S1 - Episode 002 - Ransomware Part II

S1 - Episode 002 - Ransomware Part II

Author: Jason Popillion and Kevin Pentecost February 22, 2022 Duration: 45:18

Jason and Kevin, both CISSP's and seasoned cybersecurity professionals, join guest David Bonvillain, VP of Sales Engineering for Halcyon.ai. David shares his 20+ years of experience to dive deep into Ransomware. David shares with the audience practical ways to keep yourself safe based on his years of reverse engineering malware and his deep understanding on how they are programmed to behave.  He also takes on a historical review of Ransomware, where it started, how it progressed into a major business model and recent new developments discovered in the last 2 weeks on where it is going. We conclude with information you can use to track Ransomware attacks and data breaches.

Jason Popillion is a CISSP and serves as a CIO/CTO of a SaaS company and Kevin Pentecost is a CISSP, CISM, CEH, CPT, MCSE, CCA, ITIL-F and serves as a Information Security Director for a Manufacturing company.


Ever feel like the world of cybersecurity is explained in a language only experts understand? That's exactly why Cyber Distortion Podcast Series exists. Hosts Jason Popillion and Kevin Pentecost, both seasoned professionals who hold top certifications like the CISSP, cut through the jargon and distortion to talk about digital safety in clear, practical terms. Each episode feels like a conversation with two colleagues who have been in the trenches-Jason as a CIO/CTO and Kevin as an Information Security Manager-and who genuinely want you to walk away with something useful. You won't just hear abstract theories; you'll get actionable advice that applies whether you're protecting your personal data or responsible for an entire organization's security posture. This podcast demystifies the concepts that matter now, from everyday online habits to broader organizational strategies, making crucial knowledge accessible without oversimplifying the real challenges. Tune in for straightforward discussions that equip you with the understanding to navigate an increasingly complex digital landscape with more confidence.
Author: Language: English Episodes: 60

Cyber Distortion Podcast Series
Podcast Episodes
S5 - Episode 003 – Stuxnet: Zero-Day Cataclysmic Warfare [not-audio_url] [/not-audio_url]

Duration: 33:52
Cyber Distortion Podcast – Hosted by Kevin Pentecost & Jason Popillion In this episode of the Cyber Distortion Podcast, Kevin and Jason discuss one of the most chilling and groundbreaking cyberattacks in history: Stuxnet…
S5 - Episode 002 – Cicada 3301 [not-audio_url] [/not-audio_url]

Duration: 44:08
Cyber Distortion Podcast – Hosted by Kevin Pentecost & Jason Popillion In January 2012, a mysterious message appeared on an obscure corner of the internet — a simple image posted on 4chan with a chilling promise: "We are…
S5 - Episode 001 – The Day that Twitter Died [not-audio_url] [/not-audio_url]

Duration: 29:03
Cyber Distortion Podcast – Hosted by Kevin Pentecost & Jason Popillion On July 15, 2020, the unthinkable happened: dozens of the world's most powerful voices — Barack Obama, Elon Musk, Bill Gates, Joe Biden, Apple, Uber,…
S4 - Episode 012 – Zero Trust, Zero Confusion (w/ Rob Allen) [not-audio_url] [/not-audio_url]

Duration: 1:10:28
In this eye-opening episode of Cyber Distortion, hosts Kevin Pentecost and Jason Popillion sit down with Rob Allen from ThreatLocker to break down one of the most talked-about — and misunderstood — concepts in cybersecur…
S4 - Episode 011 – Faith, Fire, and Frameworks (w/ Gaelle Koanda) [not-audio_url] [/not-audio_url]

Duration: 1:21:04
Today's guest is a true force in cybersecurity, governance, and leadership. She's a global voice for resilience, inclusion, and innovation — and her story is as inspiring as it is impactful. In this episode, we were thri…
S4 - Episode 008 – Unleashing Your Inner Hacker (w/ Ted Harrington) [not-audio_url] [/not-audio_url]

Duration: 1:25:56
This episode welcomes Ted Harrington, a celebrated ethical hacker, TED‑X keynote speaker, and executive partner at Independent Security Evaluators (ISE). With decades of real‑world experience hacking everything from iPho…