
Paul Bergman is a strategic business leader with global experience in healthcare, consulting, and telecommunications. As an expert in cybersecurity, Paul speaks at events across the US and England advocating for stronger cybersecurity in small and mid-sized businesses as the most vulnerable facet of the economy. He is also a proponent for cyber-risk management and oversight in the corporate boardroom.
Paul was an executive director of McGregor & Associates, Inc. In this capacity he served as cybersecurity and strategic IT expert on the board. Responsible for HIPAA compliance of over 3 million health care records, he managed security incidents as well as providing a full range of strategy, operations, change management, and information technology solutions to the Healthcare industry. His board service culminated with the sale of the company and exceptional value realization to the shareholders.
After his work on the sale, Paul co-Founded Secure7X, a cybersecurity and IT consulting firm which currently enjoys growing market capitalization in the SaaS and consulting space. Paul sold his ownership stake in 2018 to focus on speaking, security consulting, and board leadership.
Paul is an accomplished information security leader with a track record of integration of operations and information technology. As a member of the strategic planning team at Kryptos Logic, globally known for finding the “kill-switch” for the WannaCry ransomware and a high-end cybersecurity firm, he helped develop web-based, B2B product offerings focused on delivering cutting edge security analysis and standards-based reporting.
As Director of International Business Development at Worldcom, Paul managed the operational start-up of five international joint ventures, where he managed budgets ranging from $5M to $440M. In this role he lived in Japan, England, and Canada. He managed network deployments into England, Spain, and Germany all from his home base in London.
He holds an MBA in International Business, a BA in Economics, is a Digital Director Network boardroom Qualified Technology Expert (QTE) and is a certified Cybersecurity Information Systems Security Professional (CISSP) by ISC2.
- Would You Ignore a 1-in-3 Chance of a $250,000 Loss?
If someone told you that you had a one in three chance of an accident this year that could cost your business $250,000, what would you do? Would you roll the dice and hope it doesn’t happen?Or would you buy an insurance policy that dramatically reduces your risk? That’s the same calculation every small and… Read more: Would You Ignore a 1-in-3 Chance of a $250,000 Loss? - The cybersecurity reality for SMBsIn today’s digital environment, SMBs can no longer assume “we’re too small to matter” when it comes to cyber-threats. Microsoft’s report underscores how the risk has become pervasive and how the stakes are significant for organizations with limited resources yet major responsibilities. The findings reveal both awareness and a gap between knowing the risk and… Read more: The cybersecurity reality for SMBs
- Protecting Yourself from FinTech Fraud: Five Common Scams and How to Stay Safe
Financial technology, or FinTech, has made managing money faster and easier than ever. Apps can send money, invest, or pay bills in seconds. That same convenience can also make you a target for fraud. According to Stripe’s Guide to FinTech Fraud Detection, criminals use many different tricks to steal money or personal data. Understanding how… Read more: Protecting Yourself from FinTech Fraud: Five Common Scams and How to Stay Safe - Ransomware: What Small Businesses Need to Know
When ransomware first hit headlines, attackers often lingered in networks for weeks or even months before making demands. That window has shrunk dramatically. Today, the average time from initial compromise to ransom is just 17 hours, with reports showing some attacks happening in as little as 6 hours. In other words, by the time many… Read more: Ransomware: What Small Businesses Need to Know - Why Passkeys Beat Passwords (and Why Windows Hello Makes Them Even Better)Google recently encouraged everyone to start using passkeys instead of traditional passwords. Microsoft has been making the same push with Windows Hello and its Authenticator app. This isn’t just tech companies trying to make life complicated — it’s a real upgrade in how we protect our digital lives. Let’s walk through what makes a passkey… Read more: Why Passkeys Beat Passwords (and Why Windows Hello Makes Them Even Better)
- Devices That Support PasskeysIf your device is relatively new (last 4–5 years), it almost certainly supports passkeys. Apple, Google, and Microsoft are all committed to making passkeys the default sign-in option, and most major browsers already support them. Smartphones & Tablets Computers Browsers (on compatible devices) Hardware Security Keys
- When AI Bots Break the Rules: Lessons from Perplexity’s Stealth Crawling
Artificial intelligence is reshaping how we access and use information, but with that power comes responsibility. Recent findings by Cloudflare and investigative reporting from CyberScoop have revealed troubling behavior by Perplexity, an AI-powered answer engine, that challenges the ethical foundation of AI data practices. ????️♂️ The Incident: Crawling Behind Closed Doors Cloudflare discovered that Perplexity’s… Read more: When AI Bots Break the Rules: Lessons from Perplexity’s Stealth Crawling - Why don’t the carriers that got hacked in Salt Typhoon care?If you don’t know what the Salt Typhoon hack was, read a brief on it here: What is Salt Typhoon and why should I care? – Paul Bergman The perception that U.S. telecom carriers “don’t care” about the Salt Typhoon hack is understandable—but the full answer is more complex. Here are the key reasons why… Read more: Why don’t the carriers that got hacked in Salt Typhoon care?
- What is Salt Typhoon and why should I care????? What is Salt Typhoon? Salt Typhoon is a state-sponsored Chinese Advanced Persistent Threat (APT) believed to operate under China’s Ministry of State Security. Its espionage operations began around 2020 and have heavily targeted U.S. critical infrastructure CyberScoop. ???? How did they infiltrate U.S. telecom networks? ???? Scope of the breach: What was affected? ???? Broader… Read more: What is Salt Typhoon and why should I care?
- How US companies could be funding North Korean Missiles
North Korean IT Workers in US Companies: A Hidden Threat to National Security The infiltration of North Korean IT workers into US companies is no longer a theoretical risk—it is a widespread, persistent, and evolving threat. Recent reports and warnings from government agencies and cybersecurity experts reveal that thousands of North Korean nationals have secured… Read more: How US companies could be funding North Korean Missiles - Cryptocurrency Fraud: Why Losses Are So Shockingly High
Cryptocurrency emerged as a global financial force from its root status as a peripheral pastime—but with growth comes risk. And perhaps nowhere is that more glaringly evident than in the stratospheric losses that accompany cryptocurrency scams. According to recent statistics by the Federal Trade Commission (FTC) and Chainalysis, victims have lost billions of dollars in cryptocurrency-based scams during the past year alone. Why is there so much fraud in crypto? Why are losses so massive? And most importantly, how can investors and average users protect themselves? Let’s break it down. 1. Crypto Transactions Are IrreversibleWhen you send cryptocurrency, it’s gone—period. No chargeback process like… Read more: Cryptocurrency Fraud: Why Losses Are So Shockingly High - Balancing Budgets and Breaches: The Risky Tradeoff of Cutting Tech Talent
Balancing Budgets and Breaches: The Risky Tradeoff of Cutting Tech Talent In an era where technology drives competitive advantage, companies are under increasing pressure to cut costs while remaining innovative. Artificial Intelligence (AI) has emerged as a compelling solution, promising automation, efficiency, and scalability. For executive boards focused on shareholder value and margin expansion, it’s… Read more: Balancing Budgets and Breaches: The Risky Tradeoff of Cutting Tech Talent
- Would You Ignore a 1-in-3 Chance of a $250,000 Loss? – October 23, 2025
- The cybersecurity reality for SMBs – October 21, 2025
- Protecting Yourself from FinTech Fraud: Five Common Scams and How to Stay Safe – October 14, 2025