Breaking Vulnerability Management's 30-Year Logjam: Two Cyber Veterans Attack It With AI Titelbild

Breaking Vulnerability Management's 30-Year Logjam: Two Cyber Veterans Attack It With AI

Breaking Vulnerability Management's 30-Year Logjam: Two Cyber Veterans Attack It With AI

Jetzt kostenlos hören, ohne Abo

Details anzeigen

Über diesen Titel

Sharon Isaaci and David Warshavski spent careers on the offensive side of cybersecurity — breaking into organizations, finding zero-days, and cleaning up after the breaches that followed at Sygnia, Israel's premier incident response firm. After hundreds of engagements, they kept finding the same thing on both sides of the wire: breaches happen not because vulnerabilities go undetected, but because they go unmanaged.


Vulnerability management has been stuck for 30 years. More tools, more alerts, more dashboards — and vulnerability exploitation as a breach cause nearly tripled in 2024 alone. When ChatGPT arrived in late 2022, Sharon and David saw the missing piece: the organizational context that could fix the problem had always existed, scattered across Slack, email, wikis, and internal tools. GenAI finally made it possible to pull that together at scale.


In this conversation, we get into how two practitioners who've spent careers attacking organizations are now applying that attacker's lens — automated with AI — to break open a field that's resisted change for decades. We cover why visibility was never the real problem, what context-driven prioritization actually looks like, and what it takes to mobilize the people who do the patching.


This one is for practitioners who've lived the frustration. And for anyone watching AI get applied to a real, stubborn problem — not as a marketing claim, but as the thing that finally moves the needle.


Follow us for more conversations with practitioners who've been in the trenches.


00:00 Intro & Guest Introductions

05:35 Vulnerability Management: Still a Problem

09:45 AI as a Security Solution, Not a Problem

15:47 Visibility is Easy; Context is Hard

29:46 Leveraging the Hacker Mindset

35:29 We Need Less Findings, Not More

42:39 We're in Exciting Times


Website: https://securitycocktailhour.com

Newsletter: https://securitycocktailhour.com/newsletter

LinkedIn: https://www.linkedin.com/company/security-cocktail-hour

Twitter/X: @SecCocktailHour


Enjoyed this episode? Follow us and share with colleagues who'll enjoy honest discussions among security professionals.

Noch keine Rezensionen vorhanden