S4 - Episode 012 – Zero Trust, Zero Confusion (w/ Rob Allen)

S4 - Episode 012 – Zero Trust, Zero Confusion (w/ Rob Allen)

Author: Jason Popillion and Kevin Pentecost October 15, 2025 Duration: 1:10:28

In this eye-opening episode of Cyber Distortion, hosts Kevin Pentecost and Jason Popillion sit down with Rob Allen from ThreatLocker to break down one of the most talked-about — and misunderstood — concepts in cybersecurity today: Zero Trust.

With a deep well of technical expertise and real-world business acumen, Rob brings clarity to the chaos, cutting through the jargon to explain what Zero Trust really means, why it matters, and how organizations of all sizes can adopt it effectively. Whether you're a seasoned security pro or just starting to wrap your head around Zero Trust architecture, this episode gives you the insights and practical takeaways you need — without the confusion.

Expect real talk, real strategies, and a fresh perspective on building a more secure future. Don't miss this chance to learn from one of the industry's most experienced leaders in cybersecurity, cloud infrastructure, and customer-driven solutions.

 

Zero Trust doesn't have to be complicated. Let's make it make sense.

 

Helpful Links:

 

Here are several high‑quality resources to deepen your understanding of Zero Trust, along with the official web links for ThreatLocker and Rob Allen's LinkedIn profile:


🔗 Official Links


📚 Additional Learning Resources on Zero Trust

Here are several authoritative and practical learning resources to help your listeners (or you) get up to speed on Zero Trust architectures, strategies, and implementation:

Resource

What You'll Learn / Why It's Useful

Link

Microsoft Learn: Introduction to Zero Trust

Fundamental concepts and principles of Zero Trust

https://learn.microsoft.com/en-us/training/modules/zero-trust-introduction/ (Microsoft Learn)

Microsoft Learn: Introduction to Zero Trust and Best Practice Frameworks

How Zero Trust fits into security frameworks and architectural patterns

https://learn.microsoft.com/en-us/training/modules/introduction-zero-trust-best-practice-frameworks/ (Microsoft Learn)

Microsoft Learn: Protect Infrastructure with Zero Trust

A module focusing on applying Zero Trust in infrastructure & server environments

https://learn.microsoft.com/en-us/training/modules/zero-trust-infrastructure/ (Microsoft Learn)

Microsoft Learn: Manage Networks with Zero Trust

Zero Trust applied to network segmentation, traffic flows, threat protection

https://learn.microsoft.com/en-us/training/modules/zero-trust-networks/ (Microsoft Learn)

Microsoft Learn: Protect Data with Zero Trust

Emphasis on data protection, classification, and Zero Trust data access patterns

https://learn.microsoft.com/en-us/training/modules/zero-trust-data/ (Microsoft Learn)

Microsoft Learn path: Establish the guiding principles and core components of Zero Trust

A full learning path covering identity, endpoints, apps, network, infrastructure, and data

https://learn.microsoft.com/en-us/training/paths/zero-trust-principles/ (Microsoft Learn)

LinkedIn Learning: Understanding Zero Trust

A beginner-friendly video course explaining Zero Trust models and problem framing

https://www.linkedin.com/learning/understanding-zero-trust (LinkedIn)

Udemy: Zero Trust Security Masterclass – Beginner to Mastery

A hands-on, implementation-oriented course (paid)

https://www.udemy.com/course/zero-trust-masterclass-from-beginner-to-mastery/ (Udemy)

Cisco Zero Trust Workshops

Hands‑on and strategic workshops from a major vendor's perspective

https://www.cisco.com/c/en/us/products/security/zero-trust-workshops.html (Cisco)

Tonex Training: Zero Trust Security Model Training

A structured training course in Zero Trust fundamentals and use cases

https://www.tonex.com/training-courses/zero-trust-security-model/ (Tonex)


 


Ever feel like the world of cybersecurity is explained in a language only experts understand? That's exactly why Cyber Distortion Podcast Series exists. Hosts Jason Popillion and Kevin Pentecost, both seasoned professionals who hold top certifications like the CISSP, cut through the jargon and distortion to talk about digital safety in clear, practical terms. Each episode feels like a conversation with two colleagues who have been in the trenches-Jason as a CIO/CTO and Kevin as an Information Security Manager-and who genuinely want you to walk away with something useful. You won't just hear abstract theories; you'll get actionable advice that applies whether you're protecting your personal data or responsible for an entire organization's security posture. This podcast demystifies the concepts that matter now, from everyday online habits to broader organizational strategies, making crucial knowledge accessible without oversimplifying the real challenges. Tune in for straightforward discussions that equip you with the understanding to navigate an increasingly complex digital landscape with more confidence.
Author: Language: English Episodes: 60

Cyber Distortion Podcast Series
Podcast Episodes
S2 - Episode 013 – CISSP Success Stories with Luke Ahmed – Part II [not-audio_url] [/not-audio_url]

Duration: 1:25:25
Description: 🎙️This is part two of our riveting two-part episode with the extraordinary Luke Ahmed. Luke, a best-selling author, CISSP instructor, and the driving force behind the immensely popular Facebook page "CISSP E…
S2 - Episode 012 – CISSP Success Stories with Luke Ahmed – Part I [not-audio_url] [/not-audio_url]

Duration: 2:01:44
In this riveting two-part episode, join us as we dive deep into the world of cybersecurity with the extraordinary Luke Ahmed. Luke, a best-selling author, CISSP instructor, and the driving force behind the immensely popu…
S2 - Episode 006 – You ARE the Weakest link! [not-audio_url] [/not-audio_url]

Duration: 1:01:17
A long time in the making, this episode on the importance of User Awareness may just be the most important episode we've released so far. Kevin Pentecost and Jason Popillion are security veterans and Certified Informatio…
S2 - Episode 005 – Third Party Risk – It's not Me, It's You! [not-audio_url] [/not-audio_url]

Duration: 1:20:01
HE'S BAAAAAAACK!! In this episode, we RE-visit with our very first guest, Benjamin Hall. Ben has served as a virtual CISO, and serves as Sr. Information Security Consultant at Heartland Business Systems. With experience…