Log in

goodpods headphones icon

To access all our features

Open the Goodpods app
Close icon
headphones
No Password Required

No Password Required

Cyber Florida

The No Password Required Podcast connects with the cybersecurity industry’s most interesting professionals and shares their stories. No Password Required covers a variety of tech topics, from the cyber-related challenges facing law enforcement to the advent of quantum computing, this podcast explores the people and topics at the forefront of the field.
bookmark
Share icon

All episodes

Best episodes

Top 10 No Password Required Episodes

Goodpods has curated a list of the 10 best No Password Required episodes, ranked by the number of listens and likes each episode have garnered from our listeners. If you are listening to No Password Required for the first time, there's no better place to start than with one of these standout episodes. If you are a fan of the show, vote for your favorite No Password Required episode by adding your comments to the episode page.

No Password Required - Mari Galloway: From Cyber Novice to Cyber Ninja
play

12/26/24 • 61 min

Mari Galloway, CEO of the Women’s Society of Cyberjutsu, is a woman whose magnetic presence ignites every room she enters. Her power radiates in an undeniable way through her hair, attire, and unwavering confidence, and the Do We Belong Here team wanted to know - did her light always shine this bright or did she work to cultivate it over time?

In this episode of Do We Belong Here, Tashya Denose and Pam Lindemoen speak with Mari about how she got “stuck” in the cyber world, eventually leading her to working in Vegas with the biggest casinos in the world. As they navigate through her experiences, the trio reflects on the adage that what happens in Vegas doesn't always stay in Vegas, especially in the realm of cybersecurity.

The discussion explores Mari’s evolution of self-confidence as she reflects on the challenges of being a trailblazing black woman in a predominantly male-dominated field. They also dive deep into Mari’s chapter of “Securing Our Future” by the Black Women in Cyber Collective and explore the pivotal role of finding your community in fostering resilience and self-empowerment.

Women’s Society of Cyberjutsu - womenscyberjutsu.org

Connect with Mari on LinkedIn - linkedin.com/in/themarigalloway/

Find us on social media - @DoWeBelongPod

Learn more about Cyber Florida - cyberflorida.org

Watch the podcast on YouTube: youtube.com/@cybersecurityfl

bookmark
plus icon
share episode
No Password Required - No Password Required Podcast Episode 48 — Roman Sannikov
play

03/26/24 • 65 min

Summary

Roman Sanikov, is the president of Constellation Cyber and specializes in cyber threat intelligence. In this episode, Roman discusses the importance of collaboration and transparency in the cybersecurity industry, particularly in combating ransomware attacks. He also emphasizes the need for a holistic approach to cybersecurity, involving education and empowerment for both employees and consumers. In this episode, Roman Reinhart shares his experiences as an undercover agent in the cybercrime world. He discusses maintaining a persona, dealing with forum behavior, and memorable arrests. He also emphasizes the importance of redemption and second chances. Roman also talks about his involvement with Helpster USA, an organization dedicated to providing life-saving treatment to young people in developing economies. He shares his hobbies of mushrooming and highlights the satisfying moments at work. Finally, he reflects on the cultural differences he experienced after moving overseas.

Takeaways

  • Pig butchering schemes are a significant cause of financial losses globally, and it is important to approach the topic with compassion and nuance.
  • Many scammers involved in these schemes are forced into this life against their will, either through human trafficking or being lured into it with false promises.
  • Collaboration and transparency are crucial in the cybersecurity industry to effectively combat ransomware attacks and mitigate their secondary and tertiary impacts.
  • A holistic approach to cybersecurity, involving education and empowerment for employees and consumers, is necessary to create a more secure environment. Maintaining a persona in the cybercrime world requires careful observation and adaptation.
  • Memorable arrests can lead to redemption and second chances for individuals involved in cybercrime.
  • Helpster USA provides life-saving treatment to young people in developing economies.
  • Mushrooming is a rewarding hobby that allows for outdoor exploration and collection.
  • Satisfying moments at work include helping clients have eureka moments and making positive changes.
  • Cultural differences, such as politeness, can take time to understand and adapt to.

Chapters

00:00 Introduction to Pig Butchering Schemes (opening conversation)

02:18 Online Scams and Exploitation

03:41 Forced Labor and Human Trafficking

04:41 Approaching Scams with Compassion

05:39 Guest Introduction: Roman Sanikov

07:01 Roman's Role at Constellation Cyber

08:22 Promoting Transparency in Ransomware Incidents

10:17 Mitigating Secondary and Tertiary Impacts of Ransomware Attacks

11:14 The Ripple Effect of Ransomware Attacks

13:10 The Importance of Collaboration in Cybersecurity

14:58 Roman's Career Path and Background

19:34 Educating and Empowering Employees and Consumers

21:28 Avoiding Victim-Blaming in Cybersecurity

24:16 The Need for Collaboration and Transparency in the Industry

25:10 Balancing Non-Traditional Pursuits with College

26:37 Undercover Work and Building Relationships

33:07 Maintaining a Persona

36:25 Dealing with Forum Behavior

38:18 Memorable Arrests

41:25 Redemption and Second Chances

45:13 Helpster USA

48:16 Eccentricities of NHL Players

50:56 Life's Unexpected Moments

56:19 The Joy of Mushrooming

58:43 Satisfying Moments at Work

01:01:04 Learning Politeness in America

bookmark
plus icon
share episode
No Password Required - No Password Required Podcast Episode 46 — Dr. Diana Burley
play

01/31/24 • 58 min

SummaryThe conversation discusses the arrest of Ola Segun Simpson Adagorin, a Nigerian national facing US federal charges for a business email compromise scheme. The collaboration between the FBI and Ghana is highlighted, along with the role of the legal attache job in solving crimes with international impact. The scheme and indictment details are explored, emphasizing the sophistication of the attack. Dr. Diana Burley, Vice Provost for Research and Innovation at American University, shares insights on cybersecurity education and workforce readiness. The importance of understanding human behavior in cybersecurity is discussed, along with strategies for engaging in conversations and addressing the search for cyber unicorns. In this episode, the importance of password security and the various methods to enhance it are discussed. The conversation covers common password mistakes, the use of password managers, multi-factor authentication, biometric authentication, and the future of password security.

Takeaways

  • Collaboration between law enforcement agencies is crucial in solving cybercrime cases with international implications.
  • Understanding human behavior is essential in addressing cybersecurity challenges and shaping effective policies.
  • Digital literacy and foundational cybersecurity skills should be integrated into education across disciplines.
  • Creating a culture of cybersecurity requires a balance between rules and creativity, and a focus on psychological safety.
  • Engaging in conversations with strangers can be facilitated by finding common interests and making personal connections. Create strong and unique passwords for each online account.
  • Avoid common password mistakes such as using personal information or easily guessable patterns.
  • Consider using a password manager to securely store and generate passwords.
  • Enable multi-factor authentication whenever possible for an added layer of security.
  • Biometric authentication, such as fingerprint or facial recognition, can provide convenient and secure access to devices and accounts.
  • Passwordless authentication methods, such as biometrics or hardware tokens, may become more prevalent in the future.
  • Stay informed about emerging technologies and best practices in password security.

Chapters

00:00 Introduction and Arrest of Ola Segun Simpson Adagorin

01:24 Collaboration between FBI and Ghana

03:15 Scheme and Indictment Details

04:44 Legal Attache Job and Collaboration

06:10 Deterrence and Sealed Indictments

07:36 Introduction of Dr. Diana Burley

08:31 Dr. Burley's Background and Role at American University

09:23 Interest in Cybersecurity and Technology

10:21 American University's Role in Educating Policymakers

12:15 Engaging with Leaders and Shaping Policy

13:36 Engaging with Students and Future Leaders

14:28 American University's Focus on Policy and Research

15:27 Misconceptions about the Cybersecurity Workforce

16:23 Digital Literacy and Foundational Cybersecurity Skills

18:45 Retaining Skilled Members in the Academic Environment

19:43 Benefits of Engaging as a University Faculty Member

20:37 Understanding Human Behavior in Cybersecurity

22:05 Insights from Research on Human Behavior

23:25 Understanding Employee Behavior in Cybersecurity

24:47 Creating a Culture of Cybersecurity

27:08 Strategies for Initiating Conversations with Strangers

31:50 The Cyber Unicorn Project

35:08 Addressing the Search for Cyber Unicorns

41:45 Lifestyle Polygraph

50:57 Understanding Irrational Behavior and Self-Awareness

53:37 Engaging in Conversations with Strangers

02:30 The Importance of Password Security

10:15 Common Password Mistakes

18:45 Password Managers

27:10 Multi-Factor Authentication

35:40 Biometric Authentication

44:20 Passwordless Authentication

52:30 Future of Password Security

58:21 Conclusion

bookmark
plus icon
share episode
No Password Required - No Password Required Podcast Episode 50 — Tanya Janca
play

05/28/24 • 60 min

Summary

The conversation discusses the extradition case of Julian Assange and the role of the US prison system in the decision. It also explores Tanya Janca's role at Semgrep and her passion for affordable cybersecurity education. Additionally, it touches on Tanya's experience in election security and the importance of transparency in the process. Tanya discusses her volunteer work with the Canadian government, where she helps educate students about cybersecurity. She talks about the importance of teaching young people about privacy, protecting digital devices, and understanding cyber threats. Tanya also mentions her involvement in the Cyber Titan competition and her efforts to promote cybersecurity as a career. She shares her experience writing the book 'Alice and Bob Learn Application Security' and her unique approach to making technical concepts accessible through stories and different learning styles. Tanya also talks about the importance of mentoring and how she has benefited from mentors throughout her career.

Keywords

Julian Assange, extradition, US prison system, cybersecurity education, Semgrep, election security, transparency, volunteer work, Canadian government, cybersecurity education, privacy, digital devices, cyber threats, Cyber Titan, promoting cybersecurity, career, Alice and Bob Learn Application Security, technical concepts, stories, learning styles, mentoring

Takeaways

  • The extradition case of Julian Assange highlights the differences in prison systems between the US and other Western democracies.
  • Tanya Janca's role at Semgrep involves community management and education in the field of cybersecurity.
  • Affordable cybersecurity education is crucial for organizations to effectively use security tools and integrate them into their programs.
  • Election security requires centralization, knowledge sharing, and transparency to ensure public trust in the process. Volunteer work with the Canadian government focuses on educating students about cybersecurity, including topics like privacy and protecting digital devices.
  • Promoting cybersecurity as a career is important, and initiatives like the Cyber Titan competition help engage high school students in learning about cybersecurity.
  • Tanya's book 'Alice and Bob Learn Application Security' uses stories and different learning styles to make technical concepts accessible.
  • Mentoring is valuable for personal and professional growth, and Tanya has both benefited from mentors and become a mentor herself.

Titles

  • The Importance of Transparency in Election Security
  • Cybersecurity as a Career: The Cyber Titan Competition
  • The Value of Mentoring: Tanya's Experience as a Mentor and Mentee

Sound Bites

  • "I am head of community and education, which is a role they made up just for me."
  • "They decided, I think in 2017, we need to make a task force to make sure they know cyber."
  • "Defenders need to understand attacks or they can't be good at defending, right? Like we're teaching them ethics as we teach them how to hack."
  • "Alice and Bob are going to learn secure coding this time."

Chapters

00:00 The Extradition Case of Julian Assange

08:18 Affordable Cybersecurity Education at Semgrep

30:40 Tanya's Volunteer Work with the Canadian Government

31:35 Promoting Cybersecurity as a Career

34:02 Making Technical Concepts Accessible: 'Alice and Bob Learn Application Security'

39:45 The Value of Mentoring

bookmark
plus icon
share episode
No Password Required - No Password Required Podcast Episode 41 — Allan Liska
play

09/26/23 • 57 min

Allan Liska —Threat Intelligence Analyst at Recorded Future, the Ransomware Sommelier, and a guy with a mildly exciting expense account Allan Liska is a Threat Intelligence Analyst at Recorded Future. In this episode, Allan returns to No Password Required to talk with Carlton Fields Attorney Jack Clabby and KnowBe4’s Kayley Melton about his experiences in the ever-evolving battlefield of cyber threats, what has changed in ransomware since his first time on the show, and his perspective on the power of AI in the battle against cyber threats. He also updates us on his passion project: the upcoming release of the Yours Truly, Johnny Dollar comic book. In this thrilling new venture, Allan breathes new life into iconic insurance investigator Johnny Dollar by casting him in a role that hits close to home: a ransomware investigator. The best part was that he gifted the No Password Required team the chance to act out a scene from the comic. Jack and Kayley also talk about the dismantling of Qakbot, marking one of the largest-ever U.S.-led enforcement actions against a botnet (and also marking one of the best U.S. mission titles - Operation Duck Hunt.) You can follow Allan on LinkedIn here: https://www.linkedin.com/in/allan2/ You can follow Allan on Twitter here: @uuallan You can learn more about Recorded Future here: https://www.recordedfuture.com/
bookmark
plus icon
share episode
No Password Required - No Password Required Podcast Episode 39 - Lisa Ventura MBE
play

07/19/23 • 58 min

Lisa Ventura — founder of Cyber Security Unity, Member of the Order of the British Empire, and appreciator of 80s soap operas Lisa Ventura MBE is the founder of Cyber Security Unity, a UK-based organization seeking to unite the cyber security industry globally. Lisa is also a proud neurodivergent person; after being diagnosed in her adulthood with autism and ADHD, she gained a wider understanding of who she is, how she can use her unique traits to make the world better, and how she can advocate for neurodivergent talent in the cyber industry. In this episode of No Password Required, Lisa joins Carlton Fields, P.A.’s Jack Clabby and KnowBe4’s Kayley Melton to share how she went from working on the UK version of “Who Wants to be a Millionaire?” to becoming an award-winning leader in the cybersecurity industry. She also tells us about receiving her honorary award from the British Parliament, her love of 1980s U.S. soap operas, and the sci-fi world she’d most want to live in. Jack and Kayley discuss the drastic increase in the amount of cash Americans lost to text-messaging scams in recent years. Why is this type of attack showing so much growth? How can consumers continue moving forward? They talk about all of that and more. A special thanks to the great Sarina Gandy for producing this episode. You can connect with Lisa on Twitter here: @cybergeekgirl You can connect with Lisa on her personal website here: https://lisaventura.co.uk/ You can learn more about Cyber Security Unity here: https://csu.org.uk/
bookmark
plus icon
share episode
No Password Required - No Password Required Podcast Episode 54 — Dr. Sunny Wear
play

12/10/24 • 51 min

summary

In this episode, the conversation begins with a significant data breach at Star Health Insurance, affecting over 31 million individuals. The discussion delves into the complexities of insider threats, particularly focusing on the alleged involvement of the company's CISO. The episode transitions to an introduction of Dr. Sunny Ware, a web application penetration tester, who shares her journey from software development to cybersecurity. Dr. Sunny discusses her role in penetration testing, the importance of understanding application logic, and the use of AI in her work. The episode concludes with a lifestyle polygraph segment, where Dr. Sunny shares personal insights and experiences, emphasizing the importance of mentorship in cybersecurity.

takeaways

  • Star Health Insurance experienced a major data breach affecting millions.
  • Insider threats are predicted to be a significant risk in 2025.
  • Dr. Sunny Ware transitioned from software development to cybersecurity.
  • Understanding application logic is crucial in penetration testing.
  • AI can be a valuable tool in penetration testing.
  • Bug bounty programs offer focused opportunities for security testing.
  • Mentorship is important for the next generation of cybersecurity professionals.
  • Dr. Sunny emphasizes the creativity involved in coding and security.
  • Vulnerability disclosure programs differ from bug bounty programs.
  • Dr. Sunny's passion for teaching and sharing knowledge is evident.

titles

  • The Star Health Insurance Data Breach: A Deep Dive
  • Insider Threats: The New Face of Cybersecurity Risks
  • Meet Dr. Sunny Ware: A Cybersecurity Trailblazer
  • The Art of Penetration Testing with Dr. Sunny
  • Exploring AI's Role in Cybersecurity

sound bites

  • "Star Health Insurance suffered a significant data security incident."
  • "There's a hacker and then there's this kind of cool insider twist."
  • "The alleged hackers claimed that Star Health's CISO facilitated the breach."
  • "Insider threats are going to be the risk to prepare for in 2025."
  • "I came from very humble beginnings."
  • "I think coding is like making a painting on a blank canvas."
  • "I want to capitalize on the experience I already have in web API."
  • "I use AI almost every day on every pen test."
  • "I actively do bug hunting."
  • "I want to make sure that if there's anything I can share to help."

chapters

00:00 Data Breach at Star Health Insurance

06:06 Insider Threats and Whistleblowers

07:05 Introduction to Dr. Sunny Ware

30:14 Dr. Sunny's Career Path and Penetration Testing

37:00 Lifestyle Polygraph with Dr. Sunny

48:55 Key Takeaways and Closing Thoughts

bookmark
plus icon
share episode

Summary

In this episode, the hosts discuss the importance of representation in cybersecurity, highlighting a documentary that showcases the experiences of women and underrepresented groups in the industry. They are joined by Confidence Stavely, founder of the CyberSafe Foundation, who shares her personal journey from a victim of cybercrime to a leader in promoting digital safety and inclusion in Africa. The conversation explores themes of overcoming challenges, the significance of passion in career choices, and the responsibilities of leadership in creating opportunities for others. Confidence also discusses her creative approach to making complex topics accessible through her YouTube series, API Kitchen, and emphasizes the importance of mobilizing resources to empower the next generation in tech.

Takeaways

  • The documentary highlights the importance of representation in cybersecurity.
  • There are solutions to the challenges faced by underrepresented groups.
  • Personal experiences can drive a passion for change in the industry.
  • Education is a key factor in overcoming barriers to entry in tech.
  • Leadership should focus on values and empowering team members.
  • Creativity can be a powerful tool in communicating complex ideas.
  • API Kitchen was created as a response to gender stereotypes in tech.
  • Cybersecurity skills can significantly change lives and communities.
  • It's essential to hold the door open for others in the industry.
  • Passion is a driving force behind career success.

Chapters

00:00 The Impact of Representation in Cybersecurity

05:47 Confidence Stavely's Journey and CyberSafe Foundation

12:00 Overcoming Challenges and Pursuing Passion

18:00 Leadership and Responsibility in Cybersecurity

24:12 Creativity and Communication in Tech

29:46 Personal Growth and Future Aspirations

bookmark
plus icon
share episode
No Password Required - No Password Required Podcast Episode 55 — Zabrina Mcintyre
play

12/30/24 • 42 min

Summary

This conversation explores the U.S. Army's investment in cybersecurity compliance for small businesses, the importance of mentorship in the defense industry, and the unique career path of Sabrina McIntyre at KPMG. Sabrina discusses her transition from art to cybersecurity, the challenges of navigating compliance standards, and her advocacy for women in the field. The episode also touches on the intersection of art and cybersecurity, the vision for a cybersecurity museum, and fun personal insights from Zabrina's life.

Takeaways

  • The U.S. Army is investing in small business cybersecurity compliance.
  • Certification programs can help defense contractors meet compliance.
  • Creating a secure environment for small businesses is essential.
  • Mentorship programs are crucial for small business growth.
  • Zabrina's career path showcases the value of diverse experiences.
  • Understanding compliance standards like PCI DSS is challenging but necessary.
  • Being open to new opportunities can lead to fulfilling career paths.
  • Women in Cybersecurity is making strides in community building.
  • Creativity is important in the cybersecurity field.
  • Cybersecurity education should be accessible to all.

titles

  • Investing in Cybersecurity for Small Businesses
  • Navigating Compliance in the Cybersecurity Landscape
  • Zabrina McIntyre: A Unique Career Journey
  • Empowering Women in Cybersecurity

Sound Bites

  • "Certification program for defense contractors"
  • "Largest federal government mentor-protege program"
  • "Cybersecurity maturity model is crucial"
  • "Be your own best advocate in your career"
  • "If you can see it, you can be it"
  • "We need more creative people in cybersecurity"
  • "Cybersecurity should be accessible to everyone"
  • "Umbrellas don't work in Seattle"

Chapters

00:00 Introduction to the Next Generation Commercial Operations Program

02:51 The Importance of Cybersecurity Compliance for Small Businesses

05:45 Zabrina McIntyre's Role at KPMG

08:54 Zabrina's Unique Career Path

11:51 Navigating Cybersecurity Standards

14:48 Advice for Aspiring Cybersecurity Professionals

17:58 Women in Cybersecurity: Building Community

20:59 The Intersection of Art and Cybersecurity

24:04 Zabrina's Vision for a Cybersecurity Museum

27:02 Lifestyle Polygraph: Fun Questions with Zabrina

30:09 Key Takeaways and Closing Thoughts

bookmark
plus icon
share episode

Show more best episodes

Toggle view more icon

FAQ

How many episodes does No Password Required have?

No Password Required currently has 58 episodes available.

What topics does No Password Required cover?

The podcast is about Coding, Cloud, Information Security, Code, Infosec, Data, How To, Software, Network Security, Cloud Computing, Windows, Podcasts, Anonymous, Big Data, Technology, Developer, Education, Internet, Business, National Security, Data Privacy, Networking, Python, Cybersecurity and Network.

What is the most popular episode on No Password Required?

The episode title 'No Password Required Podcast Episode 50 — Tanya Janca' is the most popular.

What is the average episode length on No Password Required?

The average episode length on No Password Required is 56 minutes.

How often are episodes of No Password Required released?

Episodes of No Password Required are typically released every 28 days.

When was the first episode of No Password Required?

The first episode of No Password Required was released on Nov 7, 2019.

Show more FAQ

Toggle view more icon

Comments