S4 - Episode 002 - Staring Down the Barrel of a Loaded Gun (w/ Ricoh Danielson)

S4 - Episode 002 - Staring Down the Barrel of a Loaded Gun (w/ Ricoh Danielson)

Author: Jason Popillion and Kevin Pentecost March 27, 2025 Duration: 1:22:23

In this gripping episode of the Cyber Distortion Podcast, we sit down with Ricoh Danielson — a former U.S. Army Combat Veteran of Iraq and Afghanistan, national security expert, and digital forensics specialist. With a career that bridges the battlefield and the digital frontlines, Ricoh brings a rare and powerful perspective on the evolving threats to our national security and critical infrastructure. From his firsthand experiences in war zones to his current role as a VCISO and digital forensic expert, Ricoh shares stories that are as eye-opening as they are inspiring. We dive into the real-world challenges facing the nation today — from protecting our energy grids and communication systems to defending against cyber threats that target both the public and private sectors. Ricoh also recounts some of his most intense moments in service, revealing what it takes to operate in high-stakes environments, both overseas and in high-profile courtrooms. This episode is a must-listen for anyone interested in cybersecurity, national defense, or the human element behind protecting our digital and physical worlds. Jason Popillion is a CISSP and serves as a CIO/CTO of a SaaS company and Kevin Pentecost is a CISSP, CISM, CEH, CPT, MPCS, MCSE, CCA, ITIL-F and serves as the Information Security Director for a Manufacturing company. Citations & Helpful Links:

  • National Security Agency (NSA) Cybersecurity: The NSA provides resources aimed at preventing and eradicating cyber threats to U.S. national security systems, with a focus on the Defense Industrial Base and the enhancement of U.S. weapons' security.

https://www.nsa.gov/cybersecurity/

  • Department of Defense Cyber Crime Center (DC3): DC3 offers integrated services including cyber training, digital and multimedia forensics, and vulnerability disclosure, supporting law enforcement and counterintelligence efforts.

https://csrc.nist.gov/ • SANS Institute: A renowned organization specializing in information security and cybersecurity training, offering courses on topics like cyber and network defenses, penetration testing, incident response, and digital forensics. https://www.sans.org/ https://www.dc3.mil/

  • National Institute of Standards and Technology (NIST) Computer Security Resource Center: NIST's CSRC provides access to cybersecurity and information security-related projects, publications, and news, supporting government, industry, and academic efforts in securing information systems.

https://csrc.nist.gov/

  • Cybersecurity and Infrastructure Security Agency (CISA) Free Cybersecurity Services and Tools: CISA has curated a database of free cybersecurity services and tools to help organizations reduce cybersecurity risks across U.S. critical infrastructure sectors.

https://www.cisa.gov/resources-tools/... For listeners interested in connecting with Ricoh Danielson or learning more about his work:

  • Official Website: Ricoh's personal website offers insights into his background, services, and expertise.

https://www.ricohd.us/

  • Contact Page: To reach out to Ricoh directly, visit his contact page where you can send a message or inquiry.

https://www.ricohd.us/contact

  • Instagram: Follow Ricoh on Instagram for updates and insights related to cybersecurity and his professional endeavors.   / ricoh_danielson_  

These resources provide a comprehensive starting point for those interested in delving deeper into the fields of national security and digital forensics.


Ever feel like the world of cybersecurity is explained in a language only experts understand? That's exactly why Cyber Distortion Podcast Series exists. Hosts Jason Popillion and Kevin Pentecost, both seasoned professionals who hold top certifications like the CISSP, cut through the jargon and distortion to talk about digital safety in clear, practical terms. Each episode feels like a conversation with two colleagues who have been in the trenches-Jason as a CIO/CTO and Kevin as an Information Security Manager-and who genuinely want you to walk away with something useful. You won't just hear abstract theories; you'll get actionable advice that applies whether you're protecting your personal data or responsible for an entire organization's security posture. This podcast demystifies the concepts that matter now, from everyday online habits to broader organizational strategies, making crucial knowledge accessible without oversimplifying the real challenges. Tune in for straightforward discussions that equip you with the understanding to navigate an increasingly complex digital landscape with more confidence.
Author: Language: English Episodes: 61

Cyber Distortion Podcast Series
Podcast Episodes
S2 - Episode 005 – Third Party Risk – It's not Me, It's You! [not-audio_url] [/not-audio_url]

Duration: 1:20:01
HE'S BAAAAAAACK!! In this episode, we RE-visit with our very first guest, Benjamin Hall. Ben has served as a virtual CISO, and serves as Sr. Information Security Consultant at Heartland Business Systems. With experience…
S2 - Episode 004 - "AI and ChatGPT is Scary Sh*t! – Part II" [not-audio_url] [/not-audio_url]

Duration: 43:36
In this MUCH anticipated follow-up to our episode 003 on AI an ChatGPT, expect more mind-numbing and terrifying facts about this incredible new technology! Kevin and Jason wrap up their discussion with Justin "Hutch" Hut…
S2 - Episode 003 - "AI and ChatGPT is Scary Sh*t! – Part I" [not-audio_url] [/not-audio_url]

Duration: 55:03
What in the world does AI and ChatGPT have to do with Cybersecurity? Well, this episode is going to answer that question for you, and so much more!! In today's exciting episode, Jason and Kevin discuss the incredible wor…
S2 - Episode 002 – 2022 Breaches and Some Retrospection [not-audio_url] [/not-audio_url]

Duration: 1:21:06
In this exciting second episode of the new season, we're offering up a buffet of delicious options to feast your incessant little cybersecurity appetites on! BREACHES We start by spending time on 5 of the top breaches th…
S2 - Episode 001 – The Dark Web Revisited [not-audio_url] [/not-audio_url]

Duration: 1:14:40
WE ARE BACK! Happy 2023 friends… In this exciting episode of or BRAND NEW season 2, Kevin and Jason make good a promise from Season 1 where they go back and take a deep dive into the Dark Web. This time, we're coming wit…
S1 - Episode 014 – Women in Cybersecurity - Part II [not-audio_url] [/not-audio_url]

Duration: 42:52
There is a worldwide shortage of over 3 million in the ranks of cybersecurity professionals, with half a million of that shortage in North America alone. The problem is only expected to get worse as the demand for infose…
S1 - Episode 013 – Women in Cybersecurity - Part I [not-audio_url] [/not-audio_url]

Duration: 46:00
There is a worldwide shortage of over 3 million in the ranks of cybersecurity professionals, with half a million of that shortage in North America alone. The problem is only expected to get worse as the demand for infose…
S1 - Episode 012 – Unraveling the Zero Trust Mystery [not-audio_url] [/not-audio_url]

Duration: 1:22:23
If you're like many others in information security, you too may struggle with understanding the concept and basic premise of "zero trust." Well, we have good news for you! After this episode, you can rest-assured that we…
S1 - Episode 011 – The Fine Art of Social Engineering [not-audio_url] [/not-audio_url]

Duration: 1:07:03
In this exciting episode, we cover the very fascinating topic of "Social Engineering" aka: Human Hacking! Anyone that lives in Cybersecurity knows that the weakest link in any company's cyber defenses is sitting between…
S1 - Episode 010 – Doomsday Breach Prepping - 101 [not-audio_url] [/not-audio_url]

Duration: 53:10
When the world comes crumbling down and your entire existence is burning to the ground, will you be prepared to handle it? What am I talking about anyway? The post-breach apocalypse, of course. What else?! You see, we ha…