Logo

    Cyber Distortion Podcast Series

    Jason and Kevin, seasoned Cyber Security professionals, explain cyber security concepts that everyone needs to know in simple terms. They will leave you with practical takeaways you can use to keep yourself and your organizations safe. Jason Popillion is a CISSP and serves as a CIO/CTO of a SaaS company and Kevin Pentecost is a CISSP, CISM, CEH, CPT, MPCS, MCSE, CCA, ITIL-F and serves as a Information Security Manager for a Manufacturing company.
    en29 Episodes

    People also ask

    What is the main theme of the podcast?
    Who are some of the popular guests the podcast?
    Were there any controversial topics discussed in the podcast?
    Were any current trending topics addressed in the podcast?
    What popular books were mentioned in the podcast?

    Episodes (29)

    S2 - Episode 014 - Lone Star Cyber Circus - LIVE @ Hop & Sting Brewery, Grapevine, TX

    S2 - Episode 014 - Lone Star Cyber Circus - LIVE @ Hop & Sting Brewery, Grapevine, TX

    Get ready for an electrifying evening as the "Lone Star Cyber Circus" pitches its virtual tent at the renowned Hop & Sting Brewery in Grapevine, Texas! This live podcast event, a harmonious blend of cutting-edge cyber talks and classic Texan hospitality, promises an experience like no other.

    As you step into the rustic yet modern ambiance of Hop & Sting Brewery, you'll be greeted by the rich aroma of craft beers, a hallmark of this beloved local establishment. The brewery's spacious interior, adorned with hints of Texan charm and cyber-themed décor, sets the perfect stage for an evening of engaging discussions and lively entertainment.

    The "Lone Star Cyber Circus" is more than just a podcast; it's a celebration of the digital age, wrapped in the warmth of Texan culture. Hosted by charismatic cyber experts, Chris Glanden (Barcode Security), Phillip Wylie (Phillip Wylie Show), and Kevin Pentecost & Jason Popillion (Cyber Distortion Podcast). Their discussions are a riveting blend of expert insights, humorous anecdotes, and lively banter.

    What makes this event truly unique is its interactive format. The live audience, a diverse mix of tech enthusiasts, local patrons, and visitors, gets to participate in Q&A sessions, offering a dynamic and inclusive experience.

    As the podcast rolled, guests enjoyed Hop & Sting's exquisite selection of craft beers, each brew telling its own story of local ingredients and brewing artistry. The brewery's friendly staff were more than happy to guide you through their selection, ensuring a perfect pairing for your podcast experience.

    Throughout the evening, the "Lone Star Cyber Circus" also features special guests - from renowned tech gurus to local cybersecurity heroes - adding depth and diversity to the conversation. These guest appearances are a crowd favorite, often leading to insightful, sometimes heated, but always entertaining discussions. The event featured experts in the area of the DFW Hacking scene: Wirefall (Dallas Hackers Association), Juneau Jones (DC214), and NEURAL PHANTOM (HackFTW), Phillip Wylie himself, represented Denton and (DC940).

    Following the awesome discussion on the DFW Hacker scene, we shifted into another very hot topic on AI and where it’s headed in the near future. Special guests Justin “Hutch” Hutchins, and Quentin Rhoads-Herrera stole the show with this topic.

    Please follow our AWESOME SPONSORS: Cyberstrike and Trace3 who made it all happen. We want to extend the most heartfelt THANK YOU to both of them for making this event possible!!

    As the night draws to a close, the lively atmosphere of Hop & Sting Brewery, combined with the thought-provoking content of "Lone Star Cyber Circus," leaves you with a sense of connection - to the community, the evolving digital world, and the vibrant culture of Texas. It's an experience that goes beyond a typical podcast recording, leaving you enriched, entertained, and eager for the next episode.

    Whether you were a tech aficionado, a beer enthusiast, or just in search of a unique night out in Grapevine, the "Lone Star Cyber Circus" at Hop & Sting Brewery was an event you didn’t want to miss. If you missed this one, follow us on Twitter for more information about the next live Cyber Circus event! We had so much fun, we can’t wait for the next one!!

    Join us for an evening where the cyber world and Texas charm collide, creating an unforgettable podcast experience! 🍻🎪

     

    CITATIONS:

    CyberStrike: https://cyberstrikegroup.com/

    Trace3: https://www.trace3.com/

    Barcode Security: https://barcodesecurity.com/

    Phillip Wylie Show: https://www.phillipwylieshow.com/

    Cyber Distortion Podcast on Twitter: https://cyberdistortionpodcast.com/

    DFW Hacker Scene:

    Dallas Hackers Association: https://twitter.com/Dallas_Hackers

    DC214: https://twitter.com/DC214DFW

    DC940: https://twitter.com/DCG940

    HackFTW: https://twitter.com/Hack_FtW

    Thanks to Kiss for the amazing tune “Psycho Circus” which we used as our walk-up song at the event!

    S2 - Episode 013 – CISSP Success Stories with Luke Ahmed – Part II

    S2 - Episode 013 – CISSP Success Stories with Luke Ahmed – Part II

    Description:

    🎙️This is part two of our riveting two-part episode with the extraordinary Luke Ahmed. Luke, a best-selling author, CISSP instructor, and the driving force behind the immensely popular Facebook page "CISSP Exam Preparation - Study Notes and Theory," brings a wealth of knowledge and passion to the table.

    Discover the keys to success in the realm of cybersecurity as Luke shares insights from his personal journey and experience in the field. As a CISSP (Certified Information Systems Security Professional) instructor, he's not just a teacher; he's a mentor who has personally guided over 3300 aspiring CISSPs to success in their exams.

    🔒 What to Expect:

    • Insider Tips for CISSP Success: Uncover the strategies and study techniques that have proven effective for thousands of CISSP candidates. Luke spills the secrets that go beyond the textbooks.
    • Navigating the CISSP Landscape: The CISSP certification is no small feat, and Luke Ahmed breaks down the complexities, offering guidance on how to tackle the exam with confidence.
    • The Evolution of Cybersecurity: Get a front-row seat to the ever-evolving world of cybersecurity. Luke shares his thoughts on emerging trends, threats, and the skills that professionals need to stay ahead in this dynamic field.
    • Luke's Best-Selling Insights: As a best-selling author, Luke brings a unique perspective to the podcast. Explore the pages of his books and gain access to the wisdom that has resonated with cybersecurity enthusiasts worldwide. Get to know that “Mindset” that you MUST unlock to pass the ISC2 exam.
    • LOTS of Fun: We lighten things up a bit towards the end of the episodes to finish on a light-hearted note!

    🚀 Why You Should Tune In:

    Whether you're a seasoned cybersecurity professional or just starting your journey, this episode is a must-listen. Luke Ahmed's expertise and genuine passion for cybersecurity make for a captivating conversation that promises to inspire, educate, and empower.

    Don't miss out on this opportunity to tap into the mind of a CISSP guru and glean valuable insights that could shape your own path in the world of cybersecurity. Get ready to level up your cybersecurity knowledge and skills with Luke Ahmed on this exciting two-part episode of the Cyber Distortion Podcast!

    👉 Connect with Luke:

    🎧 Subscribe and Share: https://www.youtube.com/@TheCyberDistortionPodcast

    🔗 Twitter: @DistortionCyber

    🔗 Blog: cyberdistortion.com

    🔗 SWAG Shop: https://cyberdistortionswag.shop

    🔗 Additional Resources: Look for our audio podcasts on all major streaming platforms as well

    🎉 Join the Conversation: Share your thoughts, questions, and key takeaways from this episode on social media using the hashtag #CybersecurityMastermind. We can't wait to hear from you!

    Jason Popillion is a CISSP and serves as a CIO/CTO of a SaaS company and Kevin Pentecost is a CISSP, CISM, CEH, CPT, MPCS, MCSE, CCA, ITIL-F and serves as a Information Security Director for a Manufacturing company.

    Citations:

    KC7 Training for Cybersecurity Professionals - https://kc7cyber.com/

    KC7 is a new way to learn cybersecurity that’s hands-on, fun, and engaging.
    With KC7, you’ll learn key cybersecurity skills while getting practical experience that feels just like the real job.

     

    HUD Graphic for CISSP Tips – Credit https://pngtree.com/freepng/futuristic-lower-third-sci-fi-design-template-for-channel-news-information-call-box-bars-and-modern-digital-info-boxes-element-of-hud-interface-callouts-vector-illustration_8186961.html'>png image from pngtree.com

    S2 - Episode 012 – CISSP Success Stories with Luke Ahmed – Part I

    S2 - Episode 012 – CISSP Success Stories with Luke Ahmed – Part I

    In this riveting two-part episode, join us as we dive deep into the world of cybersecurity with the extraordinary Luke Ahmed. Luke, a best-selling author, CISSP instructor, and the driving force behind the immensely popular Facebook page "CISSP Exam Preparation - Study Notes and Theory," brings a wealth of knowledge and passion to the table.

    Discover the keys to success in the realm of cybersecurity as Luke shares insights from his personal journey and experience in the field. As a CISSP (Certified Information Systems Security Professional) instructor, he's not just a teacher; he's a mentor who has personally guided over 3300 aspiring CISSPs to success in their exams.

    🔒 What to Expect:

    • Insider Tips for CISSP Success: Uncover the strategies and study techniques that have proven effective for thousands of CISSP candidates. Luke spills the secrets that go beyond the textbooks.
    • Navigating the CISSP Landscape: The CISSP certification is no small feat, and Luke Ahmed breaks down the complexities, offering guidance on how to tackle the exam with confidence.
    • The Evolution of Cybersecurity: Get a front-row seat to the ever-evolving world of cybersecurity. Luke shares his thoughts on emerging trends, threats, and the skills that professionals need to stay ahead in this dynamic field.
    • Luke's Best-Selling Insights: As a best-selling author, Luke brings a unique perspective to the podcast. Explore the pages of his books and gain access to the wisdom that has resonated with cybersecurity enthusiasts worldwide. Get to know that “Mindset” that you MUST unlock to pass the ISC2 exam.
    • LOTS of Fun: We lighten things up a bit towards the end of the episodes to finish on a light-hearted note!

    🚀 Why You Should Tune In:

    Whether you're a seasoned cybersecurity professional or just starting your journey, this episode is a must-listen. Luke Ahmed's expertise and genuine passion for cybersecurity make for a captivating conversation that promises to inspire, educate, and empower.

    Don't miss out on this opportunity to tap into the mind of a CISSP guru and glean valuable insights that could shape your own path in the world of cybersecurity. Get ready to level up your cybersecurity knowledge and skills with Luke Ahmed on this exciting two-part episode of the Cyber Distortion Podcast!

    👉 Connect with Luke:

    🎧 Subscribe and Share: https://www.youtube.com/@TheCyberDistortionPodcast

    🔗 Twitter: @DistortionCyber

    🔗 Blog: cyberdistortion.com

    🔗 SWAG Shop: https://cyberdistortionswag.shop

    🔗 Additional Resources: Look for our audio podcasts on all major streaming platforms as well

    🎉 Join the Conversation: Share your thoughts, questions, and key takeaways from this episode on social media using the hashtag #CybersecurityMastermind. We can't wait to hear from you!

    Jason Popillion is a CISSP and serves as a CIO/CTO of a SaaS company and Kevin Pentecost is a CISSP, CISM, CEH, CPT, MPCS, MCSE, CCA, ITIL-F and serves as a Information Security Director for a Manufacturing company.

    Citations:

    KC7 Training for Cybersecurity Professionals - https://kc7cyber.com/

    KC7 is a new way to learn cybersecurity that’s hands-on, fun, and engaging.
    With KC7, you’ll learn key cybersecurity skills while getting practical experience that feels just like the real job.

    S2 - Episode 011 – “Cybersecurity Happy Hour - with Chris Glanden (BARCODE Security)”

    S2 - Episode 011 – “Cybersecurity Happy Hour - with Chris Glanden (BARCODE Security)”

    In this episode, Kevin and Jason shoot the breeze with fellow Cybersecurity podcaster Chris Glanden, a veteran cybersecurity professional passionate about Security Systems, breakthroughs, vulnerabilities, their mitigation and risk management.

    Chris has interviewed some of the most high-profile influencers and specialists in technology, hacking, and cyberspace. His episodes include guests like Phillip Wylie, Freaky Clown (FC), Jack Rhysider from Darknet Diaries, Alyssa Miller, Gummo, and Magda Chelly to name a few!!

    Conceptualized in mid-2020 amongst the Covid pandemic, he designed BARCODE to become THE alternative way to continue the social and educational elements of cybersecurity happy hours, technical meet-ups and security conference peer interaction that our industry was so deprived of during that time.  Often, this is where new ideas and innovation is spawned, and not confined within 4 conference walls. Enter a no pressure atmosphere where listeners gain knowledge direct from the industry’s elite.

    Chris is working on an amazing documentary project called INHUMAN and Chris is bootstrapping everything, which is tough. If people want to find out more about what they’re doing, inhumandocumentary.com is the website with crowdfunding information and sponsorship opportunities. The documentary will be all about AI and we spill lots of juicy details in this episode.

    We really hope you like this episode as much as we enjoyed putting it together and spending time with our man, Chris!

    Jason Popillion is a CISSP and serves as a CIO/CTO of a SaaS company and Kevin Pentecost is a CISSP, CISM, CEH, CPT, MPCS, MCSE, CCA, ITIL-F and serves as a Information Security Director for a Manufacturing company.

     

    CITATIONS

    THE BARCODE PODCAST:

    Chris’ Badass Podcast page can be found here:

    https://barcodesecurity.com/

    BARCODE at Barcode Episode (Live from Las Vegas) with Special Guest “Freaky Clown:”

    https://barcodesecurity.com/bonus-bcp-live-with-fc/

    Chris’ LinkedIn page:

    https://www.linkedin.com/in/chrisglanden/

    Twitter:

    https://twitter.com/ChrisGlitz

    THE DOCUMENTARY:

    Information about Chris’ Upcoming Documentary entitled “InHuman”:

    https://inhumandocumentary.com/

    INHUMAN Trailer: https://www.youtube.com/watch?app=desktop&v=RZZU28RBb7k

     

    Chris’ Partner Filmmaker and Cybersecurity Guru - Matt Barnett’s LinkedIn

     

    MORE ON FREAKY CLOWN (FC):

    Freaky Clown’s Website:

    https://www.freakyclown.com/

    Freaky Clowns Book on Amazon “How I Rob Banks

     

    CHRIS’ INTERVIEW WITH BLACK HAT HACKER GUMMO:

    Barcode Podcast Episode 53:

    https://www.youtube.com/watch?v=_3Uvm_jxRXw

     

    MORE ON GUMMO:

    Black Hat Hacker “Gummo’s” story on Soft White Underbelly on YouTube:

    https://www.youtube.com/watch?v=g6igTJXcqvo

    https://www.youtube.com/watch?v=3ZtkMmVDNEo

     

    Image Credits:

    Caesars Palace - Photo by Wesley Tingey on Unsplash

    MGM Photo - Photo by Marcos Nieto on Unsplash

    Laptop Image - Photo by Luca Bravo on Unsplash

     

    Looking to Start Your Career in IT?

    Check out CompTIA as a great entry point into an IT career if you’re interested in a certification:

    https://www.comptia.org/home

    https://www.comptia.org/career-change/switching-career-path/get-into-it-without-a-degree

    S2 - Episode 010 – Quantum Branding: Turbocharge your Identity with AI

    S2 - Episode 010 – Quantum Branding: Turbocharge your Identity with AI

    In this unconventional episode, Kevin and Jason are thrilled to welcome a true branding and growth specialist, Larry Roberts, famously known as the "Red Hat Guy." Larry brings a wealth of experience and knowledge in harnessing the power of AI tools to supercharge brand growth and visibility.

    🔴 Meet Larry Roberts - The 'Red Hat Guy' 🔴 Larry Roberts has made a name for himself in the world of branding and marketing with his unique approach to using AI-driven strategies. As a seasoned expert in the field, he has successfully leveraged cutting-edge technology to help businesses and influencers thrive in the digital age.

    🧠 Unlocking the Potential of AI 🤖 In this insightful conversation, Larry dives deep into the world of artificial intelligence and its transformative impact on branding. Discover how AI can revolutionize your marketing efforts, streamline your processes, and propel your brand to new heights. While this episode isn’t strictly focused on cybersecurity…Never fear. We do sprinkle in a little cybersecurity flavor for you as well!

    🚀 Key Takeaways: 🌟

    • How AI is reshaping the landscape of brand growth.
    • Practical tips for implementing AI in your branding strategy.
    • Real-world success stories from Larry's experience.
    • Real-world failures that also lead to growth.
    • Karl Childers from Slingblade makes a surprise visit.
    • The future of AI in marketing and brand management.

    🎧 Tune In and Stay Informed! 📡 Don't miss this chance to gain invaluable insights from one of the industry's leading experts. Whether you're a seasoned marketer or just starting your branding journey, this episode is packed with actionable advice and inspiration.

    👥 Connect with Larry Roberts 👥 Connect with Larry and stay updated on his latest insights: Twitter: @iamlarryroberts LinkedIn: Larry Roberts Instagram: thelarryroberts

    🔗 Episode Links and Resources 🔗

     

    • 🎉 Join the Conversation! 🎉 Share your thoughts and questions in the comments section below. What's your perspective on AI's role in branding and growth? Let's discuss!

    🎯 Subscribe to Cyber Distortion Podcast 🎯 Never miss an episode! Subscribe now and stay informed about the latest trends, strategies, and expert insights in the world of cybersecurity and digital transformation.

    We really hope you like this episode as much as we enjoyed putting it together!

     

    Jason Popillion is a CISSP and serves as a CIO/CTO of a SaaS company and Kevin Pentecost is a CISSP, CISM, CEH, CPT, MPCS, MCSE, CCA, ITIL-F and serves as a Information Security Director for a Manufacturing company.

     

    CITATIONS

    AI Tools to consider:

    o   https://chat.openai.com/ - AI Chatbot for Humanlike Conversational Dialog

    o   https://claude.ai/chats - AI Chatbot for Humanlike Conversational Dialog

    o   https://www.midjourney.com/ - Text to Image Generation

    o   https://elevenlabs.io/ - Generative Voice AI

    o   https://murf.ai/ - Text to Speech

    Larry’s Favorite Podcasts:

    o   Jocko Podcast

    o   Extreme Ownership Book – Jocko Willink and Leif Babin

    o   Purchase it on Amazon

    o   Smartless Podcast (Jason Bateman, Sean Hayes, and Will Arnett)

    o   HBO Max 6-part series

    o   Gary Vee Audio Experience - Gary Vaynerchuk

     

    Podfest Expo:

    https://podfestexpo.com/

     

    Where to find Larry:

    @TheLarryRoberts

    o   Instagram

    o   Facebook

    o   LinkedIn

    https://www.MeetLarryRoberts.com

     

    Jamie Gravitt Comedy:

    https://www.linkedin.com/in/jamie-gravy-a00301123/

     

    Jamie Gravitt Image Credit:
    Sam Brand Photography

    https://voyagedallas.com/interview/meet-jamie-gravy-laughing-business-dallas-tx/

    https://www.youtube.com/channel/UC_PPkDsrw90C26CCr5XcEFQ/videos?app=desktop

    https://www.youtube.com/@AlexHormozi

    S2 - Episode 009 – DEFCON – An Exhaustive Guide to Hacker Summer Camp – (with Dr. Louis DeWeaver)

    S2 - Episode 009 – DEFCON – An Exhaustive Guide to Hacker Summer Camp –  (with Dr. Louis DeWeaver)

    This very special episode is our contribution to all existing or soon-to-be DEFCON attendees! 

    We go deep under the covers to crack the shell of all things Hacker Summer Camp in this definitive, ALL YOU NEED TO KNOW, and truly exhaustive guide. 

    We join forces with our good friend, who we met at Hacker Summer Camp, Dr. Louis DeWeaver. Louis is a former professor and a seasoned cybersecurity expert who brings years of knowledge and many trips to DEFCON to this conversation. His upbeat personality is one of a kind! We like to say that Louis could definitely sell ice cubes to Eskimos! 

    We start out with a brief history of DEFCON, talk about the basics on venue, cost, and of course the backstory on how founder Jeff Moss (a.k.a. Dark Tangent) started the largest hacker conference on the planet. 
    Then, we round out this information packed episode with a definitive guide of the most important things you’re going to WANT to know if you plant to head to the dessert to join in the fun. 

    We really hope you like this episode as much as we enjoyed putting it together! 

    Jason Popillion is a CISSP and serves as a CIO/CTO of a SaaS company and Kevin Pentecost is a CISSP, CISM, CEH, CPT, MPCS, MCSE, CCA, ITIL-F and serves as a Information Security Director for a Manufacturing company. 

     

     

    DOWNLOADS: 

    The Official DECFON webpage: 

    DEFCON on Twitter: 

    The Official DC Documentary: 

     

    OTHER CONFERENCES IN VEGAS THE WEEK OF HACKER SUMMER CAMP: 

    BLACKHAT USA CONFERENCE: 

     

    B-Sides Las Vegas: 

     

    Squadcon: 

     

    So, you want to BLOW SOME SHIT UP? 

     

    Did you say “PARTIES?” – Find all the hopping social events in one spot: 

    Look for their Google Calendar on the Twitter page! 

     

    OH, you still want MORE? 

    S2 - Episode 008 – Fighting Acronym Fatigue – Part II with Dr. Aaron Estes (CEO - Ironwood Cyber)

    S2 - Episode 008 – Fighting Acronym Fatigue – Part II with Dr. Aaron Estes (CEO - Ironwood Cyber)

    In this follow-up episode, we are honored to continue our spirited discussion with (Dr. Aaron Estes – Ironwood Cyber CEO “Chief Epic Officer”) on with us to talk all about his company Ironwood Cyber, and some of the cool things they’re doing over there.

    Ever since we met the Ironwood Cyber team based out of Ft. Worth Texas, we knew we had a solid professional passion and connection and we shared MANY similar interests. The Ironwood Cyber team is a strong group of Engineers originally founded by not one, but TWO Lockheed Martin Fellows respected for their incredible skillsets. Aaron Estes and Ethan Puchaty.

    Lockheed Martin Fellowship represents less than 1% of the best technical Engineers the company has to offer and their backgrounds are quite impressive having worked for a company engineering some of the best technology the US Department of Defense has to offer.

    After leaving Lockheed Martin to start their own Cybersecurity firm (Ironwood Cyber), the company has continued its tradition of developing amazing technology with such out of the box concepts that their endpoint protection solutions boast 3 patents. Focusing on side-channel analysis, they’re quickly becoming a major player in the world of cybersecurity.

    This is part two of a two-part podcast episode, where we spend more time talking about their first electronic SWAG badge created in 2022 for DEFCON 30. We’ll be looking at some teasers and talking to Aaron about what fun and interesting things they’re doing for DEFCON 31. There may even be a few hints about the 2023 badge in the second part of this awesome conversation. I guess you’ll just have to wait and see!! The biggest hint of all….THERE IS!

    Jason Popillion is a CISSP and serves as a CIO/CTO of a SaaS company and Kevin Pentecost is a CISSP, CISM, CEH, CPT, MPCS, MCSE, CCA, ITIL-F and serves as a Information Security Director for a Manufacturing company.

     

     

    DOWNLOADS:

    Find out More about IRONWOOD CYBER:

    https://ironwoodcyber.com/

    CYBER RX:

    https://ironwoodcyber.com/ironwood-cyber-rx

    FIRETHORN:

    https://ironwoodcyber.com/firethorn

    Ironwood on Twitter:

    https://twitter.com/IronwoodCyber

    BLACKHAT USA CONFERENCE:

    https://www.blackhat.com/us-23/

     

    DEFCON HACKER CONFERENCE:

    https://defcon.org/

    The Official DC Documentary:

    https://www.youtube.com/watch?v=3ctQOmjQyYg

    S2 - Episode 007 – Fighting Acronym Fatigue – Part I with Dr. Aaron Estes (CEO - Ironwood Cyber)

    S2 - Episode 007 – Fighting Acronym Fatigue – Part I with Dr. Aaron Estes (CEO - Ironwood Cyber)

    In this episode, we are honored to have one of these amazing gentlemen (Dr. Aaron Estes – Ironwood Cyber CEO “Chief Epic Officer”) on with us to talk all about his company Ironwood Cyber, and some of the cool things they’re doing over there.

    Ever since we met the Ironwood Cyber team based out of Ft. Worth Texas, we knew we had a solid professional passion and connection and we shared MANY similar interests. The Ironwood Cyber team is a strong group of Engineers originally founded by not one, but TWO Lockheed Martin Fellows respected for their incredible skillsets. Aaron Estes and Ethan Puchaty.

    Lockheed Martin Fellowship represents less than 1% of the best technical Engineers the company has to offer and their backgrounds are quite impressive having worked for a company engineering some of the best technology the US Department of Defense has to offer.

    After leaving Lockheed Martin to start their own Cybersecurity firm (Ironwood Cyber), the company has continued its tradition of developing amazing technology with such out of the box concepts that their endpoint protection solutions boast 3 patents. Focusing on side-channel analysis, they’re quickly becoming a major player in the world of cybersecurity.

    The conversation flowed so well, in fact, that we ended up breaking this awesome episode into two parts. The first focusing on the Ironwood origin story, and their technology and the team.

    Then, in about a week, we’ll be dropping part two, where we spend more time talking about their first electronic SWAG badge created in 2022 for DEFCON 30. We’ll be looking at some teasers and talking to Aaron about what fun and interesting things they’re doing for DEFCON 31. There may even be a few hints about the 2023 badge in the second part of this awesome conversation. I guess you’ll just have to wait and see!!

    Jason Popillion is a CISSP and serves as a Director of Automotive Aftermarket of a SaaS company and Kevin Pentecost is a CISSP, CISM, CEH, CPT, MPCS, MCSE, CCA, ITIL-F and serves as a Information Security Director for a Manufacturing company.

    DOWNLOADS:

    Find out More about IRONWOOD CYBER:

    https://ironwoodcyber.com/

    CYBER RX:

    https://ironwoodcyber.com/ironwood-cyber-rx

    FIRETHORN:

    https://ironwoodcyber.com/firethorn

    Ironwood on Twitter:

    https://twitter.com/IronwoodCyber

    BLACKHAT USA CONFERENCE:

    https://www.blackhat.com/us-23/

     

    DEFCON HACKER CONFERENCE:

    https://defcon.org/

    The Official DC Documentary:

    https://www.youtube.com/watch?v=3ctQOmjQyYg

    S2 - Episode 006 – You ARE the Weakest link!

    S2 - Episode 006 – You ARE the Weakest link!

    A long time in the making, this episode on the importance of User Awareness may just be the most important episode we’ve released so far.

    Kevin Pentecost and Jason Popillion are security veterans and Certified Information Systems Security Professionals (CISSPs) who know their way around a good User Awareness Training program having personally trained in classroom led environments as well as fostered and matured their own corporate training programs over their years as Cybersecurity managers.

    Join us as the duo delve into the critical topic of Cybersecurity User Awareness. With their wealth of experience, they provided invaluable insights and practical advice on how individuals can protect themselves against evolving cyber threats.

    They emphasize that user awareness plays a pivotal role in defending against cyber threats. They highlight the fact that attackers often exploit human vulnerabilities and trick individuals into compromising their own security. By enhancing user awareness, people can become more proactive in recognizing and responding to potential threats. A key role is understanding that just like every technical control, YOU are a critical layer of defense both in your personal life, and in your corporate environment.

    We take a look at the prevalence of social engineering attacks, which manipulate human psychology to deceive individuals into divulging sensitive information or performing harmful actions. We explain common tactics such as phishing emails, vishing calls, targeting spear phishing, CEO Spoofing, and many other non-email related social engineering tactics.

    To counter these threats, they recommend adopting a skeptical mindset, scrutinizing unexpected communications, and verifying the authenticity of requests before taking any action.

    Jason Popillion is a CISSP and serves as a CIO/CTO of a SaaS company and Kevin Pentecost is a CISSP, CISM, CEH, CPT, MPCS, MCSE, CCA, ITIL-F and serves as a Information Security Director for a Manufacturing company.

     

     

    DOWNLOADS:

    PRINT and HANG this on your Wall:

     Printable Version of the Cyber Distortion Podcast “Red Flags” PDF

    CyberDistortion Blog:

    https://cyberdistortionpodcast.com/

    CyberDistortion Swag Shop:

    https://cyberdistortionswag.shop/

     

     

    S2 - Episode 005 – Third Party Risk – It’s not Me, It’s You!

    S2 - Episode 005 – Third Party Risk – It’s not Me, It’s You!

    HE’S BAAAAAAACK!! In this episode, we RE-visit with our very first guest, Benjamin Hall.

    Ben has served as a virtual CISO, and serves as Sr. Information Security Consultant at Heartland Business Systems. With experience in Governance, Risk, and Compliance, Ben has worked in several industries including Banking, Finance, Insurance, and Healthcare. He is a Certified Information Systems Auditor (CISA), a Certified Data Privacy Solutions Engineer (CDPSE), and a HITRUST Certified Common Security Framework Practitioner (CCSFP).  He is skilled in DR (Disaster Recovery), BC (Business Continuity), IR (Incident Response), Documentation, Risk Management, Business Development, and Information Security.

    To say Ben is qualified to tackle this very challenging topic is frankly, an understatement! It was our extreme pleasure to have Ben back to join us as we provide helpful tips on what YOU need to do to address third-party risk for your company.

    Join Kevin and Jason as they touch on some hard-hitting questions around risk and how to tackle some of the challenges that come with managing your due care and due diligence as it relates to outsourcing, and partnering with companies outside of your own 4 walls.

    Jason Popillion is a CISSP and serves as a CIO/CTO of a SaaS company and Kevin Pentecost is a CISSP, CISM, CEH, CPT, MPCS, MCSE, CCA, ITIL-F and serves as a Information Security Director for a Manufacturing company.

     

     

    CITATIONS:

    Heartland Business Systems:

    https://www.hbs.net/

    Mark Cuban Interview with Credit-Suisse.com:

    https://www.credit-suisse.com/about-us-news/en/articles/news-and-expertise/mark-cuban-data-is-the-new-gold-201706.html

    S2 - Episode 004 - “AI and ChatGPT is Scary Sh*t! – Part II”

    S2 - Episode 004 - “AI and ChatGPT is Scary Sh*t! – Part II”

    In this MUCH anticipated follow-up to our episode 003 on AI an ChatGPT, expect more mind-numbing and terrifying facts about this incredible new technology!

    Kevin and Jason wrap up their discussion with Justin “Hutch” Hutchins, a true pioneer in the field of AI and it’s social impact in the world of Cybersecurity and beyond.

    The sole purpose of this episode is to touch the topic of AI and open your mind as to how you need to be thinking about it. How might AI intermingle with the world of Cybersecurity? Is this whole thing just another over-hyped topic that will fade away in a few years, or is it here to stay?

    Take a seat and ride along with the boys as they delve into this topic with a true subject matter expert in the field of hacking and AI and see what he has to say.

    We don’t think, we KNOW this one is going to blow your mind!

     

    CITATIONS:

    10 Wonderful Examples of Using Artificial Intelligence (AI) for Good:

    https://www.forbes.com/sites/bernardmarr/2020/06/22/10-wonderful-examples-of-using-artificial-intelligence-ai-for-good/?sh=335e084f2f95

    Justin’s posts and conference talks can be found here on his “Sociosploit” blog:

    https://www.sociosploit.com/

    Interested to find out more about the OpenAI ChatGPT project?

    https://openai.com/blog/chatgpt

    Are you more interested in AI Generated Imagery?:

    Try out…

    -          Midjourney AI Artwork

    -          https://www.midjourney.com/home/?callbackUrl=%2Fapp%2F

    -          Bluewillow AI Artwork

    -          https://www.bluewillow.ai/

    Joe Rogan interviewing Elon Musk on AI:

    https://www.youtube.com/watch?v=Ra3fv8gl6NE

     

    Amazing YouTube Video from Digital Engine on AI today:

    https://www.youtube.com/watch?v=J6Mdq3n6kgk

     

    S2 - Episode 003 - “AI and ChatGPT is Scary Sh*t! – Part I”

    S2 - Episode 003 - “AI and ChatGPT is Scary Sh*t! – Part I”

    What in the world does AI and ChatGPT have to do with Cybersecurity? Well, this episode is going to answer that question for you, and so much more!! In today’s exciting episode, Jason and Kevin discuss the incredible world of AI with special guest and white hat hacker extraordinaire, Justin “Hutch” Hutchins.

    The sole purpose of this episode is to touch the topic of Ai and open your mind as to how you need to be thinking about it. How might AI intermingle with the world of Cybersecurity? Is this whole thing just another over-hyped topic that will fade away in a few years, or is it here to stay?

    Take a seat and ride along with the boys as they delve into this topic with a true subject matter expert in the field of hacking and AI and see what he has to say.

    We think this one might just blow your mind!

     

    CITATIONS:

    Justin’s posts and conference talks can be found here on his “Sociosploit” blog:

    https://www.sociosploit.com/

    Interested to find out more about the OpenAI ChatGPT project?

    https://openai.com/blog/chatgpt

    Are you more interested in AI Generated Imagery?:

    Try out…

    -        Midjourney AI Artwork

    -        https://www.midjourney.com/home/?callbackUrl=%2Fapp%2F

    -        Bluewillow AI Artwork

    -        https://www.bluewillow.ai/

    Joe Rogan interviewing Elon Musk on AI:

    https://www.youtube.com/watch?v=Ra3fv8gl6NE

     

    Amazing YouTube Video from Digital Engine on AI today:

    https://www.youtube.com/watch?v=J6Mdq3n6kgk

    S2 - Episode 002 – 2022 Breaches and Some Retrospection

    S2 - Episode 002 – 2022 Breaches and Some Retrospection

    In this exciting second episode of the new season, we’re offering up a buffet of delicious options to feast your incessant little cybersecurity appetites on!

    BREACHES

    We start by spending time on 5 of the top breaches that took place in 2022, but shift into some real world thoughts and ideas on what concepts could have helped in preventing those types of breaches.

    FRAMEWORKS

    Jason and Kevin dig deep into their CISSP bag of tricks to discuss cybersecurity frameworks and do a bit of a shallow dive into NIST, and then migrate into the CIS Top 18 cyber controls for effective cyber defense.

    GAP ASSESSMENTS and MATURITY ASSESSMENTS

    The guys hit on two very important aspects of how to leverage a framework for your business, for both analyzing your security overlap and your gaps. Then, they take a look at how you can use that same framework to monitor growth and maturity over time. They use hypothetical company ‘XYZ Company’ to show real-world examples of gap matrices and maturity matrices. These types of critical elements in your security program are items that should be assessed annually or even more frequently.

    A LOOK AT KPIs

    The guys move from leveraging the frameworks into looking at KPIs (Key Performance Indicators) and how you can pull KPIs from your controls to determine if you controls are actually working for you! What good is a robust framework if you can’t measure its success?

    3RD PARTY RISK

    Lastly, the guys take a look at the importance of 3rd-party risk and how your partners, customers, vendors, and joint ventures might play a part in your overall security posture. Not only how they play a part, but WHAT you can do to take actionable steps around 3rd party risk.

    This one is VERY action packed and we cover a lot of ground. Jump on the rollercoaster as we hit ALL the rides in the cyber theme park on this one!

     

    CITATIONS:

    All about the NIST Cyber Framework

    https://www.nist.gov/cyberframework

    CIS Top 18 Cyber Controls

    https://www.cisecurity.org/controls/v8

    Training for using the Frameworks offered by SANS

    https://www.sans.org/blog/cis-controls-v8/

    YouTube Training Videos on each of the 18 Controls

    https://www.youtube.com/@TheCISecurity

    https://www.youtube.com/watch?v=pGZViAZlg1k&list=PLpNN1VAyNhovvTU6pye4cNYZksP5CLTyy

    S2 - Episode 001 – The Dark Web Revisited

    S2 - Episode 001 – The Dark Web Revisited

    WE ARE BACK! Happy 2023 friends…

    In this exciting episode of or BRAND NEW season 2, Kevin and Jason make good a promise from Season 1 where they go back and take a deep dive into the Dark Web. This time, we’re coming with a purpose! We go back to investigate and see what’s really out there and try to separate myth from reality.

    Have you always wondered what really exists out on the Dark Web? Do you have a curious bone just itching to go check it all out for yourself? Well, you’re in luck! In this episode, you’ll learn all about how to properly prep to take this journey for yourself. Do we actually recommend it? Listen and find out!!

    Find out more about the original Dark Web marketplace founded by Ross Ulbricht known as the Silk Road and other place you can still visit today. Learn how to browse the Dark Web, how it all started, and how many people actually surf the Dark Web today. Learn facts you probably didn’t know about this mysterious corner of cyberspace. Lastly, find out things you can ACTUALLY purchase on the Dark Web. You might just be surprised at some of these!!

    It is important to mention that no humans were trafficked, and no organs were harvested in the making of this episode!

     

    CITATIONS:

    How to Safely Browse the Dark Web

    IDEALLY…Visit the Dark Web via an isolated OS

    ·         Here are some of the most popular options:

    o   Whonix - https://www.whonix.org/

    o   Tails  - https://tails.boum.org (as mentioned on our episode)

    o   Qubes - https://www.qubes-os.org/

    o   Kali Linux - https://www.kali.org/ (awesome hacking tools packaged with this OS)

    o   TrueOS - https://www.trueos.org/

    Get the Tor Browser:

    https://www.torproject.org/download/

    Use a good VPN – Here are some popular options (some offer free 30 day trials):

    ·         NordVPN - https://nordvpn.com/

    ·         SurfShark - https://surfshark.com/

    ·         TorGuard - https://torguard.net/

    ·         Proton VPN - https://protonvpn.com/

    ·         IP Vanish - https://www.ipvanish.com/

    ·         Express VPN - https://www.expressvpn.com/

    ·         RusVPN - https://rusvpn.com/en/

     

     

     

    Learn about Surfing the Dark Web Online

    https://www.udemy.com/courses/search/?src=ukw&q=Dark+Web

    Dark Web Stats and Facts

    https://websitebuilder.org/blog/dark-web-statistics/

    Dark Web Usage Stats

    https://earthweb.com/how-many-people-use-the-dark-web/

    S1 - Episode 014 – Women in Cybersecurity - Part II

    S1 - Episode 014 – Women in Cybersecurity - Part II
    There is a worldwide shortage of over 3 million in the ranks of cybersecurity professionals, with half a million of that shortage in North America alone. The problem is only expected to get worse as the demand for infosec talent is expected to grow dramatically in the coming months and years. One troubling fact about this shortage of talent is that the gap could be dramatically filled if only one segment of the population were proportionately represented in the cybersecurity industry – women! Join us as Kevin, Jason, and their very special guests, Kristen Twining (Senior VP of Sales) and Madison Beane (Commercial Account Executive) from Illusive Technology as we rip the Band-Aid off the issue and expose it for what it is, a societal travesty! Gender bias is certainly part of the issue, as evidence suggests that young females, often during high school or even before that point in life have already formed preconceptions about their place in the world. Let’s face it, the world of technology is intimidating enough without the additional issues of biases. The good news is that evidence suggests that things are turning around. We have a long, long way to go to eliminate gender biases, however, we are making progress! We must all do our part to encourage the female population to join the exciting field of cybersecurity. Help us fight the good fight. WE NEED YOU! In this exciting two-part episode, join us for some fun and we talk all about how tear down some of these walls and get more women interested in this fantastic field and career path. Join us this Cybersecurity Awareness month, as we hit on many important topics and focus on WOMEN in CYBERSECURITY! CITATIONS: ISC2 Women in Cybersecurity Report Download the report here: https://www.isc2.org/research/women-in-cybersecurity Frost & Sullivan (Agents of Change: Women in the Information Security Profession) https://1c7fab3im83f5gqiow2qqs2k-wpengine.netdna-ssl.com/wp-content/uploads/2019/03/Women-in-the-Information-Security-Profession-GISWS-Subreport.pdf Cybercrime Magazine Women Know Cyber: The Documentary https://www.youtube.com/watch?v=Kpc31WJ6l2M York University School of Continuing Studies What Challenges do Women Face in Cybersecurity https://www.youtube.com/watch?v=0S7kGvug4m4 Other Great Resources: Women in Cybersecurity.org https://www.wicys.org/ Girls Who Code https://girlswhocode.com/ Women in Tech https://women-in-tech.org/ Women’s Society of Cyberjutsu (WSC) https://womenscyberjutsu.org/page/WhoAreWe WoSEC – Women of Security https://twitter.com/WoSECtweets The Diana Initiative https://www.dianainitiative.org/ Code Like a Girl https://code.likeagirl.io/tagged/cybersecurity Women in Technology https://www.womentech.net/

    S1 - Episode 013 – Women in Cybersecurity - Part I

    S1 - Episode 013 – Women in Cybersecurity - Part I

    There is a worldwide shortage of over 3 million in the ranks of cybersecurity professionals, with half a million of that shortage in North America alone. The problem is only expected to get worse as the demand for infosec talent is expected to grow dramatically in the coming months and years.

    One troubling fact about this shortage of talent is that the gap could be dramatically filled if only one segment of the population were proportionately represented in the cybersecurity industry – women!

    Join us as Kevin, Jason, and their very special guests, Kristen Twining (Senior VP of Sales) and Madison Beane (Commercial Account Executive) from Illusive Technology as we rip the Band-Aid off the issue and expose it for what it is, a societal travesty!

    Gender bias is certainly part of the issue, as evidence suggests that young females, often during high school or even before that point in life have already formed preconceptions about their place in the world. Let’s face it, the world of technology is intimidating enough without the additional issues of biases.

    The good news is that evidence suggests that things are turning around. We have a long, long way to go to eliminate gender biases, however, we are making progress! We must all do our part to encourage the female population to join the exciting field of cybersecurity. Help us fight the good fight. WE NEED YOU!

    In this exciting two-part episode, join us for some fun and we talk all about how tear down some of these walls and get more women interested in this fantastic field and career path.

    Join us this Cybersecurity Awareness month, as we hit on many important topics and focus on WOMEN in CYBERSECURITY!

     

    CITATIONS:

    ISC2 Women in Cybersecurity Report

    Download the report here: https://www.isc2.org/research/women-in-cybersecurity

    Frost & Sullivan (Agents of Change: Women in the Information Security Profession)

                https://1c7fab3im83f5gqiow2qqs2k-wpengine.netdna-ssl.com/wp-content/uploads/2019/03/Women-in-the-Information-Security-Profession-GISWS-Subreport.pdf

    Cybercrime Magazine

    Women Know Cyber: The Documentary

    https://www.youtube.com/watch?v=Kpc31WJ6l2M

    York University School of Continuing Studies

    What Challenges do Women Face in Cybersecurity

    https://www.youtube.com/watch?v=0S7kGvug4m4

    Other Great Resources:

    Women in Cybersecurity.org

    https://www.wicys.org/

    Girls Who Code

    https://girlswhocode.com/

    Women in Tech

    https://women-in-tech.org/

    Women’s Society of Cyberjutsu (WSC)

    https://womenscyberjutsu.org/page/WhoAreWe

    WoSEC – Women of Security

    https://twitter.com/WoSECtweets

    The Diana Initiative

    https://www.dianainitiative.org/

    Code Like a Girl

    https://code.likeagirl.io/tagged/cybersecurity

    Women in Technology

    https://www.womentech.net/

    S1 - Episode 012 – Unraveling the Zero Trust Mystery

    S1 - Episode 012 – Unraveling the Zero Trust Mystery

    If you’re like many others in information security, you too may struggle with understanding the concept and basic premise of “zero trust.” Well, we have good news for you! After this episode, you can rest-assured that we intend to clear the fog over this very confusing topic.

    Join us as Kevin, Jason, and their very special guest, Brad Moldenhauer as they help unravel the mystery of zero trust by bring in one of the resident experts on the topic.

    Brad is the VP and CISO at Z-Scaler who comes with a lengthy history in many facets of dealing with risk throughout many verticals in IT. Brad is an expert in the field, and his passion for helping others is evident in this fun-filled episode.

    Brad is an accomplished cybersecurity leader with over 20 years experience in aligning security strategy and delivering security outcomes that balance risk with business value and IT efficiency. Throughout his career he has held roles in cybersecurity auditing, consulting, and operations management in government, healthcare and the legal industries.

     

    Prior to joining Z-Scaler, Brad was the Global Director of Information Security for Steptoe & Johnson LLP, an Am Law 100 international law firm where he developed, implemented and managed the information security program that addressed the legal business risk landscape along with geolocation and industry-specific security requirements of the firm’s global clientele. Brad is passionate about solving cybersecurity challenges that CISOs regularly deal with while balancing the impact towards employee productivity, client service, and the bottom line.

     

    Get your popcorn ready! It’s time to learn all about ZERO TRUST!

    This episode MIGHT** contain an easter egg on a Black Hat/DEFCON 30 SWAG drop!!

     

    **Definitely does

     

    CITATIONS:

    Z-Scaler Resources:

    https://www.linkedin.com/company/zscaler/

    https://www.zscaler.com/

    https://twitter.com/zscaler

    Brad’s LinkedIn Page:

    https://www.linkedin.com/in/secpro/

    S1 - Episode 011 – The Fine Art of Social Engineering

    S1 - Episode 011 – The Fine Art of Social Engineering

    In this exciting episode, we cover the very fascinating topic of “Social Engineering” aka: Human Hacking! Anyone that lives in Cybersecurity knows that the weakest link in any company’s cyber defenses is sitting between the keyboard and the chair. Tonight, we talk all about how malicious actors try to take full advantage of that weakness and exploit it to steal your company or your personal data.

    Join us as Jason and Kevin converse with a special guest Ragnhild "Bridget" Sageng on all facets of this controversial topic.

    Bridget has several years of experience in the IT industry, working with IT-support before transcending into a career within pentesting. Today, she works as an ethical hacker at Orange Cyberdefense in Norway.

    Prior to her IT career, “Bridget” educated herself in the field of human psychology and healthcare due to her interest in understanding the human mind. She has always had an interest in cybersecurity and completed her bachelor’s degree in Cybersecurity recently at Noroff University College.

    Due to her interest in both the human mind and IT security, “Bridget” specializes in social engineering and Open-source investigation (OSINT). In 2020, she won an international social engineering CTF hosted by Temple University. In 2021, “Bridget” became a Certified Social Engineering Pentest Professional (SEPP) and has since dedicated her focus toward social engineering pentesting. Her hands-on experience with social engineering pentesting has prompted her to further research the topics of ethically handling people affected by the tests.

    It's important to mention that no Princes were harmed during the making of this episode.

    CITATIONS:

    Bridget’s DEFCON30 talk “The Aftermath of a Social Engineering Pentest. - Are we Being Ethically Responsible?”

    https://www.se.community/presentations/#sageng

    Pentest Your Users with the help of a Company Like Orange Cyberdefense:

    https://www.orangecyberdefense.com/

    Temple University CTF Contest Links:

    https://sites.temple.edu/collegiatesectf/

    Interested in Learning Social Engineering and Getting Certified?

    Social-Engineer Training Website:

    https://www.social-engineer.com/

    Black Hat & DEFCON Official Websites:

    https://www.blackhat.com/

    https://defcon.org/

    S1 - Episode 010 – Doomsday Breach Prepping - 101

    S1 - Episode 010 – Doomsday Breach Prepping - 101

    When the world comes crumbling down and your entire existence is burning to the ground, will you be prepared to handle it? What am I talking about anyway? The post-breach apocalypse, of course. What else?!

    You see, we have all heard it said so many times, “It’s not a matter of IF you get breached; it’s a matter of WHEN!” Well, if that is true, do you think you should be making every possible effort to get as prepared as possible ahead of time? We do! That is precisely why have handpicked the special guest for this episode.

    Stephen Cracknell is an Amazon best-selling author with experience in a very critical area that we know you can improve in by absorbing his wisdom. We know that, because we all can improve in this area.

    Stephen and his team at USM Technology are passionate about helping business leaders repel cyberattacks. They work with IT leaders across Texas to build out comprehensive incident response plans designed to ensure that the IT team, as well as the company’s leadership, work effectively during the critical first 72 hours after a cyberattack.

    Their focus is helping IT leaders develop a plan that brings critical business processes back online quickly, so their leadership team is not forced to pay the hacker’s ransom. Your well-designed recovery plan also avoids data loss, business downtime, irate customers as well as injury to your company’s reputation and your career.

    So, sit back, refill your coffee mugs, and pull up a chair. It’s time to dive into an episode we’ve titled DOOMSDAY BREACH PREPPING 101! Yee-haw!

     

    Citations:

    USM Technology Pentesting Services:

    https://www.usmtechnology.com/uncover.html

     

    Purchase Stephen’s Book on Amazon

     

    Find Stephen on LinkedIn:

    https://www.linkedin.com/in/stephencracknell/

     

    Jason Popillion is a CISSP and serves as a CIO/CTO of a SaaS company and Kevin Pentecost is a CISSP, CISM, CEH, CPT, MCSE, CCA, ITIL-F and serves as an Information Security Director for a manufacturing company.

    S1 - Episode 009 – #Badgelife ft. AND!XOR

    S1 - Episode 009 – #Badgelife ft. AND!XOR
    Electronic Blinky-Bling?!! What the heck is that?! Take a quick walk around the Las Vegas strip around mid-summer at the DEFCON Hacking/Security Conference and you’ll find out pretty darned quick!

    #BADGELIFE is a sub-culture of creators, hackers, programmers, and like-minded pseudo geniuses that craft some of the coolest electronic gadgetry you’re ever going to see! Imagine a sea of LEDs dancing to the music of a DJs mix, on a PCB designed to look artsy and cool. Oh, also imagine that you can hack that bad boy and play games, and set the LCD screen to your favorite animated GIF. Imagine using the latest programming languages and technologies to link hundreds of badges together on their own network of social awesomeness! That’s a fraction of what Badgelife is really all about.

    In this light-hearted episode, we talk with our pals Zapp and Hyr0n at AND!XOR about how they continue to set the badgelife world ablaze with their creative masterpieces every single year.

    It should go without saying that their work is some of the absolute best as they start planning for the next masterpiece over 18 months ahead in many cases. You can rest assured, they always have a virtual line out the door filled with people looking to string an AND!XOR PCB medallion around their necks. Why?! Because their creations are always EPIC A** Kickery!

    Join Cybersecurity professionals and CISSP brethren, Jason (Redeemer) and Kevin (Sabotage66) as they bring another hard-hitting and action packed episode. This one centers on all of the intricacies of this amazing sub-culture of the awesome DEFCON conference.

    Strap on your best hacker gear, throw on your black hoodie, or your bucket hat, and if you’ve got it, flip on your coolest blinky-bling and join us as we pick the brains of half of the AND!XOR team!

    Let’s get DISTORTED (in a full on Cybery kind of way)!!

     

    Helpful DEFCON websites:

    Official DEFCON Website:

    https://defcon.org/

    Official DEFCON SWAG:

    https://shop.defcon.org/

    Registration for DC30:

    https://shop.defcon.org/products/def-con-30-pre-registration-ticket

                    DEFCON Forums:

                    https://forum.defcon.org/

    Helpful AND!XOR websites:

     

    AND!XOR Twitter: https://twitter.com/andnxor

    AND!XOR YouTube: https://www.youtube.com/channel/UCPn2tbrSo1Pi92k9TTJgmyg

    Other podcasts featuring AND!XOR:

    Macrofab Ep#66

    Macrofab Ep#109

    Macrofab Ep#144

    Macrofab Ep#238

    Jason Popillion is a CISSP and serves as a CIO/CTO of a SaaS company and Kevin Pentecost is a CISSP, CISM, CEH, CPT, MCSE, CCA, ITIL-F and serves as an Information Security Director for a manufacturing company.

    Logo

    © 2024 Podcastworld. All rights reserved

    Stay up to date

    For any inquiries, please email us at hello@podcastworld.io