Cyber Distortion Podcast Series

By: Jason Popillion CISSP and Kevin Pentecost CISSP
  • Summary

  • Jason and Kevin, seasoned Cyber Security professionals, explain cyber security concepts that everyone needs to know in simple terms. They will leave you with practical takeaways you can use to keep yourself and your organizations safe. Jason Popillion is a CISSP and serves as a CIO/CTO of a SaaS company and Kevin Pentecost is a CISSP, CISM, CEH, CPT, MPCS, MCSE, CCA, ITIL-F and serves as a Information Security Manager for a Manufacturing company.
    Jason Popillion
    Show More Show Less
activate_samplebutton_t1
Episodes
  • S3 – Episode 010 – The Art of the Pivot w/Wirefall
    Oct 14 2024

    In this episode of the Cyber Distortion Podcast, we sit down with Dustin Dykes, better known as Wirefall, the founder of the Dallas Hackers Association (DHA). Join us as we dive into the origins of DHA, its impact on the cybersecurity community, and Wirefall's journey in the hacking world.

    Dustin is a Tribe of Hackers and Art of Intrusion Contributor, a public speaker, an improv and stand up student and performer, and of course, a technical guru! He is a local security community advocate. Founder of the Dallas Hackers Association and former board member of BSides DFW and TheLab.MS.

    He is a military and law enforcement veteran with 25+ years of security consulting experience focused on attack and penetration testing.

    We also get into the other really cool business that Dustin is a part of, Telesploit. The Telesploit solution enables organizations to remotely perform internal vulnerability assessments and penetration tests leveraging resources located anywhere in the world.

    Whether you're a seasoned hacker or just curious about the culture, this episode is packed with insights you won’t want to miss!

    Jason Popillion is a CISSP and serves as a CIO/CTO of a SaaS company and Kevin Pentecost is a CISSP, CISM, CEH, CPT, MPCS, MCSE, CCA, ITIL-F and serves as the Information Security Director for a Manufacturing company.

    CITATIONS

    Wirefall’s LinkedIn Profile:

    https://www.linkedin.com/in/wirefall/

    Wirefalls’s Twitter (X) Profile:

    https://twitter.com/DHAhole

    DHA (Dallas Hackers Association) (X) Profile:

    https://twitter.com/Dallas_Hackers

    Telesploit:

    https://www.telesploit.com/

    Telesploit ‘X’ Profile:

    https://twitter.com/telesploit

    Telesploit LinkedIn Profile:

    https://www.linkedin.com/company/telesploit/

    OTHER D/FW Hacker Groups:

    DC214 ‘X’ Profile:

    https://twitter.com/DC214DFW

    DC940 ‘X’ Profile:

    https://twitter.com/DCG940

    Hack FtW’s Profile:

    https://twitter.com/Hack_FtW

    Show More Show Less
    1 hr and 48 mins
  • S3 – Episode 009 – He Robs Banks! w/FC (aka: Freaky Clown)
    Sep 13 2024

    Welcome to this episode of Cyber Distortion, where we explore the cutting edge of technology, security, and the future of humanity itself. Today, Kevin and Jason have the privilege of talking with FC. FC or, “Freaky Clown” as he’s known more commonly by his hacker handle, is a renowned ethical hacker and social engineer, as well as global keynote speaker. He has been working in the information security field for over 25 years and is motivated by a drive to make individuals, organizations, and countries more secure. When he is not legally breaking into companies, FC takes audiences on an eye-opening journey into the hacker’s mindset. He has delivered over 50 keynotes including CPX360, C-E-R-N and Intersec. FC demystifies security with his expertise, humor, and passion.

    His bestselling book ‘How I Rob Banks – and other Such Places’ was published in June 2023.

    In today’s conversation, the guys delve into many of FC’s crazy stories from his physical penetration testing days. Many of the stories are actually covered in his awesome book but there is so much more to FC’s story.

    FC and his amazing wife Dr. Jessica Barker, also run their company Cygenta, which is centered around security in 3 key areas. Their approach to cyber security is more than just penetration testing or awareness training. They are experts in combining the technical, human and physical aspects of security best practice. They help some of the largest and most complicated organizations build resilience and sustainability in their risk management, not just their technical response. With Cygenta’s approach to cyber security, you and your people are safer, your technology is more resilient and your perimeters are more secure.

    Enjoy this amazing and very entertaining story time episode!

    Jason Popillion is a CISSP and serves as a CIO/CTO of a SaaS company and Kevin Pentecost is a CISSP, CISM, CEH, CPT, MPCS, MCSE, CCA, ITIL-F and serves as the Information Security Director for a Manufacturing company.

    CITATIONS

    FC’s LinkedIn Profile:

    https://www.linkedin.com/in/freakyclown/

    FC’s Twitter (X) Profile:

    https://twitter.com/_Freakyclown_

    Jessica’s LinkedIn Profile:

    https://www.linkedin.com/in/jessica-barker/

    Jessica’s Twitter (X) Profile:

    https://twitter.com/drjessicabarker

    Cygenta LinkedIn Profile:

    https://www.linkedin.com/company/cygenta/

    Cygenta Website:

    https://www.cygenta.co.uk/

    FC’s Book on Amazon:

    https://www.amazon.com/How-Rob-Banks-Other-Places/dp/B0C8WJCRN6/

    Jessica’s Book on Amazon:

    https://www.amazon.com/Hacked-Uncovering-Strategies-Secrets-Attacks/dp/1398613703

    Show More Show Less
    1 hr and 52 mins
  • S3 – Episode 008 – The Transhuman
    Aug 29 2024

    Welcome to this episode of Cyber Distortion, where we explore the cutting edge of technology, security, and the future of humanity itself. Today, we have a truly extraordinary guest joining us: Len Noe, a Transhumanist with over 10 chips embedded in his body. Len isn’t just a futurist—he’s living proof of what the future could hold, using his integrated technology to perform hacks and complete takeovers on various devices. His unique perspective challenges the boundaries between human and machine, and today, he’s here to share his incredible journey and insights with us.

    Len’s path to becoming a white hat hacker and a technical evangelist at CyberArk is as fascinating as the technology he wields. Once a 1%er biker, Len made a dramatic transition from the world of outlaw motorcycle clubs to the front lines of cyber defense. His story is one of transformation, not just in terms of his career but in the very way he interacts with the world around him, using the embedded chips in his body as tools for exploration, protection, and demonstration.

    In this conversation, we’ll dive deep into the world of Transhumanism, explore the ethical implications of merging man with machine, and discuss how Len’s experiences have shaped his views on the future of cybersecurity. Whether you’re a tech enthusiast, a security professional, or just curious about the possibilities of human augmentation, this episode promises to be a thought-provoking journey into the unknown.

    Jason Popillion is a CISSP and serves as a CIO/CTO of a SaaS company and Kevin Pentecost is a CISSP, CISM, CEH, CPT, MPCS, MCSE, CCA, ITIL-F and serves as the Information Security Director for a Manufacturing company.

    CITATIONS

    Len’s LinkedIn Profile:

    https://www.linkedin.com/in/len-noe/

    William McCurdy Article (The Standard – UK):

    https://www.standard.co.uk/news/tech/cyborg-hacker-infiltrate-phone-office-len-noe-b1072862.html

    Len’s Book “Human Hacked: My Life and Lessons as the World's First Augmented Ethical Hacker”:

    Buy it on Amazon

    Cyber Ark:

    https://www.cyberark.com/

    The Cyber Cognition Podcast:

    https://www.itspmagazine.com/cyber-cognition-podcast

    Dangerous Things – Embedded Biohacking Stuff:

    https://dangerousthings.com/

    More on the PegLeg Impanted Device:

    http://pegleg.org/

    More on the Biohacking Village at DEFCON and Beyond:

    https://www.villageb.io/

    Biohacking Wearables:

    https://www.diygenius.com/best-biohacking-wearables/

    Show More Show Less
    1 hr and 45 mins

What listeners say about Cyber Distortion Podcast Series

Average Customer Ratings

Reviews - Please select the tabs below to change the source of reviews.

In the spirit of reconciliation, Audible acknowledges the Traditional Custodians of country throughout Australia and their connections to land, sea and community. We pay our respect to their elders past and present and extend that respect to all Aboriginal and Torres Strait Islander peoples today.