PLAY PODCASTS
Cyber Distortion Podcast Series

Cyber Distortion Podcast Series

Jason Popillion and Kevin Pentecost

61 episodesEN

Show overview

Cyber Distortion Podcast Series has been publishing since 2022, and across the 4 years since has built a catalogue of 61 episodes. That works out to roughly 75 hours of audio in total. Releases follow a monthly cadence, with the show now in its 5th season.

Episodes typically run an hour to ninety minutes — most land between 53 min and 1h 31m — though episode length varies meaningfully from one episode to the next. None of the episodes are flagged explicit by the publisher. It is catalogued as a EN-language Technology show.

The show is actively publishing — the most recent episode landed 2 weeks ago, with 4 episodes already out so far this year. Published by Jason Popillion and Kevin Pentecost.

Episodes
61
Running
2022–2026 · 4y
Median length
1h 20m
Cadence
Monthly

From the publisher

Jason and Kevin, seasoned Cyber Security professionals, explain cyber security concepts that everyone needs to know in simple terms. They will leave you with practical takeaways you can use to keep yourself and your organizations safe. Jason Popillion is a CISSP and serves as a CIO/CTO of a SaaS company and Kevin Pentecost is a CISSP, CISM, CEH, CPT, MPCS, MCSE, CCA, ITIL-F and serves as a Information Security Manager for a Manufacturing company.

Latest Episodes

View all 61 episodes

S5 - Episode 004 – Ashley Madison: Infidelity Unmasked

May 1, 202641 min

S5 - Episode 003 – Stuxnet: Zero-Day Cataclysmic Warfare

Apr 15, 202633 min

S5 Ep 2S5 - Episode 002 – Cicada 3301

Cyber Distortion Podcast – Hosted by Kevin Pentecost & Jason Popillion In January 2012, a mysterious message appeared on an obscure corner of the internet — a simple image posted on 4chan with a chilling promise: "We are looking for highly intelligent individuals." What followed was unlike anything the internet had ever seen. Hidden messages. Impossible riddles. Cryptographic puzzles buried in images, music files, and code. Clues scattered across the globe — from obscure websites to real-world posters taped to telephone poles in cities thousands of miles apart. Behind it all was a name that would become internet legend: Cicada 3301. In this episode of The Cyber Distortion Podcast, we dive deep into one of the most enigmatic puzzles ever unleashed online. Was Cicada 3301 a recruitment program for intelligence agencies? A secret society searching for elite cryptographers? Or an elaborate experiment designed to test the limits of human intelligence and collaboration? Join Kevin Pentecost and Jason Popillion, bringing over 50 years of combined cybersecurity experience, as they: Break down how the Cicada puzzles pushed the boundaries of cryptography and problem-solving Explore the hidden techniques used — from steganography to advanced encryption Investigate the theories surrounding who might have been behind the mysterious organization And uncover why, more than a decade later, the true purpose of Cicada 3301 remains unsolved This isn't just a story about puzzles — it's a journey into the strange intersection of cybersecurity, internet culture, and human curiosity. A digital scavenger hunt so complex that only a handful of people in the world were able to follow it to the end… and even they still don't fully understand who was waiting at the finish line. Are you ready to follow the clues? Resources Explore the Actual Puzzle Archive If your listeners want to see the real puzzle files and clues, this is one of the best archives online: Complete Cicada 3301 Archive (GitHub) This repository contains: Original images used in the puzzles Clues from 2012, 2013, and 2014 puzzles Hidden files extracted from the images Documentation from the community of solvers The puzzles first appeared in 2012 on 4chan, challenging users to uncover hidden messages embedded in images and code. Audio - Suspicious Atmosphere - Cyberpunk Hacker Loop - True Crime Investigation - The Truth is Here Provided by Filmora - Splatter Horror Silence 01 - Social Crisis Provided by: Audiostock - A Sinister Plot 1285 Provided by: Universal Music for Creators 🎧

Mar 26, 202644 min

S5 Ep 1S5 - Episode 001 – The Day that Twitter Died

Cyber Distortion Podcast – Hosted by Kevin Pentecost & Jason Popillion On July 15, 2020, the unthinkable happened: dozens of the world's most powerful voices — Barack Obama, Elon Musk, Bill Gates, Joe Biden, Apple, Uber, and more — suddenly blasted the same message out to millions of followers. A promise that sounded too good to be true… because it was. What looked like a generous giveaway turned into one of the most audacious social engineering hacks in tech history — all orchestrated not by a foreign syndicate, not by an elite hacker collective… but by a 17-year-old from Tampa, Florida. In this episode of The Cyber Distortion Podcast, we peel back the curtain on the incredible story of Graham Ivan Clark — the mastermind behind the 2020 Twitter bitcoin scam. How did a teenager with no access to Twitter's code base infiltrate its inner systems? What dark psychology powered the attack? And how did a stunt that netted six figures in Bitcoin come crashing down in just hours? Join Kevin Pentecost and Jason Popillion, together bringing over 50 years of cyber expertise, as we: - Break down the hacker's journey from online forums to global headlines - Decode the social engineering tricks that toppled corporate giant - Reveal the lessons the security world still hasn't fully learned - And explore how a single moment of human error unlocked the keys to a digital kingdom This isn't just a story about stolen Bitcoin — it's a chilling reminder that the weakest link in any system is the human one, and how one kid's curiosity turned into one of the most notorious cybersecurity breaches of our time. Are you ready to join us inside the breach?! Other Helpful Links: Wikipedia – 2020 Twitter account hijacking — comprehensive overview of the incident, how it unfolded, and its impact. 2020 Twitter account hijacking (Wikipedia) Wikipedia – Graham Ivan Clark — detailed background on Clark's role in the hack and related charges. Graham Ivan Clark (Wikipedia) Ars Technica – "I was a teenage Twitter hacker…" — tech-focused reporting on how the social engineering worked and the aftermath. I was a teenage Twitter hacker (Ars Technica) The Hacker News – sentencing & case details — breakdown of charges, Bitcoin scam metrics, and how the hack was executed. 18‑Year‑Old Hacker Gets 3 Years for Massive Twitter Hack (The Hacker News) CoinDesk – coverage of sentencing and legal outcomes — crypto community perspective on the hack and legal resolution. Twitter Hacker Will Serve 3 Years for Crypto Phishing Scheme (CoinDesk) Tech Times – detailed narrative of the incident — narrative explanation of how the scam unfolded and Twitter's response. 'Bitcoin Scam': Teen Twitter Hacker Gets 3 Years (Tech Times) OPB – contemporary reporting from 2020 — quotes from prosecutors and early reporting on the arrest and scope of the hack. Florida Teen Charged as Mastermind (OPB) Wikipedia (alternate language overview) — another useful global perspective on the same incident. Détournement de comptes Twitter en juillet 2020 (Wikipedia French) Court Documents: Here are some relevant links to official or publicly shared court documents / legal filings related to the 2020 Twitter hack that you can include as sources for research. (Actual court dockets are often on PACER or state court sites and require login, so we've linked publicly accessible filings or charge PDFs where available): Charging document for Mason Sheppard (PlugWalkJoe) – PDF of federal charges in the Twitter hack case (linked from CBS News). (Note: these are federal indictments related to co-conspirators; Clark's state court documents aren't publicly indexed in one central PDF but this gives key legal filings tied to the case.) 📄 [Read the charging document for Mason Sheppard (.pdf)]Charging doc for federal co‑conspirator PlugWalkJoe (CBS News) Tampa teen pleads not guilty as court filings reveal charges – local news report referencing the court proceedings and charges in Clark's case. (Tampa Bay Times) 🔗 Tampa teen pleads not guilty as documents reveal how feds cracked Twitter hack case (Tampa Bay Times summary) Court hearing coverage – describes Clark's hearing and bail setting at the Hillsborough County Courthouse with reference to court filings. (Tampa Bay Times) 🔗 Bail and court hearing coverage for Twitter hack case (Tampa Bay Times) Sentencing summary – covers Clark's plea deal and sentence terms as reflected in official court action. (WUSF) 🔗 Tampa Twitter hacker sentenced to prison and probation (WUSF) Wikipedia – Case overview with court info – includes a summary of charges, indictment details, plea dates, and sentencing, citing court sources. (Wikipedia) 🔗 2020 Twitter account hijacking (case details) Nasdaq / CoinDesk coverage on legal proceedings – references court filings and proceedings around charges and bail. (Nasdaq) 🔗 17‑year‑old pleads not guilty as defense tries to lower bail (Nasdaq) Music provided by Filmora: Social Crisis Provided by: Audiostock

Feb 18, 202629 min

S4 Ep 14S4 - Episode 014 – CYBR.HAK.CON: The L33T DFW Hacker Conference (w/ Michael Farnum & Phillip Wylie)

In this episode, we're diving deep into the evolution of one of the most respected cybersecurity community movements in the country. Michael Farnum, founder of CYBR.SEC.Community and the original force behind HOU.SEC.CON, joins us to talk about the transformation of a beloved Houston-based conference into a multi-city, multi-conference ecosystem designed to empower cybersecurity professionals, enthusiasts, and newcomers alike. With expansion plans already underway, the CYBR.SEC.Community is poised to redefine how regional infosec communities connect, learn, and grow. We're also joined by Phillip Wylie, a well-known ethical hacker, author, and educator, who will be leading CYBR.HAK.CON — the Dallas/Fort Worth chapter of this new initiative. Together, Michael and Phillip share their vision for what makes a truly impactful cybersecurity event, how they're building inclusive and technically rich experiences, and what attendees can expect from these revamped conferences. From speaker curation to community engagement, they're crafting something that's more than just a series of events — it's a movement. And of course, we'll have some fun along the way. Expect stories from past conferences, a few laughs about hacker culture, and maybe even a debate over which fictional hacker deserves a keynote slot. Whether you're a seasoned security pro or just curious about the people shaping the future of cyber communities, this episode will give you a front-row seat to the next chapter in grassroots cybersecurity. Helpful Links: Here are some helpful and relevant links for your listeners to explore CYBR.SEC.Community, its conferences, and your guests' work. These will give them direct access to events, media, and speaker profiles mentioned in your episode. ________________________________________ 🔗 CYBR.SEC.Community & Conferences • CYBR.SEC.Community Official Site https://www.cybrseccon.com Main hub for the community, including conference info, speaker lineup, merch, and tickets. • CYBR.SEC.Media https://www.cybrsecmedia.com Articles, podcasts, videos, and updates from across the CYBR.SEC ecosystem. • HOU.SEC.CON Legacy & Current Info https://www.houstonseccon.com Historical and current details about the Houston-based conference that started it all. ________________________________________ 🧠 Featured Guests • Michael Farnum (Founder, CYBR.SEC.Community) LinkedIn: https://www.linkedin.com/in/mfarnum • Phillip Wylie (Lead, CYBR.HAK.CON) Personal Site: https://thehackermaker.com Podcast: https://phillipwylieshow.transistor.fm LinkedIn: https://www.linkedin.com/in/phillipwylie • CYBR.HAK.CON Announcement Post by Phillip Wylie https://www.linkedin.com/posts/phillipwylie_im-excited-about-my-partnership-with-houseccon-activity-7379520683552321536-OV83

Dec 22, 20251h 19m

S4 Ep 13S4 - Episode 013 – The Cyber Crystal Ball: Predictions & Pitfalls (w/ Paul Furtado from Gartner)

In this episode of the Cyber Distortion Podcast, hosts Jason Popillion and Kevin Pentecost sit down with Paul Furtado, Vice President and Analyst at Gartner, for a deep, insightful conversation that cuts through industry noise and gets to the heart of what's shaping cybersecurity and enterprise technology today. Paul brings a dynamic blend of executive leadership and real-world operational expertise, with a career marked by driving bottom-line impact, navigating mergers and acquisitions, optimizing performance, and reshaping strategic technology programs. Known for his visionary leadership, negotiation acumen, and ability to connect strategy with execution, Paul shares the kind of clarity and perspective that only comes from decades on the front lines of IT, security, and business transformation. Whether you're a cybersecurity leader, a tech strategist, or simply someone looking to understand the forces driving today's enterprise landscape, this episode delivers actionable takeaways, thoughtful commentary, and a rare behind-the-scenes look at how one of Gartner's top voices views the future. Tune in and get ready for a strategic, sharp, and forward-thinking discussion only Cyber Distortion can deliver. Helpful Links: Here are some very good accompanying resources you can include in your episode show notes, to give listeners more context and the ability to dig deeper. Helpful Resources: About Paul Furtado Paul Furtado's profile on Gartner, Inc.: Paul Furtado – Gartner Expert — details his role, background, areas of coverage (security operations, infrastructure security, cyber risk) and previous experience. (Gartner) (If available) His LinkedIn profile — you may search LinkedIn for "Paul Furtado Gartner" or similar to locate his public profile, so listeners can connect or follow his posts and insights. About Gartner & the "Magic Quadrant" Gartner's official definition of the Magic Quadrant: What is the Magic Quadrant? — explains the concept of mapping vendors by "Ability to Execute" and "Completeness of Vision". (Gartner) Gartner's research methodology page: Magic Quadrant, Critical Capabilities and Market Coverage — covers how vendors are evaluated and what the four quadrants (Leaders, Challengers, Visionaries, Niche Players) mean. (Gartner) Additional explanatory article: "What is Gartner's Magic Quadrant and why does it matter?" — by AmericanEagle.com Insights: Link (Americaneagle.com) Recommended Further Listening / Reading Webinar: "The Gartner Cybersecurity Outlook for Midsize Enterprises" hosted by Paul Furtado. A helpful session for listeners who want leadership-level views on cyber risk in mid-sized enterprises. (Gartner) Research note: "How markets and vendors are evaluated in Gartner Magic Quadrants" (March 2024) — useful for understanding the behind-the-scenes of how Gartner constructs these analyses. (Gartner) Suggested "Next Steps" for Listeners Visit Paul Furtado's Gartner Expert profile and follow his commentary on cybersecurity trends. Explore Gartner's Magic Quadrant methodology so you understand how vendor evaluations work (especially useful in your job, budget planning, vendor selection). Reflect on your organization: Where would you place your internal tech or security vendors? Are you focusing just on "Leaders", or considering "Challengers", "Visionaries", or "Niche Players" based on your specific needs? (This aligns with what we discussed in the episode.)

Nov 14, 20251h 12m

S4 Ep 12S4 - Episode 012 – Zero Trust, Zero Confusion (w/ Rob Allen)

In this eye-opening episode of Cyber Distortion, hosts Kevin Pentecost and Jason Popillion sit down with Rob Allen from ThreatLocker to break down one of the most talked-about — and misunderstood — concepts in cybersecurity today: Zero Trust. With a deep well of technical expertise and real-world business acumen, Rob brings clarity to the chaos, cutting through the jargon to explain what Zero Trust really means, why it matters, and how organizations of all sizes can adopt it effectively. Whether you're a seasoned security pro or just starting to wrap your head around Zero Trust architecture, this episode gives you the insights and practical takeaways you need — without the confusion. Expect real talk, real strategies, and a fresh perspective on building a more secure future. Don't miss this chance to learn from one of the industry's most experienced leaders in cybersecurity, cloud infrastructure, and customer-driven solutions. Zero Trust doesn't have to be complicated. Let's make it make sense. Helpful Links: Here are several high‑quality resources to deepen your understanding of Zero Trust, along with the official web links for ThreatLocker and Rob Allen's LinkedIn profile: 🔗 Official Links ThreatLocker (official website / resource center) https://www.threatlocker.com/ (ThreatLocker) Rob Allen — LinkedIn https://www.linkedin.com/in/threatlockerrob/ (Phillip Wylie) ThreatLocker Resource Center (blogs, eBooks, webinars, case studies) https://www.threatlocker.com/resources (ThreatLocker) 📚 Additional Learning Resources on Zero Trust Here are several authoritative and practical learning resources to help your listeners (or you) get up to speed on Zero Trust architectures, strategies, and implementation: Resource What You'll Learn / Why It's Useful Link Microsoft Learn: Introduction to Zero Trust Fundamental concepts and principles of Zero Trust https://learn.microsoft.com/en-us/training/modules/zero-trust-introduction/ (Microsoft Learn) Microsoft Learn: Introduction to Zero Trust and Best Practice Frameworks How Zero Trust fits into security frameworks and architectural patterns https://learn.microsoft.com/en-us/training/modules/introduction-zero-trust-best-practice-frameworks/ (Microsoft Learn) Microsoft Learn: Protect Infrastructure with Zero Trust A module focusing on applying Zero Trust in infrastructure & server environments https://learn.microsoft.com/en-us/training/modules/zero-trust-infrastructure/ (Microsoft Learn) Microsoft Learn: Manage Networks with Zero Trust Zero Trust applied to network segmentation, traffic flows, threat protection https://learn.microsoft.com/en-us/training/modules/zero-trust-networks/ (Microsoft Learn) Microsoft Learn: Protect Data with Zero Trust Emphasis on data protection, classification, and Zero Trust data access patterns https://learn.microsoft.com/en-us/training/modules/zero-trust-data/ (Microsoft Learn) Microsoft Learn path: Establish the guiding principles and core components of Zero Trust A full learning path covering identity, endpoints, apps, network, infrastructure, and data https://learn.microsoft.com/en-us/training/paths/zero-trust-principles/ (Microsoft Learn) LinkedIn Learning: Understanding Zero Trust A beginner-friendly video course explaining Zero Trust models and problem framing https://www.linkedin.com/learning/understanding-zero-trust (LinkedIn) Udemy: Zero Trust Security Masterclass – Beginner to Mastery A hands-on, implementation-oriented course (paid) https://www.udemy.com/course/zero-trust-masterclass-from-beginner-to-mastery/ (Udemy) Cisco Zero Trust Workshops Hands‑on and strategic workshops from a major vendor's perspective https://www.cisco.com/c/en/us/products/security/zero-trust-workshops.html (Cisco) Tonex Training: Zero Trust Security Model Training A structured training course in Zero Trust fundamentals and use cases https://www.tonex.com/training-courses/zero-trust-security-model/ (Tonex)

Oct 15, 20251h 10m

S4 Ep 11S4 - Episode 011 – Faith, Fire, and Frameworks (w/ Gaelle Koanda)

Today's guest is a true force in cybersecurity, governance, and leadership. She's a global voice for resilience, inclusion, and innovation — and her story is as inspiring as it is impactful. In this episode, we were thrilled to be joined by Gaelle Koanda — a Cybersecurity and GRC powerhouse, ISACA Board Member, AI Ethics Advocate, Entrepreneur, and Nonprofit Leader. From IT audits to executive boardrooms, Gaelle has carved a path defined by grit, grace, and growth. She's the Founder and President of the very first WiCyS chapters in Francophone Africa, and currently serves as the SheLeadsTech Ambassador for Colorado — building bridges across continents and empowering women in tech at every step. Her career is a masterclass in purpose-driven leadership — and today, we're going to explore her journey, her insights on cybersecurity risk and governance, her thoughts on ethical AI, and her mission to uplift others through community, advocacy, and bold action. Join us for an awesome discussion on Gaelle's path into cybersecurity and beyond! 🔗 Related Links Gaelle Koanda — LinkedIn profile LinkedIn Gaelle Koanda — ISSA speaker page ISSA International "How I Survive Imposter Syndrome" (guest-written for ISACA) ISACA WiCyS (Women in Cybersecurity) — "Hacking the glass ceiling" article WiCyS WiCyS organization / about page WiCyS YouTube: "Never Give Up: Gaelle Koanda's Inspiring Path to Success" YouTube

Oct 6, 20251h 21m

S4 Ep 10S4 - Episode 010 – The Making of I AM MACHINE – w/Chris Glanden & Len Noe

Description: In this compelling episode of the Cyber Distortion Podcast, hosts Jason sits down with the extraordinary trio behind the groundbreaking documentary I AM MACHINE — a deep dive into the life and mission of transhuman white hat hacker, Len Noe. Known for merging biology with embedded technology, Len's journey into transhumanism is as provocative as it is visionary. He uses his cybernetic implants not only to push the boundaries of human capability but also as a powerful tool to demonstrate vulnerabilities in both physical and digital security systems. From real-world pen tests to live hacking demos, Len's ethical hacking blurs the line between man and machine — all in the name of education and awareness. Joining the conversation is director Chris Glanden from Barcode Security, who provides insight into the creative vision behind the documentary and how the concept was brought to life. Kevin, who also served as the film's editor, gets put in the hot seat by Jason to share his unique perspective on shaping the story from raw footage to finished film. Together, the team explores the challenges, inspirations, and revelations involved in documenting such a futuristic and deeply personal subject. Whether you're fascinated by transhumanism, cybersecurity, or the art of storytelling, this episode unpacks the making of I AM MACHINE from concept to screen — and everything in between. Here are several good resources for listeners to learn more about embedded technology, ethical hacking, and to visit the sites you mentioned. I've grouped them by topic so you can explore what interests you most: 🔌 Embedded Technology Resources TI Developer Zone – Embedded Development Texas Instruments provides hardware + software development tools, demos, software libraries & example projects to help developers get started with embedded systems. (Texas Instruments) Embedded.com – Hands‑On Experience Articles, webinars, and practical labs for embedded tech, sensors, microcontroller work – great for seeing how embedded software and hardware interact in real world applications. (Embedded) Embedded Artistry – Resources A curated set of articles, tutorials, libraries, podcasts, and community content for both beginners and those with more experience. Offers insight into best practices, architectures, hardware/software integration. (Embedded Artistry) STMicroelectronics IoT / Embedded ML Platform Free educational resources around embedded systems + machine learning, helping bridge the gap between raw hardware and AI / intelligent embedded systems. (STMicroelectronics) "Awesome Embedded" (Adafruit's curated list) A big collection of blogs, code, tools, designs, hardware boards, etc., all focused around embedded systems & related tech. (blog.adafruit.com) 🛡 Ethical Hacking / Cybersecurity Resources TryHackMe A platform with guided, hands‑on labs for ethical hacking, useful for beginners and intermediate learners. Offers real‑world style challenges. (slickhacker.com) Hack The Box (HTB) More advanced penetration‑testing style labs and "boxes" that you can hack in a safe environment. Great for up‑skilling. (slickhacker.com) OWASP (Open Web Application Security Project) Very well‑regarded project that publishes tools, frameworks, cheat‑sheets, open source projects (e.g. WebGoat, Juice Shop) and guidance on securing web apps. (slickhacker.com) GitHub — "Awesome Ethical Hacking Resources" repos Repositories like vadymurupa/ethical‑hacking‑resources or hassnainfareed/awesome‑ethical‑hacking‑resources gather lists of books, courses, vulnerable machines, tools, write‑ups, etc. (GitHub) Cyberly Tutorials, guides, and free content on cybersecurity, ethical hacking, privacy, and emerging threats. Great for self‑paced learners. (cyberly.org) 🌐 Websites You Should Definitely Visit I AM MACHINE — https://i‑am‑machine.com The official website for the documentary. Includes information about Len Noe, embedded tech, screenings, news, trailer, etc. (assumed from context). Cyber Circus Network — https://www.cybercircusnetwork.com The network behind Cyber Distortion Podcast and related content. Good place to get more episodes, background, community, and related materials.

Sep 12, 20251h 14m

S4 Ep 9S4 - Episode 009 – Codewaves Rising – Surfing Latin Americas Talent Tide (w/ Roger Einstoss)

Description: 🎙️ New Episode Alert – Cyber Distortion Podcast 🚨 Welcome back! In this episode we're diving deep into one of the most pressing challenges in cybersecurity: finding the right talent. Join us for an eye-opening conversation with Roger Einstoss, co-founder of Braintly, a company revolutionizing how organizations source cybersecurity professionals from across Latin America. With decades of experience and a sharp eye for global tech talent, Roger shares insider knowledge on tapping into thriving hubs like Argentina, Brazil, and beyond. We explore how Latin America is rapidly emerging as a hotbed for skilled cybersecurity professionals—and why North American companies are increasingly turning south of the border for outsourced expertise. Roger walks us through Braintly's unique approach to vetting and placing top-tier talent, the challenges companies face in scaling their security teams, and why understanding cultural fit is just as crucial as technical skills. Whether you're a CISO looking to grow your team, a tech leader exploring nearshoring options, or simply curious about the evolving cybersecurity workforce, this episode delivers both practical insights and global perspective. Roger's passion for empowering Latin American professionals and building cross-border partnerships is not only inspiring—it's exactly what the cybersecurity industry needs right now. 🔗 Don't miss this one—subscribe now and tune in to the Cyber Distortion Podcast on your favorite platform. Connect with Roger here: LinkedIn – Roger Einstoss 🎧 Featured Guest: Roger Einstoss LinkedIn: https://www.linkedin.com/in/rogereinstoss Twitter/X: (Not publicly listed, but you can search or ask Roger directly) Company Website (Braintly): https://www.braintly.com Braintly on LinkedIn: https://www.linkedin.com/company/braintly 🌎 Explore Braintly Braintly helps companies worldwide connect with top-tier tech and cybersecurity talent across Latin America. 🌐 Homepage: https://www.braintly.com 🔍 Services Overview: https://www.braintly.com#services 📩 Contact Braintly: https://www.braintly.com#contact 📘 Braintly Blog (if available): (Currently no blog listed on homepage—check for updates) 🧠 Learn More: Latin America's Cybersecurity Talent Landscape Here are some external resources you can reference or share to expand on the discussion: 📈 "Why Latin America is the Next Frontier for Tech Talent" – TechCrunch https://techcrunch.com/2021/08/24/latin-america-tech-talent 📊 "Cybersecurity Workforce Study" – (ISC)² 2024 https://www.isc2.org/Research/Workforce-Study 🌍 "Nearshore Outsourcing Trends in 2025" – Nearshore Americas https://nearshoreamericas.com 🗺️ "Top Tech Hubs in Latin America: Argentina, Brazil, Mexico" – Globalization Partners https://www.globalization-partners.com/blog/tech-hubs-latin-america

Aug 7, 20251h 1m

S4 Ep 8S4 - Episode 008 – Unleashing Your Inner Hacker (w/ Ted Harrington)

This episode welcomes Ted Harrington, a celebrated ethical hacker, TED‑X keynote speaker, and executive partner at Independent Security Evaluators (ISE). With decades of real‑world experience hacking everything from iPhones and cars to medical devices, cryptocurrency platforms, and password managers, Ted brings unmatched expertise to our conversation. He's built a reputation for uncovering hidden vulnerabilities, helping clients such as Google, Amazon, Netflix, Microsoft, Disney, and Adobe to fix tens of thousands of security flaws—demonstrating why no system is truly unhackable. In this episode, Ted walks us through his journey from early penetration testing to leading elite security research. We discuss the lessons from Ted's two influential books: Hackable: How to Do Application Security Right and Inner Hacker. Hackable guides developers, executives, and security teams through building threat models, finding and fixing vulnerabilities early in development, and integrating security into code and culture so organizations can earn trust—and sales. Inner Hacker delves deeper into the hacker mindset: how curiosity, creativity, and rule‑breaking thinking can be applied, not only to cybersecurity, but also to entrepreneurship and personal growth. Finally, Ted reflects on his TED‑X talk "Why You Need to Think Like a Hacker" and delivers ideas from his keynote programs—inviting listeners of Cyber Distortion Podcast to embrace four hacker traits (curiosity, creativity, persistence, and nonconformity) and use them to out-think attackers, address novel threats like AI‑driven deepfakes, and build stronger systems and teams from inside out. Tune in to enjoy a lively, illuminating mix of war stories, strategic insight, and actionable takeaways from one of the most trusted voices in ethical hacking today. CITATIONS & LINKS: 🎙️ Official and Authoritative Links Ted Harrington's official website (home page) – the main hub for his bio, speaking, books, and more https://www.tedharrington.com 📚 Buy Ted's Books Purchase Hackable: How to Do Application Security Right on Amazon (ebook/print) – direct link for buying online https://www.podchaser.com/podcasts/hacker-valley-studio-889742/episodes/think-like-a-hacker-solve-like-234696483?utm_source=chatgpt.com Pre‑order Inner Hacker (anticipated Summer 2025) via official site waitlist page https://www.tedharrington.com/inner-hacker?utm_source=chatgpt.com 🎤 Talks and Keynotes "Why You Need to Think Like a Hacker" TED‑X Talk – video available via Ted's speaking page https://www.tedharrington.com/speaking?utm_source=chatgpt.com Hacker Valley Studio episode: "Think Like a Hacker, Solve Like a Leader" featuring Ted Harrington – show notes & episode link from a popular cybersecurity podcast https://hackervalley.com/e/think-like-a-hacker-solve-like-a-leader-featuring-ted-harrington?utm_source=chatgpt.com 🎧 Other Podcasts & Interviews Social‑Engineer.com Podcast Ep. 172 – "Creating Psychological Salt" – Ted Harrington joins Chris Hadnagy to discuss security awareness and his book Hackable https://www.social-engineer.org/podcasts/ep-172-security-awareness-series-creating-psychological-salt-with-ted-harrington/?utm_source=chatgpt.com Human Factor Security Podcast Ep. 153—Ted Harrington interview – on security as a business advantage, Hackable, and real‑world anecdotes https://humanfactorsecurity.co.uk/episode-153-ted-harrington/?utm_source=chatgpt.com 🔗 Professional Profiles & Media Ted Harrington on LinkedIn – connect and follow his professional updates (often referenced in podcast show notes) hackervalleystudio.podbean.comPodchaser "Cybersecurity Videos" section on his website – demo reels, hacking case studies, keynote previews, and more tedharrington.com

Jul 29, 20251h 25m

S4 Ep 7S4 - Episode 007 – Reality Distortion is so Freakin' Real! (w/ Winn Schwartau)

In this riveting episode of Cyber Distortion, hosts Kevin Pentecost and Jason Popillion sit down with none other than Winn Schwartau — the legendary cybersecurity pioneer and provocateur known for pulling no punches when it comes to the truth. A trailblazer in information warfare and the original mind behind DEFCON Jeopardy, Winn dives deep into the murky waters of misinformation, disinformation, and the global implications of distorted digital realities. From nation-state psyops to corporate manipulation campaigns, we explore how the war over truth is being waged on battlefields both virtual and real. But it wouldn't be Cyber Distortion without a twist. We wrap the episode with our own chaotic spin on Cyber Distortion Jeopardy, putting Winn — the Godfather of DEFCON Jeopardy himself — back in the hot seat. Expect sharp insights, dark humor, and plenty of digital distortion as we challenge Winn's wit and memory. Whether you're a cybersecurity veteran or just starting to question what's real in your feed, this episode will leave you thinking twice about the information you trust. Jason Popillion is a CISSP and serves as a CIO/CTO of a SaaS company and Kevin Pentecost is a CISSP, CISM, CEH, CPT, MPCS, MCSE, CCA, ITIL-F and serves as the Information Security Director for a Manufacturing company. 🔹 Winn Schwartau – Official & Contact Personal website & contact – Connect directly: "Wanna prove me wrong?" rsaconference.com+10winnschwartau.com+10infoworld.com+10 Biography & writings – Details on his books, timeline, awards: thesecurityawarenesscompany.com LinkedIn-like presence via KnowBe4 – Founder & CVO of The Security Awareness Company (now part of KnowBe4): iwc-3.com+2thesecurityawarenesscompany.com+2en.wikipedia.org+2 🔹 Essential Articles & Background on Winn Wired (1996) – Classic article Information Warrior describes his perspective on national cyber threats and "magnetic bombs": wired.com InfoWorld & Network World – Opinion pieces by Winn on global info‑war and cyber defense: infoworld.com+1networkworld.com+1 🔹 Books by Winn Schwartau Information Warfare: Chaos on the Electronic Superhighway – seminal work on cyberterror thesecurityawarenesscompany.com+5en.wikipedia.org+5dynamicspeakers.com+5 Cybershock, Time Based Security, Terminal Compromise, Analogue Network Security, The Art & Science of Metawar – full catalog available via ThriftBooks rsaconference.com+6thriftbooks.com+6en.wikipedia.org+6 Here's a direct link where you can purchase Winn Schwartau's newest book The Art & Science of Metawar, available in paperback: The Art & Science of Metawar (paperback) – listed around $25 used/new‑low via eBay/AbeBooks. You can also purchase or preview it through these official sources: Amazon Paperback & Kindle — Paperback AbeBooks — Used paperback editions, ISBN 0996401946, published August 30, 2024 by Winn Schwartau LLC thriftbooks.com+2abebooks.com+2 🔹 Broader Reading on Misinformation & Disinformation Technology‑Enabled Disinformation (arXiv, 2018) – a rich survey of digital disinformation mechanics and defense strategies: arxiv.org Cambridge Handbook (Chapter: Misinformation, Disinformation & Online Propaganda) – analysis of spread dynamics and trust erosion: cambridge.org+1reddit.com+1 Political Behavior (2020) – study on how misinformation‑warnings can backfire (the "tainted truth" effect): link.springer.com Love Letter to America (PDF) – Read it here. Severance (2022) – The show revolves around employees of the mysterious biotechnology corporation Lumon Industries, who have undergone a surgical procedure called "severance" that separates their work memories from their personal life. This means their "innie" (work self) has no knowledge of their "outie" (personal life) and vice versa. Watch it on AppleTV.

Jul 1, 20251h 50m

S4 Ep 6S4 - Episode 006 – LULZSEC Mastermind Unmasked: The Sabu Story (w/ Hector Monsegur)

Welcome back to Cyber Distortion, the show where the shadows of the digital world come into focus. Today's episode dives deep into the mind of someone who once sat at the center of the internet's most notorious hacktivist movements. Our guest is Hector Monsegur—better known to some as Sabu—a former leading figure in both Anonymous and LULZSEC, who orchestrated some of the most high-profile cyber-attacks of the early 2010s. From penetrating government networks to being at the heart of a global FBI takedown, Hector's story is part cautionary tale, part cyber-thriller. In this conversation, he shares it all—raw, unfiltered, and in his own words. We explore what drove him, how the digital threat landscape has evolved, and his take on the current state of cybersecurity, hacktivism, and surveillance. Plug in, patch up, and get ready—today, we're going behind the mask.Whether you're an aspiring hacker, seasoned security pro, or just cyber-curious, this episode is packed with insights, inspiration, and a behind-the-scenes look at the evolving hacking landscape. Jason Popillion is a CISSP and serves as a CIO/CTO of a SaaS company and Kevin Pentecost is a CISSP, CISM, CEH, CPT, MPCS, MCSE, CCA, ITIL-F and serves as the Information Security Director for a Manufacturing company. Contact Info: Hector's LinkedIn: https://www.linkedin.com/in/hxmonsegur/ Link up with Alacrinet: https://www.alacrinet.com/ Here's a curated list of trusted, beginner-friendly, and practical online resources, categorized for easy navigation: 🛠️ Hands-On Learning Platforms 1. TryHackMe 🔗 https://tryhackme.com Interactive, gamified lessons in cybersecurity and hacking. Beginner to advanced levels, covering real-world attack simulations. Great learning paths like Pre-Security and Complete Beginner. 2. Hack The Box (HTB) 🔗 https://www.hackthebox.com Advanced platform for practicing hacking skills legally. Ideal for pentesting, network exploitation, and red teaming. Offers "HTB Academy" with structured learning paths. 3. OverTheWire: Wargames 🔗 https://overthewire.org/wargames/ Classic text-based challenges. Great for beginners learning Linux, networking, and basic hacking logic. 📘 Free Courses & Curriculums 4. Cybrary 🔗 https://www.cybrary.it Free and paid cybersecurity courses, including certifications like CompTIA Security+. Includes job role learning paths. 5. Open Security Training 🔗 http://opensecuritytraining.info In-depth technical training on topics like x86 assembly, exploit development, and reverse engineering. Free and used by industry pros. 6. MIT OpenCourseWare – Computer Systems Security 🔗 https://ocw.mit.edu/courses/6-858-computer-systems-security-fall-2014/ College-level deep dive into systems security. Lectures, slides, and assignments freely available. 📚 Books & Reading 7. Hacking: The Art of Exploitation by Jon Erickson Great for understanding how things work under the hood, including C, assembly, and exploits. 🔗 Available via No Starch Press 8. The Web Application Hacker's Handbook by Dafydd Stuttard & Marcus Pinto Excellent for aspiring bug bounty hunters and web pentesters. 🧠 Communities & Forums 9. Reddit Communities r/netsec – News and discussion about information security. r/AskNetsec – Beginner-friendly Q&A. r/cybersecurity – General news, career advice, and trends. 10. Discord Servers Many Discord servers support TryHackMe and HTB users. Look for "InfoSec Prep" and "CyberMentor's CyberSec Discord". 🧑‍💻 YouTube Channels 11. LiveOverflow 🔗 https://www.youtube.com/c/LiveOverflow Deep, technical tutorials in CTFs, binary exploitation, and real-world hacking. 12. The Cyber Mentor 🔗 https://www.youtube.com/@thecybermentor Great for aspiring pentesters. Offers a full free course: Practical Ethical Hacking. 13. John Hammond 🔗 https://www.youtube.com/@_JohnHammond Covers TryHackMe, HTB, malware analysis, and CTFs in an engaging way. 🎓 Certifications to Consider Later CompTIA Security+ – Entry-level security cert. eJPT (eLearnSecurity Junior Penetration Tester) – Beginner-friendly, hands-on. OSCP (Offensive Security Certified Professional) – More advanced, goal for serious pentesters.

Jun 11, 20251h 36m

S4 Ep 5S4 - Episode 005 – The Art of the HVCK! (w/ Ryan Williams)

In this electrifying episode, we dive deep into the world of hacking, privacy, and offensive security with Ryan Williams, Editor of HVCK Magazine and Director of Smart Cyber Solutions Pty Ltd. Ryan is more than just a cybersecurity consultant—he's a red team enthusiast, blue team strategist, and relentless innovator in the cyber arena. We explore Ryan's journey from pen tester to publisher, and uncover the vision behind HVCK Magazine—an online publication dedicated to all things hacking, from OSINT and threat intelligence to offensive tooling and real-world exploits. Learn about his contributions to the community with projects like Commander, MxFlex, AllTheThings, and Flight Freaker, and how these tools are helping redefine modern cybersecurity practices. Whether you're an aspiring hacker, seasoned security pro, or just cyber-curious, this episode is packed with insights, inspiration, and a behind-the-scenes look at the evolving hacking landscape. Jason Popillion is a CISSP and serves as a CIO/CTO of a SaaS company and Kevin Pentecost is a CISSP, CISM, CEH, CPT, MPCS, MCSE, CCA, ITIL-F and serves as the Information Security Director for a Manufacturing company. 🔐 Tune in to hear: How HVCK Magazine is shaping the hacker culture online The power of community-driven security innovation Red vs. Blue: Ryan's dual mindset in offensive and defensive ops Real talk on bespoke security tooling and Essential Eight uplifts And a few unexpected stories from the field... 🧠 Stay sharp. Stay curious. Stay distorted. Citations: 🔗 Connect with Ryan Williams LinkedIn: Explore Ryan's professional background and connect with him on LinkedIn. Smart Cyber Solutions: Learn more about his cybersecurity consultancy, Smart Cyber Solutions Pty Ltd, on their Facebook page. ​ 📰 Dive into HVCK Magazine HVCK Magazine Back Issues: Discover the mission and content of HVCK Magazine in this feature on https://hvck-magazine.github.io/ HVCK Magazine New Issues: Discover the mission and content of HVCK Magazine in this feature on https://heyzine.com/flip-book/cd19181153.html Contributors' Insights: Read about contributors' experiences and articles in HVCK Magazine, such as this LinkedIn post. ​ 🎧 Related Media & Community YouTube Interview: Watch an in-depth interview with Ryan Williams discussing HVCK Magazine and cybersecurity challenges on YouTube. 🧠 Explore More in Cybersecurity & Hacking Phrack Magazine: A long-standing publication in the hacking community, available at phrack.org. ​ Hakin9 Magazine: Offers articles and resources on IT security and ethical hacking at hakin9.org. ​

May 5, 20251h 23m

S4 Ep 4S4 - Episode 004 – Human IOT: Sub-Molecular DNA Cybersecurity (w/ Dr. Gregory Carpenter)

In this electrifying episode of the Cyber Distortion Podcast, hosts Kevin Pentecost and Jason Popillion dive into the fascinating crossroads of cybersecurity, health, and molecular science with a very special guest — Dr. Gregory Carpenter. Known worldwide for his pioneering research and groundbreaking work at the intersection of biotechnology and cybersecurity, Dr. Carpenter brings a unique and urgent perspective on the growing risks and innovations tied to DNA hacking and cybersecurity at the molecular level. Together, they explore how advances in genetics, bioinformatics, and synthetic biology are creating new vulnerabilities — and why protecting health data and even the biological code of life itself has become a critical frontier for cybersecurity professionals. Dr. Carpenter shares real-world insights, discusses current threats and emerging trends, and offers his expert take on where regulation, technology, and human ingenuity must evolve to stay ahead of threats we are only beginning to understand. Don't miss this thought-provoking conversation that bridges the digital and biological worlds — and challenges how we think about security in an era where data isn't just on servers, but in our very cells. Whether you're a cybersecurity expert, a health industry professional, or just fascinated by where technology is taking us next, this is one episode you won't want to miss! Jason Popillion is a CISSP and serves as a CIO/CTO of a SaaS company and Kevin Pentecost is a CISSP, CISM, CEH, CPT, MPCS, MCSE, CCA, ITIL-F and serves as the Information Security Director for a Manufacturing company. 🔗 Citations and Related Links: Biomalware: Malware Encoded in DNA Wired – https://www.wired.com/story/malware-dna-hack/ Scientists Hack a Computer Using DNA MIT Technology Review – https://www.technologyreview.com/2017/08/10/150013/scientists-hack-a-computer-using-dna/ Healing the Body with Sound Frequencies Donovan Health – https://www.donovanhealth.com/blog/healing-the-body-with-frequencies-the-basics-explained Dire Wolves and Woolly Mammoths: Concerns About Resurrecting Extinct Species BBC Future – https://www.bbc.com/future/article/20250425-why-scientists-fear-attempts-to-resurrect-extinct-animals-may-backfire DEFCON Conference (Official Site) https://defcon.org/ CRISPR and the Threat of Biohacking Harvard International Review – https://hir.harvard.edu/crispr-and-the-threat-of-biohacking/ Cyberbiosecurity: An Emerging New Discipline to Help Safeguard the Bioeconomy Frontiers in Bioengineering and Biotechnology – https://www.frontiersin.org/articles/10.3389/fbioe.2019.00020/full The Growing Threat of Biosecurity Risks in Synthetic Biology RAND Corporation – https://www.rand.org/pubs/research_reports/RR3027.html

Apr 28, 20251h 48m

S4 Ep 3S4 - Episode 003 – Hackers Love You...And Your Overshared Instagram Posts! (w/ Wes Kussmaul)

In this thought-provoking episode of the Cyber Distortion Podcast, we're joined by Wes Kussmaul, a visionary in the realm of secure online identities and the founder of Delphi Internet Services Corporation—the company behind the Kussmaul Encyclopedia, the world's first computerized encyclopedia and one of the earliest forms of hypertext. With over three decades of experience building secure online spaces, Wes brings a unique blend of historical perspective and forward-thinking innovation to the conversation around privacy, authentication, and identity protection. As digital threats evolve, so must our understanding of how we prove who we are online. Wes breaks down the role of public and private key cryptography in securing not just our communications, but our very identities and intellectual property. Through vivid analogies and real-world examples, he illustrates how Public Key Infrastructure (PKI) can serve as the backbone of a more trustworthy internet—one where authenticity and privacy aren't afterthoughts, but foundations. We also explore his groundbreaking work with Reliable Identities, an initiative focused on reestablishing digital trust in an age of phishing, spoofing, and identity theft. Wes shares why the current system of usernames and passwords is fundamentally flawed—and how we can replace it with something far more secure and future-proof. Whether you're a cybersecurity expert, a tech enthusiast, or simply curious about the future of online trust, this episode will reshape how you view identity in the digital world. Tune in to hear from one of the internet's earliest innovators on how we can protect who we are—and what we create—online. Wes is the author of several books about privacy and authenticity, including Quiet Enjoyment (2004), Own Your Privacy (2007), The Future Needs You (2007), and Don't Get Norteled (2014). He is also an individual adherent of the International Union of Latin Notaries and has been appointed a Notary Ambassador by the National Notary Association. Wes received his BS in Physics from the University of Central Missouri in 1971 while serving in the US Air Force at Whiteman Air Force Base (SAC). Jason Popillion is a CISSP and serves as a CIO/CTO of a SaaS company and Kevin Pentecost is a CISSP, CISM, CEH, CPT, MPCS, MCSE, CCA, ITIL-F and serves as the Information Security Director for a Manufacturing company. CITATIONS: LinkedIn: https://www.linkedin.com/in/weskussmaul/ Wes' Personal Website: https://weskussmaul.com/about-wes/ Authentiverse: https://authentiverse.net Authenticity Alliance: https://www.whatisauthenticity.com/ City of Osmio: https://www.osmio.ch/our-name.html Buy Wes' Books: https://www.pkipress.com/ The Authenticity Institute: https://www.authenticityinstitute.com/index.html More information on Sutton Smith (a.k.a. Sutton Love): https://www.reversecanarymission.org/person/sutton-smith-66936d96d1a13a06fe312995 Sutton's Instagram: https://www.instagram.com/sutton.loves/

Apr 10, 20251h 29m

S4 Ep 2S4 - Episode 002 - Staring Down the Barrel of a Loaded Gun (w/ Ricoh Danielson)

In this gripping episode of the Cyber Distortion Podcast, we sit down with Ricoh Danielson — a former U.S. Army Combat Veteran of Iraq and Afghanistan, national security expert, and digital forensics specialist. With a career that bridges the battlefield and the digital frontlines, Ricoh brings a rare and powerful perspective on the evolving threats to our national security and critical infrastructure. From his firsthand experiences in war zones to his current role as a VCISO and digital forensic expert, Ricoh shares stories that are as eye-opening as they are inspiring. We dive into the real-world challenges facing the nation today — from protecting our energy grids and communication systems to defending against cyber threats that target both the public and private sectors. Ricoh also recounts some of his most intense moments in service, revealing what it takes to operate in high-stakes environments, both overseas and in high-profile courtrooms. This episode is a must-listen for anyone interested in cybersecurity, national defense, or the human element behind protecting our digital and physical worlds. Jason Popillion is a CISSP and serves as a CIO/CTO of a SaaS company and Kevin Pentecost is a CISSP, CISM, CEH, CPT, MPCS, MCSE, CCA, ITIL-F and serves as the Information Security Director for a Manufacturing company. Citations & Helpful Links: National Security Agency (NSA) Cybersecurity: The NSA provides resources aimed at preventing and eradicating cyber threats to U.S. national security systems, with a focus on the Defense Industrial Base and the enhancement of U.S. weapons' security. https://www.nsa.gov/cybersecurity/ Department of Defense Cyber Crime Center (DC3): DC3 offers integrated services including cyber training, digital and multimedia forensics, and vulnerability disclosure, supporting law enforcement and counterintelligence efforts. https://csrc.nist.gov/ • SANS Institute: A renowned organization specializing in information security and cybersecurity training, offering courses on topics like cyber and network defenses, penetration testing, incident response, and digital forensics. https://www.sans.org/ https://www.dc3.mil/ National Institute of Standards and Technology (NIST) Computer Security Resource Center: NIST's CSRC provides access to cybersecurity and information security-related projects, publications, and news, supporting government, industry, and academic efforts in securing information systems. https://csrc.nist.gov/ Cybersecurity and Infrastructure Security Agency (CISA) Free Cybersecurity Services and Tools: CISA has curated a database of free cybersecurity services and tools to help organizations reduce cybersecurity risks across U.S. critical infrastructure sectors. https://www.cisa.gov/resources-tools/... For listeners interested in connecting with Ricoh Danielson or learning more about his work: Official Website: Ricoh's personal website offers insights into his background, services, and expertise. https://www.ricohd.us/ Contact Page: To reach out to Ricoh directly, visit his contact page where you can send a message or inquiry. https://www.ricohd.us/contact Instagram: Follow Ricoh on Instagram for updates and insights related to cybersecurity and his professional endeavors. / ricoh_danielson_ These resources provide a comprehensive starting point for those interested in delving deeper into the fields of national security and digital forensics.

Mar 27, 20251h 22m

S4 Ep 1S4 – Episode 001 – [CTRL-ALT-GEN] Resetting the Generational Tech Divide

Welcome to this episode of Cyber Distortion, where we explore the cutting edge of technology, security, and the future of humanity itself. In this episode, we look into how differing generational outlooks—from the Silent Generation, to Baby Boomers, Gen X, Millennials, and Gen Z—shape the ways teams solve problems and interact within today's corporate landscape. We explore how historical events, technological exposure, and shifting cultural norms have impacted each generation's communication style, work ethic, and appetite for risk. Through candid anecdotes and real-world examples, we uncover the advantages of blending diverse generational perspectives to spark innovation, build more inclusive workplace cultures, and tackle company challenges more effectively. We discuss bridging generational gaps and nurturing an environment where each age group can contribute its strengths. Whether it's harnessing the discipline and experience of older employees or tapping into the digital fluency and fresh ideas of younger ones, this episode offers strategies for leaders to cultivate synergy and drive growth. Ultimately, we hope that listeners will come away with a clearer understanding of why inclusive, cross-generational collaboration isn't just a nice-to-have—but a critical differentiator in a rapidly evolving corporate world. We hope you enjoy this kickoff episode of our new 4th season of the podcast!! Jason Popillion is a CISSP and serves as a CIO/CTO of a SaaS company and Kevin Pentecost is a CISSP, CISM, CEH, CPT, MPCS, MCSE, CCA, ITIL-F and serves as the Information Security Director for a Manufacturing company. CITATIONS Visit our premier sponsor's pages here: Threatlocker - a global cybersecurity platform that provides endpoint protection using a Zero Trust approach, focusing on controlling and managing applications and devices to protect organizations from cyber threats, including malware and ransomware. https://www.threatlocker.com Alacrinet - a Palo Alto-based nationwide IT Security consulting firm focused on delivering best-in-class enterprise cybersecurity solutions and services. They are dedicated to people and strive to build positive, long-term relationships - both internally and with clients. We're an agile company with a team atmosphere and 'get it done' mentality to do what's needed for our clients. https://www.alacrinet.com Fulcrum Technology Solutions - exists to solve critical business problems shoulder to shoulder with you. In the pursuit of that goal, 2/3 of our company are engineers, but 100% of us are problem solvers. Whether we are tackling Security, Infrastructure, Cloud, or Big Data issues, our team won't stop until we finish the job! Our word defines us, and motivates us to give you the service that you deserve! https://www.ftsc.com Cyphernova.AI - we recognize that we are in the midst of a profound technological revolution. The way we work, learn, and communicate is evolving rapidly and will never be the same. Leveraging over 30 years of expertise in Technology and Cybersecurity, we are committed to guiding you through this transformative era. We offer a comprehensive suite of AI + Machine Learning solutions tailored to meet the unique needs of both individuals and organizations. Our services include an extensive AI Services Platform, robust training programs, ongoing support, and customized projects. As your trusted partner, we are here to help you implement and navigate the ever-changing landscape of AI. https://cyphernova.ai

Mar 17, 20251h 21m

S3 Ep 14S3 – Episode 014 – Navigating the Storm: Mastering Incident Response and Disaster Recovery

In this season finale of the Cyber Distortion Podcast, hosts Kevin Pentecost and Jason Popillion, tackle one of the most critical topics in modern cybersecurity—incident response and disaster recovery. When a cyber incident strikes, every second counts. Organizations need to be ready with well-orchestrated plans to respond effectively and recover swiftly. This episode delves deep into the strategies, tools, and best practices that every cybersecurity professional and organization should know to minimize damage and ensure resilience. Kevin and Jason guide listeners through the intricacies of incident response, breaking it down into digestible phases like preparation, detection, containment, eradication, and recovery. They also explore the role of disaster recovery planning, highlighting how businesses can resume operations quickly and securely after a breach or significant event. The hosts share real-world examples and practical tips, making these complex processes relatable and actionable for professionals at all levels. As the final episode of the season, this is one you don't want to miss. Kevin and Jason bring their signature blend of expertise and engaging conversation to ensure listeners walk away with a solid understanding of incident response frameworks, key roles and responsibilities, and the importance of regular testing and improvement. Whether you're a seasoned cybersecurity practitioner or just starting, this episode offers something valuable for everyone. Thank you for joining us this season on Cyber Distortion. We've loved exploring the multifaceted world of cybersecurity with our incredible audience, and we're ending this season with a bang. We hope you enjoy this finale as much as we enjoyed creating it. Stay tuned for future seasons as we continue to navigate the dynamic and ever-evolving landscape of cybersecurity! Jason Popillion is a CISSP and serves as a CIO/CTO of a SaaS company and Kevin Pentecost is a CISSP, CISM, CEH, CPT, MPCS, MCSE, CCA, ITIL-F and serves as the Information Security Director for a Manufacturing company. MORE VALUABLE RESOURCES: Incident Response Resources National Institute of Standards and Technology (NIST): Computer Security Incident Handling Guide Resource: NIST SP 800-61 Rev. 2 Description: This guide provides a comprehensive framework for incident handling, detailing preparation, detection, analysis, containment, eradication, and recovery steps. SANS Institute: Incident Handler's Handbook Resource: SANS Reading Room - Incident Response Description: A practical guide for incident handlers, focusing on hands-on strategies for real-world scenarios. US-CERT: Incident Response Resources Resource: CISA Incident Response Guidance Description: A hub of information, tools, and best practices for incident response, provided by the Cybersecurity and Infrastructure Security Agency. Disaster Recovery Resources Federal Emergency Management Agency (FEMA): Continuity of Operations Planning Resource: FEMA Continuity Resources Description: Guidance on creating disaster recovery and continuity plans for organizations of all sizes. International Organization for Standardization (ISO): ISO 22301 Resource: ISO 22301: Business Continuity Management Systems Description: This standard focuses on managing and reducing risks during disruptive incidents. Disaster Recovery Institute International (DRI): Best Practices for Business Continuity Resource: DRI Resources Description: A compilation of best practices, frameworks, and tools for effective disaster recovery planning. Cybersecurity Education and Training MITRE ATT&CK Framework Resource: MITRE ATT&CK Description: A detailed knowledge base of adversary tactics and techniques to inform incident response planning. CERT Coordination Center: Incident Management Practices Resource: CERT Resources Description: Research and guidance from the Software Engineering Institute at Carnegie Mellon University. Additional Practical Tools Microsoft: Security Incident Response Playbooks Resource: Microsoft Incident Response Description: A collection of playbooks designed for cloud-centric incident response. National Cyber Security Centre (NCSC): Incident Management Guidance Resource: NCSC UK Description: Practical advice from the UK government's cybersecurity body on managing incidents effectively.

Dec 26, 20241h 38m

S3 Ep 13S3 – Episode 013 – Bridging the Cyber Skills Gap w/Jessie Bolton

Cybersecurity isn't just about technology—it's about people. In this eye-opening episode of the Cyber Distortion Podcast, we're joined by Jessie Bolton, CEO of Bolt Resources and former Vice President of North Texas ISSA, to tackle one of the industry's most pressing challenges: the human side of the cybersecurity skills gap. Jessie brings a wealth of experience from her collaborations with ISC2, WiCyS, NICE, Infosec Institute, and higher education institutions. She's at the forefront of redefining how organizations identify, nurture, and retain talent in an industry facing a critical workforce shortage. From strategies to attract untapped talent to innovative training programs that prioritize real-world readiness, Jessie shares actionable insights for employers and aspiring cybersecurity professionals alike. If you're passionate about building a stronger, more inclusive cybersecurity workforce, this is the conversation you've been waiting for. Tune in and discover how we can close the gap and secure the future—one human at a time! Jason Popillion is a CISSP and serves as a CIO/CTO of a SaaS company and Kevin Pentecost is a CISSP, CISM, CEH, CPT, MPCS, MCSE, CCA, ITIL-F and serves as the Information Security Director for a Manufacturing company. CITATIONS Jessie's LinkedIn Profile: https://www.linkedin.com/in/jessiebolt/ Bolt Resources - Websites of Jessie's: boltresources.net (Company) anchor.fm/s/ee4823f0/podcast/rss (RSS Feed) bizjournals.com/dallas/press-release/detail/9334/Bolt-Resources Cyberseek.org: https://www.cyberseek.org/ Lightcast.io: https://lightcast.io/ OTHER Resources: https://venturebeat.com/programming-development/skills-shortage-persists-in-cybersecurity-with-many-jobs-going-unfilled/ North Texas ISSA: https://www.ntxissa.org/

Dec 4, 20241h 49m
Cyber Distortion Podcast, LLC.