S3 – Episode 008 – The Transhuman

S3 – Episode 008 – The Transhuman

Author: Jason Popillion and Kevin Pentecost August 29, 2024 Duration: 1:45:27

Welcome to this episode of Cyber Distortion, where we explore the cutting edge of technology, security, and the future of humanity itself. Today, we have a truly extraordinary guest joining us: Len Noe, a Transhumanist with over 10 chips embedded in his body. Len isn't just a futurist—he's living proof of what the future could hold, using his integrated technology to perform hacks and complete takeovers on various devices. His unique perspective challenges the boundaries between human and machine, and today, he's here to share his incredible journey and insights with us.

Len's path to becoming a white hat hacker and a technical evangelist at CyberArk is as fascinating as the technology he wields. Once a 1%er biker, Len made a dramatic transition from the world of outlaw motorcycle clubs to the front lines of cyber defense. His story is one of transformation, not just in terms of his career but in the very way he interacts with the world around him, using the embedded chips in his body as tools for exploration, protection, and demonstration.

In this conversation, we'll dive deep into the world of Transhumanism, explore the ethical implications of merging man with machine, and discuss how Len's experiences have shaped his views on the future of cybersecurity. Whether you're a tech enthusiast, a security professional, or just curious about the possibilities of human augmentation, this episode promises to be a thought-provoking journey into the unknown.

Jason Popillion is a CISSP and serves as a CIO/CTO of a SaaS company and Kevin Pentecost is a CISSP, CISM, CEH, CPT, MPCS, MCSE, CCA, ITIL-F and serves as the Information Security Director for a Manufacturing company.

 

CITATIONS

Len's LinkedIn Profile:

https://www.linkedin.com/in/len-noe/

 

William McCurdy Article (The Standard – UK):

https://www.standard.co.uk/news/tech/cyborg-hacker-infiltrate-phone-office-len-noe-b1072862.html

 

Len's Book "Human Hacked: My Life and Lessons as the World's First Augmented Ethical Hacker":

Buy it on Amazon

 

Cyber Ark:

https://www.cyberark.com/

 

The Cyber Cognition Podcast:

https://www.itspmagazine.com/cyber-cognition-podcast

 

Dangerous Things – Embedded Biohacking Stuff:

https://dangerousthings.com/

 

More on the PegLeg Impanted Device:

http://pegleg.org/

 

More on the Biohacking Village at DEFCON and Beyond:

https://www.villageb.io/

 

Biohacking Wearables:

https://www.diygenius.com/best-biohacking-wearables/


Ever feel like the world of cybersecurity is explained in a language only experts understand? That's exactly why Cyber Distortion Podcast Series exists. Hosts Jason Popillion and Kevin Pentecost, both seasoned professionals who hold top certifications like the CISSP, cut through the jargon and distortion to talk about digital safety in clear, practical terms. Each episode feels like a conversation with two colleagues who have been in the trenches-Jason as a CIO/CTO and Kevin as an Information Security Manager-and who genuinely want you to walk away with something useful. You won't just hear abstract theories; you'll get actionable advice that applies whether you're protecting your personal data or responsible for an entire organization's security posture. This podcast demystifies the concepts that matter now, from everyday online habits to broader organizational strategies, making crucial knowledge accessible without oversimplifying the real challenges. Tune in for straightforward discussions that equip you with the understanding to navigate an increasingly complex digital landscape with more confidence.
Author: Language: English Episodes: 60

Cyber Distortion Podcast Series
Podcast Episodes
S1 Episode 007 – The CISSP "EXPERIENCE" [not-audio_url] [/not-audio_url]

Duration: 1:25:16
In this episode, join Jason & Kevin as they discuss the journeys they both took to obtain the coveted CISSP (Certified Information Systems Security Professional) certification from the governing body of (ISC)2. Anyone wh…
S1 - Episode 006 – Surviving Your First Regulatory Audit [not-audio_url] [/not-audio_url]

Duration: 42:25
In this episode, Jason & Kevin join special guest Stacie Grimm, Principal at UHY. UHY is one of the Midwest's leading CPA, business advisory and M&A firms. They deliver a broad range of tax, accounting, consulting and in…
S1 - Episode 005 - API Security Land Mines [not-audio_url] [/not-audio_url]

Duration: 35:43
In this episode, Jason and Kevin join guest Adam Fisher, Principal Security Engineer at Salt Security. We focus on a very common threat vector and component in modern web applications, the topic of API security. API secu…
S1 - Episode 004 - The Deep Dark Web [not-audio_url] [/not-audio_url]

Duration: 40:19
What is this mysterious online enigma? Maybe you've heard about it and wondered, "What type of craziness would I find out there?" Cybersecurity professionals and CISSP brothers, Jason and Kevin bring a hard-hitting and a…
S1 - Episode 003 - A Manager's Perspective on Cybersecurity [not-audio_url] [/not-audio_url]

Duration: 35:55
Jason and Kevin join guest Eric Lough, VP of Business Development at FCP Euro to discuss how managers think and make critical decisions around Cybersecurity. Eric brings over 15 years of experience in the Automotive Afte…
S1 - Episode 002 - Ransomware Part II [not-audio_url] [/not-audio_url]

Duration: 45:18
Jason and Kevin, both CISSP's and seasoned cybersecurity professionals, join guest David Bonvillain, VP of Sales Engineering for Halcyon.ai. David shares his 20+ years of experience to dive deep into Ransomware. David sh…
S1 - Episode 001 - Ransomware Part I [not-audio_url] [/not-audio_url]

Duration: 45:08
Jason and Kevin, both CISSP's and seasoned cybersecurity professionals, join guest Benjamin Hall CISA, CDPSE, a cybersecurity consultant to break down key understandings of Ransomware. They share Ransomware horror storie…
S1 - Episode 000 - Welcome to the Cyber Distortion Podcast [not-audio_url] [/not-audio_url]

Duration: 23:02
Jason and Kevin, both CISSP's and seasoned cybersecurity professionals, breakdown 3 of the top Ransomware attacks of 2021. They give insights into why hackers found these vulnerabilities and help you understand why this…