Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo
Artwork

Content provided by Elevano. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Elevano or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://podcastplayer.com/legal.
Player FM - Podcast App
Go offline with the Player FM app!

AI vs Human Nature: The Security Dilemma

24:02
 
Share
 

Manage episode 503003866 series 2833920
Content provided by Elevano. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Elevano or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://podcastplayer.com/legal.

Desiree Lee, one of the Business CTOs at Armis, joins Amir to unpack one of the toughest realities in cybersecurity: the biggest risks aren’t always technical, they’re human. From phishing and deepfakes to the way AI is reshaping both attackers’ and defenders’ playbooks, Desiree shares hard-won insights on what companies should actually prioritize. If you’re a tech leader navigating the expanding attack surface, this episode will sharpen how you think about security in the AI era.

Key Takeaways

• Most breaches stem from human behavior, not lack of technology.

• Attackers adopt AI faster because there’s no downside for them—defenders must catch up.

• Fundamentals like patching and asset inventory still make or break resilience.

• AI can reduce noise for security teams by spotting patterns in overwhelming data.

• Small and midsize businesses will benefit from AI-driven tools that lower the barrier to effective security.

Timestamped Highlights

00:34 — How Armis evolved from asset inventory to full security solutions

03:30 — Why security failures are more about psychology than technology

07:32 — The deepfake CFO story and why training alone can’t solve phishing risks

09:18 — Why most enterprises struggle with basics like patching and automation

11:41 — Where AI gives defenders an edge in processing massive data sets

18:33 — Practical ways AI can ease alert fatigue and vulnerability management

21:03 — The overlooked need to label assets by business criticality

A Moment Worth Remembering

“There is no penalty on the attacking side for embracing AI. It’s only good things for them. So they will adopt it quickly.” — Desiree Lee

Resources Mentioned

Armis: armis.com

Desiree Lee on LinkedIn: linkedin.com/in/desireedlee

Pro Tips

Tagging assets with their business criticality is one of the simplest, highest-impact steps companies can take. It turns asset inventories from static lists into real decision-making tools for AI-driven defense.

Call to Action

If you found this episode valuable, share it with a colleague who’s thinking about security and AI. Subscribe on your favorite podcast platform so you never miss future conversations with tech leaders pushing the edge of what’s possible.

  continue reading

523 episodes

Artwork
iconShare
 
Manage episode 503003866 series 2833920
Content provided by Elevano. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Elevano or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://podcastplayer.com/legal.

Desiree Lee, one of the Business CTOs at Armis, joins Amir to unpack one of the toughest realities in cybersecurity: the biggest risks aren’t always technical, they’re human. From phishing and deepfakes to the way AI is reshaping both attackers’ and defenders’ playbooks, Desiree shares hard-won insights on what companies should actually prioritize. If you’re a tech leader navigating the expanding attack surface, this episode will sharpen how you think about security in the AI era.

Key Takeaways

• Most breaches stem from human behavior, not lack of technology.

• Attackers adopt AI faster because there’s no downside for them—defenders must catch up.

• Fundamentals like patching and asset inventory still make or break resilience.

• AI can reduce noise for security teams by spotting patterns in overwhelming data.

• Small and midsize businesses will benefit from AI-driven tools that lower the barrier to effective security.

Timestamped Highlights

00:34 — How Armis evolved from asset inventory to full security solutions

03:30 — Why security failures are more about psychology than technology

07:32 — The deepfake CFO story and why training alone can’t solve phishing risks

09:18 — Why most enterprises struggle with basics like patching and automation

11:41 — Where AI gives defenders an edge in processing massive data sets

18:33 — Practical ways AI can ease alert fatigue and vulnerability management

21:03 — The overlooked need to label assets by business criticality

A Moment Worth Remembering

“There is no penalty on the attacking side for embracing AI. It’s only good things for them. So they will adopt it quickly.” — Desiree Lee

Resources Mentioned

Armis: armis.com

Desiree Lee on LinkedIn: linkedin.com/in/desireedlee

Pro Tips

Tagging assets with their business criticality is one of the simplest, highest-impact steps companies can take. It turns asset inventories from static lists into real decision-making tools for AI-driven defense.

Call to Action

If you found this episode valuable, share it with a colleague who’s thinking about security and AI. Subscribe on your favorite podcast platform so you never miss future conversations with tech leaders pushing the edge of what’s possible.

  continue reading

523 episodes

All episodes

×
 
Loading …

Welcome to Player FM!

Player FM is scanning the web for high-quality podcasts for you to enjoy right now. It's the best podcast app and works on Android, iPhone, and the web. Signup to sync subscriptions across devices.

 

Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play