Listen

Description

In this eye-opening episode of Cyber Distortion, hosts Kevin Pentecost and Jason Popillion sit down with Rob Allen from ThreatLocker to break down one of the most talked-about — and misunderstood — concepts in cybersecurity today: Zero Trust.

With a deep well of technical expertise and real-world business acumen, Rob brings clarity to the chaos, cutting through the jargon to explain what Zero Trust really means, why it matters, and how organizations of all sizes can adopt it effectively. Whether you're a seasoned security pro or just starting to wrap your head around Zero Trust architecture, this episode gives you the insights and practical takeaways you need — without the confusion.

Expect real talk, real strategies, and a fresh perspective on building a more secure future. Don't miss this chance to learn from one of the industry's most experienced leaders in cybersecurity, cloud infrastructure, and customer-driven solutions.

 

Zero Trust doesn't have to be complicated. Let's make it make sense.

 

Helpful Links:

 

Here are several high‑quality resources to deepen your understanding of Zero Trust, along with the official web links for ThreatLocker and Rob Allen's LinkedIn profile:


🔗 Official Links


📚 Additional Learning Resources on Zero Trust

Here are several authoritative and practical learning resources to help your listeners (or you) get up to speed on Zero Trust architectures, strategies, and implementation:

Resource

What You'll Learn / Why It's Useful

Link

Microsoft Learn: Introduction to Zero Trust

Fundamental concepts and principles of Zero Trust

https://learn.microsoft.com/en-us/training/modules/zero-trust-introduction/ (Microsoft Learn)

Microsoft Learn: Introduction to Zero Trust and Best Practice Frameworks

How Zero Trust fits into security frameworks and architectural patterns

https://learn.microsoft.com/en-us/training/modules/introduction-zero-trust-best-practice-frameworks/ (Microsoft Learn)

Microsoft Learn: Protect Infrastructure with Zero Trust

A module focusing on applying Zero Trust in infrastructure & server environments

https://learn.microsoft.com/en-us/training/modules/zero-trust-infrastructure/ (Microsoft Learn)

Microsoft Learn: Manage Networks with Zero Trust

Zero Trust applied to network segmentation, traffic flows, threat protection

https://learn.microsoft.com/en-us/training/modules/zero-trust-networks/ (Microsoft Learn)

Microsoft Learn: Protect Data with Zero Trust

Emphasis on data protection, classification, and Zero Trust data access patterns

https://learn.microsoft.com/en-us/training/modules/zero-trust-data/ (Microsoft Learn)

Microsoft Learn path: Establish the guiding principles and core components of Zero Trust

A full learning path covering identity, endpoints, apps, network, infrastructure, and data

https://learn.microsoft.com/en-us/training/paths/zero-trust-principles/ (Microsoft Learn)

LinkedIn Learning: Understanding Zero Trust

A beginner-friendly video course explaining Zero Trust models and problem framing

https://www.linkedin.com/learning/understanding-zero-trust (LinkedIn)

Udemy: Zero Trust Security Masterclass – Beginner to Mastery

A hands-on, implementation-oriented course (paid)

https://www.udemy.com/course/zero-trust-masterclass-from-beginner-to-mastery/ (Udemy)

Cisco Zero Trust Workshops

Hands‑on and strategic workshops from a major vendor's perspective

https://www.cisco.com/c/en/us/products/security/zero-trust-workshops.html (Cisco)

Tonex Training: Zero Trust Security Model Training

A structured training course in Zero Trust fundamentals and use cases

https://www.tonex.com/training-courses/zero-trust-security-model/ (Tonex)