S4 - Episode 012 – Zero Trust, Zero Confusion (w/ Rob Allen)
Release Date: 10/15/2025
Cyber Distortion Podcast
In this episode of the Cyber Distortion Podcast, hosts Jason Popillion and Kevin Pentecost sit down with Paul Furtado, Vice President and Analyst at Gartner, for a deep, insightful conversation that cuts through industry noise and gets to the heart of what’s shaping cybersecurity and enterprise technology today. Paul brings a dynamic blend of executive leadership and real-world operational expertise, with a career marked by driving bottom-line impact, navigating mergers and acquisitions, optimizing performance, and reshaping strategic technology programs. Known for his visionary...
info_outlineCyber Distortion Podcast
In this eye-opening episode of Cyber Distortion, hosts Kevin Pentecost and Jason Popillion sit down with Rob Allen from ThreatLocker to break down one of the most talked-about — and misunderstood — concepts in cybersecurity today: Zero Trust. With a deep well of technical expertise and real-world business acumen, Rob brings clarity to the chaos, cutting through the jargon to explain what Zero Trust really means, why it matters, and how organizations of all sizes can adopt it effectively. Whether you're a seasoned security pro or just starting to wrap your head around Zero Trust...
info_outlineCyber Distortion Podcast
Today’s guest is a true force in cybersecurity, governance, and leadership. She’s a global voice for resilience, inclusion, and innovation — and her story is as inspiring as it is impactful. In this episode, we were thrilled to be joined by Gaelle Koanda — a Cybersecurity and GRC powerhouse, ISACA Board Member, AI Ethics Advocate, Entrepreneur, and Nonprofit Leader. From IT audits to executive boardrooms, Gaelle has carved a path defined by grit, grace, and growth. She’s the Founder and President of the very first WiCyS chapters in Francophone Africa, and currently serves as the...
info_outlineCyber Distortion Podcast
Description: In this compelling episode of the Cyber Distortion Podcast, hosts Jason sits down with the extraordinary trio behind the groundbreaking documentary I AM MACHINE — a deep dive into the life and mission of transhuman white hat hacker, Len Noe. Known for merging biology with embedded technology, Len’s journey into transhumanism is as provocative as it is visionary. He uses his cybernetic implants not only to push the boundaries of human capability but also as a powerful tool to demonstrate vulnerabilities in both physical and digital security systems. From real-world pen tests to...
info_outlineCyber Distortion Podcast
Description: 🎙️ New Episode Alert – Cyber Distortion Podcast 🚨 Welcome back! In this episode we're diving deep into one of the most pressing challenges in cybersecurity: finding the right talent. Join us for an eye-opening conversation with Roger Einstoss, co-founder of , a company revolutionizing how organizations source cybersecurity professionals from across Latin America. With decades of experience and a sharp eye for global tech talent, Roger shares insider knowledge on tapping into thriving hubs like Argentina, Brazil, and beyond. We explore how Latin America is rapidly...
info_outlineCyber Distortion Podcast
This episode welcomes Ted Harrington, a celebrated ethical hacker, TED‑X keynote speaker, and executive partner at Independent Security Evaluators (ISE). With decades of real‑world experience hacking everything from iPhones and cars to medical devices, cryptocurrency platforms, and password managers, Ted brings unmatched expertise to our conversation. He’s built a reputation for uncovering hidden vulnerabilities, helping clients such as Google, Amazon, Netflix, Microsoft, Disney, and Adobe to fix tens of thousands of security flaws—demonstrating why no system is truly unhackable....
info_outlineCyber Distortion Podcast
In this riveting episode of Cyber Distortion, hosts Kevin Pentecost and Jason Popillion sit down with none other than Winn Schwartau — the legendary cybersecurity pioneer and provocateur known for pulling no punches when it comes to the truth. A trailblazer in information warfare and the original mind behind DEFCON Jeopardy, Winn dives deep into the murky waters of misinformation, disinformation, and the global implications of distorted digital realities. From nation-state psyops to corporate manipulation campaigns, we explore how the war over truth is being waged on battlefields both...
info_outlineCyber Distortion Podcast
Welcome back to Cyber Distortion, the show where the shadows of the digital world come into focus. Today’s episode dives deep into the mind of someone who once sat at the center of the internet’s most notorious hacktivist movements. Our guest is Hector Monsegur—better known to some as Sabu—a former leading figure in both Anonymous and LULZSEC, who orchestrated some of the most high-profile cyber-attacks of the early 2010s. From penetrating government networks to being at the heart of a global FBI takedown, Hector’s story is part cautionary tale, part cyber-thriller. In this...
info_outlineCyber Distortion Podcast
In this electrifying episode, we dive deep into the world of hacking, privacy, and offensive security with Ryan Williams, Editor of HVCK Magazine and Director of Smart Cyber Solutions Pty Ltd. Ryan is more than just a cybersecurity consultant—he's a red team enthusiast, blue team strategist, and relentless innovator in the cyber arena. We explore Ryan's journey from pen tester to publisher, and uncover the vision behind HVCK Magazine—an online publication dedicated to all things hacking, from OSINT and threat intelligence to offensive tooling and real-world exploits. Learn about his...
info_outlineCyber Distortion Podcast
In this electrifying episode of the Cyber Distortion Podcast, hosts Kevin Pentecost and Jason Popillion dive into the fascinating crossroads of cybersecurity, health, and molecular science with a very special guest — Dr. Gregory Carpenter. Known worldwide for his pioneering research and groundbreaking work at the intersection of biotechnology and cybersecurity, Dr. Carpenter brings a unique and urgent perspective on the growing risks and innovations tied to DNA hacking and cybersecurity at the molecular level. Together, they explore how advances in genetics, bioinformatics, and synthetic...
info_outlineIn this eye-opening episode of Cyber Distortion, hosts Kevin Pentecost and Jason Popillion sit down with Rob Allen from ThreatLocker to break down one of the most talked-about — and misunderstood — concepts in cybersecurity today: Zero Trust.
With a deep well of technical expertise and real-world business acumen, Rob brings clarity to the chaos, cutting through the jargon to explain what Zero Trust really means, why it matters, and how organizations of all sizes can adopt it effectively. Whether you're a seasoned security pro or just starting to wrap your head around Zero Trust architecture, this episode gives you the insights and practical takeaways you need — without the confusion.
Expect real talk, real strategies, and a fresh perspective on building a more secure future. Don’t miss this chance to learn from one of the industry’s most experienced leaders in cybersecurity, cloud infrastructure, and customer-driven solutions.
Zero Trust doesn’t have to be complicated. Let’s make it make sense.
Helpful Links:
Here are several high‑quality resources to deepen your understanding of Zero Trust, along with the official web links for ThreatLocker and Rob Allen’s LinkedIn profile:
🔗 Official Links
- ThreatLocker (official website / resource center)
https://www.threatlocker.com/ (ThreatLocker) - Rob Allen — LinkedIn
https://www.linkedin.com/in/threatlockerrob/ (Phillip Wylie) - ThreatLocker Resource Center (blogs, eBooks, webinars, case studies)
https://www.threatlocker.com/resources (ThreatLocker)
📚 Additional Learning Resources on Zero Trust
Here are several authoritative and practical learning resources to help your listeners (or you) get up to speed on Zero Trust architectures, strategies, and implementation:
| Resource | What You’ll Learn / Why It’s Useful | Link |
| Microsoft Learn: Introduction to Zero Trust | Fundamental concepts and principles of Zero Trust | https://learn.microsoft.com/en-us/training/modules/zero-trust-introduction/ (Microsoft Learn) |
| Microsoft Learn: Introduction to Zero Trust and Best Practice Frameworks | How Zero Trust fits into security frameworks and architectural patterns | https://learn.microsoft.com/en-us/training/modules/introduction-zero-trust-best-practice-frameworks/ (Microsoft Learn) |
| Microsoft Learn: Protect Infrastructure with Zero Trust | A module focusing on applying Zero Trust in infrastructure & server environments | https://learn.microsoft.com/en-us/training/modules/zero-trust-infrastructure/ (Microsoft Learn) |
| Microsoft Learn: Manage Networks with Zero Trust | Zero Trust applied to network segmentation, traffic flows, threat protection | https://learn.microsoft.com/en-us/training/modules/zero-trust-networks/ (Microsoft Learn) |
| Microsoft Learn: Protect Data with Zero Trust | Emphasis on data protection, classification, and Zero Trust data access patterns | https://learn.microsoft.com/en-us/training/modules/zero-trust-data/ (Microsoft Learn) |
| Microsoft Learn path: Establish the guiding principles and core components of Zero Trust | A full learning path covering identity, endpoints, apps, network, infrastructure, and data | https://learn.microsoft.com/en-us/training/paths/zero-trust-principles/ (Microsoft Learn) |
| LinkedIn Learning: Understanding Zero Trust | A beginner-friendly video course explaining Zero Trust models and problem framing | https://www.linkedin.com/learning/understanding-zero-trust (LinkedIn) |
| Udemy: Zero Trust Security Masterclass – Beginner to Mastery | A hands-on, implementation-oriented course (paid) | https://www.udemy.com/course/zero-trust-masterclass-from-beginner-to-mastery/ (Udemy) |
| Cisco Zero Trust Workshops | Hands‑on and strategic workshops from a major vendor’s perspective | https://www.cisco.com/c/en/us/products/security/zero-trust-workshops.html (Cisco) |
| Tonex Training: Zero Trust Security Model Training | A structured training course in Zero Trust fundamentals and use cases | https://www.tonex.com/training-courses/zero-trust-security-model/ (Tonex) |