S2 - Episode 006 – You ARE the Weakest link!

S2 - Episode 006 – You ARE the Weakest link!

Author: Jason Popillion and Kevin Pentecost June 7, 2023 Duration: 1:01:17

A long time in the making, this episode on the importance of User Awareness may just be the most important episode we've released so far.

Kevin Pentecost and Jason Popillion are security veterans and Certified Information Systems Security Professionals (CISSPs) who know their way around a good User Awareness Training program having personally trained in classroom led environments as well as fostered and matured their own corporate training programs over their years as Cybersecurity managers.

Join us as the duo delve into the critical topic of Cybersecurity User Awareness. With their wealth of experience, they provided invaluable insights and practical advice on how individuals can protect themselves against evolving cyber threats.

They emphasize that user awareness plays a pivotal role in defending against cyber threats. They highlight the fact that attackers often exploit human vulnerabilities and trick individuals into compromising their own security. By enhancing user awareness, people can become more proactive in recognizing and responding to potential threats. A key role is understanding that just like every technical control, YOU are a critical layer of defense both in your personal life, and in your corporate environment.

We take a look at the prevalence of social engineering attacks, which manipulate human psychology to deceive individuals into divulging sensitive information or performing harmful actions. We explain common tactics such as phishing emails, vishing calls, targeting spear phishing, CEO Spoofing, and many other non-email related social engineering tactics.

To counter these threats, they recommend adopting a skeptical mindset, scrutinizing unexpected communications, and verifying the authenticity of requests before taking any action.

Jason Popillion is a CISSP and serves as a CIO/CTO of a SaaS company and Kevin Pentecost is a CISSP, CISM, CEH, CPT, MPCS, MCSE, CCA, ITIL-F and serves as a Information Security Director for a Manufacturing company.

 

 

DOWNLOADS:

PRINT and HANG this on your Wall:

 Printable Version of the Cyber Distortion Podcast "Red Flags" PDF

CyberDistortion Blog:

https://cyberdistortionpodcast.com/

CyberDistortion Swag Shop:

https://cyberdistortionswag.shop/

 

 


Ever feel like the world of cybersecurity is explained in a language only experts understand? That's exactly why Cyber Distortion Podcast Series exists. Hosts Jason Popillion and Kevin Pentecost, both seasoned professionals who hold top certifications like the CISSP, cut through the jargon and distortion to talk about digital safety in clear, practical terms. Each episode feels like a conversation with two colleagues who have been in the trenches-Jason as a CIO/CTO and Kevin as an Information Security Manager-and who genuinely want you to walk away with something useful. You won't just hear abstract theories; you'll get actionable advice that applies whether you're protecting your personal data or responsible for an entire organization's security posture. This podcast demystifies the concepts that matter now, from everyday online habits to broader organizational strategies, making crucial knowledge accessible without oversimplifying the real challenges. Tune in for straightforward discussions that equip you with the understanding to navigate an increasingly complex digital landscape with more confidence.
Author: Language: English Episodes: 60

Cyber Distortion Podcast Series
Podcast Episodes
S1 Episode 007 – The CISSP "EXPERIENCE" [not-audio_url] [/not-audio_url]

Duration: 1:25:16
In this episode, join Jason & Kevin as they discuss the journeys they both took to obtain the coveted CISSP (Certified Information Systems Security Professional) certification from the governing body of (ISC)2. Anyone wh…
S1 - Episode 006 – Surviving Your First Regulatory Audit [not-audio_url] [/not-audio_url]

Duration: 42:25
In this episode, Jason & Kevin join special guest Stacie Grimm, Principal at UHY. UHY is one of the Midwest's leading CPA, business advisory and M&A firms. They deliver a broad range of tax, accounting, consulting and in…
S1 - Episode 005 - API Security Land Mines [not-audio_url] [/not-audio_url]

Duration: 35:43
In this episode, Jason and Kevin join guest Adam Fisher, Principal Security Engineer at Salt Security. We focus on a very common threat vector and component in modern web applications, the topic of API security. API secu…
S1 - Episode 004 - The Deep Dark Web [not-audio_url] [/not-audio_url]

Duration: 40:19
What is this mysterious online enigma? Maybe you've heard about it and wondered, "What type of craziness would I find out there?" Cybersecurity professionals and CISSP brothers, Jason and Kevin bring a hard-hitting and a…
S1 - Episode 003 - A Manager's Perspective on Cybersecurity [not-audio_url] [/not-audio_url]

Duration: 35:55
Jason and Kevin join guest Eric Lough, VP of Business Development at FCP Euro to discuss how managers think and make critical decisions around Cybersecurity. Eric brings over 15 years of experience in the Automotive Afte…
S1 - Episode 002 - Ransomware Part II [not-audio_url] [/not-audio_url]

Duration: 45:18
Jason and Kevin, both CISSP's and seasoned cybersecurity professionals, join guest David Bonvillain, VP of Sales Engineering for Halcyon.ai. David shares his 20+ years of experience to dive deep into Ransomware. David sh…
S1 - Episode 001 - Ransomware Part I [not-audio_url] [/not-audio_url]

Duration: 45:08
Jason and Kevin, both CISSP's and seasoned cybersecurity professionals, join guest Benjamin Hall CISA, CDPSE, a cybersecurity consultant to break down key understandings of Ransomware. They share Ransomware horror storie…
S1 - Episode 000 - Welcome to the Cyber Distortion Podcast [not-audio_url] [/not-audio_url]

Duration: 23:02
Jason and Kevin, both CISSP's and seasoned cybersecurity professionals, breakdown 3 of the top Ransomware attacks of 2021. They give insights into why hackers found these vulnerabilities and help you understand why this…