
Sign up to save your podcasts
Or


In this eye-opening episode of Cyber Distortion, hosts Kevin Pentecost and Jason Popillion sit down with Rob Allen from ThreatLocker to break down one of the most talked-about — and misunderstood — concepts in cybersecurity today: Zero Trust.
With a deep well of technical expertise and real-world business acumen, Rob brings clarity to the chaos, cutting through the jargon to explain what Zero Trust really means, why it matters, and how organizations of all sizes can adopt it effectively. Whether you're a seasoned security pro or just starting to wrap your head around Zero Trust architecture, this episode gives you the insights and practical takeaways you need — without the confusion.
Expect real talk, real strategies, and a fresh perspective on building a more secure future. Don't miss this chance to learn from one of the industry's most experienced leaders in cybersecurity, cloud infrastructure, and customer-driven solutions.
Zero Trust doesn't have to be complicated. Let's make it make sense.
Helpful Links:
Here are several high‑quality resources to deepen your understanding of Zero Trust, along with the official web links for ThreatLocker and Rob Allen's LinkedIn profile:
🔗 Official Links
📚 Additional Learning Resources on Zero Trust
Here are several authoritative and practical learning resources to help your listeners (or you) get up to speed on Zero Trust architectures, strategies, and implementation:
Resource
What You'll Learn / Why It's Useful
Link
Microsoft Learn: Introduction to Zero Trust
Fundamental concepts and principles of Zero Trust
https://learn.microsoft.com/en-us/training/modules/zero-trust-introduction/ (Microsoft Learn)
Microsoft Learn: Introduction to Zero Trust and Best Practice Frameworks
How Zero Trust fits into security frameworks and architectural patterns
https://learn.microsoft.com/en-us/training/modules/introduction-zero-trust-best-practice-frameworks/ (Microsoft Learn)
Microsoft Learn: Protect Infrastructure with Zero Trust
A module focusing on applying Zero Trust in infrastructure & server environments
https://learn.microsoft.com/en-us/training/modules/zero-trust-infrastructure/ (Microsoft Learn)
Microsoft Learn: Manage Networks with Zero Trust
Zero Trust applied to network segmentation, traffic flows, threat protection
https://learn.microsoft.com/en-us/training/modules/zero-trust-networks/ (Microsoft Learn)
Microsoft Learn: Protect Data with Zero Trust
Emphasis on data protection, classification, and Zero Trust data access patterns
https://learn.microsoft.com/en-us/training/modules/zero-trust-data/ (Microsoft Learn)
Microsoft Learn path: Establish the guiding principles and core components of Zero Trust
A full learning path covering identity, endpoints, apps, network, infrastructure, and data
https://learn.microsoft.com/en-us/training/paths/zero-trust-principles/ (Microsoft Learn)
LinkedIn Learning: Understanding Zero Trust
A beginner-friendly video course explaining Zero Trust models and problem framing
https://www.linkedin.com/learning/understanding-zero-trust (LinkedIn)
Udemy: Zero Trust Security Masterclass – Beginner to Mastery
A hands-on, implementation-oriented course (paid)
https://www.udemy.com/course/zero-trust-masterclass-from-beginner-to-mastery/ (Udemy)
Cisco Zero Trust Workshops
Hands‑on and strategic workshops from a major vendor's perspective
https://www.cisco.com/c/en/us/products/security/zero-trust-workshops.html (Cisco)
Tonex Training: Zero Trust Security Model Training
A structured training course in Zero Trust fundamentals and use cases
https://www.tonex.com/training-courses/zero-trust-security-model/ (Tonex)
By Jason PopillionIn this eye-opening episode of Cyber Distortion, hosts Kevin Pentecost and Jason Popillion sit down with Rob Allen from ThreatLocker to break down one of the most talked-about — and misunderstood — concepts in cybersecurity today: Zero Trust.
With a deep well of technical expertise and real-world business acumen, Rob brings clarity to the chaos, cutting through the jargon to explain what Zero Trust really means, why it matters, and how organizations of all sizes can adopt it effectively. Whether you're a seasoned security pro or just starting to wrap your head around Zero Trust architecture, this episode gives you the insights and practical takeaways you need — without the confusion.
Expect real talk, real strategies, and a fresh perspective on building a more secure future. Don't miss this chance to learn from one of the industry's most experienced leaders in cybersecurity, cloud infrastructure, and customer-driven solutions.
Zero Trust doesn't have to be complicated. Let's make it make sense.
Helpful Links:
Here are several high‑quality resources to deepen your understanding of Zero Trust, along with the official web links for ThreatLocker and Rob Allen's LinkedIn profile:
🔗 Official Links
📚 Additional Learning Resources on Zero Trust
Here are several authoritative and practical learning resources to help your listeners (or you) get up to speed on Zero Trust architectures, strategies, and implementation:
Resource
What You'll Learn / Why It's Useful
Link
Microsoft Learn: Introduction to Zero Trust
Fundamental concepts and principles of Zero Trust
https://learn.microsoft.com/en-us/training/modules/zero-trust-introduction/ (Microsoft Learn)
Microsoft Learn: Introduction to Zero Trust and Best Practice Frameworks
How Zero Trust fits into security frameworks and architectural patterns
https://learn.microsoft.com/en-us/training/modules/introduction-zero-trust-best-practice-frameworks/ (Microsoft Learn)
Microsoft Learn: Protect Infrastructure with Zero Trust
A module focusing on applying Zero Trust in infrastructure & server environments
https://learn.microsoft.com/en-us/training/modules/zero-trust-infrastructure/ (Microsoft Learn)
Microsoft Learn: Manage Networks with Zero Trust
Zero Trust applied to network segmentation, traffic flows, threat protection
https://learn.microsoft.com/en-us/training/modules/zero-trust-networks/ (Microsoft Learn)
Microsoft Learn: Protect Data with Zero Trust
Emphasis on data protection, classification, and Zero Trust data access patterns
https://learn.microsoft.com/en-us/training/modules/zero-trust-data/ (Microsoft Learn)
Microsoft Learn path: Establish the guiding principles and core components of Zero Trust
A full learning path covering identity, endpoints, apps, network, infrastructure, and data
https://learn.microsoft.com/en-us/training/paths/zero-trust-principles/ (Microsoft Learn)
LinkedIn Learning: Understanding Zero Trust
A beginner-friendly video course explaining Zero Trust models and problem framing
https://www.linkedin.com/learning/understanding-zero-trust (LinkedIn)
Udemy: Zero Trust Security Masterclass – Beginner to Mastery
A hands-on, implementation-oriented course (paid)
https://www.udemy.com/course/zero-trust-masterclass-from-beginner-to-mastery/ (Udemy)
Cisco Zero Trust Workshops
Hands‑on and strategic workshops from a major vendor's perspective
https://www.cisco.com/c/en/us/products/security/zero-trust-workshops.html (Cisco)
Tonex Training: Zero Trust Security Model Training
A structured training course in Zero Trust fundamentals and use cases
https://www.tonex.com/training-courses/zero-trust-security-model/ (Tonex)