Shut The Backdoor
Shut The Backdoor
Podcast Description
Welcome to Shut the Backdoor, brought to you by Redox. Shut The Backdoor is a healthcare security podcast dedicated to keeping health data safe, one episode at a time. Hosted by Jody Maberry and Meghan Mcleod and featuring special guests to discuss the most critical topics for healthcare security.
Podcast Insights
Content Themes
The podcast covers critical topics in healthcare security, including efficient offboarding processes, insider threats in hiring, and automation in identity management. Episode examples include 'Streamlining Secure Departures,' which discusses the importance of automation in offboarding to safeguard sensitive data, and 'Hiring Malicious Actors,' addressing the threats posed by sophisticated fake candidates in the hiring process.

Welcome to Shut the Backdoor, brought to you by Redox. Shut The Backdoor is a healthcare security podcast dedicated to keeping health data safe, one episode at a time. Hosted by Jody Maberry and Meghan Mcleod and featuring special guests to discuss the most critical topics for healthcare security.
“Communication is one of the biggest parts of making vulnerability management work.”
Episode Highlights
[00:44] Start with understanding your environment and technology stack
[01:21] Prioritizing vulnerabilities based on risk and business impact
[03:16] Tracking vulnerabilities without overwhelming engineering teams
[05:58] Communication and collaboration to ensure vulnerabilities get fixed
[08:40] Mitigating risk when patches or fixes are unavailable
[11:17] Why vulnerability management must continuously evolve
Building a vulnerability management program takes more than installing a scanner. Staff security engineers Trevor Wilson and Ethan Wolkowicz join the conversation to share what it actually takes to build and improve a vulnerability management program. The discussion covers how teams assess risk, prioritize fixes, work with engineering teams, and avoid overwhelming everyone with alerts. Vulnerability management is never finished. As this episode highlights, it must evolve as threats, tools, and compliance requirements change.
Resources
https://redoxengine.com/solutions/platform-security
Have feedback or a topic suggestion? Submit it using this linked form.
Meghan McLeod [email protected]

Disclaimer
This podcast’s information is provided for general reference and was obtained from publicly accessible sources. The Podcast Collaborative neither produces nor verifies the content, accuracy, or suitability of this podcast. Views and opinions belong solely to the podcast creators and guests.
For a complete disclaimer, please see our Full Disclaimer on the archive page. The Podcast Collaborative bears no responsibility for the podcast’s themes, language, or overall content. Listener discretion is advised. Read our Terms of Use and Privacy Policy for more details.