PLAY PODCASTS
Cyber Distortion Podcast Series

Cyber Distortion Podcast Series

61 episodes — Page 1 of 2

S5 - Episode 004 – Ashley Madison: Infidelity Unmasked

May 1, 202641 min

S5 - Episode 003 – Stuxnet: Zero-Day Cataclysmic Warfare

Apr 15, 202633 min

S5 Ep 2S5 - Episode 002 – Cicada 3301

Cyber Distortion Podcast – Hosted by Kevin Pentecost & Jason Popillion In January 2012, a mysterious message appeared on an obscure corner of the internet — a simple image posted on 4chan with a chilling promise: "We are looking for highly intelligent individuals." What followed was unlike anything the internet had ever seen. Hidden messages. Impossible riddles. Cryptographic puzzles buried in images, music files, and code. Clues scattered across the globe — from obscure websites to real-world posters taped to telephone poles in cities thousands of miles apart. Behind it all was a name that would become internet legend: Cicada 3301. In this episode of The Cyber Distortion Podcast, we dive deep into one of the most enigmatic puzzles ever unleashed online. Was Cicada 3301 a recruitment program for intelligence agencies? A secret society searching for elite cryptographers? Or an elaborate experiment designed to test the limits of human intelligence and collaboration? Join Kevin Pentecost and Jason Popillion, bringing over 50 years of combined cybersecurity experience, as they: Break down how the Cicada puzzles pushed the boundaries of cryptography and problem-solving Explore the hidden techniques used — from steganography to advanced encryption Investigate the theories surrounding who might have been behind the mysterious organization And uncover why, more than a decade later, the true purpose of Cicada 3301 remains unsolved This isn't just a story about puzzles — it's a journey into the strange intersection of cybersecurity, internet culture, and human curiosity. A digital scavenger hunt so complex that only a handful of people in the world were able to follow it to the end… and even they still don't fully understand who was waiting at the finish line. Are you ready to follow the clues? Resources Explore the Actual Puzzle Archive If your listeners want to see the real puzzle files and clues, this is one of the best archives online: Complete Cicada 3301 Archive (GitHub) This repository contains: Original images used in the puzzles Clues from 2012, 2013, and 2014 puzzles Hidden files extracted from the images Documentation from the community of solvers The puzzles first appeared in 2012 on 4chan, challenging users to uncover hidden messages embedded in images and code. Audio - Suspicious Atmosphere - Cyberpunk Hacker Loop - True Crime Investigation - The Truth is Here Provided by Filmora - Splatter Horror Silence 01 - Social Crisis Provided by: Audiostock - A Sinister Plot 1285 Provided by: Universal Music for Creators 🎧

Mar 26, 202644 min

S5 Ep 1S5 - Episode 001 – The Day that Twitter Died

Cyber Distortion Podcast – Hosted by Kevin Pentecost & Jason Popillion On July 15, 2020, the unthinkable happened: dozens of the world's most powerful voices — Barack Obama, Elon Musk, Bill Gates, Joe Biden, Apple, Uber, and more — suddenly blasted the same message out to millions of followers. A promise that sounded too good to be true… because it was. What looked like a generous giveaway turned into one of the most audacious social engineering hacks in tech history — all orchestrated not by a foreign syndicate, not by an elite hacker collective… but by a 17-year-old from Tampa, Florida. In this episode of The Cyber Distortion Podcast, we peel back the curtain on the incredible story of Graham Ivan Clark — the mastermind behind the 2020 Twitter bitcoin scam. How did a teenager with no access to Twitter's code base infiltrate its inner systems? What dark psychology powered the attack? And how did a stunt that netted six figures in Bitcoin come crashing down in just hours? Join Kevin Pentecost and Jason Popillion, together bringing over 50 years of cyber expertise, as we: - Break down the hacker's journey from online forums to global headlines - Decode the social engineering tricks that toppled corporate giant - Reveal the lessons the security world still hasn't fully learned - And explore how a single moment of human error unlocked the keys to a digital kingdom This isn't just a story about stolen Bitcoin — it's a chilling reminder that the weakest link in any system is the human one, and how one kid's curiosity turned into one of the most notorious cybersecurity breaches of our time. Are you ready to join us inside the breach?! Other Helpful Links: Wikipedia – 2020 Twitter account hijacking — comprehensive overview of the incident, how it unfolded, and its impact. 2020 Twitter account hijacking (Wikipedia) Wikipedia – Graham Ivan Clark — detailed background on Clark's role in the hack and related charges. Graham Ivan Clark (Wikipedia) Ars Technica – "I was a teenage Twitter hacker…" — tech-focused reporting on how the social engineering worked and the aftermath. I was a teenage Twitter hacker (Ars Technica) The Hacker News – sentencing & case details — breakdown of charges, Bitcoin scam metrics, and how the hack was executed. 18‑Year‑Old Hacker Gets 3 Years for Massive Twitter Hack (The Hacker News) CoinDesk – coverage of sentencing and legal outcomes — crypto community perspective on the hack and legal resolution. Twitter Hacker Will Serve 3 Years for Crypto Phishing Scheme (CoinDesk) Tech Times – detailed narrative of the incident — narrative explanation of how the scam unfolded and Twitter's response. 'Bitcoin Scam': Teen Twitter Hacker Gets 3 Years (Tech Times) OPB – contemporary reporting from 2020 — quotes from prosecutors and early reporting on the arrest and scope of the hack. Florida Teen Charged as Mastermind (OPB) Wikipedia (alternate language overview) — another useful global perspective on the same incident. Détournement de comptes Twitter en juillet 2020 (Wikipedia French) Court Documents: Here are some relevant links to official or publicly shared court documents / legal filings related to the 2020 Twitter hack that you can include as sources for research. (Actual court dockets are often on PACER or state court sites and require login, so we've linked publicly accessible filings or charge PDFs where available): Charging document for Mason Sheppard (PlugWalkJoe) – PDF of federal charges in the Twitter hack case (linked from CBS News). (Note: these are federal indictments related to co-conspirators; Clark's state court documents aren't publicly indexed in one central PDF but this gives key legal filings tied to the case.) 📄 [Read the charging document for Mason Sheppard (.pdf)]Charging doc for federal co‑conspirator PlugWalkJoe (CBS News) Tampa teen pleads not guilty as court filings reveal charges – local news report referencing the court proceedings and charges in Clark's case. (Tampa Bay Times) 🔗 Tampa teen pleads not guilty as documents reveal how feds cracked Twitter hack case (Tampa Bay Times summary) Court hearing coverage – describes Clark's hearing and bail setting at the Hillsborough County Courthouse with reference to court filings. (Tampa Bay Times) 🔗 Bail and court hearing coverage for Twitter hack case (Tampa Bay Times) Sentencing summary – covers Clark's plea deal and sentence terms as reflected in official court action. (WUSF) 🔗 Tampa Twitter hacker sentenced to prison and probation (WUSF) Wikipedia – Case overview with court info – includes a summary of charges, indictment details, plea dates, and sentencing, citing court sources. (Wikipedia) 🔗 2020 Twitter account hijacking (case details) Nasdaq / CoinDesk coverage on legal proceedings – references court filings and proceedings around charges and bail. (Nasdaq) 🔗 17‑year‑old pleads not guilty as defense tries to lower bail (Nasdaq) Music provided by Filmora: Social Crisis Provided by: Audiostock

Feb 18, 202629 min

S4 Ep 14S4 - Episode 014 – CYBR.HAK.CON: The L33T DFW Hacker Conference (w/ Michael Farnum & Phillip Wylie)

In this episode, we're diving deep into the evolution of one of the most respected cybersecurity community movements in the country. Michael Farnum, founder of CYBR.SEC.Community and the original force behind HOU.SEC.CON, joins us to talk about the transformation of a beloved Houston-based conference into a multi-city, multi-conference ecosystem designed to empower cybersecurity professionals, enthusiasts, and newcomers alike. With expansion plans already underway, the CYBR.SEC.Community is poised to redefine how regional infosec communities connect, learn, and grow. We're also joined by Phillip Wylie, a well-known ethical hacker, author, and educator, who will be leading CYBR.HAK.CON — the Dallas/Fort Worth chapter of this new initiative. Together, Michael and Phillip share their vision for what makes a truly impactful cybersecurity event, how they're building inclusive and technically rich experiences, and what attendees can expect from these revamped conferences. From speaker curation to community engagement, they're crafting something that's more than just a series of events — it's a movement. And of course, we'll have some fun along the way. Expect stories from past conferences, a few laughs about hacker culture, and maybe even a debate over which fictional hacker deserves a keynote slot. Whether you're a seasoned security pro or just curious about the people shaping the future of cyber communities, this episode will give you a front-row seat to the next chapter in grassroots cybersecurity. Helpful Links: Here are some helpful and relevant links for your listeners to explore CYBR.SEC.Community, its conferences, and your guests' work. These will give them direct access to events, media, and speaker profiles mentioned in your episode. ________________________________________ 🔗 CYBR.SEC.Community & Conferences • CYBR.SEC.Community Official Site https://www.cybrseccon.com Main hub for the community, including conference info, speaker lineup, merch, and tickets. • CYBR.SEC.Media https://www.cybrsecmedia.com Articles, podcasts, videos, and updates from across the CYBR.SEC ecosystem. • HOU.SEC.CON Legacy & Current Info https://www.houstonseccon.com Historical and current details about the Houston-based conference that started it all. ________________________________________ 🧠 Featured Guests • Michael Farnum (Founder, CYBR.SEC.Community) LinkedIn: https://www.linkedin.com/in/mfarnum • Phillip Wylie (Lead, CYBR.HAK.CON) Personal Site: https://thehackermaker.com Podcast: https://phillipwylieshow.transistor.fm LinkedIn: https://www.linkedin.com/in/phillipwylie • CYBR.HAK.CON Announcement Post by Phillip Wylie https://www.linkedin.com/posts/phillipwylie_im-excited-about-my-partnership-with-houseccon-activity-7379520683552321536-OV83

Dec 22, 20251h 19m

S4 Ep 13S4 - Episode 013 – The Cyber Crystal Ball: Predictions & Pitfalls (w/ Paul Furtado from Gartner)

In this episode of the Cyber Distortion Podcast, hosts Jason Popillion and Kevin Pentecost sit down with Paul Furtado, Vice President and Analyst at Gartner, for a deep, insightful conversation that cuts through industry noise and gets to the heart of what's shaping cybersecurity and enterprise technology today. Paul brings a dynamic blend of executive leadership and real-world operational expertise, with a career marked by driving bottom-line impact, navigating mergers and acquisitions, optimizing performance, and reshaping strategic technology programs. Known for his visionary leadership, negotiation acumen, and ability to connect strategy with execution, Paul shares the kind of clarity and perspective that only comes from decades on the front lines of IT, security, and business transformation. Whether you're a cybersecurity leader, a tech strategist, or simply someone looking to understand the forces driving today's enterprise landscape, this episode delivers actionable takeaways, thoughtful commentary, and a rare behind-the-scenes look at how one of Gartner's top voices views the future. Tune in and get ready for a strategic, sharp, and forward-thinking discussion only Cyber Distortion can deliver. Helpful Links: Here are some very good accompanying resources you can include in your episode show notes, to give listeners more context and the ability to dig deeper. Helpful Resources: About Paul Furtado Paul Furtado's profile on Gartner, Inc.: Paul Furtado – Gartner Expert — details his role, background, areas of coverage (security operations, infrastructure security, cyber risk) and previous experience. (Gartner) (If available) His LinkedIn profile — you may search LinkedIn for "Paul Furtado Gartner" or similar to locate his public profile, so listeners can connect or follow his posts and insights. About Gartner & the "Magic Quadrant" Gartner's official definition of the Magic Quadrant: What is the Magic Quadrant? — explains the concept of mapping vendors by "Ability to Execute" and "Completeness of Vision". (Gartner) Gartner's research methodology page: Magic Quadrant, Critical Capabilities and Market Coverage — covers how vendors are evaluated and what the four quadrants (Leaders, Challengers, Visionaries, Niche Players) mean. (Gartner) Additional explanatory article: "What is Gartner's Magic Quadrant and why does it matter?" — by AmericanEagle.com Insights: Link (Americaneagle.com) Recommended Further Listening / Reading Webinar: "The Gartner Cybersecurity Outlook for Midsize Enterprises" hosted by Paul Furtado. A helpful session for listeners who want leadership-level views on cyber risk in mid-sized enterprises. (Gartner) Research note: "How markets and vendors are evaluated in Gartner Magic Quadrants" (March 2024) — useful for understanding the behind-the-scenes of how Gartner constructs these analyses. (Gartner) Suggested "Next Steps" for Listeners Visit Paul Furtado's Gartner Expert profile and follow his commentary on cybersecurity trends. Explore Gartner's Magic Quadrant methodology so you understand how vendor evaluations work (especially useful in your job, budget planning, vendor selection). Reflect on your organization: Where would you place your internal tech or security vendors? Are you focusing just on "Leaders", or considering "Challengers", "Visionaries", or "Niche Players" based on your specific needs? (This aligns with what we discussed in the episode.)

Nov 14, 20251h 12m

S4 Ep 12S4 - Episode 012 – Zero Trust, Zero Confusion (w/ Rob Allen)

In this eye-opening episode of Cyber Distortion, hosts Kevin Pentecost and Jason Popillion sit down with Rob Allen from ThreatLocker to break down one of the most talked-about — and misunderstood — concepts in cybersecurity today: Zero Trust. With a deep well of technical expertise and real-world business acumen, Rob brings clarity to the chaos, cutting through the jargon to explain what Zero Trust really means, why it matters, and how organizations of all sizes can adopt it effectively. Whether you're a seasoned security pro or just starting to wrap your head around Zero Trust architecture, this episode gives you the insights and practical takeaways you need — without the confusion. Expect real talk, real strategies, and a fresh perspective on building a more secure future. Don't miss this chance to learn from one of the industry's most experienced leaders in cybersecurity, cloud infrastructure, and customer-driven solutions. Zero Trust doesn't have to be complicated. Let's make it make sense. Helpful Links: Here are several high‑quality resources to deepen your understanding of Zero Trust, along with the official web links for ThreatLocker and Rob Allen's LinkedIn profile: 🔗 Official Links ThreatLocker (official website / resource center) https://www.threatlocker.com/ (ThreatLocker) Rob Allen — LinkedIn https://www.linkedin.com/in/threatlockerrob/ (Phillip Wylie) ThreatLocker Resource Center (blogs, eBooks, webinars, case studies) https://www.threatlocker.com/resources (ThreatLocker) 📚 Additional Learning Resources on Zero Trust Here are several authoritative and practical learning resources to help your listeners (or you) get up to speed on Zero Trust architectures, strategies, and implementation: Resource What You'll Learn / Why It's Useful Link Microsoft Learn: Introduction to Zero Trust Fundamental concepts and principles of Zero Trust https://learn.microsoft.com/en-us/training/modules/zero-trust-introduction/ (Microsoft Learn) Microsoft Learn: Introduction to Zero Trust and Best Practice Frameworks How Zero Trust fits into security frameworks and architectural patterns https://learn.microsoft.com/en-us/training/modules/introduction-zero-trust-best-practice-frameworks/ (Microsoft Learn) Microsoft Learn: Protect Infrastructure with Zero Trust A module focusing on applying Zero Trust in infrastructure & server environments https://learn.microsoft.com/en-us/training/modules/zero-trust-infrastructure/ (Microsoft Learn) Microsoft Learn: Manage Networks with Zero Trust Zero Trust applied to network segmentation, traffic flows, threat protection https://learn.microsoft.com/en-us/training/modules/zero-trust-networks/ (Microsoft Learn) Microsoft Learn: Protect Data with Zero Trust Emphasis on data protection, classification, and Zero Trust data access patterns https://learn.microsoft.com/en-us/training/modules/zero-trust-data/ (Microsoft Learn) Microsoft Learn path: Establish the guiding principles and core components of Zero Trust A full learning path covering identity, endpoints, apps, network, infrastructure, and data https://learn.microsoft.com/en-us/training/paths/zero-trust-principles/ (Microsoft Learn) LinkedIn Learning: Understanding Zero Trust A beginner-friendly video course explaining Zero Trust models and problem framing https://www.linkedin.com/learning/understanding-zero-trust (LinkedIn) Udemy: Zero Trust Security Masterclass – Beginner to Mastery A hands-on, implementation-oriented course (paid) https://www.udemy.com/course/zero-trust-masterclass-from-beginner-to-mastery/ (Udemy) Cisco Zero Trust Workshops Hands‑on and strategic workshops from a major vendor's perspective https://www.cisco.com/c/en/us/products/security/zero-trust-workshops.html (Cisco) Tonex Training: Zero Trust Security Model Training A structured training course in Zero Trust fundamentals and use cases https://www.tonex.com/training-courses/zero-trust-security-model/ (Tonex)

Oct 15, 20251h 10m

S4 Ep 11S4 - Episode 011 – Faith, Fire, and Frameworks (w/ Gaelle Koanda)

Today's guest is a true force in cybersecurity, governance, and leadership. She's a global voice for resilience, inclusion, and innovation — and her story is as inspiring as it is impactful. In this episode, we were thrilled to be joined by Gaelle Koanda — a Cybersecurity and GRC powerhouse, ISACA Board Member, AI Ethics Advocate, Entrepreneur, and Nonprofit Leader. From IT audits to executive boardrooms, Gaelle has carved a path defined by grit, grace, and growth. She's the Founder and President of the very first WiCyS chapters in Francophone Africa, and currently serves as the SheLeadsTech Ambassador for Colorado — building bridges across continents and empowering women in tech at every step. Her career is a masterclass in purpose-driven leadership — and today, we're going to explore her journey, her insights on cybersecurity risk and governance, her thoughts on ethical AI, and her mission to uplift others through community, advocacy, and bold action. Join us for an awesome discussion on Gaelle's path into cybersecurity and beyond! 🔗 Related Links Gaelle Koanda — LinkedIn profile LinkedIn Gaelle Koanda — ISSA speaker page ISSA International "How I Survive Imposter Syndrome" (guest-written for ISACA) ISACA WiCyS (Women in Cybersecurity) — "Hacking the glass ceiling" article WiCyS WiCyS organization / about page WiCyS YouTube: "Never Give Up: Gaelle Koanda's Inspiring Path to Success" YouTube

Oct 6, 20251h 21m

S4 Ep 10S4 - Episode 010 – The Making of I AM MACHINE – w/Chris Glanden & Len Noe

Description: In this compelling episode of the Cyber Distortion Podcast, hosts Jason sits down with the extraordinary trio behind the groundbreaking documentary I AM MACHINE — a deep dive into the life and mission of transhuman white hat hacker, Len Noe. Known for merging biology with embedded technology, Len's journey into transhumanism is as provocative as it is visionary. He uses his cybernetic implants not only to push the boundaries of human capability but also as a powerful tool to demonstrate vulnerabilities in both physical and digital security systems. From real-world pen tests to live hacking demos, Len's ethical hacking blurs the line between man and machine — all in the name of education and awareness. Joining the conversation is director Chris Glanden from Barcode Security, who provides insight into the creative vision behind the documentary and how the concept was brought to life. Kevin, who also served as the film's editor, gets put in the hot seat by Jason to share his unique perspective on shaping the story from raw footage to finished film. Together, the team explores the challenges, inspirations, and revelations involved in documenting such a futuristic and deeply personal subject. Whether you're fascinated by transhumanism, cybersecurity, or the art of storytelling, this episode unpacks the making of I AM MACHINE from concept to screen — and everything in between. Here are several good resources for listeners to learn more about embedded technology, ethical hacking, and to visit the sites you mentioned. I've grouped them by topic so you can explore what interests you most: 🔌 Embedded Technology Resources TI Developer Zone – Embedded Development Texas Instruments provides hardware + software development tools, demos, software libraries & example projects to help developers get started with embedded systems. (Texas Instruments) Embedded.com – Hands‑On Experience Articles, webinars, and practical labs for embedded tech, sensors, microcontroller work – great for seeing how embedded software and hardware interact in real world applications. (Embedded) Embedded Artistry – Resources A curated set of articles, tutorials, libraries, podcasts, and community content for both beginners and those with more experience. Offers insight into best practices, architectures, hardware/software integration. (Embedded Artistry) STMicroelectronics IoT / Embedded ML Platform Free educational resources around embedded systems + machine learning, helping bridge the gap between raw hardware and AI / intelligent embedded systems. (STMicroelectronics) "Awesome Embedded" (Adafruit's curated list) A big collection of blogs, code, tools, designs, hardware boards, etc., all focused around embedded systems & related tech. (blog.adafruit.com) 🛡 Ethical Hacking / Cybersecurity Resources TryHackMe A platform with guided, hands‑on labs for ethical hacking, useful for beginners and intermediate learners. Offers real‑world style challenges. (slickhacker.com) Hack The Box (HTB) More advanced penetration‑testing style labs and "boxes" that you can hack in a safe environment. Great for up‑skilling. (slickhacker.com) OWASP (Open Web Application Security Project) Very well‑regarded project that publishes tools, frameworks, cheat‑sheets, open source projects (e.g. WebGoat, Juice Shop) and guidance on securing web apps. (slickhacker.com) GitHub — "Awesome Ethical Hacking Resources" repos Repositories like vadymurupa/ethical‑hacking‑resources or hassnainfareed/awesome‑ethical‑hacking‑resources gather lists of books, courses, vulnerable machines, tools, write‑ups, etc. (GitHub) Cyberly Tutorials, guides, and free content on cybersecurity, ethical hacking, privacy, and emerging threats. Great for self‑paced learners. (cyberly.org) 🌐 Websites You Should Definitely Visit I AM MACHINE — https://i‑am‑machine.com The official website for the documentary. Includes information about Len Noe, embedded tech, screenings, news, trailer, etc. (assumed from context). Cyber Circus Network — https://www.cybercircusnetwork.com The network behind Cyber Distortion Podcast and related content. Good place to get more episodes, background, community, and related materials.

Sep 12, 20251h 14m

S4 Ep 9S4 - Episode 009 – Codewaves Rising – Surfing Latin Americas Talent Tide (w/ Roger Einstoss)

Description: 🎙️ New Episode Alert – Cyber Distortion Podcast 🚨 Welcome back! In this episode we're diving deep into one of the most pressing challenges in cybersecurity: finding the right talent. Join us for an eye-opening conversation with Roger Einstoss, co-founder of Braintly, a company revolutionizing how organizations source cybersecurity professionals from across Latin America. With decades of experience and a sharp eye for global tech talent, Roger shares insider knowledge on tapping into thriving hubs like Argentina, Brazil, and beyond. We explore how Latin America is rapidly emerging as a hotbed for skilled cybersecurity professionals—and why North American companies are increasingly turning south of the border for outsourced expertise. Roger walks us through Braintly's unique approach to vetting and placing top-tier talent, the challenges companies face in scaling their security teams, and why understanding cultural fit is just as crucial as technical skills. Whether you're a CISO looking to grow your team, a tech leader exploring nearshoring options, or simply curious about the evolving cybersecurity workforce, this episode delivers both practical insights and global perspective. Roger's passion for empowering Latin American professionals and building cross-border partnerships is not only inspiring—it's exactly what the cybersecurity industry needs right now. 🔗 Don't miss this one—subscribe now and tune in to the Cyber Distortion Podcast on your favorite platform. Connect with Roger here: LinkedIn – Roger Einstoss 🎧 Featured Guest: Roger Einstoss LinkedIn: https://www.linkedin.com/in/rogereinstoss Twitter/X: (Not publicly listed, but you can search or ask Roger directly) Company Website (Braintly): https://www.braintly.com Braintly on LinkedIn: https://www.linkedin.com/company/braintly 🌎 Explore Braintly Braintly helps companies worldwide connect with top-tier tech and cybersecurity talent across Latin America. 🌐 Homepage: https://www.braintly.com 🔍 Services Overview: https://www.braintly.com#services 📩 Contact Braintly: https://www.braintly.com#contact 📘 Braintly Blog (if available): (Currently no blog listed on homepage—check for updates) 🧠 Learn More: Latin America's Cybersecurity Talent Landscape Here are some external resources you can reference or share to expand on the discussion: 📈 "Why Latin America is the Next Frontier for Tech Talent" – TechCrunch https://techcrunch.com/2021/08/24/latin-america-tech-talent 📊 "Cybersecurity Workforce Study" – (ISC)² 2024 https://www.isc2.org/Research/Workforce-Study 🌍 "Nearshore Outsourcing Trends in 2025" – Nearshore Americas https://nearshoreamericas.com 🗺️ "Top Tech Hubs in Latin America: Argentina, Brazil, Mexico" – Globalization Partners https://www.globalization-partners.com/blog/tech-hubs-latin-america

Aug 7, 20251h 1m

S4 Ep 8S4 - Episode 008 – Unleashing Your Inner Hacker (w/ Ted Harrington)

This episode welcomes Ted Harrington, a celebrated ethical hacker, TED‑X keynote speaker, and executive partner at Independent Security Evaluators (ISE). With decades of real‑world experience hacking everything from iPhones and cars to medical devices, cryptocurrency platforms, and password managers, Ted brings unmatched expertise to our conversation. He's built a reputation for uncovering hidden vulnerabilities, helping clients such as Google, Amazon, Netflix, Microsoft, Disney, and Adobe to fix tens of thousands of security flaws—demonstrating why no system is truly unhackable. In this episode, Ted walks us through his journey from early penetration testing to leading elite security research. We discuss the lessons from Ted's two influential books: Hackable: How to Do Application Security Right and Inner Hacker. Hackable guides developers, executives, and security teams through building threat models, finding and fixing vulnerabilities early in development, and integrating security into code and culture so organizations can earn trust—and sales. Inner Hacker delves deeper into the hacker mindset: how curiosity, creativity, and rule‑breaking thinking can be applied, not only to cybersecurity, but also to entrepreneurship and personal growth. Finally, Ted reflects on his TED‑X talk "Why You Need to Think Like a Hacker" and delivers ideas from his keynote programs—inviting listeners of Cyber Distortion Podcast to embrace four hacker traits (curiosity, creativity, persistence, and nonconformity) and use them to out-think attackers, address novel threats like AI‑driven deepfakes, and build stronger systems and teams from inside out. Tune in to enjoy a lively, illuminating mix of war stories, strategic insight, and actionable takeaways from one of the most trusted voices in ethical hacking today. CITATIONS & LINKS: 🎙️ Official and Authoritative Links Ted Harrington's official website (home page) – the main hub for his bio, speaking, books, and more https://www.tedharrington.com 📚 Buy Ted's Books Purchase Hackable: How to Do Application Security Right on Amazon (ebook/print) – direct link for buying online https://www.podchaser.com/podcasts/hacker-valley-studio-889742/episodes/think-like-a-hacker-solve-like-234696483?utm_source=chatgpt.com Pre‑order Inner Hacker (anticipated Summer 2025) via official site waitlist page https://www.tedharrington.com/inner-hacker?utm_source=chatgpt.com 🎤 Talks and Keynotes "Why You Need to Think Like a Hacker" TED‑X Talk – video available via Ted's speaking page https://www.tedharrington.com/speaking?utm_source=chatgpt.com Hacker Valley Studio episode: "Think Like a Hacker, Solve Like a Leader" featuring Ted Harrington – show notes & episode link from a popular cybersecurity podcast https://hackervalley.com/e/think-like-a-hacker-solve-like-a-leader-featuring-ted-harrington?utm_source=chatgpt.com 🎧 Other Podcasts & Interviews Social‑Engineer.com Podcast Ep. 172 – "Creating Psychological Salt" – Ted Harrington joins Chris Hadnagy to discuss security awareness and his book Hackable https://www.social-engineer.org/podcasts/ep-172-security-awareness-series-creating-psychological-salt-with-ted-harrington/?utm_source=chatgpt.com Human Factor Security Podcast Ep. 153—Ted Harrington interview – on security as a business advantage, Hackable, and real‑world anecdotes https://humanfactorsecurity.co.uk/episode-153-ted-harrington/?utm_source=chatgpt.com 🔗 Professional Profiles & Media Ted Harrington on LinkedIn – connect and follow his professional updates (often referenced in podcast show notes) hackervalleystudio.podbean.comPodchaser "Cybersecurity Videos" section on his website – demo reels, hacking case studies, keynote previews, and more tedharrington.com

Jul 29, 20251h 25m

S4 Ep 7S4 - Episode 007 – Reality Distortion is so Freakin' Real! (w/ Winn Schwartau)

In this riveting episode of Cyber Distortion, hosts Kevin Pentecost and Jason Popillion sit down with none other than Winn Schwartau — the legendary cybersecurity pioneer and provocateur known for pulling no punches when it comes to the truth. A trailblazer in information warfare and the original mind behind DEFCON Jeopardy, Winn dives deep into the murky waters of misinformation, disinformation, and the global implications of distorted digital realities. From nation-state psyops to corporate manipulation campaigns, we explore how the war over truth is being waged on battlefields both virtual and real. But it wouldn't be Cyber Distortion without a twist. We wrap the episode with our own chaotic spin on Cyber Distortion Jeopardy, putting Winn — the Godfather of DEFCON Jeopardy himself — back in the hot seat. Expect sharp insights, dark humor, and plenty of digital distortion as we challenge Winn's wit and memory. Whether you're a cybersecurity veteran or just starting to question what's real in your feed, this episode will leave you thinking twice about the information you trust. Jason Popillion is a CISSP and serves as a CIO/CTO of a SaaS company and Kevin Pentecost is a CISSP, CISM, CEH, CPT, MPCS, MCSE, CCA, ITIL-F and serves as the Information Security Director for a Manufacturing company. 🔹 Winn Schwartau – Official & Contact Personal website & contact – Connect directly: "Wanna prove me wrong?" rsaconference.com+10winnschwartau.com+10infoworld.com+10 Biography & writings – Details on his books, timeline, awards: thesecurityawarenesscompany.com LinkedIn-like presence via KnowBe4 – Founder & CVO of The Security Awareness Company (now part of KnowBe4): iwc-3.com+2thesecurityawarenesscompany.com+2en.wikipedia.org+2 🔹 Essential Articles & Background on Winn Wired (1996) – Classic article Information Warrior describes his perspective on national cyber threats and "magnetic bombs": wired.com InfoWorld & Network World – Opinion pieces by Winn on global info‑war and cyber defense: infoworld.com+1networkworld.com+1 🔹 Books by Winn Schwartau Information Warfare: Chaos on the Electronic Superhighway – seminal work on cyberterror thesecurityawarenesscompany.com+5en.wikipedia.org+5dynamicspeakers.com+5 Cybershock, Time Based Security, Terminal Compromise, Analogue Network Security, The Art & Science of Metawar – full catalog available via ThriftBooks rsaconference.com+6thriftbooks.com+6en.wikipedia.org+6 Here's a direct link where you can purchase Winn Schwartau's newest book The Art & Science of Metawar, available in paperback: The Art & Science of Metawar (paperback) – listed around $25 used/new‑low via eBay/AbeBooks. You can also purchase or preview it through these official sources: Amazon Paperback & Kindle — Paperback AbeBooks — Used paperback editions, ISBN 0996401946, published August 30, 2024 by Winn Schwartau LLC thriftbooks.com+2abebooks.com+2 🔹 Broader Reading on Misinformation & Disinformation Technology‑Enabled Disinformation (arXiv, 2018) – a rich survey of digital disinformation mechanics and defense strategies: arxiv.org Cambridge Handbook (Chapter: Misinformation, Disinformation & Online Propaganda) – analysis of spread dynamics and trust erosion: cambridge.org+1reddit.com+1 Political Behavior (2020) – study on how misinformation‑warnings can backfire (the "tainted truth" effect): link.springer.com Love Letter to America (PDF) – Read it here. Severance (2022) – The show revolves around employees of the mysterious biotechnology corporation Lumon Industries, who have undergone a surgical procedure called "severance" that separates their work memories from their personal life. This means their "innie" (work self) has no knowledge of their "outie" (personal life) and vice versa. Watch it on AppleTV.

Jul 1, 20251h 50m

S4 Ep 6S4 - Episode 006 – LULZSEC Mastermind Unmasked: The Sabu Story (w/ Hector Monsegur)

Welcome back to Cyber Distortion, the show where the shadows of the digital world come into focus. Today's episode dives deep into the mind of someone who once sat at the center of the internet's most notorious hacktivist movements. Our guest is Hector Monsegur—better known to some as Sabu—a former leading figure in both Anonymous and LULZSEC, who orchestrated some of the most high-profile cyber-attacks of the early 2010s. From penetrating government networks to being at the heart of a global FBI takedown, Hector's story is part cautionary tale, part cyber-thriller. In this conversation, he shares it all—raw, unfiltered, and in his own words. We explore what drove him, how the digital threat landscape has evolved, and his take on the current state of cybersecurity, hacktivism, and surveillance. Plug in, patch up, and get ready—today, we're going behind the mask.Whether you're an aspiring hacker, seasoned security pro, or just cyber-curious, this episode is packed with insights, inspiration, and a behind-the-scenes look at the evolving hacking landscape. Jason Popillion is a CISSP and serves as a CIO/CTO of a SaaS company and Kevin Pentecost is a CISSP, CISM, CEH, CPT, MPCS, MCSE, CCA, ITIL-F and serves as the Information Security Director for a Manufacturing company. Contact Info: Hector's LinkedIn: https://www.linkedin.com/in/hxmonsegur/ Link up with Alacrinet: https://www.alacrinet.com/ Here's a curated list of trusted, beginner-friendly, and practical online resources, categorized for easy navigation: 🛠️ Hands-On Learning Platforms 1. TryHackMe 🔗 https://tryhackme.com Interactive, gamified lessons in cybersecurity and hacking. Beginner to advanced levels, covering real-world attack simulations. Great learning paths like Pre-Security and Complete Beginner. 2. Hack The Box (HTB) 🔗 https://www.hackthebox.com Advanced platform for practicing hacking skills legally. Ideal for pentesting, network exploitation, and red teaming. Offers "HTB Academy" with structured learning paths. 3. OverTheWire: Wargames 🔗 https://overthewire.org/wargames/ Classic text-based challenges. Great for beginners learning Linux, networking, and basic hacking logic. 📘 Free Courses & Curriculums 4. Cybrary 🔗 https://www.cybrary.it Free and paid cybersecurity courses, including certifications like CompTIA Security+. Includes job role learning paths. 5. Open Security Training 🔗 http://opensecuritytraining.info In-depth technical training on topics like x86 assembly, exploit development, and reverse engineering. Free and used by industry pros. 6. MIT OpenCourseWare – Computer Systems Security 🔗 https://ocw.mit.edu/courses/6-858-computer-systems-security-fall-2014/ College-level deep dive into systems security. Lectures, slides, and assignments freely available. 📚 Books & Reading 7. Hacking: The Art of Exploitation by Jon Erickson Great for understanding how things work under the hood, including C, assembly, and exploits. 🔗 Available via No Starch Press 8. The Web Application Hacker's Handbook by Dafydd Stuttard & Marcus Pinto Excellent for aspiring bug bounty hunters and web pentesters. 🧠 Communities & Forums 9. Reddit Communities r/netsec – News and discussion about information security. r/AskNetsec – Beginner-friendly Q&A. r/cybersecurity – General news, career advice, and trends. 10. Discord Servers Many Discord servers support TryHackMe and HTB users. Look for "InfoSec Prep" and "CyberMentor's CyberSec Discord". 🧑‍💻 YouTube Channels 11. LiveOverflow 🔗 https://www.youtube.com/c/LiveOverflow Deep, technical tutorials in CTFs, binary exploitation, and real-world hacking. 12. The Cyber Mentor 🔗 https://www.youtube.com/@thecybermentor Great for aspiring pentesters. Offers a full free course: Practical Ethical Hacking. 13. John Hammond 🔗 https://www.youtube.com/@_JohnHammond Covers TryHackMe, HTB, malware analysis, and CTFs in an engaging way. 🎓 Certifications to Consider Later CompTIA Security+ – Entry-level security cert. eJPT (eLearnSecurity Junior Penetration Tester) – Beginner-friendly, hands-on. OSCP (Offensive Security Certified Professional) – More advanced, goal for serious pentesters.

Jun 11, 20251h 36m

S4 Ep 5S4 - Episode 005 – The Art of the HVCK! (w/ Ryan Williams)

In this electrifying episode, we dive deep into the world of hacking, privacy, and offensive security with Ryan Williams, Editor of HVCK Magazine and Director of Smart Cyber Solutions Pty Ltd. Ryan is more than just a cybersecurity consultant—he's a red team enthusiast, blue team strategist, and relentless innovator in the cyber arena. We explore Ryan's journey from pen tester to publisher, and uncover the vision behind HVCK Magazine—an online publication dedicated to all things hacking, from OSINT and threat intelligence to offensive tooling and real-world exploits. Learn about his contributions to the community with projects like Commander, MxFlex, AllTheThings, and Flight Freaker, and how these tools are helping redefine modern cybersecurity practices. Whether you're an aspiring hacker, seasoned security pro, or just cyber-curious, this episode is packed with insights, inspiration, and a behind-the-scenes look at the evolving hacking landscape. Jason Popillion is a CISSP and serves as a CIO/CTO of a SaaS company and Kevin Pentecost is a CISSP, CISM, CEH, CPT, MPCS, MCSE, CCA, ITIL-F and serves as the Information Security Director for a Manufacturing company. 🔐 Tune in to hear: How HVCK Magazine is shaping the hacker culture online The power of community-driven security innovation Red vs. Blue: Ryan's dual mindset in offensive and defensive ops Real talk on bespoke security tooling and Essential Eight uplifts And a few unexpected stories from the field... 🧠 Stay sharp. Stay curious. Stay distorted. Citations: 🔗 Connect with Ryan Williams LinkedIn: Explore Ryan's professional background and connect with him on LinkedIn. Smart Cyber Solutions: Learn more about his cybersecurity consultancy, Smart Cyber Solutions Pty Ltd, on their Facebook page. ​ 📰 Dive into HVCK Magazine HVCK Magazine Back Issues: Discover the mission and content of HVCK Magazine in this feature on https://hvck-magazine.github.io/ HVCK Magazine New Issues: Discover the mission and content of HVCK Magazine in this feature on https://heyzine.com/flip-book/cd19181153.html Contributors' Insights: Read about contributors' experiences and articles in HVCK Magazine, such as this LinkedIn post. ​ 🎧 Related Media & Community YouTube Interview: Watch an in-depth interview with Ryan Williams discussing HVCK Magazine and cybersecurity challenges on YouTube. 🧠 Explore More in Cybersecurity & Hacking Phrack Magazine: A long-standing publication in the hacking community, available at phrack.org. ​ Hakin9 Magazine: Offers articles and resources on IT security and ethical hacking at hakin9.org. ​

May 5, 20251h 23m

S4 Ep 4S4 - Episode 004 – Human IOT: Sub-Molecular DNA Cybersecurity (w/ Dr. Gregory Carpenter)

In this electrifying episode of the Cyber Distortion Podcast, hosts Kevin Pentecost and Jason Popillion dive into the fascinating crossroads of cybersecurity, health, and molecular science with a very special guest — Dr. Gregory Carpenter. Known worldwide for his pioneering research and groundbreaking work at the intersection of biotechnology and cybersecurity, Dr. Carpenter brings a unique and urgent perspective on the growing risks and innovations tied to DNA hacking and cybersecurity at the molecular level. Together, they explore how advances in genetics, bioinformatics, and synthetic biology are creating new vulnerabilities — and why protecting health data and even the biological code of life itself has become a critical frontier for cybersecurity professionals. Dr. Carpenter shares real-world insights, discusses current threats and emerging trends, and offers his expert take on where regulation, technology, and human ingenuity must evolve to stay ahead of threats we are only beginning to understand. Don't miss this thought-provoking conversation that bridges the digital and biological worlds — and challenges how we think about security in an era where data isn't just on servers, but in our very cells. Whether you're a cybersecurity expert, a health industry professional, or just fascinated by where technology is taking us next, this is one episode you won't want to miss! Jason Popillion is a CISSP and serves as a CIO/CTO of a SaaS company and Kevin Pentecost is a CISSP, CISM, CEH, CPT, MPCS, MCSE, CCA, ITIL-F and serves as the Information Security Director for a Manufacturing company. 🔗 Citations and Related Links: Biomalware: Malware Encoded in DNA Wired – https://www.wired.com/story/malware-dna-hack/ Scientists Hack a Computer Using DNA MIT Technology Review – https://www.technologyreview.com/2017/08/10/150013/scientists-hack-a-computer-using-dna/ Healing the Body with Sound Frequencies Donovan Health – https://www.donovanhealth.com/blog/healing-the-body-with-frequencies-the-basics-explained Dire Wolves and Woolly Mammoths: Concerns About Resurrecting Extinct Species BBC Future – https://www.bbc.com/future/article/20250425-why-scientists-fear-attempts-to-resurrect-extinct-animals-may-backfire DEFCON Conference (Official Site) https://defcon.org/ CRISPR and the Threat of Biohacking Harvard International Review – https://hir.harvard.edu/crispr-and-the-threat-of-biohacking/ Cyberbiosecurity: An Emerging New Discipline to Help Safeguard the Bioeconomy Frontiers in Bioengineering and Biotechnology – https://www.frontiersin.org/articles/10.3389/fbioe.2019.00020/full The Growing Threat of Biosecurity Risks in Synthetic Biology RAND Corporation – https://www.rand.org/pubs/research_reports/RR3027.html

Apr 28, 20251h 48m

S4 Ep 3S4 - Episode 003 – Hackers Love You...And Your Overshared Instagram Posts! (w/ Wes Kussmaul)

In this thought-provoking episode of the Cyber Distortion Podcast, we're joined by Wes Kussmaul, a visionary in the realm of secure online identities and the founder of Delphi Internet Services Corporation—the company behind the Kussmaul Encyclopedia, the world's first computerized encyclopedia and one of the earliest forms of hypertext. With over three decades of experience building secure online spaces, Wes brings a unique blend of historical perspective and forward-thinking innovation to the conversation around privacy, authentication, and identity protection. As digital threats evolve, so must our understanding of how we prove who we are online. Wes breaks down the role of public and private key cryptography in securing not just our communications, but our very identities and intellectual property. Through vivid analogies and real-world examples, he illustrates how Public Key Infrastructure (PKI) can serve as the backbone of a more trustworthy internet—one where authenticity and privacy aren't afterthoughts, but foundations. We also explore his groundbreaking work with Reliable Identities, an initiative focused on reestablishing digital trust in an age of phishing, spoofing, and identity theft. Wes shares why the current system of usernames and passwords is fundamentally flawed—and how we can replace it with something far more secure and future-proof. Whether you're a cybersecurity expert, a tech enthusiast, or simply curious about the future of online trust, this episode will reshape how you view identity in the digital world. Tune in to hear from one of the internet's earliest innovators on how we can protect who we are—and what we create—online. Wes is the author of several books about privacy and authenticity, including Quiet Enjoyment (2004), Own Your Privacy (2007), The Future Needs You (2007), and Don't Get Norteled (2014). He is also an individual adherent of the International Union of Latin Notaries and has been appointed a Notary Ambassador by the National Notary Association. Wes received his BS in Physics from the University of Central Missouri in 1971 while serving in the US Air Force at Whiteman Air Force Base (SAC). Jason Popillion is a CISSP and serves as a CIO/CTO of a SaaS company and Kevin Pentecost is a CISSP, CISM, CEH, CPT, MPCS, MCSE, CCA, ITIL-F and serves as the Information Security Director for a Manufacturing company. CITATIONS: LinkedIn: https://www.linkedin.com/in/weskussmaul/ Wes' Personal Website: https://weskussmaul.com/about-wes/ Authentiverse: https://authentiverse.net Authenticity Alliance: https://www.whatisauthenticity.com/ City of Osmio: https://www.osmio.ch/our-name.html Buy Wes' Books: https://www.pkipress.com/ The Authenticity Institute: https://www.authenticityinstitute.com/index.html More information on Sutton Smith (a.k.a. Sutton Love): https://www.reversecanarymission.org/person/sutton-smith-66936d96d1a13a06fe312995 Sutton's Instagram: https://www.instagram.com/sutton.loves/

Apr 10, 20251h 29m

S4 Ep 2S4 - Episode 002 - Staring Down the Barrel of a Loaded Gun (w/ Ricoh Danielson)

In this gripping episode of the Cyber Distortion Podcast, we sit down with Ricoh Danielson — a former U.S. Army Combat Veteran of Iraq and Afghanistan, national security expert, and digital forensics specialist. With a career that bridges the battlefield and the digital frontlines, Ricoh brings a rare and powerful perspective on the evolving threats to our national security and critical infrastructure. From his firsthand experiences in war zones to his current role as a VCISO and digital forensic expert, Ricoh shares stories that are as eye-opening as they are inspiring. We dive into the real-world challenges facing the nation today — from protecting our energy grids and communication systems to defending against cyber threats that target both the public and private sectors. Ricoh also recounts some of his most intense moments in service, revealing what it takes to operate in high-stakes environments, both overseas and in high-profile courtrooms. This episode is a must-listen for anyone interested in cybersecurity, national defense, or the human element behind protecting our digital and physical worlds. Jason Popillion is a CISSP and serves as a CIO/CTO of a SaaS company and Kevin Pentecost is a CISSP, CISM, CEH, CPT, MPCS, MCSE, CCA, ITIL-F and serves as the Information Security Director for a Manufacturing company. Citations & Helpful Links: National Security Agency (NSA) Cybersecurity: The NSA provides resources aimed at preventing and eradicating cyber threats to U.S. national security systems, with a focus on the Defense Industrial Base and the enhancement of U.S. weapons' security. https://www.nsa.gov/cybersecurity/ Department of Defense Cyber Crime Center (DC3): DC3 offers integrated services including cyber training, digital and multimedia forensics, and vulnerability disclosure, supporting law enforcement and counterintelligence efforts. https://csrc.nist.gov/ • SANS Institute: A renowned organization specializing in information security and cybersecurity training, offering courses on topics like cyber and network defenses, penetration testing, incident response, and digital forensics. https://www.sans.org/ https://www.dc3.mil/ National Institute of Standards and Technology (NIST) Computer Security Resource Center: NIST's CSRC provides access to cybersecurity and information security-related projects, publications, and news, supporting government, industry, and academic efforts in securing information systems. https://csrc.nist.gov/ Cybersecurity and Infrastructure Security Agency (CISA) Free Cybersecurity Services and Tools: CISA has curated a database of free cybersecurity services and tools to help organizations reduce cybersecurity risks across U.S. critical infrastructure sectors. https://www.cisa.gov/resources-tools/... For listeners interested in connecting with Ricoh Danielson or learning more about his work: Official Website: Ricoh's personal website offers insights into his background, services, and expertise. https://www.ricohd.us/ Contact Page: To reach out to Ricoh directly, visit his contact page where you can send a message or inquiry. https://www.ricohd.us/contact Instagram: Follow Ricoh on Instagram for updates and insights related to cybersecurity and his professional endeavors. / ricoh_danielson_ These resources provide a comprehensive starting point for those interested in delving deeper into the fields of national security and digital forensics.

Mar 27, 20251h 22m

S4 Ep 1S4 – Episode 001 – [CTRL-ALT-GEN] Resetting the Generational Tech Divide

Welcome to this episode of Cyber Distortion, where we explore the cutting edge of technology, security, and the future of humanity itself. In this episode, we look into how differing generational outlooks—from the Silent Generation, to Baby Boomers, Gen X, Millennials, and Gen Z—shape the ways teams solve problems and interact within today's corporate landscape. We explore how historical events, technological exposure, and shifting cultural norms have impacted each generation's communication style, work ethic, and appetite for risk. Through candid anecdotes and real-world examples, we uncover the advantages of blending diverse generational perspectives to spark innovation, build more inclusive workplace cultures, and tackle company challenges more effectively. We discuss bridging generational gaps and nurturing an environment where each age group can contribute its strengths. Whether it's harnessing the discipline and experience of older employees or tapping into the digital fluency and fresh ideas of younger ones, this episode offers strategies for leaders to cultivate synergy and drive growth. Ultimately, we hope that listeners will come away with a clearer understanding of why inclusive, cross-generational collaboration isn't just a nice-to-have—but a critical differentiator in a rapidly evolving corporate world. We hope you enjoy this kickoff episode of our new 4th season of the podcast!! Jason Popillion is a CISSP and serves as a CIO/CTO of a SaaS company and Kevin Pentecost is a CISSP, CISM, CEH, CPT, MPCS, MCSE, CCA, ITIL-F and serves as the Information Security Director for a Manufacturing company. CITATIONS Visit our premier sponsor's pages here: Threatlocker - a global cybersecurity platform that provides endpoint protection using a Zero Trust approach, focusing on controlling and managing applications and devices to protect organizations from cyber threats, including malware and ransomware. https://www.threatlocker.com Alacrinet - a Palo Alto-based nationwide IT Security consulting firm focused on delivering best-in-class enterprise cybersecurity solutions and services. They are dedicated to people and strive to build positive, long-term relationships - both internally and with clients. We're an agile company with a team atmosphere and 'get it done' mentality to do what's needed for our clients. https://www.alacrinet.com Fulcrum Technology Solutions - exists to solve critical business problems shoulder to shoulder with you. In the pursuit of that goal, 2/3 of our company are engineers, but 100% of us are problem solvers. Whether we are tackling Security, Infrastructure, Cloud, or Big Data issues, our team won't stop until we finish the job! Our word defines us, and motivates us to give you the service that you deserve! https://www.ftsc.com Cyphernova.AI - we recognize that we are in the midst of a profound technological revolution. The way we work, learn, and communicate is evolving rapidly and will never be the same. Leveraging over 30 years of expertise in Technology and Cybersecurity, we are committed to guiding you through this transformative era. We offer a comprehensive suite of AI + Machine Learning solutions tailored to meet the unique needs of both individuals and organizations. Our services include an extensive AI Services Platform, robust training programs, ongoing support, and customized projects. As your trusted partner, we are here to help you implement and navigate the ever-changing landscape of AI. https://cyphernova.ai

Mar 17, 20251h 21m

S3 Ep 14S3 – Episode 014 – Navigating the Storm: Mastering Incident Response and Disaster Recovery

In this season finale of the Cyber Distortion Podcast, hosts Kevin Pentecost and Jason Popillion, tackle one of the most critical topics in modern cybersecurity—incident response and disaster recovery. When a cyber incident strikes, every second counts. Organizations need to be ready with well-orchestrated plans to respond effectively and recover swiftly. This episode delves deep into the strategies, tools, and best practices that every cybersecurity professional and organization should know to minimize damage and ensure resilience. Kevin and Jason guide listeners through the intricacies of incident response, breaking it down into digestible phases like preparation, detection, containment, eradication, and recovery. They also explore the role of disaster recovery planning, highlighting how businesses can resume operations quickly and securely after a breach or significant event. The hosts share real-world examples and practical tips, making these complex processes relatable and actionable for professionals at all levels. As the final episode of the season, this is one you don't want to miss. Kevin and Jason bring their signature blend of expertise and engaging conversation to ensure listeners walk away with a solid understanding of incident response frameworks, key roles and responsibilities, and the importance of regular testing and improvement. Whether you're a seasoned cybersecurity practitioner or just starting, this episode offers something valuable for everyone. Thank you for joining us this season on Cyber Distortion. We've loved exploring the multifaceted world of cybersecurity with our incredible audience, and we're ending this season with a bang. We hope you enjoy this finale as much as we enjoyed creating it. Stay tuned for future seasons as we continue to navigate the dynamic and ever-evolving landscape of cybersecurity! Jason Popillion is a CISSP and serves as a CIO/CTO of a SaaS company and Kevin Pentecost is a CISSP, CISM, CEH, CPT, MPCS, MCSE, CCA, ITIL-F and serves as the Information Security Director for a Manufacturing company. MORE VALUABLE RESOURCES: Incident Response Resources National Institute of Standards and Technology (NIST): Computer Security Incident Handling Guide Resource: NIST SP 800-61 Rev. 2 Description: This guide provides a comprehensive framework for incident handling, detailing preparation, detection, analysis, containment, eradication, and recovery steps. SANS Institute: Incident Handler's Handbook Resource: SANS Reading Room - Incident Response Description: A practical guide for incident handlers, focusing on hands-on strategies for real-world scenarios. US-CERT: Incident Response Resources Resource: CISA Incident Response Guidance Description: A hub of information, tools, and best practices for incident response, provided by the Cybersecurity and Infrastructure Security Agency. Disaster Recovery Resources Federal Emergency Management Agency (FEMA): Continuity of Operations Planning Resource: FEMA Continuity Resources Description: Guidance on creating disaster recovery and continuity plans for organizations of all sizes. International Organization for Standardization (ISO): ISO 22301 Resource: ISO 22301: Business Continuity Management Systems Description: This standard focuses on managing and reducing risks during disruptive incidents. Disaster Recovery Institute International (DRI): Best Practices for Business Continuity Resource: DRI Resources Description: A compilation of best practices, frameworks, and tools for effective disaster recovery planning. Cybersecurity Education and Training MITRE ATT&CK Framework Resource: MITRE ATT&CK Description: A detailed knowledge base of adversary tactics and techniques to inform incident response planning. CERT Coordination Center: Incident Management Practices Resource: CERT Resources Description: Research and guidance from the Software Engineering Institute at Carnegie Mellon University. Additional Practical Tools Microsoft: Security Incident Response Playbooks Resource: Microsoft Incident Response Description: A collection of playbooks designed for cloud-centric incident response. National Cyber Security Centre (NCSC): Incident Management Guidance Resource: NCSC UK Description: Practical advice from the UK government's cybersecurity body on managing incidents effectively.

Dec 26, 20241h 38m

S3 Ep 13S3 – Episode 013 – Bridging the Cyber Skills Gap w/Jessie Bolton

Cybersecurity isn't just about technology—it's about people. In this eye-opening episode of the Cyber Distortion Podcast, we're joined by Jessie Bolton, CEO of Bolt Resources and former Vice President of North Texas ISSA, to tackle one of the industry's most pressing challenges: the human side of the cybersecurity skills gap. Jessie brings a wealth of experience from her collaborations with ISC2, WiCyS, NICE, Infosec Institute, and higher education institutions. She's at the forefront of redefining how organizations identify, nurture, and retain talent in an industry facing a critical workforce shortage. From strategies to attract untapped talent to innovative training programs that prioritize real-world readiness, Jessie shares actionable insights for employers and aspiring cybersecurity professionals alike. If you're passionate about building a stronger, more inclusive cybersecurity workforce, this is the conversation you've been waiting for. Tune in and discover how we can close the gap and secure the future—one human at a time! Jason Popillion is a CISSP and serves as a CIO/CTO of a SaaS company and Kevin Pentecost is a CISSP, CISM, CEH, CPT, MPCS, MCSE, CCA, ITIL-F and serves as the Information Security Director for a Manufacturing company. CITATIONS Jessie's LinkedIn Profile: https://www.linkedin.com/in/jessiebolt/ Bolt Resources - Websites of Jessie's: boltresources.net (Company) anchor.fm/s/ee4823f0/podcast/rss (RSS Feed) bizjournals.com/dallas/press-release/detail/9334/Bolt-Resources Cyberseek.org: https://www.cyberseek.org/ Lightcast.io: https://lightcast.io/ OTHER Resources: https://venturebeat.com/programming-development/skills-shortage-persists-in-cybersecurity-with-many-jobs-going-unfilled/ North Texas ISSA: https://www.ntxissa.org/

Dec 4, 20241h 49m

S3 Ep 12S3 – Episode 012 – Slaying the Surveillance Capitalist Pigs w/Mark Weinstein

Protecting Your Privacy Online with Mark Weinstein 🎙️ In this must-listen episode of the Cyber Distortion Podcast, we dive deep into the critical topic of online privacy with our special guest, Mark Weinstein. As a world-renowned author, TedX speaker, tech visionary, and privacy advocate, Mark brings unparalleled insight into the digital privacy landscape. We explore strategies to safeguard your online presence, regain control over your personal data, and thrive in an increasingly connected world. Mark also shares groundbreaking ideas from his award-winning book, "Restoring Our Sanity Online – A Revolutionary Social Framework", offering a transformative approach to navigating the digital age. 🔒 Don't miss this enlightening conversation about taking back your privacy and restoring balance in our online lives. 🎧 Tune in now and learn how to protect what matters most—your personal privacy. Jason Popillion is a CISSP and serves as a CIO/CTO of a SaaS company and Kevin Pentecost is a CISSP, CISM, CEH, CPT, MPCS, MCSE, CCA, ITIL-F and serves as the Information Security Director for a Manufacturing company. CITATIONS Mark's LinkedIn Profile: https://www.linkedin.com/in/markfweinstein/ Mark's Twitter (X) Profile: https://twitter.com/markweinstein The Book – Restoring Our Sanity Online – A Revolutionary Social Framework https://www.markweinsteininventor.com/book Mark's Tedx Talk: https://youtu.be/NAprT6hh33Y?feature=shared Mark's Website: https://www.markweinsteininventor.com/ About Mark: https://www.markweinsteininventor.com/about Speaking: https://www.markweinsteininventor.com/speaking Press Coverage: https://www.markweinsteininventor.com/press

Nov 21, 20241h 15m

S3 Ep 11S3 – Episode 011 – The Hitchhacker's Guide to the Cyberverse!

So, do you think your business is secure? Think again. This October, Jason and Kevin met with CompTIA's Wayne Selk, to uncover what businesses and individuals must know to stay ahead of today's online threats. Don't miss out on this essential conversation – your online safety might just depend on it! An esteemed expert in the industry, Wayne brings over 25 years of cybersecurity expertise, helping businesses and individuals strengthen their defenses against online threats. From common phishing scams to advanced ransomware tactics, Wayne breaks down the latest in cybersecurity best practices and shares practical tips to keep you, your data, and your organization safe. Prior to his current role, Selk served as Senior Director of Cybersecurity Initiatives at ConnectWise from November 2018 to March 2022. He also held positions at Sienna Group LLC as a Principal Consultant and at Integrity Data Solutions, LLC as President. His earlier roles include Senior Manager at Symantec Federal Services and Network Engineer at BAE Systems. Selk holds a bachelor's degree in information systems security from the University of Phoenix and has earned certifications such as Certified Data Protection Solutions Engineer (CDPSE) and previously held the Certified Information Systems Security Professional (CISSP). In his role at CompTIA, Selk focuses on enhancing cybersecurity programs and facilitating information sharing among organizations to improve collective security postures. Jason Popillion is a CISSP and serves as a CIO/CTO of a SaaS company and Kevin Pentecost is a CISSP, CISM, CEH, CPT, MPCS, MCSE, CCA, ITIL-F and serves as the Information Security Director for a Manufacturing company. CITATIONS Wayne's LinkedIn Profile: https://www.linkedin.com/in/wayne-selk/ Wayne's Twitter (X) Profile: https://x.com/WayneSiennaSec CompTIA's LinkedIn Profile: https://www.linkedin.com/company/comptia/ CompTIA's Twitter (X) Profile: https://x.com/CompTIA CompTIA Certification Information: https://www.comptia.org/certifications Trustmark Framework: https://connect.comptia.org/membership/company/comptia-trustmarks CISA.gov Resources and Tools: https://www.cisa.gov/resources-tools/all-resources-tools

Nov 7, 20241h 52m

S3 Ep 11S3 – Episode 010 – The Art of the Pivot w/Wirefall

In this episode of the Cyber Distortion Podcast, we sit down with Dustin Dykes, better known as Wirefall, the founder of the Dallas Hackers Association (DHA). Join us as we dive into the origins of DHA, its impact on the cybersecurity community, and Wirefall's journey in the hacking world. Dustin is a Tribe of Hackers and Art of Intrusion Contributor, a public speaker, an improv and stand up student and performer, and of course, a technical guru! He is a local security community advocate. Founder of the Dallas Hackers Association and former board member of BSides DFW and TheLab.MS. He is a military and law enforcement veteran with 25+ years of security consulting experience focused on attack and penetration testing. We also get into the other really cool business that Dustin is a part of, Telesploit. The Telesploit solution enables organizations to remotely perform internal vulnerability assessments and penetration tests leveraging resources located anywhere in the world. Whether you're a seasoned hacker or just curious about the culture, this episode is packed with insights you won't want to miss! Jason Popillion is a CISSP and serves as a CIO/CTO of a SaaS company and Kevin Pentecost is a CISSP, CISM, CEH, CPT, MPCS, MCSE, CCA, ITIL-F and serves as the Information Security Director for a Manufacturing company. CITATIONS Wirefall's LinkedIn Profile: https://www.linkedin.com/in/wirefall/ Wirefalls's Twitter (X) Profile: https://twitter.com/DHAhole DHA (Dallas Hackers Association) (X) Profile: https://twitter.com/Dallas_Hackers Telesploit: https://www.telesploit.com/ Telesploit 'X' Profile: https://twitter.com/telesploit Telesploit LinkedIn Profile: https://www.linkedin.com/company/telesploit/ OTHER D/FW Hacker Groups: DC214 'X' Profile: https://twitter.com/DC214DFW DC940 'X' Profile: https://twitter.com/DCG940 Hack FtW's Profile: https://twitter.com/Hack_FtW

Oct 14, 20241h 48m

S3 Ep 9S3 – Episode 009 – He Robs Banks! w/FC (aka: Freaky Clown)

Welcome to this episode of Cyber Distortion, where we explore the cutting edge of technology, security, and the future of humanity itself. Today, Kevin and Jason have the privilege of talking with FC. FC or, "Freaky Clown" as he's known more commonly by his hacker handle, is a renowned ethical hacker and social engineer, as well as global keynote speaker. He has been working in the information security field for over 25 years and is motivated by a drive to make individuals, organizations, and countries more secure. When he is not legally breaking into companies, FC takes audiences on an eye-opening journey into the hacker's mindset. He has delivered over 50 keynotes including CPX360, C-E-R-N and Intersec. FC demystifies security with his expertise, humor, and passion. His bestselling book 'How I Rob Banks – and other Such Places' was published in June 2023. In today's conversation, the guys delve into many of FC's crazy stories from his physical penetration testing days. Many of the stories are actually covered in his awesome book but there is so much more to FC's story. FC and his amazing wife Dr. Jessica Barker, also run their company Cygenta, which is centered around security in 3 key areas. Their approach to cyber security is more than just penetration testing or awareness training. They are experts in combining the technical, human and physical aspects of security best practice. They help some of the largest and most complicated organizations build resilience and sustainability in their risk management, not just their technical response. With Cygenta's approach to cyber security, you and your people are safer, your technology is more resilient and your perimeters are more secure. Enjoy this amazing and very entertaining story time episode! Jason Popillion is a CISSP and serves as a CIO/CTO of a SaaS company and Kevin Pentecost is a CISSP, CISM, CEH, CPT, MPCS, MCSE, CCA, ITIL-F and serves as the Information Security Director for a Manufacturing company. CITATIONS FC's LinkedIn Profile: https://www.linkedin.com/in/freakyclown/ FC's Twitter (X) Profile: https://twitter.com/_Freakyclown_ Jessica's LinkedIn Profile: https://www.linkedin.com/in/jessica-barker/ Jessica's Twitter (X) Profile: https://twitter.com/drjessicabarker Cygenta LinkedIn Profile: https://www.linkedin.com/company/cygenta/ Cygenta Website: https://www.cygenta.co.uk/ FC's Book on Amazon: https://www.amazon.com/How-Rob-Banks-Other-Places/dp/B0C8WJCRN6/ Jessica's Book on Amazon: https://www.amazon.com/Hacked-Uncovering-Strategies-Secrets-Attacks/dp/1398613703

Sep 13, 20241h 51m

S3 Ep 8S3 – Episode 008 – The Transhuman

Welcome to this episode of Cyber Distortion, where we explore the cutting edge of technology, security, and the future of humanity itself. Today, we have a truly extraordinary guest joining us: Len Noe, a Transhumanist with over 10 chips embedded in his body. Len isn't just a futurist—he's living proof of what the future could hold, using his integrated technology to perform hacks and complete takeovers on various devices. His unique perspective challenges the boundaries between human and machine, and today, he's here to share his incredible journey and insights with us. Len's path to becoming a white hat hacker and a technical evangelist at CyberArk is as fascinating as the technology he wields. Once a 1%er biker, Len made a dramatic transition from the world of outlaw motorcycle clubs to the front lines of cyber defense. His story is one of transformation, not just in terms of his career but in the very way he interacts with the world around him, using the embedded chips in his body as tools for exploration, protection, and demonstration. In this conversation, we'll dive deep into the world of Transhumanism, explore the ethical implications of merging man with machine, and discuss how Len's experiences have shaped his views on the future of cybersecurity. Whether you're a tech enthusiast, a security professional, or just curious about the possibilities of human augmentation, this episode promises to be a thought-provoking journey into the unknown. Jason Popillion is a CISSP and serves as a CIO/CTO of a SaaS company and Kevin Pentecost is a CISSP, CISM, CEH, CPT, MPCS, MCSE, CCA, ITIL-F and serves as the Information Security Director for a Manufacturing company. CITATIONS Len's LinkedIn Profile: https://www.linkedin.com/in/len-noe/ William McCurdy Article (The Standard – UK): https://www.standard.co.uk/news/tech/cyborg-hacker-infiltrate-phone-office-len-noe-b1072862.html Len's Book "Human Hacked: My Life and Lessons as the World's First Augmented Ethical Hacker": Buy it on Amazon Cyber Ark: https://www.cyberark.com/ The Cyber Cognition Podcast: https://www.itspmagazine.com/cyber-cognition-podcast Dangerous Things – Embedded Biohacking Stuff: https://dangerousthings.com/ More on the PegLeg Impanted Device: http://pegleg.org/ More on the Biohacking Village at DEFCON and Beyond: https://www.villageb.io/ Biohacking Wearables: https://www.diygenius.com/best-biohacking-wearables/

Aug 29, 20241h 45m

S3 – Episode 007 – The Sociosploit

In today's episode, Kevin and Jason talk with a good friend Justin "Hutch" Hutchens. Hutch is a technology leader and visionary. He is the author of the book "The Language of Deception: Weaponizing Next Generation AI", the creator of Sociosploit.com, a research blog which examines exploitation opportunities on the social web – a confluence of his interests in both technical hacking and social psychology, and the co-host of Cyber Cognition, a podcast focused on the rapidly evolving technical landscape of artificial intelligence and machine learning. Hutch is an award-winning public speaker and has spoken at multiple Universities and global conferences to include the RSA Conference, and DEF CON. The guys dig into the topics considered somewhat controversial in today's world of AI, and they discuss Hutche's projects as well as his new book. Jason Popillion is a CISSP and serves as a CIO/CTO of a SaaS company and Kevin Pentecost is a CISSP, CISM, CEH, CPT, MPCS, MCSE, CCA, ITIL-F and serves as the Information Security Director for a Manufacturing company. CITATIONS Hutch's LinkedIn Profile: linkedin.com/in/justinhutchens Hutch's Book "The Language of Deception: Weaponizing Next Generation AI" Buy it on Amazon Sociosploit Blog Site: https://www.sociosploit.com/ The Cyber Cognition Podcast: https://www.itspmagazine.com/cyber-cognition-podcast

Aug 5, 20241h 36m

S3 Ep 6S3 – Episode 006 – The Insane Impact of AI – (FireTalks 15)

In this episode, Kevin and Jason hit 15 different topics on the Insane Impact of AI on our businesses, in our daily lives, in healthcare, and beyond. Each topic will be covered in 5 minutes or less in a new format we're calling "Firetalks 15!" The guys like to talk, and if you've listened to more than a few episodes, keeping any topic under 5 minutes proved to be a very challenging thing as you'll see in this interesting new format! Jason Popillion is a CISSP and serves as a CIO/CTO of a SaaS company and Kevin Pentecost is a CISSP, CISM, CEH, CPT, MPCS, MCSE, CCA, ITIL-F and serves as the Information Security Director for a Manufacturing company.

Jul 14, 20241h 24m

S3 Ep 5S3 – Episode 005 – The Great Cyber Divide (w/ Special Guests: The Bare Knuckles & Brass Tacks Podcast Team)

In this episode, Kevin and Jason sit down to talk shop with George Kamide and George Al-Koura the hosts of the awesome podcast "Bare Knuckles and Brass Tacks." Their podcast is focused on talking about whether or not there truly is a vendor/customer divide. It's a cybersecurity podcast dedicated to answering that question. George Kamide comes from the vendor side, and George Al-Koura is a CISO on the customer side. They have REAL conversations from opposing sides of the pitch about cybersecurity marketing, sales, and go-to-market strategies. They confront these topics and bad practices with bare knuckles. Then it's down to brass tacks, as they look for solutions. They have guests on either side, including CISOs, SMEs, leaders, frontline account managers, and more. George Kamide is a Multi-disciplinary thinker with a penchant for blowing up silos. He loves tackling big problems. This might mean orchestrating go-to-market product strategies, or creating stimulating thought leadership in dynamic tech environments. Other times it means taking on industry-wide issues of representation, customer/vendor trust challenges, or big questions like responsible AI. George Al-Koura is a CISO Chief Information Security Officer, he leads the strategy and execution of cybersecurity for a global online dating company that empowers people to connect and explore their relationships. He has over 15 years of experience in the security profession, spanning military, government, and commercial sectors, with a focus on cyber and security threat intelligence. We pick their brains on their podcast, their origin story, and much, much more… Jason Popillion is a CISSP and serves as a CIO/CTO of a SaaS company and Kevin Pentecost is a CISSP, CISM, CEH, CPT, MPCS, MCSE, CCA, ITIL-F and serves as the Information Security Director for a Manufacturing company. CITATIONS: Links to find the Bare Knuckles Team: Web: https://www.bareknucklespod.com/ LinkedIn: Bare Knuckles: https://www.linkedin.com/company/bare-knuckles-brass-tacks/ George Kamide: https://www.linkedin.com/in/george-kamide/ George Al-Koura: https://www.linkedin.com/in/george-y-al-koura/ SquadCon: https://blackgirlshack.org/

Jun 30, 20241h 40m

S3 Ep 4S3 – Episode 004 – The Dark Tale Teller with Jack Rhysider of Darknet Diaries

In this episode, Jason and Kevin sit down with the one and only storyteller from the dark side of the internet, Jack Rhysider. Jack is the beloved voice behind the extremely popular podcast The Darknet Diaries. Tonight, it's a podcaster-to-podcaster conversational happy hour! Jack attended a highly ranked university to study computer engineering with an emphasis on software engineering. Received formal training in Linux, Unix, Windows, C, C++, Java, ASM, logic, and electrical engineering. After college, he spent over a decade conducting network hardening by securing, analyzing, and testing network equipment such as firewalls, routers, and IDS units. Completed work on dozens of client's networks ranging from schools, banks, commercial, government, and defense contractors. Acquired numerous certifications in Cisco and Juniper and other security related training. Architected and built a SOC using a SIEM to detect network threats and intrusions for clients. Darknet Diaries produces audio stories specifically intended to capture, preserve, and explain the culture around hacking and cyber security in order to educate and entertain both technical and non-technical audiences. At Darknet Diaries, they adhere to journalistic standards by fact checking and ethical sourcing of information. They adopt principles of truthfulness, accuracy, objectivity, impartiality, fairness, and public accountability. Darknet Diaries is trustworthy, they strive to enhance intellectual development, expand knowledge, deepen aural enjoyment, increase the awareness of living in a highly technical society, and result in a service to listeners which makes them more responsive, informed citizens of their digital lives. Jason Popillion is a CISSP and serves as a CIO/CTO of a SaaS company and Kevin Pentecost is a CISSP, CISM, CEH, CPT, MPCS, MCSE, CCA, ITIL-F and serves as the Information Security Director for a Manufacturing company. CITATIONS: Darknet Diaries Website: https://www.darknetdiaries.com Darknet Diaries SWAG Shop: https://shop.darknetdiaries.com/ Jack's LinkedIn: https://www.linkedin.com/in/jack-rhysider-02922a167/ Twitter: https://twitter.com/JackRhysider https://twitter.com/DarknetDiaries YouTube Channel: https://www.youtube.com/@JackRhysider Spotify: https://open.spotify.com/show/4XPl3uEEL9hvqMkoZrzbx5 Apple Podcasts: https://podcasts.apple.com/us/podcast/darknet-diaries/id1296350485 Reddit: https://www.reddit.com/r/darknetdiaries/ Patreon: https://www.patreon.com/darknetdiaries

May 24, 20241h 23m

S3 Ep 3S3 – Episode 003 – Alethe-Al Weapon with Alethe Denis

EPISODE DESCRIPTION: In this episode, we sit down with Sr. Security Consultant and Red Teamer, Alethe Denis. Alethe is a social engineer who excels in the art of human hacking. Alethe Denis is a Senior Security Consultant on the Red Team at Bishop Fox, an offensive cyber security company that helps clients protect their assets and data. She holds the Certified Ethical Hacker (CEH) certification and has multiple awards and publications in the field of social engineering and cybersecurity. Pursuing her passion for hacking she joined the cyber security industry after winning the prestigious DEF CON Social Engineering Capture the Flag competition in 2019 and receiving a coveted DEF CON Black Badge. Since then, she has been a leading social engineering expert and cybersecurity ally for companies around the globe, specializing in red team attack emulative social engineering. She is also a board member of DEF CON Groups and a member of InfraGard, a partnership between the FBI and the private sector. We get into some of her amazing stories in this episode so snap on that chin strap. We're going to have some fun!! Jason Popillion is a CISSP and serves as a CIO/CTO of a SaaS company and Kevin Pentecost is a CISSP, CISM, CEH, CPT, MPCS, MCSE, CCA, ITIL-F and serves as the Information Security Director for a Manufacturing company. CITATIONS: HOW TO FIND ALETHE LinkedIn: https://www.linkedin.com/in/alethe/ Twitter: https://twitter.com/AletheDenis Bishop Fox: https://bishopfox.com/authors/alethe-denis We are Tech Women Interview: https://wearetechwomen.com/inspirational-woman-alethe-denis-senior-security-consultant/ Social Engineering Links: https://www.se.community/ https://linktr.ee/sec_defcon DEFCON: https://defcon.org/ Black Badge Hall of Fame & More on the Black Badge: https://defcon.org/html/links/dc-black-badge.html https://defcon.org/html/links/dc-bb-policy.html

May 11, 20242h 4m

S3 Ep 2S3 – Episode 002 – Un-Bearably Dedicated!

EPISODE DESCRIPTION: In this episode, Kevin and Jason sit down to talk shop with Cyber-guru Phillip Wylie. Phillip is a friend and a member of the newly formed Cyber Circus network which includes other podcasters including Chris Glanden of BarCode Security as well as Kevin & Jason from the Cyber Distortion Podcast. Phillip Wylie is a well-known figure in the cybersecurity and ethical hacking community, recognized for his extensive experience and contributions to the field. Background and Expertise: Phillip has a background in penetration testing and ethical hacking. His career spans over two decades, during which he has held various roles in IT and security, including penetration tester, security engineer, and security consultant. His expertise lies in identifying and exploiting vulnerabilities in computer systems and networks to help organizations strengthen their security postures. Education and Advocacy: He is known for his efforts in cybersecurity education and advocacy, working to raise awareness about the importance of cybersecurity and sharing knowledge with aspiring cybersecurity professionals. Wylie often speaks at conferences and seminars, sharing his insights on ethical hacking, penetration testing, and cybersecurity trends. The Pwn School Project: Phillip is the founder of The Pwn School Project, an educational initiative aimed at teaching ethical hacking and cybersecurity skills to a wider audience. The project focuses on providing free or low-cost education to those interested in pursuing a career in cybersecurity, emphasizing hands-on learning and practical skills. Authorship and Thought Leadership: He has contributed to the cybersecurity community as a writer and thought leader, sharing his knowledge through articles, books, and research papers. His work often covers topics related to ethical hacking techniques, career advice for cybersecurity professionals, and the latest trends in cyber threats and defenses. Mentorship: Phillip is also known for his mentorship role in the cybersecurity community, guiding newcomers and helping them navigate the complexities of starting a career in cybersecurity. He advocates for continuous learning and ethical practices within the field. Jason Popillion is a CISSP and former CIO/CTO of a SaaS company and Kevin Pentecost is a CISSP, CISM, CEH, CPT, MPCS, MCSE, CCA, ITIL-F and serves as the Information Security Director for a Manufacturing company. CITATIONS: Links to find Phillip: Web: https://www.thehackermaker.com/ LinkedIn: https://www.linkedin.com/in/phillipwylie/ Twitter - X: https://twitter.com/PhillipWylie YouTube: https://www.youtube.com/@PhillipWylie Spotify: https://open.spotify.com/show/6LH3TYGlg0JRsK7UzDmbjb?si=3f1c8f364613460c DEFCON Meetup Groups: https://forum.defcon.org/social-groups DC940 (Denton Texas): https://twitter.com/DCG940

Apr 3, 20241h 19m

S3 Ep 1S3 – Episode 001 – Down the Deepfake Rabbit Hole

In this episode, Kevin and Jason kick of what we expect will be our most exciting season to date. We come out of the gate like two savage wildebeests ready to devour anything in our path! Wait, that sounds extreme. Maybe it's on that intense, but it's LEGIT intense as we tackle a topic that only the fearless dare unpackage DEEPFAKES! In this octane fueled episode, we delve into the intricate world of deepfakes, a term that has rapidly evolved from obscure tech lingo to a hot-button issue at the intersection of technology, ethics, and reality. We give funny examples and enjoy a light-hearted segment showing how deepfakes are used for laughs, but the light-hearted fun only lasts so long. The episode takes a critical turn as we examine the darker side of deepfakes, highlighting instances where they've been used to spread misinformation, and create non-consensual explicit content. The conversation also covers the psychological and societal impacts of living in a world where seeing is no longer believing, and how our understanding of truth and reality is being challenged. "Down the Deepfake Rabbit Hole" offers a comprehensive and nuanced examination of deepfakes, encouraging listeners to ponder the profound questions they raise about innovation, authenticity, and the fabric of our digital lives. Join us for this thought-provoking journey into one of the most fascinating and controversial topics in today's digital age. Jason Popillion is a CISSP and serves as a former CIO/CTO of a SaaS company and Kevin Pentecost is a CISSP, CISM, CEH, CPT, MPCS, MCSE, CCA, ITIL-F and serves as the Information Security Director for a Manufacturing company. CITATIONS CTRL_SHIFT_FACE: Their awesome channel can be found out on YouTube. Check out some of the great deepfakes they're creating out there at https://www.youtube.com/@CtrlShiftFace AICPA Guidance: https://www.aicpa-cima.com/news/article/deepfakes-emerge-as-real-cybersecurity-threat AI DEEPFAKE SCAM STORY: https://www.theguardian.com/world/2024/feb/05/hong-kong-company-deepfake-video-conference-call-scam AI TEACHER SEX SCANDAL STORIES: https://www.fox26houston.com/news/houston-area-student-accused-of-creating-deep-fake-explicit-photos-of-teacher-sharing-them-online https://nypost.com/2023/04/14/texas-student-faked-nudes-of-teacher-report/ TOOLS USED IN THE EPISODE INTRO: Speechify: https://speechify.com/ Swapface: https://www.swapface.org Envato Elements (Images): https://elements.envato.com Audio (Audio): https://audiojungle.net/

Mar 21, 20241h 8m

S2 Ep 14S2 - Episode 014 - Lone Star Cyber Circus - LIVE @ Hop & Sting Brewery, Grapevine, TX

Get ready for an electrifying evening as the "Lone Star Cyber Circus" pitches its virtual tent at the renowned Hop & Sting Brewery in Grapevine, Texas! This live podcast event, a harmonious blend of cutting-edge cyber talks and classic Texan hospitality, promises an experience like no other. As you step into the rustic yet modern ambiance of Hop & Sting Brewery, you'll be greeted by the rich aroma of craft beers, a hallmark of this beloved local establishment. The brewery's spacious interior, adorned with hints of Texan charm and cyber-themed décor, sets the perfect stage for an evening of engaging discussions and lively entertainment. The "Lone Star Cyber Circus" is more than just a podcast; it's a celebration of the digital age, wrapped in the warmth of Texan culture. Hosted by charismatic cyber experts, Chris Glanden (Barcode Security), Phillip Wylie (Phillip Wylie Show), and Kevin Pentecost & Jason Popillion (Cyber Distortion Podcast). Their discussions are a riveting blend of expert insights, humorous anecdotes, and lively banter. What makes this event truly unique is its interactive format. The live audience, a diverse mix of tech enthusiasts, local patrons, and visitors, gets to participate in Q&A sessions, offering a dynamic and inclusive experience. As the podcast rolled, guests enjoyed Hop & Sting's exquisite selection of craft beers, each brew telling its own story of local ingredients and brewing artistry. The brewery's friendly staff were more than happy to guide you through their selection, ensuring a perfect pairing for your podcast experience. Throughout the evening, the "Lone Star Cyber Circus" also features special guests - from renowned tech gurus to local cybersecurity heroes - adding depth and diversity to the conversation. These guest appearances are a crowd favorite, often leading to insightful, sometimes heated, but always entertaining discussions. The event featured experts in the area of the DFW Hacking scene: Wirefall (Dallas Hackers Association), Juneau Jones (DC214), and NEURAL PHANTOM (HackFTW), Phillip Wylie himself, represented Denton and (DC940). Following the awesome discussion on the DFW Hacker scene, we shifted into another very hot topic on AI and where it's headed in the near future. Special guests Justin "Hutch" Hutchins, and Quentin Rhoads-Herrera stole the show with this topic. Please follow our AWESOME SPONSORS: Cyberstrike and Trace3 who made it all happen. We want to extend the most heartfelt THANK YOU to both of them for making this event possible!! As the night draws to a close, the lively atmosphere of Hop & Sting Brewery, combined with the thought-provoking content of "Lone Star Cyber Circus," leaves you with a sense of connection - to the community, the evolving digital world, and the vibrant culture of Texas. It's an experience that goes beyond a typical podcast recording, leaving you enriched, entertained, and eager for the next episode. Whether you were a tech aficionado, a beer enthusiast, or just in search of a unique night out in Grapevine, the "Lone Star Cyber Circus" at Hop & Sting Brewery was an event you didn't want to miss. If you missed this one, follow us on Twitter for more information about the next live Cyber Circus event! We had so much fun, we can't wait for the next one!! Join us for an evening where the cyber world and Texas charm collide, creating an unforgettable podcast experience! 🍻🎪 CITATIONS: CyberStrike: https://cyberstrikegroup.com/ Trace3: https://www.trace3.com/ Barcode Security: https://barcodesecurity.com/ Phillip Wylie Show: https://www.phillipwylieshow.com/ Cyber Distortion Podcast on Twitter: https://cyberdistortionpodcast.com/ DFW Hacker Scene: Dallas Hackers Association: https://twitter.com/Dallas_Hackers DC214: https://twitter.com/DC214DFW DC940: https://twitter.com/DCG940 HackFTW: https://twitter.com/Hack_FtW Thanks to Kiss for the amazing tune "Psycho Circus" which we used as our walk-up song at the event!

Dec 27, 20231h 45m

S2 Ep 13S2 - Episode 013 – CISSP Success Stories with Luke Ahmed – Part II

Description: 🎙️This is part two of our riveting two-part episode with the extraordinary Luke Ahmed. Luke, a best-selling author, CISSP instructor, and the driving force behind the immensely popular Facebook page "CISSP Exam Preparation - Study Notes and Theory," brings a wealth of knowledge and passion to the table. Discover the keys to success in the realm of cybersecurity as Luke shares insights from his personal journey and experience in the field. As a CISSP (Certified Information Systems Security Professional) instructor, he's not just a teacher; he's a mentor who has personally guided over 3300 aspiring CISSPs to success in their exams. 🔒 What to Expect: Insider Tips for CISSP Success: Uncover the strategies and study techniques that have proven effective for thousands of CISSP candidates. Luke spills the secrets that go beyond the textbooks. Navigating the CISSP Landscape: The CISSP certification is no small feat, and Luke Ahmed breaks down the complexities, offering guidance on how to tackle the exam with confidence. The Evolution of Cybersecurity: Get a front-row seat to the ever-evolving world of cybersecurity. Luke shares his thoughts on emerging trends, threats, and the skills that professionals need to stay ahead in this dynamic field. Luke's Best-Selling Insights: As a best-selling author, Luke brings a unique perspective to the podcast. Explore the pages of his books and gain access to the wisdom that has resonated with cybersecurity enthusiasts worldwide. Get to know that "Mindset" that you MUST unlock to pass the ISC2 exam. LOTS of Fun: We lighten things up a bit towards the end of the episodes to finish on a light-hearted note! 🚀 Why You Should Tune In: Whether you're a seasoned cybersecurity professional or just starting your journey, this episode is a must-listen. Luke Ahmed's expertise and genuine passion for cybersecurity make for a captivating conversation that promises to inspire, educate, and empower. Don't miss out on this opportunity to tap into the mind of a CISSP guru and glean valuable insights that could shape your own path in the world of cybersecurity. Get ready to level up your cybersecurity knowledge and skills with Luke Ahmed on this exciting two-part episode of the Cyber Distortion Podcast! 👉 Connect with Luke: LinkedIn: https://www.linkedin.com/in/luke-ahmed-%F0%9F%9A%80-446601133/ Facebook: CISSP Exam Preparation - Study Notes and Theory Website: https://www.studynotesandtheory.com/ 🎧 Subscribe and Share: https://www.youtube.com/@TheCyberDistortionPodcast 🔗 Twitter: @DistortionCyber 🔗 Blog: cyberdistortion.com 🔗 SWAG Shop: https://cyberdistortionswag.shop 🔗 Additional Resources: Look for our audio podcasts on all major streaming platforms as well 🎉 Join the Conversation: Share your thoughts, questions, and key takeaways from this episode on social media using the hashtag #CybersecurityMastermind. We can't wait to hear from you! Jason Popillion is a CISSP and serves as a CIO/CTO of a SaaS company and Kevin Pentecost is a CISSP, CISM, CEH, CPT, MPCS, MCSE, CCA, ITIL-F and serves as a Information Security Director for a Manufacturing company. Citations: KC7 Training for Cybersecurity Professionals - https://kc7cyber.com/ KC7 is a new way to learn cybersecurity that's hands-on, fun, and engaging. With KC7, you'll learn key cybersecurity skills while getting practical experience that feels just like the real job. HUD Graphic for CISSP Tips – Credit https://pngtree.com/freepng/futuristic-lower-third-sci-fi-design-template-for-channel-news-information-call-box-bars-and-modern-digital-info-boxes-element-of-hud-interface-callouts-vector-illustration_8186961.html'>png image from pngtree.com

Dec 21, 20231h 25m

S2 Ep 12S2 - Episode 012 – CISSP Success Stories with Luke Ahmed – Part I

In this riveting two-part episode, join us as we dive deep into the world of cybersecurity with the extraordinary Luke Ahmed. Luke, a best-selling author, CISSP instructor, and the driving force behind the immensely popular Facebook page "CISSP Exam Preparation - Study Notes and Theory," brings a wealth of knowledge and passion to the table. Discover the keys to success in the realm of cybersecurity as Luke shares insights from his personal journey and experience in the field. As a CISSP (Certified Information Systems Security Professional) instructor, he's not just a teacher; he's a mentor who has personally guided over 3300 aspiring CISSPs to success in their exams. 🔒 What to Expect: Insider Tips for CISSP Success: Uncover the strategies and study techniques that have proven effective for thousands of CISSP candidates. Luke spills the secrets that go beyond the textbooks. Navigating the CISSP Landscape: The CISSP certification is no small feat, and Luke Ahmed breaks down the complexities, offering guidance on how to tackle the exam with confidence. The Evolution of Cybersecurity: Get a front-row seat to the ever-evolving world of cybersecurity. Luke shares his thoughts on emerging trends, threats, and the skills that professionals need to stay ahead in this dynamic field. Luke's Best-Selling Insights: As a best-selling author, Luke brings a unique perspective to the podcast. Explore the pages of his books and gain access to the wisdom that has resonated with cybersecurity enthusiasts worldwide. Get to know that "Mindset" that you MUST unlock to pass the ISC2 exam. LOTS of Fun: We lighten things up a bit towards the end of the episodes to finish on a light-hearted note! 🚀 Why You Should Tune In: Whether you're a seasoned cybersecurity professional or just starting your journey, this episode is a must-listen. Luke Ahmed's expertise and genuine passion for cybersecurity make for a captivating conversation that promises to inspire, educate, and empower. Don't miss out on this opportunity to tap into the mind of a CISSP guru and glean valuable insights that could shape your own path in the world of cybersecurity. Get ready to level up your cybersecurity knowledge and skills with Luke Ahmed on this exciting two-part episode of the Cyber Distortion Podcast! 👉 Connect with Luke: LinkedIn: https://www.linkedin.com/in/luke-ahmed-%F0%9F%9A%80-446601133/ Facebook: CISSP Exam Preparation - Study Notes and Theory Website: https://www.studynotesandtheory.com/ 🎧 Subscribe and Share: https://www.youtube.com/@TheCyberDistortionPodcast 🔗 Twitter: @DistortionCyber 🔗 Blog: cyberdistortion.com 🔗 SWAG Shop: https://cyberdistortionswag.shop 🔗 Additional Resources: Look for our audio podcasts on all major streaming platforms as well 🎉 Join the Conversation: Share your thoughts, questions, and key takeaways from this episode on social media using the hashtag #CybersecurityMastermind. We can't wait to hear from you! Jason Popillion is a CISSP and serves as a CIO/CTO of a SaaS company and Kevin Pentecost is a CISSP, CISM, CEH, CPT, MPCS, MCSE, CCA, ITIL-F and serves as a Information Security Director for a Manufacturing company. Citations: KC7 Training for Cybersecurity Professionals - https://kc7cyber.com/ KC7 is a new way to learn cybersecurity that's hands-on, fun, and engaging. With KC7, you'll learn key cybersecurity skills while getting practical experience that feels just like the real job.

Nov 30, 20232h 1m

S2 Ep 11S2 - Episode 011 – "Cybersecurity Happy Hour - with Chris Glanden (BARCODE Security)"

In this episode, Kevin and Jason shoot the breeze with fellow Cybersecurity podcaster Chris Glanden, a veteran cybersecurity professional passionate about Security Systems, breakthroughs, vulnerabilities, their mitigation and risk management. Chris has interviewed some of the most high-profile influencers and specialists in technology, hacking, and cyberspace. His episodes include guests like Phillip Wylie, Freaky Clown (FC), Jack Rhysider from Darknet Diaries, Alyssa Miller, Gummo, and Magda Chelly to name a few!! Conceptualized in mid-2020 amongst the Covid pandemic, he designed BARCODE to become THE alternative way to continue the social and educational elements of cybersecurity happy hours, technical meet-ups and security conference peer interaction that our industry was so deprived of during that time. Often, this is where new ideas and innovation is spawned, and not confined within 4 conference walls. Enter a no pressure atmosphere where listeners gain knowledge direct from the industry's elite. Chris is working on an amazing documentary project called INHUMAN and Chris is bootstrapping everything, which is tough. If people want to find out more about what they're doing, inhumandocumentary.com is the website with crowdfunding information and sponsorship opportunities. The documentary will be all about AI and we spill lots of juicy details in this episode. We really hope you like this episode as much as we enjoyed putting it together and spending time with our man, Chris! Jason Popillion is a CISSP and serves as a CIO/CTO of a SaaS company and Kevin Pentecost is a CISSP, CISM, CEH, CPT, MPCS, MCSE, CCA, ITIL-F and serves as a Information Security Director for a Manufacturing company. CITATIONS THE BARCODE PODCAST: Chris' Badass Podcast page can be found here: https://barcodesecurity.com/ BARCODE at Barcode Episode (Live from Las Vegas) with Special Guest "Freaky Clown:" https://barcodesecurity.com/bonus-bcp-live-with-fc/ Chris' LinkedIn page: https://www.linkedin.com/in/chrisglanden/ Twitter: https://twitter.com/ChrisGlitz THE DOCUMENTARY: Information about Chris' Upcoming Documentary entitled "InHuman": https://inhumandocumentary.com/ INHUMAN Trailer: https://www.youtube.com/watch?app=desktop&v=RZZU28RBb7k Chris' Partner Filmmaker and Cybersecurity Guru - Matt Barnett's LinkedIn MORE ON FREAKY CLOWN (FC): Freaky Clown's Website: https://www.freakyclown.com/ Freaky Clowns Book on Amazon "How I Rob Banks" CHRIS' INTERVIEW WITH BLACK HAT HACKER GUMMO: Barcode Podcast Episode 53: https://www.youtube.com/watch?v=_3Uvm_jxRXw MORE ON GUMMO: Black Hat Hacker "Gummo's" story on Soft White Underbelly on YouTube: https://www.youtube.com/watch?v=g6igTJXcqvo https://www.youtube.com/watch?v=3ZtkMmVDNEo Image Credits: Caesars Palace - Photo by Wesley Tingey on Unsplash MGM Photo - Photo by Marcos Nieto on Unsplash Laptop Image - Photo by Luca Bravo on Unsplash Looking to Start Your Career in IT? Check out CompTIA as a great entry point into an IT career if you're interested in a certification: https://www.comptia.org/home https://www.comptia.org/career-change/switching-career-path/get-into-it-without-a-degree

Oct 11, 20231h 33m

S2 Ep 10S2 - Episode 010 – Quantum Branding: Turbocharge your Identity with AI

In this unconventional episode, Kevin and Jason are thrilled to welcome a true branding and growth specialist, Larry Roberts, famously known as the "Red Hat Guy." Larry brings a wealth of experience and knowledge in harnessing the power of AI tools to supercharge brand growth and visibility. 🔴 Meet Larry Roberts - The 'Red Hat Guy' 🔴 Larry Roberts has made a name for himself in the world of branding and marketing with his unique approach to using AI-driven strategies. As a seasoned expert in the field, he has successfully leveraged cutting-edge technology to help businesses and influencers thrive in the digital age. 🧠 Unlocking the Potential of AI 🤖 In this insightful conversation, Larry dives deep into the world of artificial intelligence and its transformative impact on branding. Discover how AI can revolutionize your marketing efforts, streamline your processes, and propel your brand to new heights. While this episode isn't strictly focused on cybersecurity…Never fear. We do sprinkle in a little cybersecurity flavor for you as well! 🚀 Key Takeaways: 🌟 How AI is reshaping the landscape of brand growth. Practical tips for implementing AI in your branding strategy. Real-world success stories from Larry's experience. Real-world failures that also lead to growth. Karl Childers from Slingblade makes a surprise visit. The future of AI in marketing and brand management. 🎧 Tune In and Stay Informed! 📡 Don't miss this chance to gain invaluable insights from one of the industry's leading experts. Whether you're a seasoned marketer or just starting your branding journey, this episode is packed with actionable advice and inspiration. 👥 Connect with Larry Roberts 👥 Connect with Larry and stay updated on his latest insights: Twitter: @iamlarryroberts LinkedIn: Larry Roberts Instagram: thelarryroberts 🔗 Episode Links and Resources 🔗 Larry Roberts' Website 🎉 Join the Conversation! 🎉 Share your thoughts and questions in the comments section below. What's your perspective on AI's role in branding and growth? Let's discuss! 🎯 Subscribe to Cyber Distortion Podcast 🎯 Never miss an episode! Subscribe now and stay informed about the latest trends, strategies, and expert insights in the world of cybersecurity and digital transformation. We really hope you like this episode as much as we enjoyed putting it together! Jason Popillion is a CISSP and serves as a CIO/CTO of a SaaS company and Kevin Pentecost is a CISSP, CISM, CEH, CPT, MPCS, MCSE, CCA, ITIL-F and serves as a Information Security Director for a Manufacturing company. CITATIONS AI Tools to consider: o https://chat.openai.com/ - AI Chatbot for Humanlike Conversational Dialog o https://claude.ai/chats - AI Chatbot for Humanlike Conversational Dialog o https://www.midjourney.com/ - Text to Image Generation o https://elevenlabs.io/ - Generative Voice AI o https://murf.ai/ - Text to Speech Larry's Favorite Podcasts: o Jocko Podcast o Extreme Ownership Book – Jocko Willink and Leif Babin o Purchase it on Amazon o Smartless Podcast (Jason Bateman, Sean Hayes, and Will Arnett) o HBO Max 6-part series o Gary Vee Audio Experience - Gary Vaynerchuk Podfest Expo: https://podfestexpo.com/ Where to find Larry: @TheLarryRoberts o Instagram o Facebook o LinkedIn https://www.MeetLarryRoberts.com Jamie Gravitt Comedy: https://www.linkedin.com/in/jamie-gravy-a00301123/ Jamie Gravitt Image Credit: Sam Brand Photography https://voyagedallas.com/interview/meet-jamie-gravy-laughing-business-dallas-tx/ https://www.youtube.com/channel/UC_PPkDsrw90C26CCr5XcEFQ/videos?app=desktop https://www.youtube.com/@AlexHormozi

Sep 7, 20231h 22m

S2 Ep 9S2 - Episode 009 – DEFCON – An Exhaustive Guide to Hacker Summer Camp – (with Dr. Louis DeWeaver)

This very special episode is our contribution to all existing or soon-to-be DEFCON attendees! We go deep under the covers to crack the shell of all things Hacker Summer Camp in this definitive, ALL YOU NEED TO KNOW, and truly exhaustive guide. We join forces with our good friend, who we met at Hacker Summer Camp, Dr. Louis DeWeaver. Louis is a former professor and a seasoned cybersecurity expert who brings years of knowledge and many trips to DEFCON to this conversation. His upbeat personality is one of a kind! We like to say that Louis could definitely sell ice cubes to Eskimos! We start out with a brief history of DEFCON, talk about the basics on venue, cost, and of course the backstory on how founder Jeff Moss (a.k.a. Dark Tangent) started the largest hacker conference on the planet. Then, we round out this information packed episode with a definitive guide of the most important things you're going to WANT to know if you plant to head to the dessert to join in the fun. We really hope you like this episode as much as we enjoyed putting it together! Jason Popillion is a CISSP and serves as a CIO/CTO of a SaaS company and Kevin Pentecost is a CISSP, CISM, CEH, CPT, MPCS, MCSE, CCA, ITIL-F and serves as a Information Security Director for a Manufacturing company. DOWNLOADS: The Official DECFON webpage: https://defcon.org/ DEFCON on Twitter: https://twitter.com/defcon The Official DC Documentary: https://www.youtube.com/watch?v=3ctQOmjQyYg OTHER CONFERENCES IN VEGAS THE WEEK OF HACKER SUMMER CAMP: BLACKHAT USA CONFERENCE: https://www.blackhat.com/us-23/ B-Sides Las Vegas: https://bsideslv.org/registration Squadcon: https://www.blackgirlshack.org/event-5176921 So, you want to BLOW SOME SHIT UP? https://deviating.net/firearms/defcon_shoot/ Did you say "PARTIES?" – Find all the hopping social events in one spot: https://twitter.com/defconparties Look for their Google Calendar on the Twitter page! OH, you still want MORE? https://conferenceparties.com/hsc2023/

Aug 4, 20231h 30m

S2 Ep 8S2 - Episode 008 – Fighting Acronym Fatigue – Part II with Dr. Aaron Estes (CEO - Ironwood Cyber)

In this follow-up episode, we are honored to continue our spirited discussion with (Dr. Aaron Estes – Ironwood Cyber CEO "Chief Epic Officer") on with us to talk all about his company Ironwood Cyber, and some of the cool things they're doing over there. Ever since we met the Ironwood Cyber team based out of Ft. Worth Texas, we knew we had a solid professional passion and connection and we shared MANY similar interests. The Ironwood Cyber team is a strong group of Engineers originally founded by not one, but TWO Lockheed Martin Fellows respected for their incredible skillsets. Aaron Estes and Ethan Puchaty. Lockheed Martin Fellowship represents less than 1% of the best technical Engineers the company has to offer and their backgrounds are quite impressive having worked for a company engineering some of the best technology the US Department of Defense has to offer. After leaving Lockheed Martin to start their own Cybersecurity firm (Ironwood Cyber), the company has continued its tradition of developing amazing technology with such out of the box concepts that their endpoint protection solutions boast 3 patents. Focusing on side-channel analysis, they're quickly becoming a major player in the world of cybersecurity. This is part two of a two-part podcast episode, where we spend more time talking about their first electronic SWAG badge created in 2022 for DEFCON 30. We'll be looking at some teasers and talking to Aaron about what fun and interesting things they're doing for DEFCON 31. There may even be a few hints about the 2023 badge in the second part of this awesome conversation. I guess you'll just have to wait and see!! The biggest hint of all….THERE IS! Jason Popillion is a CISSP and serves as a CIO/CTO of a SaaS company and Kevin Pentecost is a CISSP, CISM, CEH, CPT, MPCS, MCSE, CCA, ITIL-F and serves as a Information Security Director for a Manufacturing company. DOWNLOADS: Find out More about IRONWOOD CYBER: https://ironwoodcyber.com/ CYBER RX: https://ironwoodcyber.com/ironwood-cyber-rx FIRETHORN: https://ironwoodcyber.com/firethorn Ironwood on Twitter: https://twitter.com/IronwoodCyber BLACKHAT USA CONFERENCE: https://www.blackhat.com/us-23/ DEFCON HACKER CONFERENCE: https://defcon.org/ The Official DC Documentary: https://www.youtube.com/watch?v=3ctQOmjQyYg

Jul 22, 202338 min

S2 Ep 7S2 - Episode 007 – Fighting Acronym Fatigue – Part I with Dr. Aaron Estes (CEO - Ironwood Cyber)

In this episode, we are honored to have one of these amazing gentlemen (Dr. Aaron Estes – Ironwood Cyber CEO "Chief Epic Officer") on with us to talk all about his company Ironwood Cyber, and some of the cool things they're doing over there. Ever since we met the Ironwood Cyber team based out of Ft. Worth Texas, we knew we had a solid professional passion and connection and we shared MANY similar interests. The Ironwood Cyber team is a strong group of Engineers originally founded by not one, but TWO Lockheed Martin Fellows respected for their incredible skillsets. Aaron Estes and Ethan Puchaty. Lockheed Martin Fellowship represents less than 1% of the best technical Engineers the company has to offer and their backgrounds are quite impressive having worked for a company engineering some of the best technology the US Department of Defense has to offer. After leaving Lockheed Martin to start their own Cybersecurity firm (Ironwood Cyber), the company has continued its tradition of developing amazing technology with such out of the box concepts that their endpoint protection solutions boast 3 patents. Focusing on side-channel analysis, they're quickly becoming a major player in the world of cybersecurity. The conversation flowed so well, in fact, that we ended up breaking this awesome episode into two parts. The first focusing on the Ironwood origin story, and their technology and the team. Then, in about a week, we'll be dropping part two, where we spend more time talking about their first electronic SWAG badge created in 2022 for DEFCON 30. We'll be looking at some teasers and talking to Aaron about what fun and interesting things they're doing for DEFCON 31. There may even be a few hints about the 2023 badge in the second part of this awesome conversation. I guess you'll just have to wait and see!! Jason Popillion is a CISSP and serves as a Director of Automotive Aftermarket of a SaaS company and Kevin Pentecost is a CISSP, CISM, CEH, CPT, MPCS, MCSE, CCA, ITIL-F and serves as a Information Security Director for a Manufacturing company. DOWNLOADS: Find out More about IRONWOOD CYBER: https://ironwoodcyber.com/ CYBER RX: https://ironwoodcyber.com/ironwood-cyber-rx FIRETHORN: https://ironwoodcyber.com/firethorn Ironwood on Twitter: https://twitter.com/IronwoodCyber BLACKHAT USA CONFERENCE: https://www.blackhat.com/us-23/ DEFCON HACKER CONFERENCE: https://defcon.org/ The Official DC Documentary: https://www.youtube.com/watch?v=3ctQOmjQyYg

Jul 13, 20231h 8m

S2 Ep 6S2 - Episode 006 – You ARE the Weakest link!

A long time in the making, this episode on the importance of User Awareness may just be the most important episode we've released so far. Kevin Pentecost and Jason Popillion are security veterans and Certified Information Systems Security Professionals (CISSPs) who know their way around a good User Awareness Training program having personally trained in classroom led environments as well as fostered and matured their own corporate training programs over their years as Cybersecurity managers. Join us as the duo delve into the critical topic of Cybersecurity User Awareness. With their wealth of experience, they provided invaluable insights and practical advice on how individuals can protect themselves against evolving cyber threats. They emphasize that user awareness plays a pivotal role in defending against cyber threats. They highlight the fact that attackers often exploit human vulnerabilities and trick individuals into compromising their own security. By enhancing user awareness, people can become more proactive in recognizing and responding to potential threats. A key role is understanding that just like every technical control, YOU are a critical layer of defense both in your personal life, and in your corporate environment. We take a look at the prevalence of social engineering attacks, which manipulate human psychology to deceive individuals into divulging sensitive information or performing harmful actions. We explain common tactics such as phishing emails, vishing calls, targeting spear phishing, CEO Spoofing, and many other non-email related social engineering tactics. To counter these threats, they recommend adopting a skeptical mindset, scrutinizing unexpected communications, and verifying the authenticity of requests before taking any action. Jason Popillion is a CISSP and serves as a CIO/CTO of a SaaS company and Kevin Pentecost is a CISSP, CISM, CEH, CPT, MPCS, MCSE, CCA, ITIL-F and serves as a Information Security Director for a Manufacturing company. DOWNLOADS: PRINT and HANG this on your Wall: Printable Version of the Cyber Distortion Podcast "Red Flags" PDF CyberDistortion Blog: https://cyberdistortionpodcast.com/ CyberDistortion Swag Shop: https://cyberdistortionswag.shop/

Jun 7, 20231h 1m

S2 Ep 5S2 - Episode 005 – Third Party Risk – It's not Me, It's You!

HE'S BAAAAAAACK!! In this episode, we RE-visit with our very first guest, Benjamin Hall. Ben has served as a virtual CISO, and serves as Sr. Information Security Consultant at Heartland Business Systems. With experience in Governance, Risk, and Compliance, Ben has worked in several industries including Banking, Finance, Insurance, and Healthcare. He is a Certified Information Systems Auditor (CISA), a Certified Data Privacy Solutions Engineer (CDPSE), and a HITRUST Certified Common Security Framework Practitioner (CCSFP). He is skilled in DR (Disaster Recovery), BC (Business Continuity), IR (Incident Response), Documentation, Risk Management, Business Development, and Information Security. To say Ben is qualified to tackle this very challenging topic is frankly, an understatement! It was our extreme pleasure to have Ben back to join us as we provide helpful tips on what YOU need to do to address third-party risk for your company. Join Kevin and Jason as they touch on some hard-hitting questions around risk and how to tackle some of the challenges that come with managing your due care and due diligence as it relates to outsourcing, and partnering with companies outside of your own 4 walls. Jason Popillion is a CISSP and serves as a CIO/CTO of a SaaS company and Kevin Pentecost is a CISSP, CISM, CEH, CPT, MPCS, MCSE, CCA, ITIL-F and serves as a Information Security Director for a Manufacturing company. CITATIONS: Heartland Business Systems: https://www.hbs.net/ Mark Cuban Interview with Credit-Suisse.com: https://www.credit-suisse.com/about-us-news/en/articles/news-and-expertise/mark-cuban-data-is-the-new-gold-201706.html

Apr 27, 20231h 20m

S2 Ep 4S2 - Episode 004 - "AI and ChatGPT is Scary Sh*t! – Part II"

In this MUCH anticipated follow-up to our episode 003 on AI an ChatGPT, expect more mind-numbing and terrifying facts about this incredible new technology! Kevin and Jason wrap up their discussion with Justin "Hutch" Hutchins, a true pioneer in the field of AI and it's social impact in the world of Cybersecurity and beyond. The sole purpose of this episode is to touch the topic of AI and open your mind as to how you need to be thinking about it. How might AI intermingle with the world of Cybersecurity? Is this whole thing just another over-hyped topic that will fade away in a few years, or is it here to stay? Take a seat and ride along with the boys as they delve into this topic with a true subject matter expert in the field of hacking and AI and see what he has to say. We don't think, we KNOW this one is going to blow your mind! CITATIONS: 10 Wonderful Examples of Using Artificial Intelligence (AI) for Good: https://www.forbes.com/sites/bernardmarr/2020/06/22/10-wonderful-examples-of-using-artificial-intelligence-ai-for-good/?sh=335e084f2f95 Justin's posts and conference talks can be found here on his "Sociosploit" blog: https://www.sociosploit.com/ Interested to find out more about the OpenAI ChatGPT project? https://openai.com/blog/chatgpt Are you more interested in AI Generated Imagery?: Try out… - Midjourney AI Artwork - https://www.midjourney.com/home/?callbackUrl=%2Fapp%2F - Bluewillow AI Artwork - https://www.bluewillow.ai/ Joe Rogan interviewing Elon Musk on AI: https://www.youtube.com/watch?v=Ra3fv8gl6NE Amazing YouTube Video from Digital Engine on AI today: https://www.youtube.com/watch?v=J6Mdq3n6kgk

Mar 30, 202343 min

S2 Ep 3S2 - Episode 003 - "AI and ChatGPT is Scary Sh*t! – Part I"

What in the world does AI and ChatGPT have to do with Cybersecurity? Well, this episode is going to answer that question for you, and so much more!! In today's exciting episode, Jason and Kevin discuss the incredible world of AI with special guest and white hat hacker extraordinaire, Justin "Hutch" Hutchins. The sole purpose of this episode is to touch the topic of Ai and open your mind as to how you need to be thinking about it. How might AI intermingle with the world of Cybersecurity? Is this whole thing just another over-hyped topic that will fade away in a few years, or is it here to stay? Take a seat and ride along with the boys as they delve into this topic with a true subject matter expert in the field of hacking and AI and see what he has to say. We think this one might just blow your mind! CITATIONS: Justin's posts and conference talks can be found here on his "Sociosploit" blog: https://www.sociosploit.com/ Interested to find out more about the OpenAI ChatGPT project? https://openai.com/blog/chatgpt Are you more interested in AI Generated Imagery?: Try out… - Midjourney AI Artwork - https://www.midjourney.com/home/?callbackUrl=%2Fapp%2F - Bluewillow AI Artwork - https://www.bluewillow.ai/ Joe Rogan interviewing Elon Musk on AI: https://www.youtube.com/watch?v=Ra3fv8gl6NE Amazing YouTube Video from Digital Engine on AI today: https://www.youtube.com/watch?v=J6Mdq3n6kgk

Mar 20, 202355 min

S2 Ep 2S2 - Episode 002 – 2022 Breaches and Some Retrospection

In this exciting second episode of the new season, we're offering up a buffet of delicious options to feast your incessant little cybersecurity appetites on! BREACHES We start by spending time on 5 of the top breaches that took place in 2022, but shift into some real world thoughts and ideas on what concepts could have helped in preventing those types of breaches. FRAMEWORKS Jason and Kevin dig deep into their CISSP bag of tricks to discuss cybersecurity frameworks and do a bit of a shallow dive into NIST, and then migrate into the CIS Top 18 cyber controls for effective cyber defense. GAP ASSESSMENTS and MATURITY ASSESSMENTS The guys hit on two very important aspects of how to leverage a framework for your business, for both analyzing your security overlap and your gaps. Then, they take a look at how you can use that same framework to monitor growth and maturity over time. They use hypothetical company 'XYZ Company' to show real-world examples of gap matrices and maturity matrices. These types of critical elements in your security program are items that should be assessed annually or even more frequently. A LOOK AT KPIs The guys move from leveraging the frameworks into looking at KPIs (Key Performance Indicators) and how you can pull KPIs from your controls to determine if you controls are actually working for you! What good is a robust framework if you can't measure its success? 3RD PARTY RISK Lastly, the guys take a look at the importance of 3rd-party risk and how your partners, customers, vendors, and joint ventures might play a part in your overall security posture. Not only how they play a part, but WHAT you can do to take actionable steps around 3rd party risk. This one is VERY action packed and we cover a lot of ground. Jump on the rollercoaster as we hit ALL the rides in the cyber theme park on this one! CITATIONS: All about the NIST Cyber Framework https://www.nist.gov/cyberframework CIS Top 18 Cyber Controls https://www.cisecurity.org/controls/v8 Training for using the Frameworks offered by SANS https://www.sans.org/blog/cis-controls-v8/ YouTube Training Videos on each of the 18 Controls https://www.youtube.com/@TheCISecurity https://www.youtube.com/watch?v=pGZViAZlg1k&list=PLpNN1VAyNhovvTU6pye4cNYZksP5CLTyy

Mar 3, 20231h 21m

S2 Ep 1S2 - Episode 001 – The Dark Web Revisited

WE ARE BACK! Happy 2023 friends… In this exciting episode of or BRAND NEW season 2, Kevin and Jason make good a promise from Season 1 where they go back and take a deep dive into the Dark Web. This time, we're coming with a purpose! We go back to investigate and see what's really out there and try to separate myth from reality. Have you always wondered what really exists out on the Dark Web? Do you have a curious bone just itching to go check it all out for yourself? Well, you're in luck! In this episode, you'll learn all about how to properly prep to take this journey for yourself. Do we actually recommend it? Listen and find out!! Find out more about the original Dark Web marketplace founded by Ross Ulbricht known as the Silk Road and other place you can still visit today. Learn how to browse the Dark Web, how it all started, and how many people actually surf the Dark Web today. Learn facts you probably didn't know about this mysterious corner of cyberspace. Lastly, find out things you can ACTUALLY purchase on the Dark Web. You might just be surprised at some of these!! It is important to mention that no humans were trafficked, and no organs were harvested in the making of this episode! CITATIONS: How to Safely Browse the Dark Web IDEALLY…Visit the Dark Web via an isolated OS · Here are some of the most popular options: o Whonix - https://www.whonix.org/ o Tails - https://tails.boum.org (as mentioned on our episode) o Qubes - https://www.qubes-os.org/ o Kali Linux - https://www.kali.org/ (awesome hacking tools packaged with this OS) o TrueOS - https://www.trueos.org/ Get the Tor Browser: https://www.torproject.org/download/ Use a good VPN – Here are some popular options (some offer free 30 day trials): · NordVPN - https://nordvpn.com/ · SurfShark - https://surfshark.com/ · TorGuard - https://torguard.net/ · Proton VPN - https://protonvpn.com/ · IP Vanish - https://www.ipvanish.com/ · Express VPN - https://www.expressvpn.com/ · RusVPN - https://rusvpn.com/en/ Learn about Surfing the Dark Web Online https://www.udemy.com/courses/search/?src=ukw&q=Dark+Web Dark Web Stats and Facts https://websitebuilder.org/blog/dark-web-statistics/ Dark Web Usage Stats https://earthweb.com/how-many-people-use-the-dark-web/

Feb 7, 20231h 14m

S1 Ep 14S1 - Episode 014 – Women in Cybersecurity - Part II

There is a worldwide shortage of over 3 million in the ranks of cybersecurity professionals, with half a million of that shortage in North America alone. The problem is only expected to get worse as the demand for infosec talent is expected to grow dramatically in the coming months and years. One troubling fact about this shortage of talent is that the gap could be dramatically filled if only one segment of the population were proportionately represented in the cybersecurity industry – women! Join us as Kevin, Jason, and their very special guests, Kristen Twining (Senior VP of Sales) and Madison Beane (Commercial Account Executive) from Illusive Technology as we rip the Band-Aid off the issue and expose it for what it is, a societal travesty! Gender bias is certainly part of the issue, as evidence suggests that young females, often during high school or even before that point in life have already formed preconceptions about their place in the world. Let's face it, the world of technology is intimidating enough without the additional issues of biases. The good news is that evidence suggests that things are turning around. We have a long, long way to go to eliminate gender biases, however, we are making progress! We must all do our part to encourage the female population to join the exciting field of cybersecurity. Help us fight the good fight. WE NEED YOU! In this exciting two-part episode, join us for some fun and we talk all about how tear down some of these walls and get more women interested in this fantastic field and career path. Join us this Cybersecurity Awareness month, as we hit on many important topics and focus on WOMEN in CYBERSECURITY! CITATIONS: ISC2 Women in Cybersecurity Report Download the report here: https://www.isc2.org/research/women-in-cybersecurity Frost & Sullivan (Agents of Change: Women in the Information Security Profession) https://1c7fab3im83f5gqiow2qqs2k-wpengine.netdna-ssl.com/wp-content/uploads/2019/03/Women-in-the-Information-Security-Profession-GISWS-Subreport.pdf Cybercrime Magazine Women Know Cyber: The Documentary https://www.youtube.com/watch?v=Kpc31WJ6l2M York University School of Continuing Studies What Challenges do Women Face in Cybersecurity https://www.youtube.com/watch?v=0S7kGvug4m4 Other Great Resources: Women in Cybersecurity.org https://www.wicys.org/ Girls Who Code https://girlswhocode.com/ Women in Tech https://women-in-tech.org/ Women's Society of Cyberjutsu (WSC) https://womenscyberjutsu.org/page/WhoAreWe WoSEC – Women of Security https://twitter.com/WoSECtweets The Diana Initiative https://www.dianainitiative.org/ Code Like a Girl https://code.likeagirl.io/tagged/cybersecurity Women in Technology https://www.womentech.net/

Oct 18, 202242 min

S1 Ep 13S1 - Episode 013 – Women in Cybersecurity - Part I

There is a worldwide shortage of over 3 million in the ranks of cybersecurity professionals, with half a million of that shortage in North America alone. The problem is only expected to get worse as the demand for infosec talent is expected to grow dramatically in the coming months and years. One troubling fact about this shortage of talent is that the gap could be dramatically filled if only one segment of the population were proportionately represented in the cybersecurity industry – women! Join us as Kevin, Jason, and their very special guests, Kristen Twining (Senior VP of Sales) and Madison Beane (Commercial Account Executive) from Illusive Technology as we rip the Band-Aid off the issue and expose it for what it is, a societal travesty! Gender bias is certainly part of the issue, as evidence suggests that young females, often during high school or even before that point in life have already formed preconceptions about their place in the world. Let's face it, the world of technology is intimidating enough without the additional issues of biases. The good news is that evidence suggests that things are turning around. We have a long, long way to go to eliminate gender biases, however, we are making progress! We must all do our part to encourage the female population to join the exciting field of cybersecurity. Help us fight the good fight. WE NEED YOU! In this exciting two-part episode, join us for some fun and we talk all about how tear down some of these walls and get more women interested in this fantastic field and career path. Join us this Cybersecurity Awareness month, as we hit on many important topics and focus on WOMEN in CYBERSECURITY! CITATIONS: ISC2 Women in Cybersecurity Report Download the report here: https://www.isc2.org/research/women-in-cybersecurity Frost & Sullivan (Agents of Change: Women in the Information Security Profession) https://1c7fab3im83f5gqiow2qqs2k-wpengine.netdna-ssl.com/wp-content/uploads/2019/03/Women-in-the-Information-Security-Profession-GISWS-Subreport.pdf Cybercrime Magazine Women Know Cyber: The Documentary https://www.youtube.com/watch?v=Kpc31WJ6l2M York University School of Continuing Studies What Challenges do Women Face in Cybersecurity https://www.youtube.com/watch?v=0S7kGvug4m4 Other Great Resources: Women in Cybersecurity.org https://www.wicys.org/ Girls Who Code https://girlswhocode.com/ Women in Tech https://women-in-tech.org/ Women's Society of Cyberjutsu (WSC) https://womenscyberjutsu.org/page/WhoAreWe WoSEC – Women of Security https://twitter.com/WoSECtweets The Diana Initiative https://www.dianainitiative.org/ Code Like a Girl https://code.likeagirl.io/tagged/cybersecurity Women in Technology https://www.womentech.net/

Oct 6, 202246 min

S1 Ep 12S1 - Episode 012 – Unraveling the Zero Trust Mystery

If you're like many others in information security, you too may struggle with understanding the concept and basic premise of "zero trust." Well, we have good news for you! After this episode, you can rest-assured that we intend to clear the fog over this very confusing topic. Join us as Kevin, Jason, and their very special guest, Brad Moldenhauer as they help unravel the mystery of zero trust by bring in one of the resident experts on the topic. Brad is the VP and CISO at Z-Scaler who comes with a lengthy history in many facets of dealing with risk throughout many verticals in IT. Brad is an expert in the field, and his passion for helping others is evident in this fun-filled episode. Brad is an accomplished cybersecurity leader with over 20 years experience in aligning security strategy and delivering security outcomes that balance risk with business value and IT efficiency. Throughout his career he has held roles in cybersecurity auditing, consulting, and operations management in government, healthcare and the legal industries. Prior to joining Z-Scaler, Brad was the Global Director of Information Security for Steptoe & Johnson LLP, an Am Law 100 international law firm where he developed, implemented and managed the information security program that addressed the legal business risk landscape along with geolocation and industry-specific security requirements of the firm's global clientele. Brad is passionate about solving cybersecurity challenges that CISOs regularly deal with while balancing the impact towards employee productivity, client service, and the bottom line. Get your popcorn ready! It's time to learn all about ZERO TRUST! This episode MIGHT** contain an easter egg on a Black Hat/DEFCON 30 SWAG drop!! **Definitely does CITATIONS: Z-Scaler Resources: https://www.linkedin.com/company/zscaler/ https://www.zscaler.com/ https://twitter.com/zscaler Brad's LinkedIn Page: https://www.linkedin.com/in/secpro/

Aug 7, 20221h 22m

S1 Ep 11S1 - Episode 011 – The Fine Art of Social Engineering

In this exciting episode, we cover the very fascinating topic of "Social Engineering" aka: Human Hacking! Anyone that lives in Cybersecurity knows that the weakest link in any company's cyber defenses is sitting between the keyboard and the chair. Tonight, we talk all about how malicious actors try to take full advantage of that weakness and exploit it to steal your company or your personal data. Join us as Jason and Kevin converse with a special guest Ragnhild "Bridget" Sageng on all facets of this controversial topic. Bridget has several years of experience in the IT industry, working with IT-support before transcending into a career within pentesting. Today, she works as an ethical hacker at Orange Cyberdefense in Norway. Prior to her IT career, "Bridget" educated herself in the field of human psychology and healthcare due to her interest in understanding the human mind. She has always had an interest in cybersecurity and completed her bachelor's degree in Cybersecurity recently at Noroff University College. Due to her interest in both the human mind and IT security, "Bridget" specializes in social engineering and Open-source investigation (OSINT). In 2020, she won an international social engineering CTF hosted by Temple University. In 2021, "Bridget" became a Certified Social Engineering Pentest Professional (SEPP) and has since dedicated her focus toward social engineering pentesting. Her hands-on experience with social engineering pentesting has prompted her to further research the topics of ethically handling people affected by the tests. It's important to mention that no Princes were harmed during the making of this episode. CITATIONS: Bridget's DEFCON30 talk "The Aftermath of a Social Engineering Pentest. - Are we Being Ethically Responsible?" https://www.se.community/presentations/#sageng Pentest Your Users with the help of a Company Like Orange Cyberdefense: https://www.orangecyberdefense.com/ Temple University CTF Contest Links: https://sites.temple.edu/collegiatesectf/ Interested in Learning Social Engineering and Getting Certified? Social-Engineer Training Website: https://www.social-engineer.com/ Black Hat & DEFCON Official Websites: https://www.blackhat.com/ https://defcon.org/

Jul 18, 20221h 7m