S3 – Episode 014 – Navigating the Storm: Mastering Incident Response and Disaster Recovery
Release Date: 12/26/2024
Cyber Distortion Podcast
In this riveting episode of Cyber Distortion, hosts Kevin Pentecost and Jason Popillion sit down with none other than Winn Schwartau — the legendary cybersecurity pioneer and provocateur known for pulling no punches when it comes to the truth. A trailblazer in information warfare and the original mind behind DEFCON Jeopardy, Winn dives deep into the murky waters of misinformation, disinformation, and the global implications of distorted digital realities. From nation-state psyops to corporate manipulation campaigns, we explore how the war over truth is being waged on battlefields both...
info_outlineCyber Distortion Podcast
Welcome back to Cyber Distortion, the show where the shadows of the digital world come into focus. Today’s episode dives deep into the mind of someone who once sat at the center of the internet’s most notorious hacktivist movements. Our guest is Hector Monsegur—better known to some as Sabu—a former leading figure in both Anonymous and LULZSEC, who orchestrated some of the most high-profile cyber-attacks of the early 2010s. From penetrating government networks to being at the heart of a global FBI takedown, Hector’s story is part cautionary tale, part cyber-thriller. In this...
info_outlineCyber Distortion Podcast
In this electrifying episode, we dive deep into the world of hacking, privacy, and offensive security with Ryan Williams, Editor of HVCK Magazine and Director of Smart Cyber Solutions Pty Ltd. Ryan is more than just a cybersecurity consultant—he's a red team enthusiast, blue team strategist, and relentless innovator in the cyber arena. We explore Ryan's journey from pen tester to publisher, and uncover the vision behind HVCK Magazine—an online publication dedicated to all things hacking, from OSINT and threat intelligence to offensive tooling and real-world exploits. Learn about his...
info_outlineCyber Distortion Podcast
In this electrifying episode of the Cyber Distortion Podcast, hosts Kevin Pentecost and Jason Popillion dive into the fascinating crossroads of cybersecurity, health, and molecular science with a very special guest — Dr. Gregory Carpenter. Known worldwide for his pioneering research and groundbreaking work at the intersection of biotechnology and cybersecurity, Dr. Carpenter brings a unique and urgent perspective on the growing risks and innovations tied to DNA hacking and cybersecurity at the molecular level. Together, they explore how advances in genetics, bioinformatics, and synthetic...
info_outlineCyber Distortion Podcast
In this thought-provoking episode of the Cyber Distortion Podcast, we’re joined by Wes Kussmaul, a visionary in the realm of secure online identities and the founder of Delphi Internet Services Corporation—the company behind the Kussmaul Encyclopedia, the world’s first computerized encyclopedia and one of the earliest forms of hypertext. With over three decades of experience building secure online spaces, Wes brings a unique blend of historical perspective and forward-thinking innovation to the conversation around privacy, authentication, and identity protection. As digital...
info_outlineCyber Distortion Podcast
In this gripping episode of the Cyber Distortion Podcast, we sit down with Ricoh Danielson — a former U.S. Army Combat Veteran of Iraq and Afghanistan, national security expert, and digital forensics specialist. With a career that bridges the battlefield and the digital frontlines, Ricoh brings a rare and powerful perspective on the evolving threats to our national security and critical infrastructure. From his firsthand experiences in war zones to his current role as a VCISO and digital forensic expert, Ricoh shares stories that are as eye-opening as they are inspiring. We dive into the...
info_outlineCyber Distortion Podcast
Welcome to this episode of Cyber Distortion, where we explore the cutting edge of technology, security, and the future of humanity itself. In this episode, we look into how differing generational outlooks—from the Silent Generation, to Baby Boomers, Gen X, Millennials, and Gen Z—shape the ways teams solve problems and interact within today’s corporate landscape. We explore how historical events, technological exposure, and shifting cultural norms have impacted each generation’s communication style, work ethic, and appetite for risk. Through candid anecdotes and real-world...
info_outlineCyber Distortion Podcast
In this season finale of the Cyber Distortion Podcast, hosts Kevin Pentecost and Jason Popillion, tackle one of the most critical topics in modern cybersecurity—incident response and disaster recovery. When a cyber incident strikes, every second counts. Organizations need to be ready with well-orchestrated plans to respond effectively and recover swiftly. This episode delves deep into the strategies, tools, and best practices that every cybersecurity professional and organization should know to minimize damage and ensure resilience. Kevin and Jason guide listeners through the intricacies of...
info_outlineCyber Distortion Podcast
Cybersecurity isn’t just about technology—it’s about people. In this eye-opening episode of the Cyber Distortion Podcast, we’re joined by Jessie Bolton, CEO of Bolt Resources and former Vice President of North Texas ISSA, to tackle one of the industry’s most pressing challenges: the human side of the cybersecurity skills gap. Jessie brings a wealth of experience from her collaborations with ISC2, WiCyS, NICE, Infosec Institute, and higher education institutions. She’s at the forefront of redefining how organizations identify, nurture, and retain talent in an industry facing a...
info_outlineCyber Distortion Podcast
Protecting Your Privacy Online with Mark Weinstein 🎙️ In this must-listen episode of the Cyber Distortion Podcast, we dive deep into the critical topic of online privacy with our special guest, Mark Weinstein. As a world-renowned author, TedX speaker, tech visionary, and privacy advocate, Mark brings unparalleled insight into the digital privacy landscape. We explore strategies to safeguard your online presence, regain control over your personal data, and thrive in an increasingly connected world. Mark also shares groundbreaking ideas from his award-winning book, "Restoring Our...
info_outlineIn this season finale of the Cyber Distortion Podcast, hosts Kevin Pentecost and Jason Popillion, tackle one of the most critical topics in modern cybersecurity—incident response and disaster recovery. When a cyber incident strikes, every second counts. Organizations need to be ready with well-orchestrated plans to respond effectively and recover swiftly. This episode delves deep into the strategies, tools, and best practices that every cybersecurity professional and organization should know to minimize damage and ensure resilience.
Kevin and Jason guide listeners through the intricacies of incident response, breaking it down into digestible phases like preparation, detection, containment, eradication, and recovery. They also explore the role of disaster recovery planning, highlighting how businesses can resume operations quickly and securely after a breach or significant event. The hosts share real-world examples and practical tips, making these complex processes relatable and actionable for professionals at all levels.
As the final episode of the season, this is one you don’t want to miss. Kevin and Jason bring their signature blend of expertise and engaging conversation to ensure listeners walk away with a solid understanding of incident response frameworks, key roles and responsibilities, and the importance of regular testing and improvement. Whether you’re a seasoned cybersecurity practitioner or just starting, this episode offers something valuable for everyone.
Thank you for joining us this season on Cyber Distortion. We’ve loved exploring the multifaceted world of cybersecurity with our incredible audience, and we’re ending this season with a bang. We hope you enjoy this finale as much as we enjoyed creating it. Stay tuned for future seasons as we continue to navigate the dynamic and ever-evolving landscape of cybersecurity!
Jason Popillion is a CISSP and serves as a CIO/CTO of a SaaS company and Kevin Pentecost is a CISSP, CISM, CEH, CPT, MPCS, MCSE, CCA, ITIL-F and serves as the Information Security Director for a Manufacturing company.
MORE VALUABLE RESOURCES:
Incident Response Resources
- National Institute of Standards and Technology (NIST): Computer Security Incident Handling Guide
- Resource: NIST SP 800-61 Rev. 2
- Description: This guide provides a comprehensive framework for incident handling, detailing preparation, detection, analysis, containment, eradication, and recovery steps.
- SANS Institute: Incident Handler's Handbook
- Resource: SANS Reading Room - Incident Response
- Description: A practical guide for incident handlers, focusing on hands-on strategies for real-world scenarios.
- US-CERT: Incident Response Resources
- Resource: CISA Incident Response Guidance
- Description: A hub of information, tools, and best practices for incident response, provided by the Cybersecurity and Infrastructure Security Agency.
Disaster Recovery Resources
- Federal Emergency Management Agency (FEMA): Continuity of Operations Planning
- Resource: FEMA Continuity Resources
- Description: Guidance on creating disaster recovery and continuity plans for organizations of all sizes.
- International Organization for Standardization (ISO): ISO 22301
- Resource: ISO 22301: Business Continuity Management Systems
- Description: This standard focuses on managing and reducing risks during disruptive incidents.
- Disaster Recovery Institute International (DRI): Best Practices for Business Continuity
- Resource: DRI Resources
- Description: A compilation of best practices, frameworks, and tools for effective disaster recovery planning.
Cybersecurity Education and Training
- MITRE ATT&CK Framework
- Resource: MITRE ATT&CK
- Description: A detailed knowledge base of adversary tactics and techniques to inform incident response planning.
- CERT Coordination Center: Incident Management Practices
- Resource: CERT Resources
- Description: Research and guidance from the Software Engineering Institute at Carnegie Mellon University.
Additional Practical Tools
- Microsoft: Security Incident Response Playbooks
- Resource: Microsoft Incident Response
- Description: A collection of playbooks designed for cloud-centric incident response.
- National Cyber Security Centre (NCSC): Incident Management Guidance
- Resource: NCSC UK
- Description: Practical advice from the UK government’s cybersecurity body on managing incidents effectively.