Reginald “Andre” Andre is the dynamic founder and CEO of ARK Solvers. A chance encounter at a CompUSA store sparked a series of events that eventually created ARK Solvers — now one of South Florida’s fastest-growing IT and...more
On this episode, we sit down with Mariana Padilla, CEO and co-founder of HACKERverse.ai — an AI-driven platform transforming how cybersecurity solutions are tested and purchased. From her early days in education and...more
On this episode, we sit down with Trevor Hilligoss, director of security research and the research and innovation division of SpyCloud Labs. From his beginnings in the Army Criminal Investigation Division to his leadership...more
On this episode, we sit down with Rob Allen, chief marketing officer at ThreatLocker, live from the 2024 Sunshine Cyber Conference. From his early days “locked” in an IT closet to his current role in the C-suite, Rob’s...more
On this episode, Jack Clabby of Carlton Fields, P.A., and resident cybersecurity expert Kayley Melton, founder of Reality Shift, chat with Dr. Anmol Agarwal, a senior security researcher at Nokia. With deep expertise in AI...more
Zabrina Mcintyre is a director and cybersecurity adviser at KPMG, where she leverages her diverse expertise in cybersecurity, risk management, and strategic project leadership.
She brings a unique blend of creativity and...more
Dr. Sunny Wear began her career as a developer, spending countless hours maintaining others' code—a humbling experience, as she describes it. Realizing she wanted a different path, a friend suggested exploring cybersecurity...more
Confidence Staveley is the founder and CEO of Cybersafe Foundation, Africa's leading nongovernmental organization dedicated to digital development. Her mission is to ensure inclusive and safe digital access across Africa.
...more
Dr. Thomas Hyslip teaches at the master’s in cybercrime program at the University of South Florida, where he blends criminology, digital forensics, and incident response coursework.
A retired U.S. Army colonel, Dr. Hyslip's...more
Maretta Morovitz is the Engage Lead at MITRE, where she simplifies the planning of adversary engagement for cyber defenders. Maretta likens her cyber defense work to the movie Home Alone, setting a series of traps for the...more
Tanya Janca, also known as SheHacksPurple, is the head of community and education at Semgrep and the best-selling author of Alice and Bob Learn Application Security. With more than 25 years of experience in coding,...more
Tamiko Fletcher —CISO at Kennedy Space Center With a Heart of Gratitude
Tamiko Fletcher’s career at NASA began in 1999 as a cooperative education student. Her journey to CISO over the following 20 years is nothing short of...more
The Department of Health and Human Services recently issued a health sector alert through the Health Sector Cybersecurity Coordination Center (HC3)....more
4/26/2024
/ Algorithms ,
Artificial Intelligence ,
Centers for Medicare & Medicaid Services (CMS) ,
Cyber Attacks ,
Cybersecurity ,
Department of Health and Human Services (HHS) ,
Health Insurance Portability and Accountability Act (HIPAA) ,
Healthcare ,
Hospitals ,
Machine Learning ,
Popular ,
Social Engineering
Roman Sannikov is the president of Constellation Cyber LLC, a boutique consulting firm specializing in cyberthreat intelligence and analysis. In addition to building Constellation from the ground up, he also serves as a...more
Dr. Diana Burley has nearly 30 years of experience leading digital transformations and driving cross-sector education, research, and strategic innovation. As American University’s chief research and innovation officer, she is...more
Lisa Plaggemier is the executive director at the National Cybersecurity Alliance. Renowned for her people-first leadership style, Lisa’s passions for collaboration and humor drive transformative change for personal and...more
Jayson Street, the dynamic chief adversarial officer at Secure Yeti, has worn many masks throughout his life and career. He was once named a “world-class hacker” on National Geographic’s "Breakthrough” series episode “Cyber...more
Jessica Gulick is a woman of many trades. She is the founder and CEO of the cyber marketing firm Katzcy, the founder and commissioner of the US Cyber Games, and a trailblazer who is working to make cybersecurity a sport that...more
On July 26, 2023, the SEC adopted new cybersecurity rules, which have two top-line impacts. First, registrants must disclose material cybersecurity incidents promptly on Form 8-K. Second, registrants must disclose new...more
10/3/2023
/ Annual Reports ,
Corporate Governance ,
Cyber Incident Reporting ,
Cybersecurity ,
Data Breach ,
Disclosure Requirements ,
Form 10-K ,
Form 8-K ,
New Regulations ,
Publicly-Traded Companies ,
Regulation S-K ,
Regulatory Reform ,
Reporting Requirements ,
Securities and Exchange Commission (SEC) ,
Securities Regulation
Allan Liska is a threat intelligence analyst at Recorded Future. In this episode, Allan returns to No Password Required to talk with Carlton Fields attorney Jack Clabby and KnowBe4’s Kayley Melton about his experiences in the...more
On September 5, the Department of Justice (DOJ) settled allegations under the False Claims Act against Verizon Business Network Services LLC, a telecommunications provider. The settlement emphasizes the DOJ’s continued...more
Courtney Jackson is the CEO of Paragon Cyber Solutions, a Tampa-based cybersecurity solutions provider. If Courtney’s name sounds familiar, that may be because she was named the Global 2022 Cybersecurity Woman Entrepreneur of...more
Generative AI has captured the public’s attention and promises to transform the way we live and work. The technology, however, implicates a number of important cybersecurity and privacy considerations for organizations. This...more
Lisa Ventura is the founder of Cyber Security Unity, a U.K.-based organization seeking to unite the cybersecurity industry globally. Lisa is also a proud neurodivergent person; after being diagnosed in her adulthood with...more
Nick Biasini leads a team of threat researchers at Cisco Talos who patrol the cutting edge of the threat landscape. Not only has he investigated some of the most significant cyberattacks in history, but he also has hands-on...more