S3 – Episode 014 – Navigating the Storm: Mastering Incident Response and Disaster Recovery
Release Date: 12/26/2024
Cyber Distortion Podcast
In this episode of the Cyber Distortion Podcast, hosts Jason Popillion and Kevin Pentecost sit down with Paul Furtado, Vice President and Analyst at Gartner, for a deep, insightful conversation that cuts through industry noise and gets to the heart of what’s shaping cybersecurity and enterprise technology today. Paul brings a dynamic blend of executive leadership and real-world operational expertise, with a career marked by driving bottom-line impact, navigating mergers and acquisitions, optimizing performance, and reshaping strategic technology programs. Known for his visionary...
info_outlineCyber Distortion Podcast
In this eye-opening episode of Cyber Distortion, hosts Kevin Pentecost and Jason Popillion sit down with Rob Allen from ThreatLocker to break down one of the most talked-about — and misunderstood — concepts in cybersecurity today: Zero Trust. With a deep well of technical expertise and real-world business acumen, Rob brings clarity to the chaos, cutting through the jargon to explain what Zero Trust really means, why it matters, and how organizations of all sizes can adopt it effectively. Whether you're a seasoned security pro or just starting to wrap your head around Zero Trust...
info_outlineCyber Distortion Podcast
Today’s guest is a true force in cybersecurity, governance, and leadership. She’s a global voice for resilience, inclusion, and innovation — and her story is as inspiring as it is impactful. In this episode, we were thrilled to be joined by Gaelle Koanda — a Cybersecurity and GRC powerhouse, ISACA Board Member, AI Ethics Advocate, Entrepreneur, and Nonprofit Leader. From IT audits to executive boardrooms, Gaelle has carved a path defined by grit, grace, and growth. She’s the Founder and President of the very first WiCyS chapters in Francophone Africa, and currently serves as the...
info_outlineCyber Distortion Podcast
Description: In this compelling episode of the Cyber Distortion Podcast, hosts Jason sits down with the extraordinary trio behind the groundbreaking documentary I AM MACHINE — a deep dive into the life and mission of transhuman white hat hacker, Len Noe. Known for merging biology with embedded technology, Len’s journey into transhumanism is as provocative as it is visionary. He uses his cybernetic implants not only to push the boundaries of human capability but also as a powerful tool to demonstrate vulnerabilities in both physical and digital security systems. From real-world pen tests to...
info_outlineCyber Distortion Podcast
Description: 🎙️ New Episode Alert – Cyber Distortion Podcast 🚨 Welcome back! In this episode we're diving deep into one of the most pressing challenges in cybersecurity: finding the right talent. Join us for an eye-opening conversation with Roger Einstoss, co-founder of , a company revolutionizing how organizations source cybersecurity professionals from across Latin America. With decades of experience and a sharp eye for global tech talent, Roger shares insider knowledge on tapping into thriving hubs like Argentina, Brazil, and beyond. We explore how Latin America is rapidly...
info_outlineCyber Distortion Podcast
This episode welcomes Ted Harrington, a celebrated ethical hacker, TED‑X keynote speaker, and executive partner at Independent Security Evaluators (ISE). With decades of real‑world experience hacking everything from iPhones and cars to medical devices, cryptocurrency platforms, and password managers, Ted brings unmatched expertise to our conversation. He’s built a reputation for uncovering hidden vulnerabilities, helping clients such as Google, Amazon, Netflix, Microsoft, Disney, and Adobe to fix tens of thousands of security flaws—demonstrating why no system is truly unhackable....
info_outlineCyber Distortion Podcast
In this riveting episode of Cyber Distortion, hosts Kevin Pentecost and Jason Popillion sit down with none other than Winn Schwartau — the legendary cybersecurity pioneer and provocateur known for pulling no punches when it comes to the truth. A trailblazer in information warfare and the original mind behind DEFCON Jeopardy, Winn dives deep into the murky waters of misinformation, disinformation, and the global implications of distorted digital realities. From nation-state psyops to corporate manipulation campaigns, we explore how the war over truth is being waged on battlefields both...
info_outlineCyber Distortion Podcast
Welcome back to Cyber Distortion, the show where the shadows of the digital world come into focus. Today’s episode dives deep into the mind of someone who once sat at the center of the internet’s most notorious hacktivist movements. Our guest is Hector Monsegur—better known to some as Sabu—a former leading figure in both Anonymous and LULZSEC, who orchestrated some of the most high-profile cyber-attacks of the early 2010s. From penetrating government networks to being at the heart of a global FBI takedown, Hector’s story is part cautionary tale, part cyber-thriller. In this...
info_outlineCyber Distortion Podcast
In this electrifying episode, we dive deep into the world of hacking, privacy, and offensive security with Ryan Williams, Editor of HVCK Magazine and Director of Smart Cyber Solutions Pty Ltd. Ryan is more than just a cybersecurity consultant—he's a red team enthusiast, blue team strategist, and relentless innovator in the cyber arena. We explore Ryan's journey from pen tester to publisher, and uncover the vision behind HVCK Magazine—an online publication dedicated to all things hacking, from OSINT and threat intelligence to offensive tooling and real-world exploits. Learn about his...
info_outlineCyber Distortion Podcast
In this electrifying episode of the Cyber Distortion Podcast, hosts Kevin Pentecost and Jason Popillion dive into the fascinating crossroads of cybersecurity, health, and molecular science with a very special guest — Dr. Gregory Carpenter. Known worldwide for his pioneering research and groundbreaking work at the intersection of biotechnology and cybersecurity, Dr. Carpenter brings a unique and urgent perspective on the growing risks and innovations tied to DNA hacking and cybersecurity at the molecular level. Together, they explore how advances in genetics, bioinformatics, and synthetic...
info_outlineIn this season finale of the Cyber Distortion Podcast, hosts Kevin Pentecost and Jason Popillion, tackle one of the most critical topics in modern cybersecurity—incident response and disaster recovery. When a cyber incident strikes, every second counts. Organizations need to be ready with well-orchestrated plans to respond effectively and recover swiftly. This episode delves deep into the strategies, tools, and best practices that every cybersecurity professional and organization should know to minimize damage and ensure resilience.
Kevin and Jason guide listeners through the intricacies of incident response, breaking it down into digestible phases like preparation, detection, containment, eradication, and recovery. They also explore the role of disaster recovery planning, highlighting how businesses can resume operations quickly and securely after a breach or significant event. The hosts share real-world examples and practical tips, making these complex processes relatable and actionable for professionals at all levels.
As the final episode of the season, this is one you don’t want to miss. Kevin and Jason bring their signature blend of expertise and engaging conversation to ensure listeners walk away with a solid understanding of incident response frameworks, key roles and responsibilities, and the importance of regular testing and improvement. Whether you’re a seasoned cybersecurity practitioner or just starting, this episode offers something valuable for everyone.
Thank you for joining us this season on Cyber Distortion. We’ve loved exploring the multifaceted world of cybersecurity with our incredible audience, and we’re ending this season with a bang. We hope you enjoy this finale as much as we enjoyed creating it. Stay tuned for future seasons as we continue to navigate the dynamic and ever-evolving landscape of cybersecurity!
Jason Popillion is a CISSP and serves as a CIO/CTO of a SaaS company and Kevin Pentecost is a CISSP, CISM, CEH, CPT, MPCS, MCSE, CCA, ITIL-F and serves as the Information Security Director for a Manufacturing company.
MORE VALUABLE RESOURCES:
Incident Response Resources
- National Institute of Standards and Technology (NIST): Computer Security Incident Handling Guide
- Resource: NIST SP 800-61 Rev. 2
- Description: This guide provides a comprehensive framework for incident handling, detailing preparation, detection, analysis, containment, eradication, and recovery steps.
- SANS Institute: Incident Handler's Handbook
- Resource: SANS Reading Room - Incident Response
- Description: A practical guide for incident handlers, focusing on hands-on strategies for real-world scenarios.
- US-CERT: Incident Response Resources
- Resource: CISA Incident Response Guidance
- Description: A hub of information, tools, and best practices for incident response, provided by the Cybersecurity and Infrastructure Security Agency.
Disaster Recovery Resources
- Federal Emergency Management Agency (FEMA): Continuity of Operations Planning
- Resource: FEMA Continuity Resources
- Description: Guidance on creating disaster recovery and continuity plans for organizations of all sizes.
- International Organization for Standardization (ISO): ISO 22301
- Resource: ISO 22301: Business Continuity Management Systems
- Description: This standard focuses on managing and reducing risks during disruptive incidents.
- Disaster Recovery Institute International (DRI): Best Practices for Business Continuity
- Resource: DRI Resources
- Description: A compilation of best practices, frameworks, and tools for effective disaster recovery planning.
Cybersecurity Education and Training
- MITRE ATT&CK Framework
- Resource: MITRE ATT&CK
- Description: A detailed knowledge base of adversary tactics and techniques to inform incident response planning.
- CERT Coordination Center: Incident Management Practices
- Resource: CERT Resources
- Description: Research and guidance from the Software Engineering Institute at Carnegie Mellon University.
Additional Practical Tools
- Microsoft: Security Incident Response Playbooks
- Resource: Microsoft Incident Response
- Description: A collection of playbooks designed for cloud-centric incident response.
- National Cyber Security Centre (NCSC): Incident Management Guidance
- Resource: NCSC UK
- Description: Practical advice from the UK government’s cybersecurity body on managing incidents effectively.