship Models 17:22</p><p>Hacking Medical Records 22:37</p><p>Culture of Cybercriminals 24:34</p><p>Crypto Ransomware and Automation 26:25</p>
]]></content:encoded>
      <enclosure length="36575893" type="audio/mpeg" url="https://dts.podtrac.com/redirect.mp3/cdn.simplecast.com/audio/ba5244/ba5244e0-cb0d-4762-b681-e884e01b43fb/72db4764-87c1-42f3-a958-d183558fedf5/no-password-required-with-ed-cabrera_tc.mp3?aid=rss_feed&amp;feed=YGJgknbK"/>
      <itunes:title>How IoT Threats Impact Us All</itunes:title>
      <itunes:author>Ed Cabrera</itunes:author>
      <itunes:duration>00:38:02</itunes:duration>
      <itunes:summary>When everything is connected, is anything safe?  No Password Required guest Ed Cabrera helps understand the term &quot;IoT&quot; and what it means in our lives. He discusses how connectivity is changing the role of responsibility and reputation in design, manufacturing, and leadership; the cybersecurity personnel shortage in the age of automation and machine learning; and risk management against ransomware, cyberattacks, cyber manipulation, and identity theft.</itunes:summary>
      <itunes:subtitle>When everything is connected, is anything safe?  No Password Required guest Ed Cabrera helps understand the term &quot;IoT&quot; and what it means in our lives. He discusses how connectivity is changing the role of responsibility and reputation in design, manufacturing, and leadership; the cybersecurity personnel shortage in the age of automation and machine learning; and risk management against ransomware, cyberattacks, cyber manipulation, and identity theft.</itunes:subtitle>
      <itunes:keywords>ai, vpn, machine learning, mirai attack, cyberattack, iot, penetration testing, ransomware, trend micro, cybersecurity, it jobs, iot botnet, cybersecurity industry, cybersecurity education, cloud, executive, malware, digital extortion, device vulnerabilities, no password required, leadership, ed cabrera, it, company culture, cybersecurity jobs, smart home vulnerabilities</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>2</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">5a29f46e-7031-4a0f-a9de-5b51c1e1a87c</guid>
      <title>Roger A. Grimes, KnowBe4’s data-driven defense evangelist</title>
      <description><![CDATA[<p>Can a piece of dust on your touchscreen compromise your data? The answer is yes. We learn how from <i>No Password Required Podcast</i> guest Roger A. Grimes, KnowBe4’s data-driven defense evangelist, whose mission is to educate others about cybersecurity issues that can compromise computers. He shares two of the largest threats of cyberattacks impacting companies: social engineering and unpatched software. His simple advice for avoiding 99% of cyber risks: “Patch your stuff and don’t get tricked into doing something you shouldn’t; you do those two things and you will not get hacked.”</p><p>Roger is a prolific author, blogger and speaker. He shares his 30+ years of penetration testing/ethical hacking expertise with companies and tech professionals to improve their security and defend their network. In this interview, he talks about man-in-the-middle attacks and other social engineering scams that open doors for data breaches. He examines the lack of improvement in technical controls and the proliferation of adversaries and continuous daily malware attempts. Roger also discusses the future of computing with quantum supremacy on the horizon and the threat it poses to public key cryptography. </p><p>Topics in Order:</p><p>Who is Roger A. Grimes?</p><p>Hacking Isn’t That Hard </p><p>Is Misinformation Part of the Cybersecurity Problem</p><p>Anti-Virus and Firewalls Don’t Work - Close Your Computer Exploits by Patching Software </p><p>10 Ways I Can Hack You</p><p>Recognizing Red Flags of Social Engineering</p><p>Why is Hacking Still Such a Problem</p><p>How to Hack Passwords & Multi-factor Authentication</p><p>The Truth Behind Password Lengths and Password Policies</p><p>How to Never Be Hacked</p><p>Is that Dust or Hair on Your Touchscreen? Nope, it’s an Embedded Scam</p><p>What are the Two Biggest Cybersecurity Risks?</p><p>Have You Heard of this Scam? Security Awareness Training and Social Engineering</p><p>Creating a Cyber Culture for Your Employees through Security Awareness Training</p><p>The End of Classic Computing</p><p>Will Quantum Computers Launch in 2019?  The Sprint for Quantum Supremacy</p><p>A Better Future with Quantum Models</p><p>The Downside of Quantum Computers: Breaking the Public Key Cryptography</p><p>The Coming Quantum Break</p><p>Post-Quantum Encryption and Susceptibility </p><p>Has the Quantum Crypto Break Already Happened? </p><p>Is Quantum Supremacy a Big Deal or the Next Y2K?</p><p>What is Crypto-Agility and Will it Matter with Quantum Computing?</p><p>Is Society Becoming Tolerant of Hacking and Cybercrime? Why and What Do We Do About It? </p><p> </p>
]]></description>
      <pubDate>Thu, 7 Nov 2019 19:28:47 +0000</pubDate>
      <author>rex2@cyberflorida.org (Roger Grimes)</author>
      <link>https://no-password-required.simplecast.com/episodes/roger-a-grimes-knowbe4s-data-driven-defense-evangelist-ubbmrz2J</link>
      <content:encoded><![CDATA[<p>Can a piece of dust on your touchscreen compromise your data? The answer is yes. We learn how from <i>No Password Required Podcast</i> guest Roger A. Grimes, KnowBe4’s data-driven defense evangelist, whose mission is to educate others about cybersecurity issues that can compromise computers. He shares two of the largest threats of cyberattacks impacting companies: social engineering and unpatched software. His simple advice for avoiding 99% of cyber risks: “Patch your stuff and don’t get tricked into doing something you shouldn’t; you do those two things and you will not get hacked.”</p><p>Roger is a prolific author, blogger and speaker. He shares his 30+ years of penetration testing/ethical hacking expertise with companies and tech professionals to improve their security and defend their network. In this interview, he talks about man-in-the-middle attacks and other social engineering scams that open doors for data breaches. He examines the lack of improvement in technical controls and the proliferation of adversaries and continuous daily malware attempts. Roger also discusses the future of computing with quantum supremacy on the horizon and the threat it poses to public key cryptography. </p><p>Topics in Order:</p><p>Who is Roger A. Grimes?</p><p>Hacking Isn’t That Hard </p><p>Is Misinformation Part of the Cybersecurity Problem</p><p>Anti-Virus and Firewalls Don’t Work - Close Your Computer Exploits by Patching Software </p><p>10 Ways I Can Hack You</p><p>Recognizing Red Flags of Social Engineering</p><p>Why is Hacking Still Such a Problem</p><p>How to Hack Passwords & Multi-factor Authentication</p><p>The Truth Behind Password Lengths and Password Policies</p><p>How to Never Be Hacked</p><p>Is that Dust or Hair on Your Touchscreen? Nope, it’s an Embedded Scam</p><p>What are the Two Biggest Cybersecurity Risks?</p><p>Have You Heard of this Scam? Security Awareness Training and Social Engineering</p><p>Creating a Cyber Culture for Your Employees through Security Awareness Training</p><p>The End of Classic Computing</p><p>Will Quantum Computers Launch in 2019?  The Sprint for Quantum Supremacy</p><p>A Better Future with Quantum Models</p><p>The Downside of Quantum Computers: Breaking the Public Key Cryptography</p><p>The Coming Quantum Break</p><p>Post-Quantum Encryption and Susceptibility </p><p>Has the Quantum Crypto Break Already Happened? </p><p>Is Quantum Supremacy a Big Deal or the Next Y2K?</p><p>What is Crypto-Agility and Will it Matter with Quantum Computing?</p><p>Is Society Becoming Tolerant of Hacking and Cybercrime? Why and What Do We Do About It? </p><p> </p>
]]></content:encoded>
      <enclosure length="39053456" type="audio/mpeg" url="https://dts.podtrac.com/redirect.mp3/cdn.simplecast.com/audio/ba5244/ba5244e0-cb0d-4762-b681-e884e01b43fb/e2439b0f-3546-487b-a047-7484be5da76f/roger-grimes-copy_tc.mp3?aid=rss_feed&amp;feed=YGJgknbK"/>
      <itunes:title>Roger A. Grimes, KnowBe4’s data-driven defense evangelist</itunes:title>
      <itunes:author>Roger Grimes</itunes:author>
      <itunes:duration>00:40:40</itunes:duration>
      <itunes:summary>Can a piece of dust on your touchscreen compromise your data? The answer is yes. We learn how from No Password Required Podcast guest Roger A. Grimes, KnowBe4’s data-driven defense evangelist, whose mission is to educate others about cybersecurity issues that can compromise computers. </itunes:summary>
      <itunes:subtitle>Can a piece of dust on your touchscreen compromise your data? The answer is yes. We learn how from No Password Required Podcast guest Roger A. Grimes, KnowBe4’s data-driven defense evangelist, whose mission is to educate others about cybersecurity issues that can compromise computers. </itunes:subtitle>
      <itunes:keywords>quantum computing, national security, technology, cybersecurity, hackers, it specialists, computer security, password security, cyber culture, computer technology, data breach, data security, computer hackers, computer scams, computer fraud</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>1</itunes:episode>
    </item>
  </channel>
</rss>