
Sign up to save your podcasts
Or


Jonathan Jaffe, CISO at Lemonade, has built what he predicts will be "the perfect AI system" using agent orchestration to automate vulnerability management at machine speed, eliminating the developer burden of false positive security alerts. His unconventional approach to security combines lessons learned from practicing law against major tech companies with a systematic strategy for partnering with security startups to access cutting-edge technology years before competitors.
Jonathan tells David a story that showcases how even well-intentioned people will exploit systems if they believe they won't get caught or cause harm, which has shaped his approach to insider threat detection and the importance of maintaining skeptical oversight of automated security controls. His team leverages AI agents that automatically analyze GitHub Dependabot vulnerabilities, determine actual exploitability by examining entire code repositories, and either dismiss false positives or generate proof-of-concept explanations for developers.
Topics discussed:
Key Takeaways:
Listen to more episodes:
Apple
Spotify
YouTube
Website
By Team Cymru4.5
1111 ratings
Jonathan Jaffe, CISO at Lemonade, has built what he predicts will be "the perfect AI system" using agent orchestration to automate vulnerability management at machine speed, eliminating the developer burden of false positive security alerts. His unconventional approach to security combines lessons learned from practicing law against major tech companies with a systematic strategy for partnering with security startups to access cutting-edge technology years before competitors.
Jonathan tells David a story that showcases how even well-intentioned people will exploit systems if they believe they won't get caught or cause harm, which has shaped his approach to insider threat detection and the importance of maintaining skeptical oversight of automated security controls. His team leverages AI agents that automatically analyze GitHub Dependabot vulnerabilities, determine actual exploitability by examining entire code repositories, and either dismiss false positives or generate proof-of-concept explanations for developers.
Topics discussed:
Key Takeaways:
Listen to more episodes:
Apple
Spotify
YouTube
Website

7,709 Listeners

4,353 Listeners

1,637 Listeners

638 Listeners

1,022 Listeners

112,342 Listeners

415 Listeners

8,010 Listeners
![Talkin' About [Infosec] News, Powered by Black Hills Information Security by Black Hills Information Security](https://podcast-api-images.s3.amazonaws.com/corona/show/516141/logo_300x300.jpeg)
94 Listeners

1,960 Listeners

134 Listeners

22 Listeners

60 Listeners

22 Listeners

548 Listeners