Future of Threat Intelligence

Lemonade's Jonathan Jaffe on Trading Feedback for Security Technology


Listen Later

Jonathan Jaffe, CISO at Lemonade, has built what he predicts will be "the perfect AI system" using agent orchestration to automate vulnerability management at machine speed, eliminating the developer burden of false positive security alerts. His unconventional approach to security combines lessons learned from practicing law against major tech companies with a systematic strategy for partnering with security startups to access cutting-edge technology years before competitors.

Jonathan tells David a story that showcases how even well-intentioned people will exploit systems if they believe they won't get caught or cause harm, which has shaped his approach to insider threat detection and the importance of maintaining skeptical oversight of automated security controls. His team leverages AI agents that automatically analyze GitHub Dependabot vulnerabilities, determine actual exploitability by examining entire code repositories, and either dismiss false positives or generate proof-of-concept explanations for developers.

Topics discussed:

  • The evolution from traditional security approaches to AI-powered agent orchestration that operates at machine speed to eliminate false positive vulnerability alerts.
  • Strategic partnerships with security startups as design partners, trading feedback and data for free access to cutting-edge technology while helping shape market-ready products.
  • Policy-based security enforcement for cloud-native environments that prevents the need to manage individual pods, containers, or microservices through automated compliance checks.
  • How legal experience prosecuting tech companies provides unique insights into adversarial thinking and the psychology behind insider threats and system exploitation.
  • Implementation of AI vulnerability management systems that automatically ingest CVEs, analyze code repositories for exploitable methods, and generate proof-of-concept explanations for developers.
  • Risk management strategies for adopting startup technology by starting small in non-impactful areas and gradually building trust through demonstrated value and reliability.
  • Transforming security operations from reactive vulnerability patching to proactive automated threat prevention through intelligent agent-based systems.
  • Key Takeaways: 

    • Implement policy-based security enforcement for cloud environments to automate compliance across all deployments rather than managing individual pods or containers manually.
    • Partner with security startups as design partners by trading feedback data for free access to cutting-edge technology while helping them develop market-ready products.
    • Build AI agent orchestration platforms that automatically ingest GitHub Dependabot CVEs, analyze code repositories for exploitable methods, and dismiss false positive vulnerability alerts.
    • Begin startup technology adoption in low-risk or non-impactful areas to build trust and demonstrate value before expanding to critical security functions.
    • Establish relationships with venture capital communities to gain early access to portfolio companies and emerging security technologies before mainstream adoption.
    • Apply healthy skepticism to security controls by recognizing that even well-intentioned employees may exploit systems if they believe they won't cause harm or get caught.
    • Focus AI development efforts on automating time-intensive security tasks that typically require many days of manual developer work into machine-speed operations.
    • Evaluate business risk first before pursuing legal or compliance actions by calculating whether the effort investment justifies potential outcomes and settlements.
    • Listen to more episodes: 

      Apple 

      Spotify 

      YouTube

      Website

      ...more
      View all episodesView all episodes
      Download on the App Store

      Future of Threat IntelligenceBy Team Cymru

      • 4.5
      • 4.5
      • 4.5
      • 4.5
      • 4.5

      4.5

      11 ratings


      More shows like Future of Threat Intelligence

      View all
      Global News Podcast by BBC World Service

      Global News Podcast

      7,709 Listeners

      WSJ What’s News by The Wall Street Journal

      WSJ What’s News

      4,353 Listeners

      WSJ Tech News Briefing by The Wall Street Journal

      WSJ Tech News Briefing

      1,637 Listeners

      SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast) by Johannes B. Ullrich

      SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

      638 Listeners

      CyberWire Daily by N2K Networks

      CyberWire Daily

      1,022 Listeners

      The Daily by The New York Times

      The Daily

      112,342 Listeners

      Click Here by Recorded Future News

      Click Here

      415 Listeners

      Darknet Diaries by Jack Rhysider

      Darknet Diaries

      8,010 Listeners

      Talkin' About [Infosec] News, Powered by Black Hills Information Security by Black Hills Information Security

      Talkin' About [Infosec] News, Powered by Black Hills Information Security

      94 Listeners

      True Spies: Espionage | Investigation | Crime | Murder | Detective | Politics by SPYSCAPE

      True Spies: Espionage | Investigation | Crime | Murder | Detective | Politics

      1,960 Listeners

      Cyber Security Headlines by CISO Series

      Cyber Security Headlines

      134 Listeners

      Security Matters by CyberArk

      Security Matters

      22 Listeners

      Bloomberg Tech by Bloomberg

      Bloomberg Tech

      60 Listeners

      Microsoft Threat Intelligence Podcast by Microsoft

      Microsoft Threat Intelligence Podcast

      22 Listeners

      Better Offline by Cool Zone Media and iHeartPodcasts

      Better Offline

      548 Listeners