Episodi

  • Cybersecurity for Medical Devices | Ctrl-Alt-Secure S3E13 ft. Madison Morrow & Farshad Esnaashari
    Dec 5 2025

    In this episode of Ctrl-Alt-Secure, Valentina Flores sits down with Madison Morrow, Director of Business Development at Blue Sages, and Farshad Esnaashari, a medical device full–lifecycle consultant, to break down one of the most urgent topics in the med-tech industry: cybersecurity requirements for FDA medical device submissions.

    The conversation explores why the FDA is increasing its cybersecurity expectations, the most common mistakes manufacturers make, and how device makers can integrate security early in the product lifecycle. Madison explains how Blue Sages supports medical device companies through engineering best practices, software documentation, testing, and compliance, while Farshad brings over 30 years of experience in architectural security, risk management, and interpreting FDA cybersecurity guidance.

    Key topics covered in this FDA cybersecurity episode:

    • Why cybersecurity must start early in medical device design (not at the end)
    • What the FDA now expects: SPDF, SBOM, traceability, threat modeling, and vulnerability management
    • Why shallow SBOMs, missing traceability, and late pentesting delay submissions
    • How penetration testing and offensive security strengthen FDA submissions
    • Practical guidance for med-tech startups balancing speed, safety, and compliance
    • How AI introduces new cybersecurity risks in medical devices and what the FDA expects for model updates, rollback plans, and integrity checks

    Who needs this episode?

    This discussion is essential for anyone involved in medical device development, regulatory submissions, FDA compliance, cyber risk, software validation, or connected device security. If you’re preparing a 510(k), De Novo, or PMA submission in 2025–2026, this episode gives you a clear roadmap of what to prioritize.

    About Ctrl-Alt-Secure

    Ctrl-Alt-Secure is brought to you by Red Sentry, a human-led, tech-powered penetration testing firm helping companies identify and fix vulnerabilities before attackers can exploit them.

    🔗 Connect with Blue Sages to explore their engineering and regulatory support for medical device companies: https://www.bluesages.com/

    🔗 Contact Red Sentry: https://redsentry.com/contact

    Find more about Red Sentry.

    Mostra di più Mostra meno
    29 min
  • Phishing, Ransomware & Email Security | Ctrl-Alt-Secure S3E12 ft. Bennet Hammer
    Nov 21 2025

    In this episode of Ctrl-Alt-Secure, Valentina Flores sits down with Dr. Bennett Hammer, founder and president of Hammer IT, for a deep dive into one of today’s most common yet misunderstood risks: email security. They break down the evolving threat landscape, from the rise of phishing and ransomware to the ways AI is now being used by both attackers and defenders.

    The conversation explores why email remains one of the most effective entry points for cybercriminals, how remote and hybrid work environments have expanded the attack surface, and the practical steps organizations can take to strengthen their defenses. Dr. Hammer highlights the importance of proactive measures, continuous user education, and building a culture where employees are empowered to question suspicious activity.

    A handful of valuable takeaways:
    • Phishing and ransomware continue to top the list of email-based threats
    • AI is accelerating both offensive and defensive capabilities in cybersecurity
    • Remote work has created new vulnerabilities in email workflows
    • User training and awareness remain essential for preventing breaches
    • Strong filtering, verification protocols, and layered defenses make a measurable difference

    To explore more of Dr. Hammer’s work or try his free tools, visit hammeritconsulting.com, hammersecure.com, or HammerSpam, his spam email analyzer.

    Ctrl-Alt-Secure is brought to you by Red Sentry, a human-led, tech-powered pentesting firm helping companies identify and fix vulnerabilities before attackers can exploit them.

    Find more about Red Sentry.

    Mostra di più Mostra meno
    19 min
  • Neurodiversity in Tech | Ctrl-Alt-Secure S3E11 ft. Andy Ryan & Fred Bullock
    Oct 23 2025

    In this episode of CTRL-ALT-SECURE, Valentina Flores discusses the importance of understanding neurodiversity in tech leadership with guests Andy and Fred from Irregular Training. They explore how neurodivergent individuals, including those with autism and ADHD, can bring unique strengths to the workplace, the challenges posed by standardized work environments, and practical steps organizations can take to support neurodiverse talent. The conversation emphasizes the need for flexibility, trust, and a shift in hiring practices to leverage the strengths of neurodivergent individuals for a more inclusive and productive workplace.

    A handful of valuable takeaways:

    • Neurodiversity is a key part of how teams actually function and succeed.
    • Understanding different thinking styles can unlock creativity and performance.
    • Standardized workplaces often miss what neurodivergent employees need to thrive.
    • Traits like deep focus, pattern recognition, and problem-solving are real strengths.
    • Flexible roles and trust-based cultures bring out the best in neurodivergent talent.
    • The future of work will depend on embracing and designing for neurodiversity.

    To learn more about Andy and Fred’s work on building inclusive, high-performing teams, visit their site Irregular Training.

    CTRL-ALT-SECURE is brought to you by Red Sentry, a human-led, tech-powered pentesting firm helping companies identify and fix vulnerabilities before attackers can exploit them.

    Find more about Red Sentry.

    Mostra di più Mostra meno
    45 min
  • How to Survive a Cyber Crisis | Ctrl-Alt-Secure S3E10 ft. Casey Boggs
    Jul 30 2025

    Ctrl-Alt-Secure Podcast: Breach Mode – How to Survive a Cyber Crisis
    Host: Valentina Flores (Red Sentry CEO)
    Special Guest: Casey Boggs (President, ReputationUs)

    Are you a CISO or CIO preparing your organization for the reputational fallout of a cyberattack? In this episode, we dive deep into the critical, often-overlooked side of cybersecurity: reputation management. Join Valentina Flores and Casey Boggs as they discuss real-world strategies for crisis communication, incident response, and protecting your brand when the unthinkable happens.

    Key Topics:

    • Why reputation is as important as technical response
    • Common mistakes companies make after a breach
    • Building a proactive incident response and communication plan
    • Industry-specific challenges (healthcare, finance, tech, and more)
    • Authenticity and transparency in crisis communications

    Chapters:
    00:00 – Introduction & Guest Welcome
    02:10 – Casey Boggs’ Background & ReputationUs
    05:30 – The Real Impact of a Cyber Breach on Reputation
    09:00 – Who’s to Blame? Internal & External Stakeholders
    13:20 – Common Mistakes in Crisis Response
    18:00 – Timing & Transparency: When to Communicate
    22:45 – Building a Smart Incident Response Plan
    28:10 – Legal, Insurance, and PR: Who’s on Your Team?
    33:00 – Industry-Specific Considerations
    37:15 – Success Stories & Lessons Learned
    41:00 – Proactive Steps for CISOs & CIOs
    45:00 – Final Takeaways & Resources

    About Our Guest:
    Casey Boggs is President of ReputationUs, a leading firm specializing in reputation management and crisis mitigation. With over 20 years of experience, Casey has helped organizations across industries navigate the aftermath of cyber incidents and protect their most valuable asset: trust.

    Connect with Us:
    🔗 Red Sentry
    🔗 ReputationUs

    Find more about Red Sentry.

    Mostra di più Mostra meno
    21 min
  • How Hackers Exploit Your Digital Footprint | Ctrl-Alt-Secure S3E09 ft. Richard Frederick
    Jul 10 2025

    Welcome to the Control-Alt-Secure podcast! In this episode, host Valentina Flores (CEO of Red Sentry) sits down with Richard Frederick, founder and CEO of Strategic All Source Intelligence, to uncover the hidden risks of your digital footprint.

    We dive deep into:

    What your digital footprint really is—and why it matters more than ever
    How hackers and threat actors weaponize open source intelligence (OSINT) against individuals and organizations
    The most overlooked ways companies expose themselves online
    Real-world strategies for managing and reducing your attack surface
    The role of pen testing, cloud security, and continuous monitoring in modern cyber defense
    Actionable tips for building cyber resiliency and protecting your reputation

    Whether you’re a business leader, IT professional, or just want to stay safe online, this episode is packed with insights you can use right away.

    🔗 Connect with Richard Frederick for more on intelligence and risk advisory services. https://sasintel.com/

    Don’t forget to like, subscribe, and hit the bell for more cybersecurity conversations!

    Find more about Red Sentry.

    Mostra di più Mostra meno
    19 min
  • Season 2 E8: Why Backups & Recovery Have to be in Your Strategy | Red Sentry ft Cathy Miron
    Jul 9 2025

    Are your company’s backups really as safe—and as restorable—as you think? Or are you just hoping someone, somewhere, has it all covered?

    This week, Red Sentry CEO Valentina Flores welcomes backup and disaster recovery expert Cathy Miron (CEO of eSilo) for a reality check on one of the most misunderstood (and neglected) pillars of cybersecurity. Together, they demystify how backups actually work, what most companies get wrong, and why a “set it and forget it” approach is a recipe for disaster.

    In this episode:
    • What’s really required for a modern backup and disaster recovery strategy (and why it’s more than just clicking ‘save’)
    • Why backups fail when you need them most, and how to avoid common mistakes
    • The difference between compliance checkboxes and true business resilience
    • Ransomware, immutability, the “3-2-1 rule,” and other backup best practices explained—minus the jargon
    • How to test your plan (before a disaster strikes) and why tabletop exercises are your best friend
    • The dangers of assuming your IT team, MSP, or cloud provider has you covered
    • Recovery point objective, recovery time objective, and what actually matters when you’re staring down downtime

    Whether you’re in the cloud, on-prem, or somewhere in between, you’ll learn why backup and recovery need to be at the core of your security and business continuity plan—not an afterthought.

    If you don’t know exactly how your backups work (or if they work at all), this episode is a must-listen. Don’t wait for an attack or accident to test your recovery plan. Start now.

    Subscribe for more real-world cybersecurity conversations—practical, honest, and focused on what actually keeps your business running.

    00:00 Introduction to the Podcast and Guest
    00:31 Cathy Miron's Background and eSilo's Evolution
    02:50 Importance of Backups and Recovery in Cybersecurity
    03:42 Business Continuity and Resiliency Planning
    07:06 Common Misconceptions and Overconfidence in Backups
    16:56 Ransomware and the Importance of Immutability
    27:00 Cloud Backups and Vendor Risk Management
    30:42 Future of Backup and Recovery
    33:00 Conclusion and Final Thoughts

    Find more about Red Sentry.

    Mostra di più Mostra meno
    34 min
  • Navigating Compliance & Security | Ctrl-Alt-Secure S3E07 ft. Brian Guenther
    Feb 5 2025

    In this insightful episode, Red Sentry CEO Valentina Flores sits down with Brian Guenther from Exceed to break down the essentials of a successful cybersecurity journey. From understanding critical certifications to navigating the latest CMMC updates, they share actionable advice and industry insights to help businesses stay compliant and ready to operate in today’s threat landscape.

    Find more about Red Sentry.

    Mostra di più Mostra meno
    31 min
  • How AI Is Changing Cybersecurity | Ctrl-Alt-Secure S3E06 ft. Rob Petrosino
    Jan 15 2025

    Valentina Flores, CEO of Red Sentry, sits down with Rob Petrosino to explore the intersection of AI and cybersecurity. Together, they discuss how AI is transforming industries and provide practical insights on adopting AI securely in the workplace. Whether you're a tech enthusiast or a business leader, this episode offers valuable perspectives on staying ahead in the AI-driven future.

    Find more about Red Sentry.

    Mostra di più Mostra meno
    35 min