Cyber Distortion Podcast Series cover art

Cyber Distortion Podcast Series

Cyber Distortion Podcast Series

By: Jason Popillion
Listen for free

About this listen

Jason and Kevin, seasoned Cyber Security professionals, explain cyber security concepts that everyone needs to know in simple terms. They will leave you with practical takeaways you can use to keep yourself and your organizations safe. Jason Popillion is a CISSP and serves as a CIO/CTO of a SaaS company and Kevin Pentecost is a CISSP, CISM, CEH, CPT, MPCS, MCSE, CCA, ITIL-F and serves as a Information Security Manager for a Manufacturing company.Jason Popillion Politics & Government
Episodes
  • S4 - Episode 014 – CYBR.HAK.CON: The L33T DFW Hacker Conference (w/ Michael Farnum & Phillip Wylie)
    Dec 22 2025

    In this episode, we're diving deep into the evolution of one of the most respected cybersecurity community movements in the country. Michael Farnum, founder of CYBR.SEC.Community and the original force behind HOU.SEC.CON, joins us to talk about the transformation of a beloved Houston-based conference into a multi-city, multi-conference ecosystem designed to empower cybersecurity professionals, enthusiasts, and newcomers alike. With expansion plans already underway, the CYBR.SEC.Community is poised to redefine how regional infosec communities connect, learn, and grow.

    We're also joined by Phillip Wylie, a well-known ethical hacker, author, and educator, who will be leading CYBR.HAK.CON — the Dallas/Fort Worth chapter of this new initiative. Together, Michael and Phillip share their vision for what makes a truly impactful cybersecurity event, how they're building inclusive and technically rich experiences, and what attendees can expect from these revamped conferences. From speaker curation to community engagement, they're crafting something that's more than just a series of events — it's a movement.

    And of course, we'll have some fun along the way. Expect stories from past conferences, a few laughs about hacker culture, and maybe even a debate over which fictional hacker deserves a keynote slot. Whether you're a seasoned security pro or just curious about the people shaping the future of cyber communities, this episode will give you a front-row seat to the next chapter in grassroots cybersecurity.

    Helpful Links:

    Here are some helpful and relevant links for your listeners to explore CYBR.SEC.Community, its conferences, and your guests' work. These will give them direct access to events, media, and speaker profiles mentioned in your episode.
    ________________________________________
    🔗 CYBR.SEC.Community & Conferences
    • CYBR.SEC.Community Official Site
    https://www.cybrseccon.com
    Main hub for the community, including conference info, speaker lineup, merch, and tickets.
    • CYBR.SEC.Media
    https://www.cybrsecmedia.com
    Articles, podcasts, videos, and updates from across the CYBR.SEC ecosystem.
    • HOU.SEC.CON Legacy & Current Info
    https://www.houstonseccon.com
    Historical and current details about the Houston-based conference that started it all.
    ________________________________________
    🧠 Featured Guests
    • Michael Farnum (Founder, CYBR.SEC.Community)
    LinkedIn: https://www.linkedin.com/in/mfarnum
    • Phillip Wylie (Lead, CYBR.HAK.CON)
    Personal Site: https://thehackermaker.com
    Podcast: https://phillipwylieshow.transistor.fm
    LinkedIn: https://www.linkedin.com/in/phillipwylie
    • CYBR.HAK.CON Announcement Post by Phillip Wylie
    https://www.linkedin.com/posts/phillipwylie_im-excited-about-my-partnership-with-houseccon-activity-7379520683552321536-OV83

    Show More Show Less
    1 hr and 20 mins
  • S4 - Episode 013 – The Cyber Crystal Ball: Predictions & Pitfalls (w/ Paul Furtado from Gartner)
    Nov 14 2025
    In this episode of the Cyber Distortion Podcast, hosts Jason Popillion and Kevin Pentecost sit down with Paul Furtado, Vice President and Analyst at Gartner, for a deep, insightful conversation that cuts through industry noise and gets to the heart of what's shaping cybersecurity and enterprise technology today. Paul brings a dynamic blend of executive leadership and real-world operational expertise, with a career marked by driving bottom-line impact, navigating mergers and acquisitions, optimizing performance, and reshaping strategic technology programs. Known for his visionary leadership, negotiation acumen, and ability to connect strategy with execution, Paul shares the kind of clarity and perspective that only comes from decades on the front lines of IT, security, and business transformation. Whether you're a cybersecurity leader, a tech strategist, or simply someone looking to understand the forces driving today's enterprise landscape, this episode delivers actionable takeaways, thoughtful commentary, and a rare behind-the-scenes look at how one of Gartner's top voices views the future. Tune in and get ready for a strategic, sharp, and forward-thinking discussion only Cyber Distortion can deliver. Helpful Links: Here are some very good accompanying resources you can include in your episode show notes, to give listeners more context and the ability to dig deeper. Helpful Resources: About Paul Furtado Paul Furtado's profile on Gartner, Inc.: Paul Furtado – Gartner Expert — details his role, background, areas of coverage (security operations, infrastructure security, cyber risk) and previous experience. (Gartner)(If available) His LinkedIn profile — you may search LinkedIn for "Paul Furtado Gartner" or similar to locate his public profile, so listeners can connect or follow his posts and insights. About Gartner & the "Magic Quadrant" Gartner's official definition of the Magic Quadrant: What is the Magic Quadrant? — explains the concept of mapping vendors by "Ability to Execute" and "Completeness of Vision". (Gartner)Gartner's research methodology page: Magic Quadrant, Critical Capabilities and Market Coverage — covers how vendors are evaluated and what the four quadrants (Leaders, Challengers, Visionaries, Niche Players) mean. (Gartner)Additional explanatory article: "What is Gartner's Magic Quadrant and why does it matter?" — by AmericanEagle.com Insights: Link (Americaneagle.com) Recommended Further Listening / Reading Webinar: "The Gartner Cybersecurity Outlook for Midsize Enterprises" hosted by Paul Furtado. A helpful session for listeners who want leadership-level views on cyber risk in mid-sized enterprises. (Gartner)Research note: "How markets and vendors are evaluated in Gartner Magic Quadrants" (March 2024) — useful for understanding the behind-the-scenes of how Gartner constructs these analyses. (Gartner) Suggested "Next Steps" for Listeners Visit Paul Furtado's Gartner Expert profile and follow his commentary on cybersecurity trends.Explore Gartner's Magic Quadrant methodology so you understand how vendor evaluations work (especially useful in your job, budget planning, vendor selection).Reflect on your organization: Where would you place your internal tech or security vendors? Are you focusing just on "Leaders", or considering "Challengers", "Visionaries", or "Niche Players" based on your specific needs? (This aligns with what we discussed in the episode.)
    Show More Show Less
    1 hr and 12 mins
  • S4 - Episode 012 – Zero Trust, Zero Confusion (w/ Rob Allen)
    Oct 15 2025
    In this eye-opening episode of Cyber Distortion, hosts Kevin Pentecost and Jason Popillion sit down with Rob Allen from ThreatLocker to break down one of the most talked-about — and misunderstood — concepts in cybersecurity today: Zero Trust. With a deep well of technical expertise and real-world business acumen, Rob brings clarity to the chaos, cutting through the jargon to explain what Zero Trust really means, why it matters, and how organizations of all sizes can adopt it effectively. Whether you're a seasoned security pro or just starting to wrap your head around Zero Trust architecture, this episode gives you the insights and practical takeaways you need — without the confusion. Expect real talk, real strategies, and a fresh perspective on building a more secure future. Don't miss this chance to learn from one of the industry's most experienced leaders in cybersecurity, cloud infrastructure, and customer-driven solutions. Zero Trust doesn't have to be complicated. Let's make it make sense. Helpful Links: Here are several high‑quality resources to deepen your understanding of Zero Trust, along with the official web links for ThreatLocker and Rob Allen's LinkedIn profile: 🔗 Official Links ThreatLocker (official website / resource center) https://www.threatlocker.com/ (ThreatLocker)Rob Allen — LinkedIn https://www.linkedin.com/in/threatlockerrob/ (Phillip Wylie) ThreatLocker Resource Center (blogs, eBooks, webinars, case studies) https://www.threatlocker.com/resources (ThreatLocker) 📚 Additional Learning Resources on Zero Trust Here are several authoritative and practical learning resources to help your listeners (or you) get up to speed on Zero Trust architectures, strategies, and implementation: Resource What You'll Learn / Why It's Useful Link Microsoft Learn: Introduction to Zero Trust Fundamental concepts and principles of Zero Trust https://learn.microsoft.com/en-us/training/modules/zero-trust-introduction/ (Microsoft Learn) Microsoft Learn: Introduction to Zero Trust and Best Practice Frameworks How Zero Trust fits into security frameworks and architectural patterns https://learn.microsoft.com/en-us/training/modules/introduction-zero-trust-best-practice-frameworks/ (Microsoft Learn) Microsoft Learn: Protect Infrastructure with Zero Trust A module focusing on applying Zero Trust in infrastructure & server environments https://learn.microsoft.com/en-us/training/modules/zero-trust-infrastructure/ (Microsoft Learn) Microsoft Learn: Manage Networks with Zero Trust Zero Trust applied to network segmentation, traffic flows, threat protection https://learn.microsoft.com/en-us/training/modules/zero-trust-networks/ (Microsoft Learn) Microsoft Learn: Protect Data with Zero Trust Emphasis on data protection, classification, and Zero Trust data access patterns https://learn.microsoft.com/en-us/training/modules/zero-trust-data/ (Microsoft Learn) Microsoft Learn path: Establish the guiding principles and core components of Zero Trust A full learning path covering identity, endpoints, apps, network, infrastructure, and data https://learn.microsoft.com/en-us/training/paths/zero-trust-principles/ (Microsoft Learn) LinkedIn Learning: Understanding Zero Trust A beginner-friendly video course explaining Zero Trust models and problem framing https://www.linkedin.com/learning/understanding-zero-trust (LinkedIn) Udemy: Zero Trust Security Masterclass – Beginner to Mastery A hands-on, implementation-oriented course (paid) https://www.udemy.com/course/zero-trust-masterclass-from-beginner-to-mastery/ (Udemy) Cisco Zero Trust Workshops Hands‑on and strategic workshops from a major vendor's perspective https://www.cisco.com/c/en/us/products/security/zero-trust-workshops.html (Cisco) Tonex Training: Zero Trust Security Model Training A structured training course in Zero Trust fundamentals and use cases https://www.tonex.com/training-courses/zero-trust-security-model/ (Tonex)
    Show More Show Less
    1 hr and 10 mins
No reviews yet
In the spirit of reconciliation, Audible acknowledges the Traditional Custodians of country throughout Australia and their connections to land, sea and community. We pay our respect to their elders past and present and extend that respect to all Aboriginal and Torres Strait Islander peoples today.