Cyber Distortion Podcast Series cover art

Cyber Distortion Podcast Series

Cyber Distortion Podcast Series

By: Jason Popillion
Listen for free

About this listen

Jason and Kevin, seasoned Cyber Security professionals, explain cyber security concepts that everyone needs to know in simple terms. They will leave you with practical takeaways you can use to keep yourself and your organizations safe. Jason Popillion is a CISSP and serves as a CIO/CTO of a SaaS company and Kevin Pentecost is a CISSP, CISM, CEH, CPT, MPCS, MCSE, CCA, ITIL-F and serves as a Information Security Manager for a Manufacturing company.Jason Popillion Politics & Government
Episodes
  • S4 - Episode 012 – Zero Trust, Zero Confusion (w/ Rob Allen)
    Oct 15 2025
    In this eye-opening episode of Cyber Distortion, hosts Kevin Pentecost and Jason Popillion sit down with Rob Allen from ThreatLocker to break down one of the most talked-about — and misunderstood — concepts in cybersecurity today: Zero Trust. With a deep well of technical expertise and real-world business acumen, Rob brings clarity to the chaos, cutting through the jargon to explain what Zero Trust really means, why it matters, and how organizations of all sizes can adopt it effectively. Whether you're a seasoned security pro or just starting to wrap your head around Zero Trust architecture, this episode gives you the insights and practical takeaways you need — without the confusion. Expect real talk, real strategies, and a fresh perspective on building a more secure future. Don't miss this chance to learn from one of the industry's most experienced leaders in cybersecurity, cloud infrastructure, and customer-driven solutions. Zero Trust doesn't have to be complicated. Let's make it make sense. Helpful Links: Here are several high‑quality resources to deepen your understanding of Zero Trust, along with the official web links for ThreatLocker and Rob Allen's LinkedIn profile: 🔗 Official Links ThreatLocker (official website / resource center) https://www.threatlocker.com/ (ThreatLocker)Rob Allen — LinkedIn https://www.linkedin.com/in/threatlockerrob/ (Phillip Wylie) ThreatLocker Resource Center (blogs, eBooks, webinars, case studies) https://www.threatlocker.com/resources (ThreatLocker) 📚 Additional Learning Resources on Zero Trust Here are several authoritative and practical learning resources to help your listeners (or you) get up to speed on Zero Trust architectures, strategies, and implementation: Resource What You'll Learn / Why It's Useful Link Microsoft Learn: Introduction to Zero Trust Fundamental concepts and principles of Zero Trust https://learn.microsoft.com/en-us/training/modules/zero-trust-introduction/ (Microsoft Learn) Microsoft Learn: Introduction to Zero Trust and Best Practice Frameworks How Zero Trust fits into security frameworks and architectural patterns https://learn.microsoft.com/en-us/training/modules/introduction-zero-trust-best-practice-frameworks/ (Microsoft Learn) Microsoft Learn: Protect Infrastructure with Zero Trust A module focusing on applying Zero Trust in infrastructure & server environments https://learn.microsoft.com/en-us/training/modules/zero-trust-infrastructure/ (Microsoft Learn) Microsoft Learn: Manage Networks with Zero Trust Zero Trust applied to network segmentation, traffic flows, threat protection https://learn.microsoft.com/en-us/training/modules/zero-trust-networks/ (Microsoft Learn) Microsoft Learn: Protect Data with Zero Trust Emphasis on data protection, classification, and Zero Trust data access patterns https://learn.microsoft.com/en-us/training/modules/zero-trust-data/ (Microsoft Learn) Microsoft Learn path: Establish the guiding principles and core components of Zero Trust A full learning path covering identity, endpoints, apps, network, infrastructure, and data https://learn.microsoft.com/en-us/training/paths/zero-trust-principles/ (Microsoft Learn) LinkedIn Learning: Understanding Zero Trust A beginner-friendly video course explaining Zero Trust models and problem framing https://www.linkedin.com/learning/understanding-zero-trust (LinkedIn) Udemy: Zero Trust Security Masterclass – Beginner to Mastery A hands-on, implementation-oriented course (paid) https://www.udemy.com/course/zero-trust-masterclass-from-beginner-to-mastery/ (Udemy) Cisco Zero Trust Workshops Hands‑on and strategic workshops from a major vendor's perspective https://www.cisco.com/c/en/us/products/security/zero-trust-workshops.html (Cisco) Tonex Training: Zero Trust Security Model Training A structured training course in Zero Trust fundamentals and use cases https://www.tonex.com/training-courses/zero-trust-security-model/ (Tonex)
    Show More Show Less
    1 hr and 10 mins
  • S4 - Episode 011 – Faith, Fire, and Frameworks (w/ Gaelle Koanda)
    Oct 6 2025

    Today's guest is a true force in cybersecurity, governance, and leadership. She's a global voice for resilience, inclusion, and innovation — and her story is as inspiring as it is impactful.

    In this episode, we were thrilled to be joined by Gaelle Koanda — a Cybersecurity and GRC powerhouse, ISACA Board Member, AI Ethics Advocate, Entrepreneur, and Nonprofit Leader. From IT audits to executive boardrooms, Gaelle has carved a path defined by grit, grace, and growth. She's the Founder and President of the very first WiCyS chapters in Francophone Africa, and currently serves as the SheLeadsTech Ambassador for Colorado — building bridges across continents and empowering women in tech at every step.

    Her career is a masterclass in purpose-driven leadership — and today, we're going to explore her journey, her insights on cybersecurity risk and governance, her thoughts on ethical AI, and her mission to uplift others through community, advocacy, and bold action.

    Join us for an awesome discussion on Gaelle's path into cybersecurity and beyond!

    🔗 Related Links

    • Gaelle Koanda — LinkedIn profile LinkedIn
    • Gaelle Koanda — ISSA speaker page ISSA International
    • "How I Survive Imposter Syndrome" (guest-written for ISACA) ISACA
    • WiCyS (Women in Cybersecurity) — "Hacking the glass ceiling" article WiCyS
    • WiCyS organization / about page WiCyS
    • YouTube: "Never Give Up: Gaelle Koanda's Inspiring Path to Success" YouTube
    Show More Show Less
    1 hr and 21 mins
  • S4 - Episode 010 – The Making of I AM MACHINE – w/Chris Glanden & Len Noe
    Sep 12 2025
    Description: In this compelling episode of the Cyber Distortion Podcast, hosts Jason sits down with the extraordinary trio behind the groundbreaking documentary I AM MACHINE — a deep dive into the life and mission of transhuman white hat hacker, Len Noe. Known for merging biology with embedded technology, Len's journey into transhumanism is as provocative as it is visionary. He uses his cybernetic implants not only to push the boundaries of human capability but also as a powerful tool to demonstrate vulnerabilities in both physical and digital security systems. From real-world pen tests to live hacking demos, Len's ethical hacking blurs the line between man and machine — all in the name of education and awareness. Joining the conversation is director Chris Glanden from Barcode Security, who provides insight into the creative vision behind the documentary and how the concept was brought to life. Kevin, who also served as the film's editor, gets put in the hot seat by Jason to share his unique perspective on shaping the story from raw footage to finished film. Together, the team explores the challenges, inspirations, and revelations involved in documenting such a futuristic and deeply personal subject. Whether you're fascinated by transhumanism, cybersecurity, or the art of storytelling, this episode unpacks the making of I AM MACHINE from concept to screen — and everything in between. Here are several good resources for listeners to learn more about embedded technology, ethical hacking, and to visit the sites you mentioned. I've grouped them by topic so you can explore what interests you most: 🔌 Embedded Technology Resources TI Developer Zone – Embedded Development Texas Instruments provides hardware + software development tools, demos, software libraries & example projects to help developers get started with embedded systems. (Texas Instruments) Embedded.com – Hands‑On Experience Articles, webinars, and practical labs for embedded tech, sensors, microcontroller work – great for seeing how embedded software and hardware interact in real world applications. (Embedded)Embedded Artistry – Resources A curated set of articles, tutorials, libraries, podcasts, and community content for both beginners and those with more experience. Offers insight into best practices, architectures, hardware/software integration. (Embedded Artistry) STMicroelectronics IoT / Embedded ML Platform Free educational resources around embedded systems + machine learning, helping bridge the gap between raw hardware and AI / intelligent embedded systems. (STMicroelectronics)"Awesome Embedded" (Adafruit's curated list) A big collection of blogs, code, tools, designs, hardware boards, etc., all focused around embedded systems & related tech. (blog.adafruit.com) 🛡 Ethical Hacking / Cybersecurity Resources TryHackMe A platform with guided, hands‑on labs for ethical hacking, useful for beginners and intermediate learners. Offers real‑world style challenges. (slickhacker.com)Hack The Box (HTB) More advanced penetration‑testing style labs and "boxes" that you can hack in a safe environment. Great for up‑skilling. (slickhacker.com)OWASP (Open Web Application Security Project) Very well‑regarded project that publishes tools, frameworks, cheat‑sheets, open source projects (e.g. WebGoat, Juice Shop) and guidance on securing web apps. (slickhacker.com)GitHub — "Awesome Ethical Hacking Resources" repos Repositories like vadymurupa/ethical‑hacking‑resources or hassnainfareed/awesome‑ethical‑hacking‑resources gather lists of books, courses, vulnerable machines, tools, write‑ups, etc. (GitHub) Cyberly Tutorials, guides, and free content on cybersecurity, ethical hacking, privacy, and emerging threats. Great for self‑paced learners. (cyberly.org) 🌐 Websites You Should Definitely Visit I AM MACHINE — https://i‑am‑machine.com The official website for the documentary. Includes information about Len Noe, embedded tech, screenings, news, trailer, etc. (assumed from context).Cyber Circus Network — https://www.cybercircusnetwork.com The network behind Cyber Distortion Podcast and related content. Good place to get more episodes, background, community, and related materials.
    Show More Show Less
    1 hr and 15 mins
No reviews yet
In the spirit of reconciliation, Audible acknowledges the Traditional Custodians of country throughout Australia and their connections to land, sea and community. We pay our respect to their elders past and present and extend that respect to all Aboriginal and Torres Strait Islander peoples today.