No Password Required Podcast Episode 46 — Dr. Diana Burley Dr. Diana Burley — Vice Provost for Research and Innovation at American University and a researcher of unicorns (the cybersecurity kind) Dr. Diana Burley has nearly 30 years of experience driving digital transformation by leading cross-sector teams to drive education, research, and strategic innovation. As the American University’s chief research officer and innovation officer, she is responsible for establishing the strategic vision and supporting faculty-led scholarship across all disciplines. In this episode, Dr. Burley joins Carlton Fields, P.A.’s Jack Clabby, and KnowBe4’s V.P. of Remote Publishing Teams, Kayley Melton, to discuss her role in educating policymakers and her research into the misconceptions about the cybersecurity workforce. Dr. Burley goes into one of her current research projects, “The Cyber Unicorn Challenge,” a collaboration between Dr. Burley and Cyber Florida. This study aims to gather data to confirm the challenge of finding cyber unicorns, delve into the reasons behind inflated requirements, and understand why the search for cyber unicorns persists. To start the show, Jack and Kayley discuss the Alleged Nigerian cybercriminal arrested for stealing $7.5M from charities. Jack also breaks down the job of an FBI Legal Attaché. You can follow Dr. Diana Burley on LinkedIn here: https://www.linkedin.com/in/dianaburley You can follow Dr. Diana Burley on Twitter here: @dianaburley You can learn more about American University here: https://www.american.edu/
SummaryThe conversation discusses the arrest of Ola Segun Simpson Adagorin, a Nigerian national facing US federal charges for a business email compromise scheme. The collaboration between the FBI and Ghana is highlighted, along with the role of the legal attache job in solving crimes with international impact. The scheme and indictment details are explored, emphasizing the sophistication of the attack. Dr. Diana Burley, Vice Provost for Research and Innovation at American University, shares insights on cybersecurity education and workforce readiness. The importance of understanding human behavior in cybersecurity is discussed, along with strategies for engaging in conversations and addressing the search for cyber unicorns. In this episode, the importance of password security and the various methods to enhance it are discussed. The conversation covers common password mistakes, the use of password managers, multi-factor authentication, biometric authentication, and the future of password security.
Takeaways
Chapters
00:00 Introduction and Arrest of Ola Segun Simpson Adagorin
01:24 Collaboration between FBI and Ghana
03:15 Scheme and Indictment Details
04:44 Legal Attache Job and Collaboration
06:10 Deterrence and Sealed Indictments
07:36 Introduction of Dr. Diana Burley
08:31 Dr. Burley's Background and Role at American University
09:23 Interest in Cybersecurity and Technology
10:21 American University's Role in Educating Policymakers
12:15 Engaging with Leaders and Shaping Policy
13:36 Engaging with Students and Future Leaders
14:28 American University's Focus on Policy and Research
15:27 Misconceptions about the Cybersecurity Workforce
16:23 Digital Literacy and Foundational Cybersecurity Skills
18:45 Retaining Skilled Members in the Academic Environment
19:43 Benefits of Engaging as a University Faculty Member
20:37 Understanding Human Behavior in Cybersecurity
22:05 Insights from Research on Human Behavior
23:25 Understanding Employee Behavior in Cybersecurity
24:47 Creating a Culture of Cybersecurity
27:08 Strategies for Initiating Conversations with Strangers
31:50 The Cyber Unicorn Project
35:08 Addressing the Search for Cyber Unicorns
41:45 Lifestyle Polygraph
50:57 Understanding Irrational Behavior and Self-Awareness
53:37 Engaging in Conversations with Strangers
02:30 The Importance of Password Security
10:15 Common Password Mistakes
18:45 Password Managers
27:10 Multi-Factor Authentication
35:40 Biometric Authentication
44:20 Passwordless Authentication
52:30 Future of Password Security
58:21 Conclusion