
Sign up to save your podcasts
Or


Desiree Lee, one of the Business CTOs at Armis, joins Amir to unpack one of the toughest realities in cybersecurity: the biggest risks aren’t always technical, they’re human. From phishing and deepfakes to the way AI is reshaping both attackers’ and defenders’ playbooks, Desiree shares hard-won insights on what companies should actually prioritize. If you’re a tech leader navigating the expanding attack surface, this episode will sharpen how you think about security in the AI era.
Key Takeaways
• Most breaches stem from human behavior, not lack of technology.
• Attackers adopt AI faster because there’s no downside for them—defenders must catch up.
• Fundamentals like patching and asset inventory still make or break resilience.
• AI can reduce noise for security teams by spotting patterns in overwhelming data.
• Small and midsize businesses will benefit from AI-driven tools that lower the barrier to effective security.
Timestamped Highlights
00:34 — How Armis evolved from asset inventory to full security solutions
03:30 — Why security failures are more about psychology than technology
07:32 — The deepfake CFO story and why training alone can’t solve phishing risks
09:18 — Why most enterprises struggle with basics like patching and automation
11:41 — Where AI gives defenders an edge in processing massive data sets
18:33 — Practical ways AI can ease alert fatigue and vulnerability management
21:03 — The overlooked need to label assets by business criticality
A Moment Worth Remembering
“There is no penalty on the attacking side for embracing AI. It’s only good things for them. So they will adopt it quickly.” — Desiree Lee
Resources Mentioned
Armis: armis.com
Desiree Lee on LinkedIn: linkedin.com/in/desireedlee
Pro Tips
Tagging assets with their business criticality is one of the simplest, highest-impact steps companies can take. It turns asset inventories from static lists into real decision-making tools for AI-driven defense.
Call to Action
If you found this episode valuable, share it with a colleague who’s thinking about security and AI. Subscribe on your favorite podcast platform so you never miss future conversations with tech leaders pushing the edge of what’s possible.
By Elevano5
7474 ratings
Desiree Lee, one of the Business CTOs at Armis, joins Amir to unpack one of the toughest realities in cybersecurity: the biggest risks aren’t always technical, they’re human. From phishing and deepfakes to the way AI is reshaping both attackers’ and defenders’ playbooks, Desiree shares hard-won insights on what companies should actually prioritize. If you’re a tech leader navigating the expanding attack surface, this episode will sharpen how you think about security in the AI era.
Key Takeaways
• Most breaches stem from human behavior, not lack of technology.
• Attackers adopt AI faster because there’s no downside for them—defenders must catch up.
• Fundamentals like patching and asset inventory still make or break resilience.
• AI can reduce noise for security teams by spotting patterns in overwhelming data.
• Small and midsize businesses will benefit from AI-driven tools that lower the barrier to effective security.
Timestamped Highlights
00:34 — How Armis evolved from asset inventory to full security solutions
03:30 — Why security failures are more about psychology than technology
07:32 — The deepfake CFO story and why training alone can’t solve phishing risks
09:18 — Why most enterprises struggle with basics like patching and automation
11:41 — Where AI gives defenders an edge in processing massive data sets
18:33 — Practical ways AI can ease alert fatigue and vulnerability management
21:03 — The overlooked need to label assets by business criticality
A Moment Worth Remembering
“There is no penalty on the attacking side for embracing AI. It’s only good things for them. So they will adopt it quickly.” — Desiree Lee
Resources Mentioned
Armis: armis.com
Desiree Lee on LinkedIn: linkedin.com/in/desireedlee
Pro Tips
Tagging assets with their business criticality is one of the simplest, highest-impact steps companies can take. It turns asset inventories from static lists into real decision-making tools for AI-driven defense.
Call to Action
If you found this episode valuable, share it with a colleague who’s thinking about security and AI. Subscribe on your favorite podcast platform so you never miss future conversations with tech leaders pushing the edge of what’s possible.

56,441 Listeners

168 Listeners

5,471 Listeners

588 Listeners