PodcastsBusiness#RealTalk with Aaron Bregg

#RealTalk with Aaron Bregg

Aaron Bregg
#RealTalk with Aaron Bregg
Latest episode

Available Episodes

5 of 108
  • EP108 — Rethinking Third-Party Risk in 2026
    In this episode we discuss evolving vendor-risk practices and automation.
    --------  
    25:02
  • Episode 107 - Rethinking Threat Intelligence in 2025
    In this first episode of 2025, I picked a topic that is one of the few areas of security that is both 'hype' and 'real'. Threat Intelligence. It is an area that you can get great information for free but also overpay for what you get.I wanted to take a different approach to discussing this one, so I contacted a well-respected colleague of mine, Justin Lentz. Who happens to  work in the SMB Threat Intel space to come on the podcast and share his experiences and thoughts.Talking Points:How do you approach a smaller client when it comes to TI?What is different when it comes to a client that has some experience with TI?What are some pitfalls when you look at the different TI providers out there?What happens when you run into data that is not relevant to your company's process?Asking clients what is the problem that you are trying to solve?What do you do when you have a low or limited budget?What is his experiences running into this type of project (open source tools, using Azure, etc.)What does it look like a year later?SaaS platformPartnering with different groups, agencies, etc.The 'addiction' on wanting to get more dataCreating a Circle of Trust to share valuable informationEpisode Charity:Corewell Health's Blue Envelope Student Suicide Prevention ProgramEpisode Sponsor:Solis Security is a cyber security managed service provider specializing in Threat Intelligence and Incident Response.  
    --------  
    37:57
  • Episode 106 - CISO Insights - Lessons Learned in My Healthcare Security Journey
    In this special episode, I finally get a chance to do a virtual fireside chat with my talented and funny CISO Scott Dresen. I actually started working with Scott while he was the Chief Technology Officer for Spectrum Health. It was in this role that Scott down the path to becoming the Chief Information Security Officer for Corewell Health. So you can say he has been here for the entire Information Security program revamp that started back in 2016.Talking Points:Back in 2016 you were the CTO when the Information Security program was 'rebooted'. What were some of your biggest challenges and frustrations back then?In 2018 you assumed the dual role of CTO and CISO, what was the hardest thing you had to change/overcome with having that dual role?Let's talk to WannaCry incident, what did the high level leadership view look like and what decisions needed to happen?In 2019 you had to re-evaluate the state of the security program at the halfway part of the timeline. During that you had to make some hard choice about the direction we needed to go in order to compete things. How did you come up with those decisions?You have had the distinct 'pleasure' of being a part of both a small healthcare and large scale acquisitions, what are some valuable lessons learned from each?In 2020 you had to pivot from an almost entirely in-person workforce to almost 100% remote, how did you manage to accomplish this in a timely and successful manner?In 2023 you had a chance to speak in front of congress around healthcare security, walk me through how that came about, how you felt in the moment and what things would you do differently (in hindsight)What has been the hardest part of planning and implementing Artificial Intelligence security?Heading into 2025, what advice do you have for other healthcare security leaders as they face the challenges of tighter budgets, smarter threat actors and changing business strategies? Episode Charities:Toys for Tots of Grand Rapids - Presents for less fortunate childrenNorth Kent Connect - A great foundation that helps families with items that may not be covered by other programsYMCA of Greater Grand Rapids - Great organization promoting healthy lifestylesEpisode Sponsor:Cloud Con - Michigan's premier security and infrastructure conference!
    --------  
    50:58
  • Episode 105 - Monsters Under Your Bed: Mapping The Dark Web with Python
    *Disclaimer* While this episode deals with an incredibly important topic, there are potential dangers in doing this type of work. PLEASE do your homework and be well prepared should you go down this path, as your life can be impacted with a wrong turn.In this episode, which is the first of a listener requested one around technical topics.With cybercrime and threat actor activity on the rise, it is more important than ever to understand the dark web and monitor it for potential risks or signs of a breach. There are several tools and intel providers that can do this, but they’re not cheap. So why don’t we just do it ourselves?Python can handle simple tasks surrounding dark web scanning and offers more customization for complex tasks. Using strictly free open-source libraries and any system you have available, you can set up an automated scanner and detect threats as they arise.Scan for IP addresses, potentially compromised emails, crypto addresses, and any regex patterns that you desire. Map your findings to the most relevant onion sites and get an understanding of where your adversaries tend to operate. This is just a start. From here, you can go almost anywhere.Episode Charity:Proceeds from this episode's sponsorship will be going towards the Baker-Bonsai Friendship Fund. Bruce Baker was a great bonsai tree artist and along with Deal Bull, helped make the art of bonsai be something wonderful that can be shared for future generations at the Frederik Meijer Gardens.Episode Sponsor:Cloud Security Alliance of West MichiganTalking Points:Why is it important that you at least have a basic understanding of the Dark Web is you are in the Small and Medium sized Business (SMB) space.Pros and Cons of Build vs BuyWhat safeguards do you want when out in the fringes?What are the mental health aspects of doing this type of work? How manage those pressures?What are Seed URLs?How to use Dark Web templates for scanning.Description credit to GrrCon
    --------  
    50:58
  • Debunking The Zero Trust is Expensive and Painful Myth
    In this episode I talk with Tamer Baker around the not always clear topic of Zero Trust. While the term has been around while, it definitely gets overused by security vendors. However, because of Tamer's role as the Chief Technology Officer in the Healthcare space, he is also to bring several different points of view to the conversation.  Several of these are key to solving questions such as:Is Zero Trust truly expensive and painful? (Radiologist user experience example)As more and more healthcare systems are having to worry about budgets, he challenges the concepts on doing the same with 'less'.A lot of security vendors are talking AI in their products, what things is your company doing that is actually using AI?These are just a few of the tough questions that we tackle. So, set aside some time in your day to listen in to a great conversation!Episode CharitySince 2011, Black Girls Code has supported girls of color in tech through coding education and more. We partner with schools and organizations to offer a range of programs, both in-person and virtual, for ages 7-25.Episode SponsorZscaler is a Cloud Security company based out of San Jose California.
    --------  
    52:03

More Business podcasts

About #RealTalk with Aaron Bregg

Practical security conversations for healthcare and beyond.
Podcast website

Listen to #RealTalk with Aaron Bregg, Money Rehab with Nicole Lapin and many other podcasts from around the world with the radio.net app

Get the free radio.net app

  • Stations and podcasts to bookmark
  • Stream via Wi-Fi or Bluetooth
  • Supports Carplay & Android Auto
  • Many other app features
Social
v8.1.2 | © 2007-2025 radio.de GmbH
Generated: 12/15/2025 - 4:00:26 AM