Episodes

  • In this episode, Jason and Kevin sit down with the one and only storyteller from the dark side of the internet, Jack Rhysider. Jack is the beloved voice behind the extremely popular podcast The Darknet Diaries. Tonight, it’s a podcaster-to-podcaster conversational happy hour!

    Jack attended a highly ranked university to study computer engineering with an emphasis on software engineering. Received formal training in Linux, Unix, Windows, C, C++, Java, ASM, logic, and electrical engineering.

    After college, he spent over a decade conducting network hardening by securing, analyzing, and testing network equipment such as firewalls, routers, and IDS units. Completed work on dozens of client's networks ranging from schools, banks, commercial, government, and defense contractors. Acquired numerous certifications in Cisco and Juniper and other security related training. Architected and built a SOC using a SIEM to detect network threats and intrusions for clients.

    Darknet Diaries produces audio stories specifically intended to capture, preserve, and explain the culture around hacking and cyber security in order to educate and entertain both technical and non-technical audiences.

    At Darknet Diaries, they adhere to journalistic standards by fact checking and ethical sourcing of information. They adopt principles of truthfulness, accuracy, objectivity, impartiality, fairness, and public accountability.

    Darknet Diaries is trustworthy, they strive to enhance intellectual development, expand knowledge, deepen aural enjoyment, increase the awareness of living in a highly technical society, and result in a service to listeners which makes them more responsive, informed citizens of their digital lives.

    Jason Popillion is a CISSP and serves as a CIO/CTO of a SaaS company and Kevin Pentecost is a CISSP, CISM, CEH, CPT, MPCS, MCSE, CCA, ITIL-F and serves as the Information Security Director for a Manufacturing company.

    CITATIONS:

    Darknet Diaries Website:

    https://www.darknetdiaries.com

    Darknet Diaries SWAG Shop:

    https://shop.darknetdiaries.com/

    Jack’s LinkedIn:

    https://www.linkedin.com/in/jack-rhysider-02922a167/

    Twitter:

    https://twitter.com/JackRhysider

    https://twitter.com/DarknetDiaries

    YouTube Channel:

    https://www.youtube.com/@JackRhysider

    Spotify:

    https://open.spotify.com/show/4XPl3uEEL9hvqMkoZrzbx5

    Apple Podcasts:

    https://podcasts.apple.com/us/podcast/darknet-diaries/id1296350485

    Reddit:

    https://www.reddit.com/r/darknetdiaries/

    Patreon:

    https://www.patreon.com/darknetdiaries

  • EPISODE DESCRIPTION:

    In this episode, we sit down with Sr. Security Consultant and Red Teamer, Alethe Denis. Alethe is a social engineer who excels in the art of human hacking.

    Alethe Denis is a Senior Security Consultant on the Red Team at Bishop Fox, an offensive cyber security company that helps clients protect their assets and data. She holds the Certified Ethical Hacker (CEH) certification and has multiple awards and publications in the field of social engineering and cybersecurity.

    Pursuing her passion for hacking she joined the cyber security industry after winning the prestigious DEF CON Social Engineering Capture the Flag competition in 2019 and receiving a coveted DEF CON Black Badge. Since then, she has been a leading social engineering expert and cybersecurity ally for companies around the globe, specializing in red team attack emulative social engineering. She is also a board member of DEF CON Groups and a member of InfraGard, a partnership between the FBI and the private sector.

    We get into some of her amazing stories in this episode so snap on that chin strap. We’re going to have some fun!!

    Jason Popillion is a CISSP and serves as a CIO/CTO of a SaaS company and Kevin Pentecost is a CISSP, CISM, CEH, CPT, MPCS, MCSE, CCA, ITIL-F and serves as the Information Security Director for a Manufacturing company.

    CITATIONS:

    HOW TO FIND ALETHE

    LinkedIn:

    https://www.linkedin.com/in/alethe/

    Twitter:

    https://twitter.com/AletheDenis

    Bishop Fox:

    https://bishopfox.com/authors/alethe-denis

    We are Tech Women Interview:

    https://wearetechwomen.com/inspirational-woman-alethe-denis-senior-security-consultant/

    Social Engineering Links:

    https://www.se.community/

    https://linktr.ee/sec_defcon

    DEFCON:

    https://defcon.org/

    Black Badge Hall of Fame & More on the Black Badge:

    https://defcon.org/html/links/dc-black-badge.html

    https://defcon.org/html/links/dc-bb-policy.html

  • Missing episodes?

    Click here to refresh the feed.

  • EPISODE DESCRIPTION:

    In this episode, Kevin and Jason sit down to talk shop with Cyber-guru Phillip Wylie. Phillip is a friend and a member of the newly formed Cyber Circus network which includes other podcasters including Chris Glanden of BarCode Security as well as Kevin & Jason from the Cyber Distortion Podcast.

    Phillip Wylie is a well-known figure in the cybersecurity and ethical hacking community, recognized for his extensive experience and contributions to the field.

    Background and Expertise: Phillip has a background in penetration testing and ethical hacking. His career spans over two decades, during which he has held various roles in IT and security, including penetration tester, security engineer, and security consultant. His expertise lies in identifying and exploiting vulnerabilities in computer systems and networks to help organizations strengthen their security postures.

    Education and Advocacy: He is known for his efforts in cybersecurity education and advocacy, working to raise awareness about the importance of cybersecurity and sharing knowledge with aspiring cybersecurity professionals. Wylie often speaks at conferences and seminars, sharing his insights on ethical hacking, penetration testing, and cybersecurity trends.

    The Pwn School Project: Phillip is the founder of The Pwn School Project, an educational initiative aimed at teaching ethical hacking and cybersecurity skills to a wider audience. The project focuses on providing free or low-cost education to those interested in pursuing a career in cybersecurity, emphasizing hands-on learning and practical skills.

    Authorship and Thought Leadership: He has contributed to the cybersecurity community as a writer and thought leader, sharing his knowledge through articles, books, and research papers. His work often covers topics related to ethical hacking techniques, career advice for cybersecurity professionals, and the latest trends in cyber threats and defenses.

    Mentorship: Phillip is also known for his mentorship role in the cybersecurity community, guiding newcomers and helping them navigate the complexities of starting a career in cybersecurity. He advocates for continuous learning and ethical practices within the field.

    Jason Popillion is a CISSP and former CIO/CTO of a SaaS company and Kevin Pentecost is a CISSP, CISM, CEH, CPT, MPCS, MCSE, CCA, ITIL-F and serves as the Information Security Director for a Manufacturing company.

    CITATIONS:

    Links to find Phillip:

    Web:

    https://www.thehackermaker.com/

    LinkedIn:

    https://www.linkedin.com/in/phillipwylie/

    Twitter - X:

    https://twitter.com/PhillipWylie

    YouTube:

    https://www.youtube.com/@PhillipWylie

    Spotify:

    https://open.spotify.com/show/6LH3TYGlg0JRsK7UzDmbjb?si=3f1c8f364613460c

    DEFCON Meetup Groups:

    https://forum.defcon.org/social-groups

    DC940 (Denton Texas):

    https://twitter.com/DCG940

  • In this episode, Kevin and Jason kick of what we expect will be our most exciting season to date. We come out of the gate like two savage wildebeests ready to devour anything in our path! Wait, that sounds extreme. Maybe it’s on that intense, but it’s LEGIT intense as we tackle a topic that only the fearless dare unpackage DEEPFAKES!

    In this octane fueled episode, we delve into the intricate world of deepfakes, a term that has rapidly evolved from obscure tech lingo to a hot-button issue at the intersection of technology, ethics, and reality. We give funny examples and enjoy a light-hearted segment showing how deepfakes are used for laughs, but the light-hearted fun only lasts so long.

    The episode takes a critical turn as we examine the darker side of deepfakes, highlighting instances where they've been used to spread misinformation, and create non-consensual explicit content. The conversation also covers the psychological and societal impacts of living in a world where seeing is no longer believing, and how our understanding of truth and reality is being challenged.

    "Down the Deepfake Rabbit Hole" offers a comprehensive and nuanced examination of deepfakes, encouraging listeners to ponder the profound questions they raise about innovation, authenticity, and the fabric of our digital lives. Join us for this thought-provoking journey into one of the most fascinating and controversial topics in today's digital age.

    Jason Popillion is a CISSP and serves as a former CIO/CTO of a SaaS company and Kevin Pentecost is a CISSP, CISM, CEH, CPT, MPCS, MCSE, CCA, ITIL-F and serves as the Information Security Director for a Manufacturing company.

    CITATIONS

    CTRL_SHIFT_FACE:

    Their awesome channel can be found out on YouTube. Check out some of the great deepfakes they’re creating out there at https://www.youtube.com/@CtrlShiftFace

    AICPA Guidance:

    https://www.aicpa-cima.com/news/article/deepfakes-emerge-as-real-cybersecurity-threat

    AI DEEPFAKE SCAM STORY:

    https://www.theguardian.com/world/2024/feb/05/hong-kong-company-deepfake-video-conference-call-scam

    AI TEACHER SEX SCANDAL STORIES:

    https://www.fox26houston.com/news/houston-area-student-accused-of-creating-deep-fake-explicit-photos-of-teacher-sharing-them-online

    https://nypost.com/2023/04/14/texas-student-faked-nudes-of-teacher-report/

    TOOLS USED IN THE EPISODE INTRO:

    Speechify:

    https://speechify.com/

    Swapface:

    https://www.swapface.org

    Envato Elements (Images):

    https://elements.envato.com

    Audio (Audio):

    https://audiojungle.net/

  • Get ready for an electrifying evening as the "Lone Star Cyber Circus" pitches its virtual tent at the renowned Hop & Sting Brewery in Grapevine, Texas! This live podcast event, a harmonious blend of cutting-edge cyber talks and classic Texan hospitality, promises an experience like no other.

    As you step into the rustic yet modern ambiance of Hop & Sting Brewery, you'll be greeted by the rich aroma of craft beers, a hallmark of this beloved local establishment. The brewery's spacious interior, adorned with hints of Texan charm and cyber-themed décor, sets the perfect stage for an evening of engaging discussions and lively entertainment.

    The "Lone Star Cyber Circus" is more than just a podcast; it's a celebration of the digital age, wrapped in the warmth of Texan culture. Hosted by charismatic cyber experts, Chris Glanden (Barcode Security), Phillip Wylie (Phillip Wylie Show), and Kevin Pentecost & Jason Popillion (Cyber Distortion Podcast). Their discussions are a riveting blend of expert insights, humorous anecdotes, and lively banter.

    What makes this event truly unique is its interactive format. The live audience, a diverse mix of tech enthusiasts, local patrons, and visitors, gets to participate in Q&A sessions, offering a dynamic and inclusive experience.

    As the podcast rolled, guests enjoyed Hop & Sting's exquisite selection of craft beers, each brew telling its own story of local ingredients and brewing artistry. The brewery's friendly staff were more than happy to guide you through their selection, ensuring a perfect pairing for your podcast experience.

    Throughout the evening, the "Lone Star Cyber Circus" also features special guests - from renowned tech gurus to local cybersecurity heroes - adding depth and diversity to the conversation. These guest appearances are a crowd favorite, often leading to insightful, sometimes heated, but always entertaining discussions. The event featured experts in the area of the DFW Hacking scene: Wirefall (Dallas Hackers Association), Juneau Jones (DC214), and NEURAL PHANTOM (HackFTW), Phillip Wylie himself, represented Denton and (DC940).

    Following the awesome discussion on the DFW Hacker scene, we shifted into another very hot topic on AI and where it’s headed in the near future. Special guests Justin “Hutch” Hutchins, and Quentin Rhoads-Herrera stole the show with this topic.

    Please follow our AWESOME SPONSORS: Cyberstrike and Trace3 who made it all happen. We want to extend the most heartfelt THANK YOU to both of them for making this event possible!!

    As the night draws to a close, the lively atmosphere of Hop & Sting Brewery, combined with the thought-provoking content of "Lone Star Cyber Circus," leaves you with a sense of connection - to the community, the evolving digital world, and the vibrant culture of Texas. It's an experience that goes beyond a typical podcast recording, leaving you enriched, entertained, and eager for the next episode.

    Whether you were a tech aficionado, a beer enthusiast, or just in search of a unique night out in Grapevine, the "Lone Star Cyber Circus" at Hop & Sting Brewery was an event you didn’t want to miss. If you missed this one, follow us on Twitter for more information about the next live Cyber Circus event! We had so much fun, we can’t wait for the next one!!

    Join us for an evening where the cyber world and Texas charm collide, creating an unforgettable podcast experience! 🍻🎪

    CITATIONS:

    CyberStrike: https://cyberstrikegroup.com/

    Trace3: https://www.trace3.com/

    Barcode Security: https://barcodesecurity.com/

    Phillip Wylie Show: https://www.phillipwylieshow.com/

    Cyber Distortion Podcast on Twitter: https://cyberdistortionpodcast.com/

    DFW Hacker Scene:

    Dallas Hackers Association: https://twitter.com/Dallas_Hackers

    DC214: https://twitter.com/DC214DFW

    DC940: https://twitter.com/DCG940

    HackFTW: https://twitter.com/Hack_FtW

    Thanks to Kiss for the amazing tune “Psycho Circus” which we used as our walk-up song at the event!

  • Description:

    🎙️This is part two of our riveting two-part episode with the extraordinary Luke Ahmed. Luke, a best-selling author, CISSP instructor, and the driving force behind the immensely popular Facebook page "CISSP Exam Preparation - Study Notes and Theory," brings a wealth of knowledge and passion to the table.

    Discover the keys to success in the realm of cybersecurity as Luke shares insights from his personal journey and experience in the field. As a CISSP (Certified Information Systems Security Professional) instructor, he's not just a teacher; he's a mentor who has personally guided over 3300 aspiring CISSPs to success in their exams.

    🔒 What to Expect:

    Insider Tips for CISSP Success: Uncover the strategies and study techniques that have proven effective for thousands of CISSP candidates. Luke spills the secrets that go beyond the textbooks. Navigating the CISSP Landscape: The CISSP certification is no small feat, and Luke Ahmed breaks down the complexities, offering guidance on how to tackle the exam with confidence. The Evolution of Cybersecurity: Get a front-row seat to the ever-evolving world of cybersecurity. Luke shares his thoughts on emerging trends, threats, and the skills that professionals need to stay ahead in this dynamic field. Luke's Best-Selling Insights: As a best-selling author, Luke brings a unique perspective to the podcast. Explore the pages of his books and gain access to the wisdom that has resonated with cybersecurity enthusiasts worldwide. Get to know that “Mindset” that you MUST unlock to pass the ISC2 exam. LOTS of Fun: We lighten things up a bit towards the end of the episodes to finish on a light-hearted note!

    🚀 Why You Should Tune In:

    Whether you're a seasoned cybersecurity professional or just starting your journey, this episode is a must-listen. Luke Ahmed's expertise and genuine passion for cybersecurity make for a captivating conversation that promises to inspire, educate, and empower.

    Don't miss out on this opportunity to tap into the mind of a CISSP guru and glean valuable insights that could shape your own path in the world of cybersecurity. Get ready to level up your cybersecurity knowledge and skills with Luke Ahmed on this exciting two-part episode of the Cyber Distortion Podcast!

    👉 Connect with Luke:

    LinkedIn: https://www.linkedin.com/in/luke-ahmed-%F0%9F%9A%80-446601133/ Facebook: CISSP Exam Preparation - Study Notes and Theory Website: https://www.studynotesandtheory.com/

    🎧 Subscribe and Share: https://www.youtube.com/@TheCyberDistortionPodcast

    🔗 Twitter: @DistortionCyber

    🔗 Blog: cyberdistortion.com

    🔗 SWAG Shop: https://cyberdistortionswag.shop

    🔗 Additional Resources: Look for our audio podcasts on all major streaming platforms as well

    🎉 Join the Conversation: Share your thoughts, questions, and key takeaways from this episode on social media using the hashtag #CybersecurityMastermind. We can't wait to hear from you!

    Jason Popillion is a CISSP and serves as a CIO/CTO of a SaaS company and Kevin Pentecost is a CISSP, CISM, CEH, CPT, MPCS, MCSE, CCA, ITIL-F and serves as a Information Security Director for a Manufacturing company.

    Citations:

    KC7 Training for Cybersecurity Professionals - https://kc7cyber.com/

    KC7 is a new way to learn cybersecurity that’s hands-on, fun, and engaging.
    With KC7, you’ll learn key cybersecurity skills while getting practical experience that feels just like the real job.

    HUD Graphic for CISSP Tips – Credit https://pngtree.com/freepng/futuristic-lower-third-sci-fi-design-template-for-channel-news-information-call-box-bars-and-modern-digital-info-boxes-element-of-hud-interface-callouts-vector-illustration_8186961.html'>png image from pngtree.com

  • In this riveting two-part episode, join us as we dive deep into the world of cybersecurity with the extraordinary Luke Ahmed. Luke, a best-selling author, CISSP instructor, and the driving force behind the immensely popular Facebook page "CISSP Exam Preparation - Study Notes and Theory," brings a wealth of knowledge and passion to the table.

    Discover the keys to success in the realm of cybersecurity as Luke shares insights from his personal journey and experience in the field. As a CISSP (Certified Information Systems Security Professional) instructor, he's not just a teacher; he's a mentor who has personally guided over 3300 aspiring CISSPs to success in their exams.

    🔒 What to Expect:

    Insider Tips for CISSP Success: Uncover the strategies and study techniques that have proven effective for thousands of CISSP candidates. Luke spills the secrets that go beyond the textbooks. Navigating the CISSP Landscape: The CISSP certification is no small feat, and Luke Ahmed breaks down the complexities, offering guidance on how to tackle the exam with confidence. The Evolution of Cybersecurity: Get a front-row seat to the ever-evolving world of cybersecurity. Luke shares his thoughts on emerging trends, threats, and the skills that professionals need to stay ahead in this dynamic field. Luke's Best-Selling Insights: As a best-selling author, Luke brings a unique perspective to the podcast. Explore the pages of his books and gain access to the wisdom that has resonated with cybersecurity enthusiasts worldwide. Get to know that “Mindset” that you MUST unlock to pass the ISC2 exam. LOTS of Fun: We lighten things up a bit towards the end of the episodes to finish on a light-hearted note!

    🚀 Why You Should Tune In:

    Whether you're a seasoned cybersecurity professional or just starting your journey, this episode is a must-listen. Luke Ahmed's expertise and genuine passion for cybersecurity make for a captivating conversation that promises to inspire, educate, and empower.

    Don't miss out on this opportunity to tap into the mind of a CISSP guru and glean valuable insights that could shape your own path in the world of cybersecurity. Get ready to level up your cybersecurity knowledge and skills with Luke Ahmed on this exciting two-part episode of the Cyber Distortion Podcast!

    👉 Connect with Luke:

    LinkedIn: https://www.linkedin.com/in/luke-ahmed-%F0%9F%9A%80-446601133/ Facebook: CISSP Exam Preparation - Study Notes and Theory Website: https://www.studynotesandtheory.com/

    🎧 Subscribe and Share: https://www.youtube.com/@TheCyberDistortionPodcast

    🔗 Twitter: @DistortionCyber

    🔗 Blog: cyberdistortion.com

    🔗 SWAG Shop: https://cyberdistortionswag.shop

    🔗 Additional Resources: Look for our audio podcasts on all major streaming platforms as well

    🎉 Join the Conversation: Share your thoughts, questions, and key takeaways from this episode on social media using the hashtag #CybersecurityMastermind. We can't wait to hear from you!

    Jason Popillion is a CISSP and serves as a CIO/CTO of a SaaS company and Kevin Pentecost is a CISSP, CISM, CEH, CPT, MPCS, MCSE, CCA, ITIL-F and serves as a Information Security Director for a Manufacturing company.

    Citations:

    KC7 Training for Cybersecurity Professionals - https://kc7cyber.com/

    KC7 is a new way to learn cybersecurity that’s hands-on, fun, and engaging.
    With KC7, you’ll learn key cybersecurity skills while getting practical experience that feels just like the real job.

  • In this episode, Kevin and Jason shoot the breeze with fellow Cybersecurity podcaster Chris Glanden, a veteran cybersecurity professional passionate about Security Systems, breakthroughs, vulnerabilities, their mitigation and risk management.

    Chris has interviewed some of the most high-profile influencers and specialists in technology, hacking, and cyberspace. His episodes include guests like Phillip Wylie, Freaky Clown (FC), Jack Rhysider from Darknet Diaries, Alyssa Miller, Gummo, and Magda Chelly to name a few!!

    Conceptualized in mid-2020 amongst the Covid pandemic, he designed BARCODE to become THE alternative way to continue the social and educational elements of cybersecurity happy hours, technical meet-ups and security conference peer interaction that our industry was so deprived of during that time. Often, this is where new ideas and innovation is spawned, and not confined within 4 conference walls. Enter a no pressure atmosphere where listeners gain knowledge direct from the industry’s elite.

    Chris is working on an amazing documentary project called INHUMAN and Chris is bootstrapping everything, which is tough. If people want to find out more about what they’re doing, inhumandocumentary.com is the website with crowdfunding information and sponsorship opportunities. The documentary will be all about AI and we spill lots of juicy details in this episode.

    We really hope you like this episode as much as we enjoyed putting it together and spending time with our man, Chris!

    Jason Popillion is a CISSP and serves as a CIO/CTO of a SaaS company and Kevin Pentecost is a CISSP, CISM, CEH, CPT, MPCS, MCSE, CCA, ITIL-F and serves as a Information Security Director for a Manufacturing company.

    CITATIONS

    THE BARCODE PODCAST:

    Chris’ Badass Podcast page can be found here:

    https://barcodesecurity.com/

    BARCODE at Barcode Episode (Live from Las Vegas) with Special Guest “Freaky Clown:”

    https://barcodesecurity.com/bonus-bcp-live-with-fc/

    Chris’ LinkedIn page:

    https://www.linkedin.com/in/chrisglanden/

    Twitter:

    https://twitter.com/ChrisGlitz

    THE DOCUMENTARY:

    Information about Chris’ Upcoming Documentary entitled “InHuman”:

    https://inhumandocumentary.com/

    INHUMAN Trailer: https://www.youtube.com/watch?app=desktop&v=RZZU28RBb7k

    Chris’ Partner Filmmaker and Cybersecurity Guru - Matt Barnett’s LinkedIn

    MORE ON FREAKY CLOWN (FC):

    Freaky Clown’s Website:

    https://www.freakyclown.com/

    Freaky Clowns Book on Amazon “How I Rob Banks

    CHRIS’ INTERVIEW WITH BLACK HAT HACKER GUMMO:

    Barcode Podcast Episode 53:

    https://www.youtube.com/watch?v=_3Uvm_jxRXw

    MORE ON GUMMO:

    Black Hat Hacker “Gummo’s” story on Soft White Underbelly on YouTube:

    https://www.youtube.com/watch?v=g6igTJXcqvo

    https://www.youtube.com/watch?v=3ZtkMmVDNEo

    Image Credits:

    Caesars Palace - Photo by Wesley Tingey on Unsplash

    MGM Photo - Photo by Marcos Nieto on Unsplash

    Laptop Image - Photo by Luca Bravo on Unsplash

    Looking to Start Your Career in IT?

    Check out CompTIA as a great entry point into an IT career if you’re interested in a certification:

    https://www.comptia.org/home

    https://www.comptia.org/career-change/switching-career-path/get-into-it-without-a-degree

  • In this unconventional episode, Kevin and Jason are thrilled to welcome a true branding and growth specialist, Larry Roberts, famously known as the "Red Hat Guy." Larry brings a wealth of experience and knowledge in harnessing the power of AI tools to supercharge brand growth and visibility.

    🔴 Meet Larry Roberts - The 'Red Hat Guy' 🔴 Larry Roberts has made a name for himself in the world of branding and marketing with his unique approach to using AI-driven strategies. As a seasoned expert in the field, he has successfully leveraged cutting-edge technology to help businesses and influencers thrive in the digital age.

    🧠 Unlocking the Potential of AI 🤖 In this insightful conversation, Larry dives deep into the world of artificial intelligence and its transformative impact on branding. Discover how AI can revolutionize your marketing efforts, streamline your processes, and propel your brand to new heights. While this episode isn’t strictly focused on cybersecurity…Never fear. We do sprinkle in a little cybersecurity flavor for you as well!

    🚀 Key Takeaways: 🌟

    How AI is reshaping the landscape of brand growth. Practical tips for implementing AI in your branding strategy. Real-world success stories from Larry's experience. Real-world failures that also lead to growth. Karl Childers from Slingblade makes a surprise visit. The future of AI in marketing and brand management.

    🎧 Tune In and Stay Informed! 📡 Don't miss this chance to gain invaluable insights from one of the industry's leading experts. Whether you're a seasoned marketer or just starting your branding journey, this episode is packed with actionable advice and inspiration.

    👥 Connect with Larry Roberts 👥 Connect with Larry and stay updated on his latest insights: Twitter: @iamlarryroberts LinkedIn: Larry Roberts Instagram: thelarryroberts

    🔗 Episode Links and Resources 🔗

    Larry Roberts' Website

    🎉 Join the Conversation! 🎉 Share your thoughts and questions in the comments section below. What's your perspective on AI's role in branding and growth? Let's discuss!

    🎯 Subscribe to Cyber Distortion Podcast 🎯 Never miss an episode! Subscribe now and stay informed about the latest trends, strategies, and expert insights in the world of cybersecurity and digital transformation.

    We really hope you like this episode as much as we enjoyed putting it together!

    Jason Popillion is a CISSP and serves as a CIO/CTO of a SaaS company and Kevin Pentecost is a CISSP, CISM, CEH, CPT, MPCS, MCSE, CCA, ITIL-F and serves as a Information Security Director for a Manufacturing company.

    CITATIONS

    AI Tools to consider:

    o https://chat.openai.com/ - AI Chatbot for Humanlike Conversational Dialog

    o https://claude.ai/chats - AI Chatbot for Humanlike Conversational Dialog

    o https://www.midjourney.com/ - Text to Image Generation

    o https://elevenlabs.io/ - Generative Voice AI

    o https://murf.ai/ - Text to Speech

    Larry’s Favorite Podcasts:

    o Jocko Podcast

    o Extreme Ownership Book – Jocko Willink and Leif Babin

    o Purchase it on Amazon

    o Smartless Podcast (Jason Bateman, Sean Hayes, and Will Arnett)

    o HBO Max 6-part series

    o Gary Vee Audio Experience - Gary Vaynerchuk

    Podfest Expo:

    https://podfestexpo.com/

    Where to find Larry:

    @TheLarryRoberts

    o Instagram

    o Facebook

    o LinkedIn

    https://www.MeetLarryRoberts.com

    Jamie Gravitt Comedy:

    https://www.linkedin.com/in/jamie-gravy-a00301123/

    Jamie Gravitt Image Credit:
    Sam Brand Photography

    https://voyagedallas.com/interview/meet-jamie-gravy-laughing-business-dallas-tx/

    https://www.youtube.com/channel/UC_PPkDsrw90C26CCr5XcEFQ/videos?app=desktop

    https://www.youtube.com/@AlexHormozi

  • This very special episode is our contribution to all existing or soon-to-be DEFCON attendees!

    We go deep under the covers to crack the shell of all things Hacker Summer Camp in this definitive, ALL YOU NEED TO KNOW, and truly exhaustive guide.

    We join forces with our good friend, who we met at Hacker Summer Camp, Dr. Louis DeWeaver. Louis is a former professor and a seasoned cybersecurity expert who brings years of knowledge and many trips to DEFCON to this conversation. His upbeat personality is one of a kind! We like to say that Louis could definitely sell ice cubes to Eskimos!

    We start out with a brief history of DEFCON, talk about the basics on venue, cost, and of course the backstory on how founder Jeff Moss (a.k.a. Dark Tangent) started the largest hacker conference on the planet.
    Then, we round out this information packed episode with a definitive guide of the most important things you’re going to WANT to know if you plant to head to the dessert to join in the fun.

    We really hope you like this episode as much as we enjoyed putting it together!

    Jason Popillion is a CISSP and serves as a CIO/CTO of a SaaS company and Kevin Pentecost is a CISSP, CISM, CEH, CPT, MPCS, MCSE, CCA, ITIL-F and serves as a Information Security Director for a Manufacturing company.

    DOWNLOADS:

    The Official DECFON webpage:

    https://defcon.org/

    DEFCON on Twitter:

    https://twitter.com/defcon

    The Official DC Documentary:

    https://www.youtube.com/watch?v=3ctQOmjQyYg

    OTHER CONFERENCES IN VEGAS THE WEEK OF HACKER SUMMER CAMP:

    BLACKHAT USA CONFERENCE:

    https://www.blackhat.com/us-23/

    B-Sides Las Vegas:

    https://bsideslv.org/registration

    Squadcon:

    https://www.blackgirlshack.org/event-5176921

    So, you want to BLOW SOME SHIT UP?

    https://deviating.net/firearms/defcon_shoot/

    Did you say “PARTIES?” – Find all the hopping social events in one spot:

    https://twitter.com/defconparties

    Look for their Google Calendar on the Twitter page!

    OH, you still want MORE?

    https://conferenceparties.com/hsc2023/

  • In this follow-up episode, we are honored to continue our spirited discussion with (Dr. Aaron Estes – Ironwood Cyber CEO “Chief Epic Officer”) on with us to talk all about his company Ironwood Cyber, and some of the cool things they’re doing over there.

    Ever since we met the Ironwood Cyber team based out of Ft. Worth Texas, we knew we had a solid professional passion and connection and we shared MANY similar interests. The Ironwood Cyber team is a strong group of Engineers originally founded by not one, but TWO Lockheed Martin Fellows respected for their incredible skillsets. Aaron Estes and Ethan Puchaty.

    Lockheed Martin Fellowship represents less than 1% of the best technical Engineers the company has to offer and their backgrounds are quite impressive having worked for a company engineering some of the best technology the US Department of Defense has to offer.

    After leaving Lockheed Martin to start their own Cybersecurity firm (Ironwood Cyber), the company has continued its tradition of developing amazing technology with such out of the box concepts that their endpoint protection solutions boast 3 patents. Focusing on side-channel analysis, they’re quickly becoming a major player in the world of cybersecurity.

    This is part two of a two-part podcast episode, where we spend more time talking about their first electronic SWAG badge created in 2022 for DEFCON 30. We’ll be looking at some teasers and talking to Aaron about what fun and interesting things they’re doing for DEFCON 31. There may even be a few hints about the 2023 badge in the second part of this awesome conversation. I guess you’ll just have to wait and see!! The biggest hint of all….THERE IS!

    Jason Popillion is a CISSP and serves as a CIO/CTO of a SaaS company and Kevin Pentecost is a CISSP, CISM, CEH, CPT, MPCS, MCSE, CCA, ITIL-F and serves as a Information Security Director for a Manufacturing company.

    DOWNLOADS:

    Find out More about IRONWOOD CYBER:

    https://ironwoodcyber.com/

    CYBER RX:

    https://ironwoodcyber.com/ironwood-cyber-rx

    FIRETHORN:

    https://ironwoodcyber.com/firethorn

    Ironwood on Twitter:

    https://twitter.com/IronwoodCyber

    BLACKHAT USA CONFERENCE:

    https://www.blackhat.com/us-23/

    DEFCON HACKER CONFERENCE:

    https://defcon.org/

    The Official DC Documentary:

    https://www.youtube.com/watch?v=3ctQOmjQyYg

  • In this episode, we are honored to have one of these amazing gentlemen (Dr. Aaron Estes – Ironwood Cyber CEO “Chief Epic Officer”) on with us to talk all about his company Ironwood Cyber, and some of the cool things they’re doing over there.

    Ever since we met the Ironwood Cyber team based out of Ft. Worth Texas, we knew we had a solid professional passion and connection and we shared MANY similar interests. The Ironwood Cyber team is a strong group of Engineers originally founded by not one, but TWO Lockheed Martin Fellows respected for their incredible skillsets. Aaron Estes and Ethan Puchaty.

    Lockheed Martin Fellowship represents less than 1% of the best technical Engineers the company has to offer and their backgrounds are quite impressive having worked for a company engineering some of the best technology the US Department of Defense has to offer.

    After leaving Lockheed Martin to start their own Cybersecurity firm (Ironwood Cyber), the company has continued its tradition of developing amazing technology with such out of the box concepts that their endpoint protection solutions boast 3 patents. Focusing on side-channel analysis, they’re quickly becoming a major player in the world of cybersecurity.

    The conversation flowed so well, in fact, that we ended up breaking this awesome episode into two parts. The first focusing on the Ironwood origin story, and their technology and the team.

    Then, in about a week, we’ll be dropping part two, where we spend more time talking about their first electronic SWAG badge created in 2022 for DEFCON 30. We’ll be looking at some teasers and talking to Aaron about what fun and interesting things they’re doing for DEFCON 31. There may even be a few hints about the 2023 badge in the second part of this awesome conversation. I guess you’ll just have to wait and see!!

    Jason Popillion is a CISSP and serves as a Director of Automotive Aftermarket of a SaaS company and Kevin Pentecost is a CISSP, CISM, CEH, CPT, MPCS, MCSE, CCA, ITIL-F and serves as a Information Security Director for a Manufacturing company.

    DOWNLOADS:

    Find out More about IRONWOOD CYBER:

    https://ironwoodcyber.com/

    CYBER RX:

    https://ironwoodcyber.com/ironwood-cyber-rx

    FIRETHORN:

    https://ironwoodcyber.com/firethorn

    Ironwood on Twitter:

    https://twitter.com/IronwoodCyber

    BLACKHAT USA CONFERENCE:

    https://www.blackhat.com/us-23/

    DEFCON HACKER CONFERENCE:

    https://defcon.org/

    The Official DC Documentary:

    https://www.youtube.com/watch?v=3ctQOmjQyYg

  • A long time in the making, this episode on the importance of User Awareness may just be the most important episode we’ve released so far.

    Kevin Pentecost and Jason Popillion are security veterans and Certified Information Systems Security Professionals (CISSPs) who know their way around a good User Awareness Training program having personally trained in classroom led environments as well as fostered and matured their own corporate training programs over their years as Cybersecurity managers.

    Join us as the duo delve into the critical topic of Cybersecurity User Awareness. With their wealth of experience, they provided invaluable insights and practical advice on how individuals can protect themselves against evolving cyber threats.

    They emphasize that user awareness plays a pivotal role in defending against cyber threats. They highlight the fact that attackers often exploit human vulnerabilities and trick individuals into compromising their own security. By enhancing user awareness, people can become more proactive in recognizing and responding to potential threats. A key role is understanding that just like every technical control, YOU are a critical layer of defense both in your personal life, and in your corporate environment.

    We take a look at the prevalence of social engineering attacks, which manipulate human psychology to deceive individuals into divulging sensitive information or performing harmful actions. We explain common tactics such as phishing emails, vishing calls, targeting spear phishing, CEO Spoofing, and many other non-email related social engineering tactics.

    To counter these threats, they recommend adopting a skeptical mindset, scrutinizing unexpected communications, and verifying the authenticity of requests before taking any action.

    Jason Popillion is a CISSP and serves as a CIO/CTO of a SaaS company and Kevin Pentecost is a CISSP, CISM, CEH, CPT, MPCS, MCSE, CCA, ITIL-F and serves as a Information Security Director for a Manufacturing company.

    DOWNLOADS:

    PRINT and HANG this on your Wall:

    Printable Version of the Cyber Distortion Podcast “Red Flags” PDF

    CyberDistortion Blog:

    https://cyberdistortionpodcast.com/

    CyberDistortion Swag Shop:

    https://cyberdistortionswag.shop/

  • HE’S BAAAAAAACK!! In this episode, we RE-visit with our very first guest, Benjamin Hall.

    Ben has served as a virtual CISO, and serves as Sr. Information Security Consultant at Heartland Business Systems. With experience in Governance, Risk, and Compliance, Ben has worked in several industries including Banking, Finance, Insurance, and Healthcare. He is a Certified Information Systems Auditor (CISA), a Certified Data Privacy Solutions Engineer (CDPSE), and a HITRUST Certified Common Security Framework Practitioner (CCSFP). He is skilled in DR (Disaster Recovery), BC (Business Continuity), IR (Incident Response), Documentation, Risk Management, Business Development, and Information Security.

    To say Ben is qualified to tackle this very challenging topic is frankly, an understatement! It was our extreme pleasure to have Ben back to join us as we provide helpful tips on what YOU need to do to address third-party risk for your company.

    Join Kevin and Jason as they touch on some hard-hitting questions around risk and how to tackle some of the challenges that come with managing your due care and due diligence as it relates to outsourcing, and partnering with companies outside of your own 4 walls.

    Jason Popillion is a CISSP and serves as a CIO/CTO of a SaaS company and Kevin Pentecost is a CISSP, CISM, CEH, CPT, MPCS, MCSE, CCA, ITIL-F and serves as a Information Security Director for a Manufacturing company.

    CITATIONS:

    Heartland Business Systems: https://www.hbs.net/

    Mark Cuban Interview with Credit-Suisse.com:

    https://www.credit-suisse.com/about-us-news/en/articles/news-and-expertise/mark-cuban-data-is-the-new-gold-201706.html
  • In this MUCH anticipated follow-up to our episode 003 on AI an ChatGPT, expect more mind-numbing and terrifying facts about this incredible new technology!

    Kevin and Jason wrap up their discussion with Justin “Hutch” Hutchins, a true pioneer in the field of AI and it’s social impact in the world of Cybersecurity and beyond.

    The sole purpose of this episode is to touch the topic of AI and open your mind as to how you need to be thinking about it. How might AI intermingle with the world of Cybersecurity? Is this whole thing just another over-hyped topic that will fade away in a few years, or is it here to stay?

    Take a seat and ride along with the boys as they delve into this topic with a true subject matter expert in the field of hacking and AI and see what he has to say.

    We don’t think, we KNOW this one is going to blow your mind!

    CITATIONS:

    10 Wonderful Examples of Using Artificial Intelligence (AI) for Good:

    https://www.forbes.com/sites/bernardmarr/2020/06/22/10-wonderful-examples-of-using-artificial-intelligence-ai-for-good/?sh=335e084f2f95

    Justin’s posts and conference talks can be found here on his “Sociosploit” blog: https://www.sociosploit.com/ Interested to find out more about the OpenAI ChatGPT project? https://openai.com/blog/chatgpt Are you more interested in AI Generated Imagery?: Try out… - Midjourney AI Artwork - https://www.midjourney.com/home/?callbackUrl=%2Fapp%2F - Bluewillow AI Artwork - https://www.bluewillow.ai/ Joe Rogan interviewing Elon Musk on AI: https://www.youtube.com/watch?v=Ra3fv8gl6NE Amazing YouTube Video from Digital Engine on AI today: https://www.youtube.com/watch?v=J6Mdq3n6kgk
  • What in the world does AI and ChatGPT have to do with Cybersecurity? Well, this episode is going to answer that question for you, and so much more!! In today’s exciting episode, Jason and Kevin discuss the incredible world of AI with special guest and white hat hacker extraordinaire, Justin “Hutch” Hutchins.

    The sole purpose of this episode is to touch the topic of Ai and open your mind as to how you need to be thinking about it. How might AI intermingle with the world of Cybersecurity? Is this whole thing just another over-hyped topic that will fade away in a few years, or is it here to stay?

    Take a seat and ride along with the boys as they delve into this topic with a true subject matter expert in the field of hacking and AI and see what he has to say.

    We think this one might just blow your mind!

    CITATIONS:

    Justin’s posts and conference talks can be found here on his “Sociosploit” blog: https://www.sociosploit.com/ Interested to find out more about the OpenAI ChatGPT project? https://openai.com/blog/chatgpt Are you more interested in AI Generated Imagery?: Try out… - Midjourney AI Artwork - https://www.midjourney.com/home/?callbackUrl=%2Fapp%2F - Bluewillow AI Artwork - https://www.bluewillow.ai/ Joe Rogan interviewing Elon Musk on AI: https://www.youtube.com/watch?v=Ra3fv8gl6NE Amazing YouTube Video from Digital Engine on AI today: https://www.youtube.com/watch?v=J6Mdq3n6kgk
  • In this exciting second episode of the new season, we’re offering up a buffet of delicious options to feast your incessant little cybersecurity appetites on!

    BREACHES

    We start by spending time on 5 of the top breaches that took place in 2022, but shift into some real world thoughts and ideas on what concepts could have helped in preventing those types of breaches.

    FRAMEWORKS

    Jason and Kevin dig deep into their CISSP bag of tricks to discuss cybersecurity frameworks and do a bit of a shallow dive into NIST, and then migrate into the CIS Top 18 cyber controls for effective cyber defense.

    GAP ASSESSMENTS and MATURITY ASSESSMENTS

    The guys hit on two very important aspects of how to leverage a framework for your business, for both analyzing your security overlap and your gaps. Then, they take a look at how you can use that same framework to monitor growth and maturity over time. They use hypothetical company ‘XYZ Company’ to show real-world examples of gap matrices and maturity matrices. These types of critical elements in your security program are items that should be assessed annually or even more frequently.

    A LOOK AT KPIs

    The guys move from leveraging the frameworks into looking at KPIs (Key Performance Indicators) and how you can pull KPIs from your controls to determine if you controls are actually working for you! What good is a robust framework if you can’t measure its success?

    3RD PARTY RISK

    Lastly, the guys take a look at the importance of 3rd-party risk and how your partners, customers, vendors, and joint ventures might play a part in your overall security posture. Not only how they play a part, but WHAT you can do to take actionable steps around 3rd party risk.

    This one is VERY action packed and we cover a lot of ground. Jump on the rollercoaster as we hit ALL the rides in the cyber theme park on this one!

    CITATIONS:

    All about the NIST Cyber Framework https://www.nist.gov/cyberframework CIS Top 18 Cyber Controls https://www.cisecurity.org/controls/v8 Training for using the Frameworks offered by SANS https://www.sans.org/blog/cis-controls-v8/ YouTube Training Videos on each of the 18 Controls https://www.youtube.com/@TheCISecurity https://www.youtube.com/watch?v=pGZViAZlg1k&list=PLpNN1VAyNhovvTU6pye4cNYZksP5CLTyy
  • WE ARE BACK! Happy 2023 friends…

    In this exciting episode of or BRAND NEW season 2, Kevin and Jason make good a promise from Season 1 where they go back and take a deep dive into the Dark Web. This time, we’re coming with a purpose! We go back to investigate and see what’s really out there and try to separate myth from reality.

    Have you always wondered what really exists out on the Dark Web? Do you have a curious bone just itching to go check it all out for yourself? Well, you’re in luck! In this episode, you’ll learn all about how to properly prep to take this journey for yourself. Do we actually recommend it? Listen and find out!!

    Find out more about the original Dark Web marketplace founded by Ross Ulbricht known as the Silk Road and other place you can still visit today. Learn how to browse the Dark Web, how it all started, and how many people actually surf the Dark Web today. Learn facts you probably didn’t know about this mysterious corner of cyberspace. Lastly, find out things you can ACTUALLY purchase on the Dark Web. You might just be surprised at some of these!!

    It is important to mention that no humans were trafficked, and no organs were harvested in the making of this episode!

    CITATIONS:

    How to Safely Browse the Dark Web IDEALLY…Visit the Dark Web via an isolated OS · Here are some of the most popular options: o Whonix - https://www.whonix.org/ o Tails - https://tails.boum.org (as mentioned on our episode) o Qubes - https://www.qubes-os.org/ o Kali Linux - https://www.kali.org/ (awesome hacking tools packaged with this OS) o TrueOS - https://www.trueos.org/ Get the Tor Browser: https://www.torproject.org/download/ Use a good VPN – Here are some popular options (some offer free 30 day trials): · NordVPN - https://nordvpn.com/ · SurfShark - https://surfshark.com/ · TorGuard - https://torguard.net/ · Proton VPN - https://protonvpn.com/ · IP Vanish - https://www.ipvanish.com/ · Express VPN - https://www.expressvpn.com/ · RusVPN - https://rusvpn.com/en/ Learn about Surfing the Dark Web Online https://www.udemy.com/courses/search/?src=ukw&q=Dark+Web Dark Web Stats and Facts https://websitebuilder.org/blog/dark-web-statistics/ Dark Web Usage Stats

    https://earthweb.com/how-many-people-use-the-dark-web/

  • There is a worldwide shortage of over 3 million in the ranks of cybersecurity professionals, with half a million of that shortage in North America alone. The problem is only expected to get worse as the demand for infosec talent is expected to grow dramatically in the coming months and years. One troubling fact about this shortage of talent is that the gap could be dramatically filled if only one segment of the population were proportionately represented in the cybersecurity industry – women! Join us as Kevin, Jason, and their very special guests, Kristen Twining (Senior VP of Sales) and Madison Beane (Commercial Account Executive) from Illusive Technology as we rip the Band-Aid off the issue and expose it for what it is, a societal travesty! Gender bias is certainly part of the issue, as evidence suggests that young females, often during high school or even before that point in life have already formed preconceptions about their place in the world. Let’s face it, the world of technology is intimidating enough without the additional issues of biases. The good news is that evidence suggests that things are turning around. We have a long, long way to go to eliminate gender biases, however, we are making progress! We must all do our part to encourage the female population to join the exciting field of cybersecurity. Help us fight the good fight. WE NEED YOU! In this exciting two-part episode, join us for some fun and we talk all about how tear down some of these walls and get more women interested in this fantastic field and career path. Join us this Cybersecurity Awareness month, as we hit on many important topics and focus on WOMEN in CYBERSECURITY! CITATIONS: ISC2 Women in Cybersecurity Report Download the report here: https://www.isc2.org/research/women-in-cybersecurity Frost & Sullivan (Agents of Change: Women in the Information Security Profession) https://1c7fab3im83f5gqiow2qqs2k-wpengine.netdna-ssl.com/wp-content/uploads/2019/03/Women-in-the-Information-Security-Profession-GISWS-Subreport.pdf Cybercrime Magazine Women Know Cyber: The Documentary https://www.youtube.com/watch?v=Kpc31WJ6l2M York University School of Continuing Studies What Challenges do Women Face in Cybersecurity https://www.youtube.com/watch?v=0S7kGvug4m4 Other Great Resources: Women in Cybersecurity.org https://www.wicys.org/ Girls Who Code https://girlswhocode.com/ Women in Tech https://women-in-tech.org/ Women’s Society of Cyberjutsu (WSC) https://womenscyberjutsu.org/page/WhoAreWe WoSEC – Women of Security https://twitter.com/WoSECtweets The Diana Initiative https://www.dianainitiative.org/ Code Like a Girl https://code.likeagirl.io/tagged/cybersecurity Women in Technology https://www.womentech.net/

  • There is a worldwide shortage of over 3 million in the ranks of cybersecurity professionals, with half a million of that shortage in North America alone. The problem is only expected to get worse as the demand for infosec talent is expected to grow dramatically in the coming months and years.

    One troubling fact about this shortage of talent is that the gap could be dramatically filled if only one segment of the population were proportionately represented in the cybersecurity industry – women!

    Join us as Kevin, Jason, and their very special guests, Kristen Twining (Senior VP of Sales) and Madison Beane (Commercial Account Executive) from Illusive Technology as we rip the Band-Aid off the issue and expose it for what it is, a societal travesty!

    Gender bias is certainly part of the issue, as evidence suggests that young females, often during high school or even before that point in life have already formed preconceptions about their place in the world. Let’s face it, the world of technology is intimidating enough without the additional issues of biases.

    The good news is that evidence suggests that things are turning around. We have a long, long way to go to eliminate gender biases, however, we are making progress! We must all do our part to encourage the female population to join the exciting field of cybersecurity. Help us fight the good fight. WE NEED YOU!

    In this exciting two-part episode, join us for some fun and we talk all about how tear down some of these walls and get more women interested in this fantastic field and career path.

    Join us this Cybersecurity Awareness month, as we hit on many important topics and focus on WOMEN in CYBERSECURITY!

    CITATIONS:

    ISC2 Women in Cybersecurity Report

    Download the report here: https://www.isc2.org/research/women-in-cybersecurity

    Frost & Sullivan (Agents of Change: Women in the Information Security Profession)

    https://1c7fab3im83f5gqiow2qqs2k-wpengine.netdna-ssl.com/wp-content/uploads/2019/03/Women-in-the-Information-Security-Profession-GISWS-Subreport.pdf

    Cybercrime Magazine

    Women Know Cyber: The Documentary

    https://www.youtube.com/watch?v=Kpc31WJ6l2M

    York University School of Continuing Studies

    What Challenges do Women Face in Cybersecurity

    https://www.youtube.com/watch?v=0S7kGvug4m4

    Other Great Resources:

    Women in Cybersecurity.org

    https://www.wicys.org/

    Girls Who Code

    https://girlswhocode.com/

    Women in Tech

    https://women-in-tech.org/

    Women’s Society of Cyberjutsu (WSC)

    https://womenscyberjutsu.org/page/WhoAreWe

    WoSEC – Women of Security

    https://twitter.com/WoSECtweets

    The Diana Initiative

    https://www.dianainitiative.org/

    Code Like a Girl

    https://code.likeagirl.io/tagged/cybersecurity

    Women in Technology

    https://www.womentech.net/