Roman Sannikov is the president of Constellation Cyber LLC, a boutique consulting firm specializing in cyberthreat intelligence and analysis. In addition to building Constellation from the ground up, he also serves as a...more
Jayson Street, the dynamic chief adversarial officer at Secure Yeti, has worn many masks throughout his life and career. He was once named a “world-class hacker” on National Geographic’s "Breakthrough” series episode “Cyber...more
Jessica Gulick is a woman of many trades. She is the founder and CEO of the cyber marketing firm Katzcy, the founder and commissioner of the US Cyber Games, and a trailblazer who is working to make cybersecurity a sport that...more
Generative AI has captured the public’s attention and promises to transform the way we live and work. The technology, however, implicates a number of important cybersecurity and privacy considerations for organizations. This...more
The No Password Required Podcast is dedicated to introducing and celebrating the practitioners, leaders, researchers, and individuals who are shaping the cybersecurity industry. Join us for an in-depth conversation that...more
Thomas Vaughn is the current Chief Information Security Officer (CISO) of the City of Tallahassee and the former CISO of Florida. A kindhearted introvert who began his cybersecurity career in the Army and then the U.S. Coast...more
Debbie Janeczek is the Cyber Threat Management Leader and Technology Executive at Wells Fargo. At her core, Debbie is an outdoorswoman who is passionate about conquering the mountains of Colorado and beyond with her sidekick,...more
The No Password Required Podcast is dedicated to introducing and celebrating the practitioners, leaders, researchers, and individuals who are shaping the cybersecurity industry. Join us for an in-depth conversation that...more
The No Password Required Podcast is dedicated to introducing and celebrating the practitioners, leaders, researchers, and individuals who are shaping the cybersecurity industry. Join us for an in-depth conversation that...more
In part 2 of this series, we continue to discuss the tools that cybersecurity teams use to combat ransomware attacks.
Ransomware is a type of malware used by criminal organizations to gain unlawful access to computer...more
Ransomware is a type of malware used by criminal organizations to gain unlawful access to computer networks and encrypt the data stored on those networks and render it unusable. The criminal organization then holds the data...more
9/1/2021
/ Best Practices ,
Cyber Attacks ,
Cyber Crimes ,
Cyber Threats ,
Cybersecurity ,
Data Breach ,
Hackers ,
Malware ,
Popular ,
Ransomware ,
Risk Mitigation
The No Password Required Podcast is dedicated to introducing and celebrating the practitioners, leaders, researchers, and individuals who are shaping the cybersecurity industry. Join us for an in-depth conversation that...more
6/29/2021
/ Cyber Attacks ,
Cyber Insurance ,
Cyber Threats ,
Cybersecurity ,
Data Breach ,
Data Loss Prevention ,
Data Privacy ,
Data Protection ,
Data Security ,
Hackers ,
Ransomware
The No Password Required Podcast is dedicated to introducing and celebrating the practitioners, leaders, researchers, and individuals who are shaping the cybersecurity industry. Join us for an in-depth conversation that...more
The No Password Required Podcast is dedicated to introducing and celebrating the practitioners, leaders, researchers, and individuals who are shaping the cybersecurity industry. Join us for an in-depth conversation that...more
The No Password Required Podcast is dedicated to introducing and celebrating the practitioners, leaders, researchers, and individuals who are shaping the cybersecurity industry. Join us for an in-depth conversation that...more
The No Password Required Podcast is dedicated to introducing and celebrating the practitioners, leaders, researchers, and individuals who are shaping the cybersecurity industry. Join us for an in-depth conversation that...more
Last month the White House disclosed how the federal government will coordinate incident response activities in the event of a large-scale cyber incident. While the policy directive is worth reading in its entirety, this...more
8/29/2016
/ Critical Infrastructure Sectors ,
Cyber Attacks ,
Cyber Incident Reporting ,
Cyber Threats ,
Cybersecurity ,
Data Breach ,
Data Protection ,
Data Security ,
Incident Response Plans ,
NCCIC ,
Presidential Directives
In This Issue:
IN THE SPOTLIGHT -
- Your Data Breach Collided With My Personal Injury Coverage
LIFE INSURANCE -
- Phantom Injury Dooms “Shadow Insurance” Case
- Latest NAIC Cybersecurity News...more
10/8/2015
/ Administrative Law Judge (ALJ) ,
AIG ,
Auto Body Shop ,
Bailout ,
Banking Sector ,
Banks ,
Big Data ,
Breach Notification Rule ,
Class Action ,
Compliance ,
Consumer Financial Products ,
Consumer Financial Protection Bureau (CFPB) ,
CT Supreme Court ,
Cyber Threats ,
Cybersecurity ,
Data Breach ,
Data Security ,
Department of Labor (DOL) ,
Derivative Suit ,
Disclosure Requirements ,
Disparate Impact ,
EB-5 ,
Fair Housing Act (FHA) ,
FFIEC ,
Fiduciary Duty ,
Financial Institutions ,
Foreclosure ,
Healthcare ,
Insurance Industry ,
King v Burwell ,
Life Insurance ,
Mortgage Servicers ,
Mutual Funds ,
NAIC ,
Online Advertisements ,
Ransomware ,
Reassigned Phone Numbers ,
Regulation A ,
RI Supreme Court ,
SCOTUS ,
Securities and Exchange Commission (SEC) ,
Standing ,
TCPA ,
Telecommunications ,
Treble Damages ,
Whistleblowers