In this eye-opening episode of Cyber Distortion, hosts Kevin Pentecost and Jason Popillion sit down with Rob Allen from ThreatLocker to break down one of the most talked-about — and misunderstood — concepts in cybersecurity today: Zero Trust.
With a deep well of technical expertise and real-world business acumen, Rob brings clarity to the chaos, cutting through the jargon to explain what Zero Trust really means, why it matters, and how organizations of all sizes can adopt it effectively. Whether you're a seasoned security pro or just starting to wrap your head around Zero Trust architecture, this episode gives you the insights and practical takeaways you need — without the confusion.
Expect real talk, real strategies, and a fresh perspective on building a more secure future. Don't miss this chance to learn from one of the industry's most experienced leaders in cybersecurity, cloud infrastructure, and customer-driven solutions.
Zero Trust doesn't have to be complicated. Let's make it make sense.
Helpful Links:
Here are several high‑quality resources to deepen your understanding of Zero Trust, along with the official web links for ThreatLocker and Rob Allen's LinkedIn profile:
🔗 Official Links
📚 Additional Learning Resources on Zero Trust
Here are several authoritative and practical learning resources to help your listeners (or you) get up to speed on Zero Trust architectures, strategies, and implementation:
| Resource | What You'll Learn / Why It's Useful | Link |
| Microsoft Learn: Introduction to Zero Trust | Fundamental concepts and principles of Zero Trust | https://learn.microsoft.com/en-us/training/modules/zero-trust-introduction/ (Microsoft Learn) |
| Microsoft Learn: Introduction to Zero Trust and Best Practice Frameworks | How Zero Trust fits into security frameworks and architectural patterns | https://learn.microsoft.com/en-us/training/modules/introduction-zero-trust-best-practice-frameworks/ (Microsoft Learn) |
| Microsoft Learn: Protect Infrastructure with Zero Trust | A module focusing on applying Zero Trust in infrastructure & server environments | https://learn.microsoft.com/en-us/training/modules/zero-trust-infrastructure/ (Microsoft Learn) |
| Microsoft Learn: Manage Networks with Zero Trust | Zero Trust applied to network segmentation, traffic flows, threat protection | https://learn.microsoft.com/en-us/training/modules/zero-trust-networks/ (Microsoft Learn) |
| Microsoft Learn: Protect Data with Zero Trust | Emphasis on data protection, classification, and Zero Trust data access patterns | https://learn.microsoft.com/en-us/training/modules/zero-trust-data/ (Microsoft Learn) |
| Microsoft Learn path: Establish the guiding principles and core components of Zero Trust | A full learning path covering identity, endpoints, apps, network, infrastructure, and data | https://learn.microsoft.com/en-us/training/paths/zero-trust-principles/ (Microsoft Learn) |
| LinkedIn Learning: Understanding Zero Trust | A beginner-friendly video course explaining Zero Trust models and problem framing | https://www.linkedin.com/learning/understanding-zero-trust (LinkedIn) |
| Udemy: Zero Trust Security Masterclass – Beginner to Mastery | A hands-on, implementation-oriented course (paid) | https://www.udemy.com/course/zero-trust-masterclass-from-beginner-to-mastery/ (Udemy) |
| Cisco Zero Trust Workshops | Hands‑on and strategic workshops from a major vendor's perspective | https://www.cisco.com/c/en/us/products/security/zero-trust-workshops.html (Cisco) |
| Tonex Training: Zero Trust Security Model Training | A structured training course in Zero Trust fundamentals and use cases | https://www.tonex.com/training-courses/zero-trust-security-model/ (Tonex) |