Cyber Distortion Podcast
Welcome to the Cyber Distortion Podcast. A podcast where we cover all of today's relevant topics related to anything and everything around Cybersecurity. Jason Popillion is a CISSP and serves as a CIO/CTO of a SaaS company and Kevin Pentecost is a CISSP, CISM, CEH, CPT, MCSE, CCA, ITIL-F and serves as a Information Security Director for a Manufacturing company.
info_outline
S4 - Episode 007 – Reality Distortion is so Freakin’ Real! (w/ Winn Schwartau)
07/01/2025
S4 - Episode 007 – Reality Distortion is so Freakin’ Real! (w/ Winn Schwartau)
In this riveting episode of Cyber Distortion, hosts Kevin Pentecost and Jason Popillion sit down with none other than Winn Schwartau — the legendary cybersecurity pioneer and provocateur known for pulling no punches when it comes to the truth. A trailblazer in information warfare and the original mind behind DEFCON Jeopardy, Winn dives deep into the murky waters of misinformation, disinformation, and the global implications of distorted digital realities. From nation-state psyops to corporate manipulation campaigns, we explore how the war over truth is being waged on battlefields both virtual and real. But it wouldn't be Cyber Distortion without a twist. We wrap the episode with our own chaotic spin on Cyber Distortion Jeopardy, putting Winn — the Godfather of DEFCON Jeopardy himself — back in the hot seat. Expect sharp insights, dark humor, and plenty of digital distortion as we challenge Winn’s wit and memory. Whether you're a cybersecurity veteran or just starting to question what's real in your feed, this episode will leave you thinking twice about the information you trust. Jason Popillion is a CISSP and serves as a CIO/CTO of a SaaS company and Kevin Pentecost is a CISSP, CISM, CEH, CPT, MPCS, MCSE, CCA, ITIL-F and serves as the Information Security Director for a Manufacturing company. 🔹 Winn Schwartau – Official & Contact Personal website & contact – Connect directly: “Wanna prove me wrong?” Biography & writings – Details on his books, timeline, awards: LinkedIn-like presence via KnowBe4 – Founder & CVO of The Security Awareness Company (now part of KnowBe4): 🔹 Essential Articles & Background on Winn Wired (1996) – Classic article Information Warrior describes his perspective on national cyber threats and “magnetic bombs”: InfoWorld & Network World – Opinion pieces by Winn on global info‑war and cyber defense: 🔹 Books by Winn Schwartau Information Warfare: Chaos on the Electronic Superhighway – seminal work on cyberterror Cybershock, Time Based Security, Terminal Compromise, Analogue Network Security, The Art & Science of Metawar – full catalog available via ThriftBooks Here’s a direct link where you can purchase Winn Schwartau’s newest book The Art & Science of Metawar, available in paperback: The Art & Science of Metawar (paperback) – listed around $25 used/new‑low via eBay/AbeBooks. You can also purchase or preview it through these official sources: Amazon Paperback & Kindle — AbeBooks — Used paperback editions, ISBN 0996401946, published August 30, 2024 by Winn Schwartau LLC 🔹 Broader Reading on Misinformation & Disinformation Technology‑Enabled Disinformation (arXiv, 2018) – a rich survey of digital disinformation mechanics and defense strategies: Cambridge Handbook (Chapter: Misinformation, Disinformation & Online Propaganda) – analysis of spread dynamics and trust erosion: Political Behavior (2020) – study on how misinformation‑warnings can backfire (the “tainted truth” effect): Love Letter to America (PDF) – . Severance (2022) – The show revolves around employees of the mysterious biotechnology corporation Lumon Industries, who have undergone a surgical procedure called "severance" that separates their work memories from their personal life. This means their "innie" (work self) has no knowledge of their "outie" (personal life) and vice versa. .
/episode/index/show/cyberdistortion/id/37248710
info_outline
S4 - Episode 006 – LULZSEC Mastermind Unmasked: The Sabu Story (w/ Hector Monsegur)
06/11/2025
S4 - Episode 006 – LULZSEC Mastermind Unmasked: The Sabu Story (w/ Hector Monsegur)
Welcome back to Cyber Distortion, the show where the shadows of the digital world come into focus. Today’s episode dives deep into the mind of someone who once sat at the center of the internet’s most notorious hacktivist movements. Our guest is Hector Monsegur—better known to some as Sabu—a former leading figure in both Anonymous and LULZSEC, who orchestrated some of the most high-profile cyber-attacks of the early 2010s. From penetrating government networks to being at the heart of a global FBI takedown, Hector’s story is part cautionary tale, part cyber-thriller. In this conversation, he shares it all—raw, unfiltered, and in his own words. We explore what drove him, how the digital threat landscape has evolved, and his take on the current state of cybersecurity, hacktivism, and surveillance. Plug in, patch up, and get ready—today, we’re going behind the mask.Whether you're an aspiring hacker, seasoned security pro, or just cyber-curious, this episode is packed with insights, inspiration, and a behind-the-scenes look at the evolving hacking landscape. Jason Popillion is a CISSP and serves as a CIO/CTO of a SaaS company and Kevin Pentecost is a CISSP, CISM, CEH, CPT, MPCS, MCSE, CCA, ITIL-F and serves as the Information Security Director for a Manufacturing company. Contact Info: Hector’s LinkedIn: Link up with Alacrinet: Here's a curated list of trusted, beginner-friendly, and practical online resources, categorized for easy navigation: 🛠️ Hands-On Learning Platforms 1. TryHackMe 🔗 Interactive, gamified lessons in cybersecurity and hacking. Beginner to advanced levels, covering real-world attack simulations. Great learning paths like Pre-Security and Complete Beginner. 2. Hack The Box (HTB) 🔗 Advanced platform for practicing hacking skills legally. Ideal for pentesting, network exploitation, and red teaming. Offers “HTB Academy” with structured learning paths. 3. OverTheWire: Wargames 🔗 https://overthewire.org/wargames/ Classic text-based challenges. Great for beginners learning Linux, networking, and basic hacking logic. 📘 Free Courses & Curriculums 4. Cybrary 🔗 Free and paid cybersecurity courses, including certifications like CompTIA Security+. Includes job role learning paths. 5. Open Security Training 🔗 In-depth technical training on topics like x86 assembly, exploit development, and reverse engineering. Free and used by industry pros. 6. MIT OpenCourseWare – Computer Systems Security 🔗 https://ocw.mit.edu/courses/6-858-computer-systems-security-fall-2014/ College-level deep dive into systems security. Lectures, slides, and assignments freely available. 📚 Books & Reading 7. Hacking: The Art of Exploitation by Jon Erickson Great for understanding how things work under the hood, including C, assembly, and exploits. 🔗 Available via No Starch Press 8. The Web Application Hacker's Handbook by Dafydd Stuttard & Marcus Pinto Excellent for aspiring bug bounty hunters and web pentesters. 🧠 Communities & Forums 9. Reddit Communities r/netsec – News and discussion about information security. r/AskNetsec – Beginner-friendly Q&A. r/cybersecurity – General news, career advice, and trends. 10. Discord Servers Many Discord servers support TryHackMe and HTB users. Look for “InfoSec Prep” and “CyberMentor’s CyberSec Discord”. 🧑💻 YouTube Channels 11. LiveOverflow 🔗 Deep, technical tutorials in CTFs, binary exploitation, and real-world hacking. 12. The Cyber Mentor 🔗 Great for aspiring pentesters. Offers a full free course: Practical Ethical Hacking. 13. John Hammond 🔗 Covers TryHackMe, HTB, malware analysis, and CTFs in an engaging way. 🎓 Certifications to Consider Later CompTIA Security+ – Entry-level security cert. eJPT (eLearnSecurity Junior Penetration Tester) – Beginner-friendly, hands-on. OSCP (Offensive Security Certified Professional) – More advanced, goal for serious pentesters.
/episode/index/show/cyberdistortion/id/36948785
info_outline
S4 - Episode 005 – The Art of the HVCK! (w/ Ryan Williams)
05/05/2025
S4 - Episode 005 – The Art of the HVCK! (w/ Ryan Williams)
In this electrifying episode, we dive deep into the world of hacking, privacy, and offensive security with Ryan Williams, Editor of HVCK Magazine and Director of Smart Cyber Solutions Pty Ltd. Ryan is more than just a cybersecurity consultant—he's a red team enthusiast, blue team strategist, and relentless innovator in the cyber arena. We explore Ryan's journey from pen tester to publisher, and uncover the vision behind HVCK Magazine—an online publication dedicated to all things hacking, from OSINT and threat intelligence to offensive tooling and real-world exploits. Learn about his contributions to the community with projects like Commander, MxFlex, AllTheThings, and Flight Freaker, and how these tools are helping redefine modern cybersecurity practices. Whether you're an aspiring hacker, seasoned security pro, or just cyber-curious, this episode is packed with insights, inspiration, and a behind-the-scenes look at the evolving hacking landscape. Jason Popillion is a CISSP and serves as a CIO/CTO of a SaaS company and Kevin Pentecost is a CISSP, CISM, CEH, CPT, MPCS, MCSE, CCA, ITIL-F and serves as the Information Security Director for a Manufacturing company. 🔐 Tune in to hear: How HVCK Magazine is shaping the hacker culture online The power of community-driven security innovation Red vs. Blue: Ryan’s dual mindset in offensive and defensive ops Real talk on bespoke security tooling and Essential Eight uplifts And a few unexpected stories from the field... 🧠 Stay sharp. Stay curious. Stay distorted. Citations: 🔗 Connect with Ryan Williams LinkedIn: Explore Ryan's professional background and connect with him on . Smart Cyber Solutions: Learn more about his cybersecurity consultancy, Smart Cyber Solutions Pty Ltd, on their . 📰 Dive into HVCK Magazine HVCK Magazine Back Issues: Discover the mission and content of HVCK Magazine in this feature on HVCK Magazine New Issues: Discover the mission and content of HVCK Magazine in this feature on Contributors' Insights: Read about contributors' experiences and articles in HVCK Magazine, such as this . 🎧 Related Media & Community YouTube Interview: Watch an in-depth interview with Ryan Williams discussing HVCK Magazine and cybersecurity challenges on . 🧠 Explore More in Cybersecurity & Hacking Phrack Magazine: A long-standing publication in the hacking community, available at . Hakin9 Magazine: Offers articles and resources on IT security and ethical hacking at .
/episode/index/show/cyberdistortion/id/36437025
info_outline
S4 - Episode 004 – Human IOT: Sub-Molecular DNA Cybersecurity (w/ Dr. Gregory Carpenter)
04/28/2025
S4 - Episode 004 – Human IOT: Sub-Molecular DNA Cybersecurity (w/ Dr. Gregory Carpenter)
In this electrifying episode of the Cyber Distortion Podcast, hosts Kevin Pentecost and Jason Popillion dive into the fascinating crossroads of cybersecurity, health, and molecular science with a very special guest — Dr. Gregory Carpenter. Known worldwide for his pioneering research and groundbreaking work at the intersection of biotechnology and cybersecurity, Dr. Carpenter brings a unique and urgent perspective on the growing risks and innovations tied to DNA hacking and cybersecurity at the molecular level. Together, they explore how advances in genetics, bioinformatics, and synthetic biology are creating new vulnerabilities — and why protecting health data and even the biological code of life itself has become a critical frontier for cybersecurity professionals. Dr. Carpenter shares real-world insights, discusses current threats and emerging trends, and offers his expert take on where regulation, technology, and human ingenuity must evolve to stay ahead of threats we are only beginning to understand. Don’t miss this thought-provoking conversation that bridges the digital and biological worlds — and challenges how we think about security in an era where data isn’t just on servers, but in our very cells. Whether you're a cybersecurity expert, a health industry professional, or just fascinated by where technology is taking us next, this is one episode you won't want to miss! Jason Popillion is a CISSP and serves as a CIO/CTO of a SaaS company and Kevin Pentecost is a CISSP, CISM, CEH, CPT, MPCS, MCSE, CCA, ITIL-F and serves as the Information Security Director for a Manufacturing company. 🔗 Citations and Related Links: Biomalware: Malware Encoded in DNA Wired – Scientists Hack a Computer Using DNA MIT Technology Review – Healing the Body with Sound Frequencies Donovan Health – Dire Wolves and Woolly Mammoths: Concerns About Resurrecting Extinct Species BBC Future – DEFCON Conference (Official Site) CRISPR and the Threat of Biohacking Harvard International Review – Cyberbiosecurity: An Emerging New Discipline to Help Safeguard the Bioeconomy Frontiers in Bioengineering and Biotechnology – https://www.frontiersin.org/articles/10.3389/fbioe.2019.00020/full The Growing Threat of Biosecurity Risks in Synthetic Biology RAND Corporation –
/episode/index/show/cyberdistortion/id/36337075
info_outline
S4 - Episode 003 – Hackers Love You...And Your Overshared Instagram Posts! (w/ Wes Kussmaul)
04/10/2025
S4 - Episode 003 – Hackers Love You...And Your Overshared Instagram Posts! (w/ Wes Kussmaul)
In this thought-provoking episode of the Cyber Distortion Podcast, we’re joined by Wes Kussmaul, a visionary in the realm of secure online identities and the founder of Delphi Internet Services Corporation—the company behind the Kussmaul Encyclopedia, the world’s first computerized encyclopedia and one of the earliest forms of hypertext. With over three decades of experience building secure online spaces, Wes brings a unique blend of historical perspective and forward-thinking innovation to the conversation around privacy, authentication, and identity protection. As digital threats evolve, so must our understanding of how we prove who we are online. Wes breaks down the role of public and private key cryptography in securing not just our communications, but our very identities and intellectual property. Through vivid analogies and real-world examples, he illustrates how Public Key Infrastructure (PKI) can serve as the backbone of a more trustworthy internet—one where authenticity and privacy aren’t afterthoughts, but foundations. We also explore his groundbreaking work with Reliable Identities, an initiative focused on reestablishing digital trust in an age of phishing, spoofing, and identity theft. Wes shares why the current system of usernames and passwords is fundamentally flawed—and how we can replace it with something far more secure and future-proof. Whether you're a cybersecurity expert, a tech enthusiast, or simply curious about the future of online trust, this episode will reshape how you view identity in the digital world. Tune in to hear from one of the internet’s earliest innovators on how we can protect who we are—and what we create—online. Wes is the author of several books about privacy and authenticity, including Quiet Enjoyment (2004), Own Your Privacy (2007), The Future Needs You (2007), and Don’t Get Norteled (2014). He is also an individual adherent of the International Union of Latin Notaries and has been appointed a Notary Ambassador by the National Notary Association. Wes received his BS in Physics from the University of Central Missouri in 1971 while serving in the US Air Force at Whiteman Air Force Base (SAC). Jason Popillion is a CISSP and serves as a CIO/CTO of a SaaS company and Kevin Pentecost is a CISSP, CISM, CEH, CPT, MPCS, MCSE, CCA, ITIL-F and serves as the Information Security Director for a Manufacturing company. CITATIONS: LinkedIn: Wes’ Personal Website: Authentiverse: Authenticity Alliance: City of Osmio: Buy Wes’ Books: The Authenticity Institute: More information on Sutton Smith (a.k.a. Sutton Love): Sutton’s Instagram:
/episode/index/show/cyberdistortion/id/36085075
info_outline
S4 - Episode 002 - Staring Down the Barrel of a Loaded Gun (w/ Ricoh Danielson)
03/27/2025
S4 - Episode 002 - Staring Down the Barrel of a Loaded Gun (w/ Ricoh Danielson)
In this gripping episode of the Cyber Distortion Podcast, we sit down with Ricoh Danielson — a former U.S. Army Combat Veteran of Iraq and Afghanistan, national security expert, and digital forensics specialist. With a career that bridges the battlefield and the digital frontlines, Ricoh brings a rare and powerful perspective on the evolving threats to our national security and critical infrastructure. From his firsthand experiences in war zones to his current role as a VCISO and digital forensic expert, Ricoh shares stories that are as eye-opening as they are inspiring. We dive into the real-world challenges facing the nation today — from protecting our energy grids and communication systems to defending against cyber threats that target both the public and private sectors. Ricoh also recounts some of his most intense moments in service, revealing what it takes to operate in high-stakes environments, both overseas and in high-profile courtrooms. This episode is a must-listen for anyone interested in cybersecurity, national defense, or the human element behind protecting our digital and physical worlds. Jason Popillion is a CISSP and serves as a CIO/CTO of a SaaS company and Kevin Pentecost is a CISSP, CISM, CEH, CPT, MPCS, MCSE, CCA, ITIL-F and serves as the Information Security Director for a Manufacturing company. Citations & Helpful Links: National Security Agency (NSA) Cybersecurity: The NSA provides resources aimed at preventing and eradicating cyber threats to U.S. national security systems, with a focus on the Defense Industrial Base and the enhancement of U.S. weapons' security. Department of Defense Cyber Crime Center (DC3): DC3 offers integrated services including cyber training, digital and multimedia forensics, and vulnerability disclosure, supporting law enforcement and counterintelligence efforts. • SANS Institute: A renowned organization specializing in information security and cybersecurity training, offering courses on topics like cyber and network defenses, penetration testing, incident response, and digital forensics. National Institute of Standards and Technology (NIST) Computer Security Resource Center: NIST's CSRC provides access to cybersecurity and information security-related projects, publications, and news, supporting government, industry, and academic efforts in securing information systems. Cybersecurity and Infrastructure Security Agency (CISA) Free Cybersecurity Services and Tools: CISA has curated a database of free cybersecurity services and tools to help organizations reduce cybersecurity risks across U.S. critical infrastructure sectors. For listeners interested in connecting with Ricoh Danielson or learning more about his work: Official Website: Ricoh's personal website offers insights into his background, services, and expertise. Contact Page: To reach out to Ricoh directly, visit his contact page where you can send a message or inquiry. Instagram: Follow Ricoh on Instagram for updates and insights related to cybersecurity and his professional endeavors. These resources provide a comprehensive starting point for those interested in delving deeper into the fields of national security and digital forensics.
/episode/index/show/cyberdistortion/id/35887555
info_outline
S4 – Episode 001 – [CTRL-ALT-GEN] Resetting the Generational Tech Divide
03/17/2025
S4 – Episode 001 – [CTRL-ALT-GEN] Resetting the Generational Tech Divide
Welcome to this episode of Cyber Distortion, where we explore the cutting edge of technology, security, and the future of humanity itself. In this episode, we look into how differing generational outlooks—from the Silent Generation, to Baby Boomers, Gen X, Millennials, and Gen Z—shape the ways teams solve problems and interact within today’s corporate landscape. We explore how historical events, technological exposure, and shifting cultural norms have impacted each generation’s communication style, work ethic, and appetite for risk. Through candid anecdotes and real-world examples, we uncover the advantages of blending diverse generational perspectives to spark innovation, build more inclusive workplace cultures, and tackle company challenges more effectively. We discuss bridging generational gaps and nurturing an environment where each age group can contribute its strengths. Whether it’s harnessing the discipline and experience of older employees or tapping into the digital fluency and fresh ideas of younger ones, this episode offers strategies for leaders to cultivate synergy and drive growth. Ultimately, we hope that listeners will come away with a clearer understanding of why inclusive, cross-generational collaboration isn’t just a nice-to-have—but a critical differentiator in a rapidly evolving corporate world. We hope you enjoy this kickoff episode of our new 4th season of the podcast!! Jason Popillion is a CISSP and serves as a CIO/CTO of a SaaS company and Kevin Pentecost is a CISSP, CISM, CEH, CPT, MPCS, MCSE, CCA, ITIL-F and serves as the Information Security Director for a Manufacturing company. CITATIONS Visit our premier sponsor’s pages here: Threatlocker - a global cybersecurity platform that provides endpoint protection using a Zero Trust approach, focusing on controlling and managing applications and devices to protect organizations from cyber threats, including malware and ransomware. Alacrinet - a Palo Alto-based nationwide IT Security consulting firm focused on delivering best-in-class enterprise cybersecurity solutions and services. They are dedicated to people and strive to build positive, long-term relationships - both internally and with clients. We’re an agile company with a team atmosphere and ‘get it done’ mentality to do what’s needed for our clients. Fulcrum Technology Solutions - exists to solve critical business problems shoulder to shoulder with you. In the pursuit of that goal, 2/3 of our company are engineers, but 100% of us are problem solvers. Whether we are tackling Security, Infrastructure, Cloud, or Big Data issues, our team won't stop until we finish the job! Our word defines us, and motivates us to give you the service that you deserve! Cyphernova.AI - we recognize that we are in the midst of a profound technological revolution. The way we work, learn, and communicate is evolving rapidly and will never be the same. Leveraging over 30 years of expertise in Technology and Cybersecurity, we are committed to guiding you through this transformative era. We offer a comprehensive suite of AI + Machine Learning solutions tailored to meet the unique needs of both individuals and organizations. Our services include an extensive AI Services Platform, robust training programs, ongoing support, and customized projects. As your trusted partner, we are here to help you implement and navigate the ever-changing landscape of AI.
/episode/index/show/cyberdistortion/id/35732105
info_outline
S3 – Episode 014 – Navigating the Storm: Mastering Incident Response and Disaster Recovery
12/26/2024
S3 – Episode 014 – Navigating the Storm: Mastering Incident Response and Disaster Recovery
In this season finale of the Cyber Distortion Podcast, hosts Kevin Pentecost and Jason Popillion, tackle one of the most critical topics in modern cybersecurity—incident response and disaster recovery. When a cyber incident strikes, every second counts. Organizations need to be ready with well-orchestrated plans to respond effectively and recover swiftly. This episode delves deep into the strategies, tools, and best practices that every cybersecurity professional and organization should know to minimize damage and ensure resilience. Kevin and Jason guide listeners through the intricacies of incident response, breaking it down into digestible phases like preparation, detection, containment, eradication, and recovery. They also explore the role of disaster recovery planning, highlighting how businesses can resume operations quickly and securely after a breach or significant event. The hosts share real-world examples and practical tips, making these complex processes relatable and actionable for professionals at all levels. As the final episode of the season, this is one you don’t want to miss. Kevin and Jason bring their signature blend of expertise and engaging conversation to ensure listeners walk away with a solid understanding of incident response frameworks, key roles and responsibilities, and the importance of regular testing and improvement. Whether you’re a seasoned cybersecurity practitioner or just starting, this episode offers something valuable for everyone. Thank you for joining us this season on Cyber Distortion. We’ve loved exploring the multifaceted world of cybersecurity with our incredible audience, and we’re ending this season with a bang. We hope you enjoy this finale as much as we enjoyed creating it. Stay tuned for future seasons as we continue to navigate the dynamic and ever-evolving landscape of cybersecurity! Jason Popillion is a CISSP and serves as a CIO/CTO of a SaaS company and Kevin Pentecost is a CISSP, CISM, CEH, CPT, MPCS, MCSE, CCA, ITIL-F and serves as the Information Security Director for a Manufacturing company. MORE VALUABLE RESOURCES: Incident Response Resources National Institute of Standards and Technology (NIST): Computer Security Incident Handling Guide Resource: Description: This guide provides a comprehensive framework for incident handling, detailing preparation, detection, analysis, containment, eradication, and recovery steps. SANS Institute: Incident Handler's Handbook Resource: SANS Reading Room - Incident Response Description: A practical guide for incident handlers, focusing on hands-on strategies for real-world scenarios. US-CERT: Incident Response Resources Resource: CISA Incident Response Guidance Description: A hub of information, tools, and best practices for incident response, provided by the Cybersecurity and Infrastructure Security Agency. Disaster Recovery Resources Federal Emergency Management Agency (FEMA): Continuity of Operations Planning Resource: FEMA Continuity Resources Description: Guidance on creating disaster recovery and continuity plans for organizations of all sizes. International Organization for Standardization (ISO): ISO 22301 Resource: ISO 22301: Business Continuity Management Systems Description: This standard focuses on managing and reducing risks during disruptive incidents. Disaster Recovery Institute International (DRI): Best Practices for Business Continuity Resource: DRI Resources Description: A compilation of best practices, frameworks, and tools for effective disaster recovery planning. Cybersecurity Education and Training MITRE ATT&CK Framework Resource: MITRE ATT&CK Description: A detailed knowledge base of adversary tactics and techniques to inform incident response planning. CERT Coordination Center: Incident Management Practices Resource: CERT Resources Description: Research and guidance from the Software Engineering Institute at Carnegie Mellon University. Additional Practical Tools Microsoft: Security Incident Response Playbooks Resource: Description: A collection of playbooks designed for cloud-centric incident response. National Cyber Security Centre (NCSC): Incident Management Guidance Resource: NCSC UK Description: Practical advice from the UK government’s cybersecurity body on managing incidents effectively.
/episode/index/show/cyberdistortion/id/34623870
info_outline
S3 – Episode 013 – Bridging the Cyber Skills Gap w/Jessie Bolton
12/04/2024
S3 – Episode 013 – Bridging the Cyber Skills Gap w/Jessie Bolton
Cybersecurity isn’t just about technology—it’s about people. In this eye-opening episode of the Cyber Distortion Podcast, we’re joined by Jessie Bolton, CEO of Bolt Resources and former Vice President of North Texas ISSA, to tackle one of the industry’s most pressing challenges: the human side of the cybersecurity skills gap. Jessie brings a wealth of experience from her collaborations with ISC2, WiCyS, NICE, Infosec Institute, and higher education institutions. She’s at the forefront of redefining how organizations identify, nurture, and retain talent in an industry facing a critical workforce shortage. From strategies to attract untapped talent to innovative training programs that prioritize real-world readiness, Jessie shares actionable insights for employers and aspiring cybersecurity professionals alike. If you’re passionate about building a stronger, more inclusive cybersecurity workforce, this is the conversation you’ve been waiting for. Tune in and discover how we can close the gap and secure the future—one human at a time! Jason Popillion is a CISSP and serves as a CIO/CTO of a SaaS company and Kevin Pentecost is a CISSP, CISM, CEH, CPT, MPCS, MCSE, CCA, ITIL-F and serves as the Information Security Director for a Manufacturing company. CITATIONS Jessie’s LinkedIn Profile: Bolt Resources - Websites of Jessie’s: (Company) (RSS Feed) Cyberseek.org: Lightcast.io: OTHER Resources: North Texas ISSA:
/episode/index/show/cyberdistortion/id/34282585
info_outline
S3 – Episode 012 – Slaying the Surveillance Capitalist Pigs w/Mark Weinstein
11/21/2024
S3 – Episode 012 – Slaying the Surveillance Capitalist Pigs w/Mark Weinstein
Protecting Your Privacy Online with Mark Weinstein 🎙️ In this must-listen episode of the Cyber Distortion Podcast, we dive deep into the critical topic of online privacy with our special guest, Mark Weinstein. As a world-renowned author, TedX speaker, tech visionary, and privacy advocate, Mark brings unparalleled insight into the digital privacy landscape. We explore strategies to safeguard your online presence, regain control over your personal data, and thrive in an increasingly connected world. Mark also shares groundbreaking ideas from his award-winning book, "Restoring Our Sanity Online – A Revolutionary Social Framework", offering a transformative approach to navigating the digital age. 🔒 Don't miss this enlightening conversation about taking back your privacy and restoring balance in our online lives. 🎧 Tune in now and learn how to protect what matters most—your personal privacy. Jason Popillion is a CISSP and serves as a CIO/CTO of a SaaS company and Kevin Pentecost is a CISSP, CISM, CEH, CPT, MPCS, MCSE, CCA, ITIL-F and serves as the Information Security Director for a Manufacturing company. CITATIONS Mark’s LinkedIn Profile: Mark’s Twitter (X) Profile: The Book – Restoring Our Sanity Online – A Revolutionary Social Framework Mark’s Tedx Talk: Mark’s Website: About Mark: Speaking: Press Coverage:
/episode/index/show/cyberdistortion/id/34099721
info_outline
S3 – Episode 011 – The Hitchhacker’s Guide to the Cyberverse!
11/07/2024
S3 – Episode 011 – The Hitchhacker’s Guide to the Cyberverse!
So, do you think your business is secure? Think again. This October, Jason and Kevin met with CompTIA’s Wayne Selk, to uncover what businesses and individuals must know to stay ahead of today’s online threats. Don't miss out on this essential conversation – your online safety might just depend on it! An esteemed expert in the industry, Wayne brings over 25 years of cybersecurity expertise, helping businesses and individuals strengthen their defenses against online threats. From common phishing scams to advanced ransomware tactics, Wayne breaks down the latest in cybersecurity best practices and shares practical tips to keep you, your data, and your organization safe. Prior to his current role, Selk served as Senior Director of Cybersecurity Initiatives at ConnectWise from November 2018 to March 2022. He also held positions at Sienna Group LLC as a Principal Consultant and at Integrity Data Solutions, LLC as President. His earlier roles include Senior Manager at Symantec Federal Services and Network Engineer at BAE Systems. Selk holds a bachelor’s degree in information systems security from the University of Phoenix and has earned certifications such as Certified Data Protection Solutions Engineer (CDPSE) and previously held the Certified Information Systems Security Professional (CISSP). In his role at CompTIA, Selk focuses on enhancing cybersecurity programs and facilitating information sharing among organizations to improve collective security postures. Jason Popillion is a CISSP and serves as a CIO/CTO of a SaaS company and Kevin Pentecost is a CISSP, CISM, CEH, CPT, MPCS, MCSE, CCA, ITIL-F and serves as the Information Security Director for a Manufacturing company. CITATIONS Wayne’s LinkedIn Profile: Wayne’s Twitter (X) Profile: CompTIA’s LinkedIn Profile: CompTIA’s Twitter (X) Profile: CompTIA Certification Information: Trustmark Framework: CISA.gov Resources and Tools:
/episode/index/show/cyberdistortion/id/33842022
info_outline
S3 – Episode 010 – The Art of the Pivot w/Wirefall
10/14/2024
S3 – Episode 010 – The Art of the Pivot w/Wirefall
In this episode of the Cyber Distortion Podcast, we sit down with Dustin Dykes, better known as Wirefall, the founder of the Dallas Hackers Association (DHA). Join us as we dive into the origins of DHA, its impact on the cybersecurity community, and Wirefall's journey in the hacking world. Dustin is a Tribe of Hackers and Art of Intrusion Contributor, a public speaker, an improv and stand up student and performer, and of course, a technical guru! He is a local security community advocate. Founder of the Dallas Hackers Association and former board member of BSides DFW and TheLab.MS. He is a military and law enforcement veteran with 25+ years of security consulting experience focused on attack and penetration testing. We also get into the other really cool business that Dustin is a part of, Telesploit. The Telesploit solution enables organizations to remotely perform internal vulnerability assessments and penetration tests leveraging resources located anywhere in the world. Whether you're a seasoned hacker or just curious about the culture, this episode is packed with insights you won’t want to miss! Jason Popillion is a CISSP and serves as a CIO/CTO of a SaaS company and Kevin Pentecost is a CISSP, CISM, CEH, CPT, MPCS, MCSE, CCA, ITIL-F and serves as the Information Security Director for a Manufacturing company. CITATIONS Wirefall’s LinkedIn Profile: Wirefalls’s Twitter (X) Profile: DHA (Dallas Hackers Association) (X) Profile: Telesploit: Telesploit ‘X’ Profile: Telesploit LinkedIn Profile: OTHER D/FW Hacker Groups: DC214 ‘X’ Profile: DC940 ‘X’ Profile: Hack FtW’s Profile:
/episode/index/show/cyberdistortion/id/33444137
info_outline
S3 – Episode 009 – He Robs Banks! w/FC (aka: Freaky Clown)
09/13/2024
S3 – Episode 009 – He Robs Banks! w/FC (aka: Freaky Clown)
Welcome to this episode of Cyber Distortion, where we explore the cutting edge of technology, security, and the future of humanity itself. Today, Kevin and Jason have the privilege of talking with FC. FC or, “Freaky Clown” as he’s known more commonly by his hacker handle, is a renowned ethical hacker and social engineer, as well as global keynote speaker. He has been working in the information security field for over 25 years and is motivated by a drive to make individuals, organizations, and countries more secure. When he is not legally breaking into companies, FC takes audiences on an eye-opening journey into the hacker’s mindset. He has delivered over 50 keynotes including CPX360, C-E-R-N and Intersec. FC demystifies security with his expertise, humor, and passion. His bestselling book ‘How I Rob Banks – and other Such Places’ was published in June 2023. In today’s conversation, the guys delve into many of FC’s crazy stories from his physical penetration testing days. Many of the stories are actually covered in his awesome book but there is so much more to FC’s story. FC and his amazing wife Dr. Jessica Barker, also run their company Cygenta, which is centered around security in 3 key areas. Their approach to cyber security is more than just penetration testing or awareness training. They are experts in combining the technical, human and physical aspects of security best practice. They help some of the largest and most complicated organizations build resilience and sustainability in their risk management, not just their technical response. With Cygenta’s approach to cyber security, you and your people are safer, your technology is more resilient and your perimeters are more secure. Enjoy this amazing and very entertaining story time episode! Jason Popillion is a CISSP and serves as a CIO/CTO of a SaaS company and Kevin Pentecost is a CISSP, CISM, CEH, CPT, MPCS, MCSE, CCA, ITIL-F and serves as the Information Security Director for a Manufacturing company. CITATIONS FC’s LinkedIn Profile: FC’s Twitter (X) Profile: Jessica’s LinkedIn Profile: Jessica’s Twitter (X) Profile: Cygenta LinkedIn Profile: Cygenta Website: FC’s Book on Amazon: Jessica’s Book on Amazon:
/episode/index/show/cyberdistortion/id/33032962
info_outline
S3 – Episode 008 – The Transhuman
08/29/2024
S3 – Episode 008 – The Transhuman
Welcome to this episode of Cyber Distortion, where we explore the cutting edge of technology, security, and the future of humanity itself. Today, we have a truly extraordinary guest joining us: Len Noe, a Transhumanist with over 10 chips embedded in his body. Len isn’t just a futurist—he’s living proof of what the future could hold, using his integrated technology to perform hacks and complete takeovers on various devices. His unique perspective challenges the boundaries between human and machine, and today, he’s here to share his incredible journey and insights with us. Len’s path to becoming a white hat hacker and a technical evangelist at CyberArk is as fascinating as the technology he wields. Once a 1%er biker, Len made a dramatic transition from the world of outlaw motorcycle clubs to the front lines of cyber defense. His story is one of transformation, not just in terms of his career but in the very way he interacts with the world around him, using the embedded chips in his body as tools for exploration, protection, and demonstration. In this conversation, we’ll dive deep into the world of Transhumanism, explore the ethical implications of merging man with machine, and discuss how Len’s experiences have shaped his views on the future of cybersecurity. Whether you’re a tech enthusiast, a security professional, or just curious about the possibilities of human augmentation, this episode promises to be a thought-provoking journey into the unknown. Jason Popillion is a CISSP and serves as a CIO/CTO of a SaaS company and Kevin Pentecost is a CISSP, CISM, CEH, CPT, MPCS, MCSE, CCA, ITIL-F and serves as the Information Security Director for a Manufacturing company. CITATIONS Len’s LinkedIn Profile: William McCurdy Article (The Standard – UK): Len’s Book “Human Hacked: My Life and Lessons as the World's First Augmented Ethical Hacker”: Cyber Ark: The Cyber Cognition Podcast: Dangerous Things – Embedded Biohacking Stuff: More on the PegLeg Impanted Device: More on the Biohacking Village at DEFCON and Beyond: Biohacking Wearables:
/episode/index/show/cyberdistortion/id/32799902
info_outline
S3 – Episode 007 – The Sociosploit
08/05/2024
S3 – Episode 007 – The Sociosploit
In today’s episode, Kevin and Jason talk with a good friend Justin "Hutch" Hutchens. Hutch is a technology leader and visionary. He is the author of the book "The Language of Deception: Weaponizing Next Generation AI", the creator of Sociosploit.com, a research blog which examines exploitation opportunities on the social web – a confluence of his interests in both technical hacking and social psychology, and the co-host of Cyber Cognition, a podcast focused on the rapidly evolving technical landscape of artificial intelligence and machine learning. Hutch is an award-winning public speaker and has spoken at multiple Universities and global conferences to include the RSA Conference, and DEF CON. The guys dig into the topics considered somewhat controversial in today’s world of AI, and they discuss Hutche’s projects as well as his new book. Jason Popillion is a CISSP and serves as a CIO/CTO of a SaaS company and Kevin Pentecost is a CISSP, CISM, CEH, CPT, MPCS, MCSE, CCA, ITIL-F and serves as the Information Security Director for a Manufacturing company. CITATIONS Hutch’s LinkedIn Profile: Hutch’s Book “The Language of Deception: Weaponizing Next Generation AI” Sociosploit Blog Site: The Cyber Cognition Podcast:
/episode/index/show/cyberdistortion/id/32446687
info_outline
S3 – Episode 006 – The Insane Impact of AI – (FireTalks 15)
07/14/2024
S3 – Episode 006 – The Insane Impact of AI – (FireTalks 15)
In this episode, Kevin and Jason hit 15 different topics on the Insane Impact of AI on our businesses, in our daily lives, in healthcare, and beyond. Each topic will be covered in 5 minutes or less in a new format we’re calling “Firetalks 15!” The guys like to talk, and if you’ve listened to more than a few episodes, keeping any topic under 5 minutes proved to be a very challenging thing as you’ll see in this interesting new format! Jason Popillion is a CISSP and serves as a CIO/CTO of a SaaS company and Kevin Pentecost is a CISSP, CISM, CEH, CPT, MPCS, MCSE, CCA, ITIL-F and serves as the Information Security Director for a Manufacturing company.
/episode/index/show/cyberdistortion/id/32132052
info_outline
S3 – Episode 005 – The Great Cyber Divide (w/ Special Guests: The Bare Knuckles & Brass Tacks Podcast Team)
06/30/2024
S3 – Episode 005 – The Great Cyber Divide (w/ Special Guests: The Bare Knuckles & Brass Tacks Podcast Team)
In this episode, Kevin and Jason sit down to talk shop with George Kamide and George Al-Koura the hosts of the awesome podcast “Bare Knuckles and Brass Tacks.” Their podcast is focused on talking about whether or not there truly is a vendor/customer divide. It’s a cybersecurity podcast dedicated to answering that question. George Kamide comes from the vendor side, and George Al-Koura is a CISO on the customer side. They have REAL conversations from opposing sides of the pitch about cybersecurity marketing, sales, and go-to-market strategies. They confront these topics and bad practices with bare knuckles. Then it’s down to brass tacks, as they look for solutions. They have guests on either side, including CISOs, SMEs, leaders, frontline account managers, and more. George Kamide is a Multi-disciplinary thinker with a penchant for blowing up silos. He loves tackling big problems. This might mean orchestrating go-to-market product strategies, or creating stimulating thought leadership in dynamic tech environments. Other times it means taking on industry-wide issues of representation, customer/vendor trust challenges, or big questions like responsible AI. George Al-Koura is a CISO Chief Information Security Officer, he leads the strategy and execution of cybersecurity for a global online dating company that empowers people to connect and explore their relationships. He has over 15 years of experience in the security profession, spanning military, government, and commercial sectors, with a focus on cyber and security threat intelligence. We pick their brains on their podcast, their origin story, and much, much more… Jason Popillion is a CISSP and serves as a CIO/CTO of a SaaS company and Kevin Pentecost is a CISSP, CISM, CEH, CPT, MPCS, MCSE, CCA, ITIL-F and serves as the Information Security Director for a Manufacturing company. CITATIONS: Links to find the Bare Knuckles Team: Web: LinkedIn: Bare Knuckles: George Kamide: George Al-Koura: SquadCon:
/episode/index/show/cyberdistortion/id/31942537
info_outline
S3 – Episode 004 – The Dark Tale Teller with Jack Rhysider of Darknet Diaries
05/24/2024
S3 – Episode 004 – The Dark Tale Teller with Jack Rhysider of Darknet Diaries
In this episode, Jason and Kevin sit down with the one and only storyteller from the dark side of the internet, Jack Rhysider. Jack is the beloved voice behind the extremely popular podcast The Darknet Diaries. Tonight, it’s a podcaster-to-podcaster conversational happy hour! Jack attended a highly ranked university to study computer engineering with an emphasis on software engineering. Received formal training in Linux, Unix, Windows, C, C++, Java, ASM, logic, and electrical engineering. After college, he spent over a decade conducting network hardening by securing, analyzing, and testing network equipment such as firewalls, routers, and IDS units. Completed work on dozens of client's networks ranging from schools, banks, commercial, government, and defense contractors. Acquired numerous certifications in Cisco and Juniper and other security related training. Architected and built a SOC using a SIEM to detect network threats and intrusions for clients. Darknet Diaries produces audio stories specifically intended to capture, preserve, and explain the culture around hacking and cyber security in order to educate and entertain both technical and non-technical audiences. At Darknet Diaries, they adhere to journalistic standards by fact checking and ethical sourcing of information. They adopt principles of truthfulness, accuracy, objectivity, impartiality, fairness, and public accountability. Darknet Diaries is trustworthy, they strive to enhance intellectual development, expand knowledge, deepen aural enjoyment, increase the awareness of living in a highly technical society, and result in a service to listeners which makes them more responsive, informed citizens of their digital lives. Jason Popillion is a CISSP and serves as a CIO/CTO of a SaaS company and Kevin Pentecost is a CISSP, CISM, CEH, CPT, MPCS, MCSE, CCA, ITIL-F and serves as the Information Security Director for a Manufacturing company. CITATIONS: Darknet Diaries Website: Darknet Diaries SWAG Shop: Jack’s LinkedIn: Twitter: YouTube Channel: Spotify: Apple Podcasts: Reddit: Patreon:
/episode/index/show/cyberdistortion/id/31451547
info_outline
S3 – Episode 003 – Alethe-Al Weapon with Alethe Denis
05/11/2024
S3 – Episode 003 – Alethe-Al Weapon with Alethe Denis
EPISODE DESCRIPTION: In this episode, we sit down with Sr. Security Consultant and Red Teamer, Alethe Denis. Alethe is a social engineer who excels in the art of human hacking. Alethe Denis is a Senior Security Consultant on the Red Team at Bishop Fox, an offensive cyber security company that helps clients protect their assets and data. She holds the Certified Ethical Hacker (CEH) certification and has multiple awards and publications in the field of social engineering and cybersecurity. Pursuing her passion for hacking she joined the cyber security industry after winning the prestigious DEF CON Social Engineering Capture the Flag competition in 2019 and receiving a coveted DEF CON Black Badge. Since then, she has been a leading social engineering expert and cybersecurity ally for companies around the globe, specializing in red team attack emulative social engineering. She is also a board member of DEF CON Groups and a member of InfraGard, a partnership between the FBI and the private sector. We get into some of her amazing stories in this episode so snap on that chin strap. We’re going to have some fun!! Jason Popillion is a CISSP and serves as a CIO/CTO of a SaaS company and Kevin Pentecost is a CISSP, CISM, CEH, CPT, MPCS, MCSE, CCA, ITIL-F and serves as the Information Security Director for a Manufacturing company. CITATIONS: HOW TO FIND ALETHE LinkedIn: Twitter: Bishop Fox: We are Tech Women Interview: Social Engineering Links: DEFCON: Black Badge Hall of Fame & More on the Black Badge:
/episode/index/show/cyberdistortion/id/31245932
info_outline
S3 – Episode 002 – Un-Bearably Dedicated!
04/03/2024
S3 – Episode 002 – Un-Bearably Dedicated!
EPISODE DESCRIPTION: In this episode, Kevin and Jason sit down to talk shop with Cyber-guru Phillip Wylie. Phillip is a friend and a member of the newly formed Cyber Circus network which includes other podcasters including Chris Glanden of BarCode Security as well as Kevin & Jason from the Cyber Distortion Podcast. Phillip Wylie is a well-known figure in the cybersecurity and ethical hacking community, recognized for his extensive experience and contributions to the field. Background and Expertise: Phillip has a background in penetration testing and ethical hacking. His career spans over two decades, during which he has held various roles in IT and security, including penetration tester, security engineer, and security consultant. His expertise lies in identifying and exploiting vulnerabilities in computer systems and networks to help organizations strengthen their security postures. Education and Advocacy: He is known for his efforts in cybersecurity education and advocacy, working to raise awareness about the importance of cybersecurity and sharing knowledge with aspiring cybersecurity professionals. Wylie often speaks at conferences and seminars, sharing his insights on ethical hacking, penetration testing, and cybersecurity trends. The Pwn School Project: Phillip is the founder of The Pwn School Project, an educational initiative aimed at teaching ethical hacking and cybersecurity skills to a wider audience. The project focuses on providing free or low-cost education to those interested in pursuing a career in cybersecurity, emphasizing hands-on learning and practical skills. Authorship and Thought Leadership: He has contributed to the cybersecurity community as a writer and thought leader, sharing his knowledge through articles, books, and research papers. His work often covers topics related to ethical hacking techniques, career advice for cybersecurity professionals, and the latest trends in cyber threats and defenses. Mentorship: Phillip is also known for his mentorship role in the cybersecurity community, guiding newcomers and helping them navigate the complexities of starting a career in cybersecurity. He advocates for continuous learning and ethical practices within the field. Jason Popillion is a CISSP and former CIO/CTO of a SaaS company and Kevin Pentecost is a CISSP, CISM, CEH, CPT, MPCS, MCSE, CCA, ITIL-F and serves as the Information Security Director for a Manufacturing company. CITATIONS: Links to find Phillip: Web: LinkedIn: Twitter - X: YouTube: Spotify: DEFCON Meetup Groups: DC940 (Denton Texas):
/episode/index/show/cyberdistortion/id/30659643
info_outline
S3 – Episode 001 – Down the Deepfake Rabbit Hole
03/21/2024
S3 – Episode 001 – Down the Deepfake Rabbit Hole
In this episode, Kevin and Jason kick of what we expect will be our most exciting season to date. We come out of the gate like two savage wildebeests ready to devour anything in our path! Wait, that sounds extreme. Maybe it’s on that intense, but it’s LEGIT intense as we tackle a topic that only the fearless dare unpackage DEEPFAKES! In this octane fueled episode, we delve into the intricate world of deepfakes, a term that has rapidly evolved from obscure tech lingo to a hot-button issue at the intersection of technology, ethics, and reality. We give funny examples and enjoy a light-hearted segment showing how deepfakes are used for laughs, but the light-hearted fun only lasts so long. The episode takes a critical turn as we examine the darker side of deepfakes, highlighting instances where they've been used to spread misinformation, and create non-consensual explicit content. The conversation also covers the psychological and societal impacts of living in a world where seeing is no longer believing, and how our understanding of truth and reality is being challenged. "Down the Deepfake Rabbit Hole" offers a comprehensive and nuanced examination of deepfakes, encouraging listeners to ponder the profound questions they raise about innovation, authenticity, and the fabric of our digital lives. Join us for this thought-provoking journey into one of the most fascinating and controversial topics in today's digital age. Jason Popillion is a CISSP and serves as a former CIO/CTO of a SaaS company and Kevin Pentecost is a CISSP, CISM, CEH, CPT, MPCS, MCSE, CCA, ITIL-F and serves as the Information Security Director for a Manufacturing company. CITATIONS CTRL_SHIFT_FACE: Their awesome channel can be found out on YouTube. Check out some of the great deepfakes they’re creating out there at AICPA Guidance: AI DEEPFAKE SCAM STORY: AI TEACHER SEX SCANDAL STORIES: TOOLS USED IN THE EPISODE INTRO: Speechify: Swapface: Envato Elements (Images): Audio (Audio):
/episode/index/show/cyberdistortion/id/30468788
info_outline
S2 - Episode 014 - Lone Star Cyber Circus - LIVE @ Hop & Sting Brewery, Grapevine, TX
12/27/2023
S2 - Episode 014 - Lone Star Cyber Circus - LIVE @ Hop & Sting Brewery, Grapevine, TX
Get ready for an electrifying evening as the "Lone Star Cyber Circus" pitches its virtual tent at the renowned Hop & Sting Brewery in Grapevine, Texas! This live podcast event, a harmonious blend of cutting-edge cyber talks and classic Texan hospitality, promises an experience like no other. As you step into the rustic yet modern ambiance of Hop & Sting Brewery, you'll be greeted by the rich aroma of craft beers, a hallmark of this beloved local establishment. The brewery's spacious interior, adorned with hints of Texan charm and cyber-themed décor, sets the perfect stage for an evening of engaging discussions and lively entertainment. The "Lone Star Cyber Circus" is more than just a podcast; it's a celebration of the digital age, wrapped in the warmth of Texan culture. Hosted by charismatic cyber experts, Chris Glanden (Barcode Security), Phillip Wylie (Phillip Wylie Show), and Kevin Pentecost & Jason Popillion (Cyber Distortion Podcast). Their discussions are a riveting blend of expert insights, humorous anecdotes, and lively banter. What makes this event truly unique is its interactive format. The live audience, a diverse mix of tech enthusiasts, local patrons, and visitors, gets to participate in Q&A sessions, offering a dynamic and inclusive experience. As the podcast rolled, guests enjoyed Hop & Sting's exquisite selection of craft beers, each brew telling its own story of local ingredients and brewing artistry. The brewery's friendly staff were more than happy to guide you through their selection, ensuring a perfect pairing for your podcast experience. Throughout the evening, the "Lone Star Cyber Circus" also features special guests - from renowned tech gurus to local cybersecurity heroes - adding depth and diversity to the conversation. These guest appearances are a crowd favorite, often leading to insightful, sometimes heated, but always entertaining discussions. The event featured experts in the area of the DFW Hacking scene: Wirefall (Dallas Hackers Association), Juneau Jones (DC214), and NEURAL PHANTOM (HackFTW), Phillip Wylie himself, represented Denton and (DC940). Following the awesome discussion on the DFW Hacker scene, we shifted into another very hot topic on AI and where it’s headed in the near future. Special guests Justin “Hutch” Hutchins, and Quentin Rhoads-Herrera stole the show with this topic. Please follow our AWESOME SPONSORS: Cyberstrike and Trace3 who made it all happen. We want to extend the most heartfelt THANK YOU to both of them for making this event possible!! As the night draws to a close, the lively atmosphere of Hop & Sting Brewery, combined with the thought-provoking content of "Lone Star Cyber Circus," leaves you with a sense of connection - to the community, the evolving digital world, and the vibrant culture of Texas. It's an experience that goes beyond a typical podcast recording, leaving you enriched, entertained, and eager for the next episode. Whether you were a tech aficionado, a beer enthusiast, or just in search of a unique night out in Grapevine, the "Lone Star Cyber Circus" at Hop & Sting Brewery was an event you didn’t want to miss. If you missed this one, follow us on Twitter for more information about the next live Cyber Circus event! We had so much fun, we can’t wait for the next one!! Join us for an evening where the cyber world and Texas charm collide, creating an unforgettable podcast experience! 🍻🎪 CITATIONS: CyberStrike: Trace3: Barcode Security: Phillip Wylie Show: Cyber Distortion Podcast on Twitter: DFW Hacker Scene: Dallas Hackers Association: DC214: DC940: HackFTW: Thanks to Kiss for the amazing tune “Psycho Circus” which we used as our walk-up song at the event!
/episode/index/show/cyberdistortion/id/29240843
info_outline
S2 - Episode 013 – CISSP Success Stories with Luke Ahmed – Part II
12/21/2023
S2 - Episode 013 – CISSP Success Stories with Luke Ahmed – Part II
Description: 🎙️This is part two of our riveting two-part episode with the extraordinary Luke Ahmed. Luke, a best-selling author, CISSP instructor, and the driving force behind the immensely popular Facebook page "," brings a wealth of knowledge and passion to the table. Discover the keys to success in the realm of cybersecurity as Luke shares insights from his personal journey and experience in the field. As a CISSP (Certified Information Systems Security Professional) instructor, he's not just a teacher; he's a mentor who has personally guided over 3300 aspiring CISSPs to success in their exams. 🔒 What to Expect: Insider Tips for CISSP Success: Uncover the strategies and study techniques that have proven effective for thousands of CISSP candidates. Luke spills the secrets that go beyond the textbooks. Navigating the CISSP Landscape: The CISSP certification is no small feat, and Luke Ahmed breaks down the complexities, offering guidance on how to tackle the exam with confidence. The Evolution of Cybersecurity: Get a front-row seat to the ever-evolving world of cybersecurity. Luke shares his thoughts on emerging trends, threats, and the skills that professionals need to stay ahead in this dynamic field. Luke's Best-Selling Insights: As a best-selling author, Luke brings a unique perspective to the podcast. Explore the pages of his books and gain access to the wisdom that has resonated with cybersecurity enthusiasts worldwide. Get to know that “Mindset” that you MUST unlock to pass the ISC2 exam. LOTS of Fun: We lighten things up a bit towards the end of the episodes to finish on a light-hearted note! 🚀 Why You Should Tune In: Whether you're a seasoned cybersecurity professional or just starting your journey, this episode is a must-listen. Luke Ahmed's expertise and genuine passion for cybersecurity make for a captivating conversation that promises to inspire, educate, and empower. Don't miss out on this opportunity to tap into the mind of a CISSP guru and glean valuable insights that could shape your own path in the world of cybersecurity. Get ready to level up your cybersecurity knowledge and skills with Luke Ahmed on this exciting two-part episode of the Cyber Distortion Podcast! 👉 Connect with Luke: LinkedIn: Facebook: Website: 🎧 Subscribe and Share: 🔗 Twitter: @DistortionCyber 🔗 Blog: cyberdistortion.com 🔗 SWAG Shop: 🔗 Additional Resources: Look for our audio podcasts on all major streaming platforms as well 🎉 Join the Conversation: Share your thoughts, questions, and key takeaways from this episode on social media using the hashtag #CybersecurityMastermind. We can't wait to hear from you! Jason Popillion is a CISSP and serves as a CIO/CTO of a SaaS company and Kevin Pentecost is a CISSP, CISM, CEH, CPT, MPCS, MCSE, CCA, ITIL-F and serves as a Information Security Director for a Manufacturing company. Citations: KC7 Training for Cybersecurity Professionals - KC7 is a new way to learn cybersecurity that’s hands-on, fun, and engaging. With KC7, you’ll learn key cybersecurity skills while getting practical experience that feels just like the real job. HUD Graphic for CISSP Tips – Credit https://pngtree.com/freepng/futuristic-lower-third-sci-fi-design-template-for-channel-news-information-call-box-bars-and-modern-digital-info-boxes-element-of-hud-interface-callouts-vector-illustration_8186961.html'>png image from pngtree.com
/episode/index/show/cyberdistortion/id/29182458
info_outline
S2 - Episode 012 – CISSP Success Stories with Luke Ahmed – Part I
11/30/2023
S2 - Episode 012 – CISSP Success Stories with Luke Ahmed – Part I
In this riveting two-part episode, join us as we dive deep into the world of cybersecurity with the extraordinary Luke Ahmed. Luke, a best-selling author, CISSP instructor, and the driving force behind the immensely popular Facebook page "," brings a wealth of knowledge and passion to the table. Discover the keys to success in the realm of cybersecurity as Luke shares insights from his personal journey and experience in the field. As a CISSP (Certified Information Systems Security Professional) instructor, he's not just a teacher; he's a mentor who has personally guided over 3300 aspiring CISSPs to success in their exams. 🔒 What to Expect: Insider Tips for CISSP Success: Uncover the strategies and study techniques that have proven effective for thousands of CISSP candidates. Luke spills the secrets that go beyond the textbooks. Navigating the CISSP Landscape: The CISSP certification is no small feat, and Luke Ahmed breaks down the complexities, offering guidance on how to tackle the exam with confidence. The Evolution of Cybersecurity: Get a front-row seat to the ever-evolving world of cybersecurity. Luke shares his thoughts on emerging trends, threats, and the skills that professionals need to stay ahead in this dynamic field. Luke's Best-Selling Insights: As a best-selling author, Luke brings a unique perspective to the podcast. Explore the pages of his books and gain access to the wisdom that has resonated with cybersecurity enthusiasts worldwide. Get to know that “Mindset” that you MUST unlock to pass the ISC2 exam. LOTS of Fun: We lighten things up a bit towards the end of the episodes to finish on a light-hearted note! 🚀 Why You Should Tune In: Whether you're a seasoned cybersecurity professional or just starting your journey, this episode is a must-listen. Luke Ahmed's expertise and genuine passion for cybersecurity make for a captivating conversation that promises to inspire, educate, and empower. Don't miss out on this opportunity to tap into the mind of a CISSP guru and glean valuable insights that could shape your own path in the world of cybersecurity. Get ready to level up your cybersecurity knowledge and skills with Luke Ahmed on this exciting two-part episode of the Cyber Distortion Podcast! 👉 Connect with Luke: LinkedIn: Facebook: Website: 🎧 Subscribe and Share: 🔗 Twitter: @DistortionCyber 🔗 Blog: cyberdistortion.com 🔗 SWAG Shop: 🔗 Additional Resources: Look for our audio podcasts on all major streaming platforms as well 🎉 Join the Conversation: Share your thoughts, questions, and key takeaways from this episode on social media using the hashtag #CybersecurityMastermind. We can't wait to hear from you! Jason Popillion is a CISSP and serves as a CIO/CTO of a SaaS company and Kevin Pentecost is a CISSP, CISM, CEH, CPT, MPCS, MCSE, CCA, ITIL-F and serves as a Information Security Director for a Manufacturing company. Citations: KC7 Training for Cybersecurity Professionals - KC7 is a new way to learn cybersecurity that’s hands-on, fun, and engaging. With KC7, you’ll learn key cybersecurity skills while getting practical experience that feels just like the real job.
/episode/index/show/cyberdistortion/id/28854848
info_outline
S2 - Episode 011 – “Cybersecurity Happy Hour - with Chris Glanden (BARCODE Security)”
10/11/2023
S2 - Episode 011 – “Cybersecurity Happy Hour - with Chris Glanden (BARCODE Security)”
In this episode, Kevin and Jason shoot the breeze with fellow Cybersecurity podcaster Chris Glanden, a veteran cybersecurity professional passionate about Security Systems, breakthroughs, vulnerabilities, their mitigation and risk management. Chris has interviewed some of the most high-profile influencers and specialists in technology, hacking, and cyberspace. His episodes include guests like Phillip Wylie, Freaky Clown (FC), Jack Rhysider from Darknet Diaries, Alyssa Miller, Gummo, and Magda Chelly to name a few!! Conceptualized in mid-2020 amongst the Covid pandemic, he designed BARCODE to become THE alternative way to continue the social and educational elements of cybersecurity happy hours, technical meet-ups and security conference peer interaction that our industry was so deprived of during that time. Often, this is where new ideas and innovation is spawned, and not confined within 4 conference walls. Enter a no pressure atmosphere where listeners gain knowledge direct from the industry’s elite. Chris is working on an amazing documentary project called INHUMAN and Chris is bootstrapping everything, which is tough. If people want to find out more about what they’re doing, is the website with crowdfunding information and sponsorship opportunities. The documentary will be all about AI and we spill lots of juicy details in this episode. We really hope you like this episode as much as we enjoyed putting it together and spending time with our man, Chris! Jason Popillion is a CISSP and serves as a CIO/CTO of a SaaS company and Kevin Pentecost is a CISSP, CISM, CEH, CPT, MPCS, MCSE, CCA, ITIL-F and serves as a Information Security Director for a Manufacturing company. CITATIONS THE BARCODE PODCAST: Chris’ Badass Podcast page can be found here: BARCODE at Barcode Episode (Live from Las Vegas) with Special Guest “Freaky Clown:” Chris’ LinkedIn page: Twitter: THE DOCUMENTARY: Information about Chris’ Upcoming Documentary entitled “InHuman”: INHUMAN Trailer: Chris’ Partner Filmmaker and Cybersecurity Guru - MORE ON FREAKY CLOWN (FC): Freaky Clown’s Website: Freaky Clowns Book on Amazon “” CHRIS’ INTERVIEW WITH BLACK HAT HACKER GUMMO: Barcode Podcast Episode 53: MORE ON GUMMO: Black Hat Hacker “Gummo’s” story on Soft White Underbelly on YouTube: Image Credits: Caesars Palace - Photo by on MGM Photo - Photo by on Laptop Image - Photo by on Looking to Start Your Career in IT? Check out CompTIA as a great entry point into an IT career if you’re interested in a certification:
/episode/index/show/cyberdistortion/id/28293068
info_outline
S2 - Episode 010 – Quantum Branding: Turbocharge your Identity with AI
09/07/2023
S2 - Episode 010 – Quantum Branding: Turbocharge your Identity with AI
In this unconventional episode, Kevin and Jason are thrilled to welcome a true branding and growth specialist, Larry Roberts, famously known as the "Red Hat Guy." Larry brings a wealth of experience and knowledge in harnessing the power of AI tools to supercharge brand growth and visibility. 🔴 Meet Larry Roberts - The 'Red Hat Guy' 🔴 Larry Roberts has made a name for himself in the world of branding and marketing with his unique approach to using AI-driven strategies. As a seasoned expert in the field, he has successfully leveraged cutting-edge technology to help businesses and influencers thrive in the digital age. 🧠 Unlocking the Potential of AI 🤖 In this insightful conversation, Larry dives deep into the world of artificial intelligence and its transformative impact on branding. Discover how AI can revolutionize your marketing efforts, streamline your processes, and propel your brand to new heights. While this episode isn’t strictly focused on cybersecurity…Never fear. We do sprinkle in a little cybersecurity flavor for you as well! 🚀 Key Takeaways: 🌟 How AI is reshaping the landscape of brand growth. Practical tips for implementing AI in your branding strategy. Real-world success stories from Larry's experience. Real-world failures that also lead to growth. Karl Childers from Slingblade makes a surprise visit. The future of AI in marketing and brand management. 🎧 Tune In and Stay Informed! 📡 Don't miss this chance to gain invaluable insights from one of the industry's leading experts. Whether you're a seasoned marketer or just starting your branding journey, this episode is packed with actionable advice and inspiration. 👥 Connect with Larry Roberts 👥 Connect with Larry and stay updated on his latest insights: Twitter: @iamlarryroberts LinkedIn: Larry Roberts Instagram: thelarryroberts 🔗 Episode Links and Resources 🔗 🎉 Join the Conversation! 🎉 Share your thoughts and questions in the comments section below. What's your perspective on AI's role in branding and growth? Let's discuss! 🎯 Subscribe to Cyber Distortion Podcast 🎯 Never miss an episode! Subscribe now and stay informed about the latest trends, strategies, and expert insights in the world of cybersecurity and digital transformation. We really hope you like this episode as much as we enjoyed putting it together! Jason Popillion is a CISSP and serves as a CIO/CTO of a SaaS company and Kevin Pentecost is a CISSP, CISM, CEH, CPT, MPCS, MCSE, CCA, ITIL-F and serves as a Information Security Director for a Manufacturing company. CITATIONS AI Tools to consider: o - AI Chatbot for Humanlike Conversational Dialog o - AI Chatbot for Humanlike Conversational Dialog o - Text to Image Generation o - Generative Voice AI o - Text to Speech Larry’s Favorite Podcasts: o Jocko Podcast o Extreme Ownership Book – Jocko Willink and Leif Babin o o Smartless Podcast (Jason Bateman, Sean Hayes, and Will Arnett) o HBO Max 6-part series o Gary Vee Audio Experience - Podfest Expo: Where to find Larry: @TheLarryRoberts o Instagram o Facebook o LinkedIn Jamie Gravitt Comedy: Jamie Gravitt Image Credit: Sam Brand Photography
/episode/index/show/cyberdistortion/id/27968145
info_outline
S2 - Episode 009 – DEFCON – An Exhaustive Guide to Hacker Summer Camp – (with Dr. Louis DeWeaver)
08/04/2023
S2 - Episode 009 – DEFCON – An Exhaustive Guide to Hacker Summer Camp – (with Dr. Louis DeWeaver)
This very special episode is our contribution to all existing or soon-to-be DEFCON attendees! We go deep under the covers to crack the shell of all things Hacker Summer Camp in this definitive, ALL YOU NEED TO KNOW, and truly exhaustive guide. We join forces with our good friend, who we met at Hacker Summer Camp, Dr. Louis DeWeaver. Louis is a former professor and a seasoned cybersecurity expert who brings years of knowledge and many trips to DEFCON to this conversation. His upbeat personality is one of a kind! We like to say that Louis could definitely sell ice cubes to Eskimos! We start out with a brief history of DEFCON, talk about the basics on venue, cost, and of course the backstory on how founder Jeff Moss (a.k.a. Dark Tangent) started the largest hacker conference on the planet. Then, we round out this information packed episode with a definitive guide of the most important things you’re going to WANT to know if you plant to head to the dessert to join in the fun. We really hope you like this episode as much as we enjoyed putting it together! Jason Popillion is a CISSP and serves as a CIO/CTO of a SaaS company and Kevin Pentecost is a CISSP, CISM, CEH, CPT, MPCS, MCSE, CCA, ITIL-F and serves as a Information Security Director for a Manufacturing company. DOWNLOADS: The Official DECFON webpage: DEFCON on Twitter: The Official DC Documentary: OTHER CONFERENCES IN VEGAS THE WEEK OF HACKER SUMMER CAMP: BLACKHAT USA CONFERENCE: B-Sides Las Vegas: Squadcon: So, you want to BLOW SOME SHIT UP? Did you say “PARTIES?” – Find all the hopping social events in one spot: Look for their Google Calendar on the Twitter page! OH, you still want MORE?
/episode/index/show/cyberdistortion/id/27655665
info_outline
S2 - Episode 008 – Fighting Acronym Fatigue – Part II with Dr. Aaron Estes (CEO - Ironwood Cyber)
07/22/2023
S2 - Episode 008 – Fighting Acronym Fatigue – Part II with Dr. Aaron Estes (CEO - Ironwood Cyber)
In this follow-up episode, we are honored to continue our spirited discussion with (Dr. Aaron Estes – Ironwood Cyber CEO “Chief Epic Officer”) on with us to talk all about his company Ironwood Cyber, and some of the cool things they’re doing over there. Ever since we met the Ironwood Cyber team based out of Ft. Worth Texas, we knew we had a solid professional passion and connection and we shared MANY similar interests. The Ironwood Cyber team is a strong group of Engineers originally founded by not one, but TWO Lockheed Martin Fellows respected for their incredible skillsets. Aaron Estes and Ethan Puchaty. Lockheed Martin Fellowship represents less than 1% of the best technical Engineers the company has to offer and their backgrounds are quite impressive having worked for a company engineering some of the best technology the US Department of Defense has to offer. After leaving Lockheed Martin to start their own Cybersecurity firm (Ironwood Cyber), the company has continued its tradition of developing amazing technology with such out of the box concepts that their endpoint protection solutions boast 3 patents. Focusing on side-channel analysis, they’re quickly becoming a major player in the world of cybersecurity. This is part two of a two-part podcast episode, where we spend more time talking about their first electronic SWAG badge created in 2022 for DEFCON 30. We’ll be looking at some teasers and talking to Aaron about what fun and interesting things they’re doing for DEFCON 31. There may even be a few hints about the 2023 badge in the second part of this awesome conversation. I guess you’ll just have to wait and see!! The biggest hint of all….THERE IS! Jason Popillion is a CISSP and serves as a CIO/CTO of a SaaS company and Kevin Pentecost is a CISSP, CISM, CEH, CPT, MPCS, MCSE, CCA, ITIL-F and serves as a Information Security Director for a Manufacturing company. DOWNLOADS: Find out More about IRONWOOD CYBER: CYBER RX: FIRETHORN: Ironwood on Twitter: BLACKHAT USA CONFERENCE: DEFCON HACKER CONFERENCE: The Official DC Documentary:
/episode/index/show/cyberdistortion/id/27537078
info_outline
S2 - Episode 007 – Fighting Acronym Fatigue – Part I with Dr. Aaron Estes (CEO - Ironwood Cyber)
07/13/2023
S2 - Episode 007 – Fighting Acronym Fatigue – Part I with Dr. Aaron Estes (CEO - Ironwood Cyber)
In this episode, we are honored to have one of these amazing gentlemen (Dr. Aaron Estes – Ironwood Cyber CEO “Chief Epic Officer”) on with us to talk all about his company Ironwood Cyber, and some of the cool things they’re doing over there. Ever since we met the Ironwood Cyber team based out of Ft. Worth Texas, we knew we had a solid professional passion and connection and we shared MANY similar interests. The Ironwood Cyber team is a strong group of Engineers originally founded by not one, but TWO Lockheed Martin Fellows respected for their incredible skillsets. Aaron Estes and Ethan Puchaty. Lockheed Martin Fellowship represents less than 1% of the best technical Engineers the company has to offer and their backgrounds are quite impressive having worked for a company engineering some of the best technology the US Department of Defense has to offer. After leaving Lockheed Martin to start their own Cybersecurity firm (Ironwood Cyber), the company has continued its tradition of developing amazing technology with such out of the box concepts that their endpoint protection solutions boast 3 patents. Focusing on side-channel analysis, they’re quickly becoming a major player in the world of cybersecurity. The conversation flowed so well, in fact, that we ended up breaking this awesome episode into two parts. The first focusing on the Ironwood origin story, and their technology and the team. Then, in about a week, we’ll be dropping part two, where we spend more time talking about their first electronic SWAG badge created in 2022 for DEFCON 30. We’ll be looking at some teasers and talking to Aaron about what fun and interesting things they’re doing for DEFCON 31. There may even be a few hints about the 2023 badge in the second part of this awesome conversation. I guess you’ll just have to wait and see!! Jason Popillion is a CISSP and serves as a Director of Automotive Aftermarket of a SaaS company and Kevin Pentecost is a CISSP, CISM, CEH, CPT, MPCS, MCSE, CCA, ITIL-F and serves as a Information Security Director for a Manufacturing company. DOWNLOADS: Find out More about IRONWOOD CYBER: CYBER RX: FIRETHORN: Ironwood on Twitter: BLACKHAT USA CONFERENCE: DEFCON HACKER CONFERENCE: The Official DC Documentary:
/episode/index/show/cyberdistortion/id/27458391
info_outline
S2 - Episode 006 – You ARE the Weakest link!
06/07/2023
S2 - Episode 006 – You ARE the Weakest link!
A long time in the making, this episode on the importance of User Awareness may just be the most important episode we’ve released so far. Kevin Pentecost and Jason Popillion are security veterans and Certified Information Systems Security Professionals (CISSPs) who know their way around a good User Awareness Training program having personally trained in classroom led environments as well as fostered and matured their own corporate training programs over their years as Cybersecurity managers. Join us as the duo delve into the critical topic of Cybersecurity User Awareness. With their wealth of experience, they provided invaluable insights and practical advice on how individuals can protect themselves against evolving cyber threats. They emphasize that user awareness plays a pivotal role in defending against cyber threats. They highlight the fact that attackers often exploit human vulnerabilities and trick individuals into compromising their own security. By enhancing user awareness, people can become more proactive in recognizing and responding to potential threats. A key role is understanding that just like every technical control, YOU are a critical layer of defense both in your personal life, and in your corporate environment. We take a look at the prevalence of social engineering attacks, which manipulate human psychology to deceive individuals into divulging sensitive information or performing harmful actions. We explain common tactics such as phishing emails, vishing calls, targeting spear phishing, CEO Spoofing, and many other non-email related social engineering tactics. To counter these threats, they recommend adopting a skeptical mindset, scrutinizing unexpected communications, and verifying the authenticity of requests before taking any action. Jason Popillion is a CISSP and serves as a CIO/CTO of a SaaS company and Kevin Pentecost is a CISSP, CISM, CEH, CPT, MPCS, MCSE, CCA, ITIL-F and serves as a Information Security Director for a Manufacturing company. DOWNLOADS: PRINT and HANG this on your Wall: CyberDistortion Blog: CyberDistortion Swag Shop:
/episode/index/show/cyberdistortion/id/27071151