Transcript
Snehal Antani (0:02)
You're listening to the Cyberwire Network, powered by N2K.
Dave Bittner (0:19)
Hello, everyone, and welcome to this Cyberwire X special edition. I'm Dave Bittner.
Interviewer / Host (0:24)
Today we're talking about one of the.
Dave Bittner (0:26)
Toughest challenges defenders face. Sorting the noise from the signal. For many teams, vulnerability management feels like a fire hose. Loud, constant, and not especially helpful. And when everything is labeled critical, nothing really is. Our guest today is Snehal Antani, Co founder and CEO of Horizon 3 AI. He's lived that struggle firsthand as a CIO, deciding what not to do, asking staff to cancel family plans for patches that didn't matter, and trying to prove security controls worked without waiting for an actual breach to test them. That frustration pushed him to rethink how we validate security in the first place. Instead of guessing, he decided to continuously pen test his own environment. And the challenges he ran into along the way ultimately led him to Co found Horizon 3 AI, a company working to bring autonomous pen testing and AI hackers into the mainstream. His argument is vuln scanners tell you what might be wrong. Pen tests show you what actually matters.
Interviewer / Host (1:43)
So today we are talking about pen testing, continuous pen testing, and AI hackers and all that good stuff. I would love to start with a little background on you. I know you've said that the hardest part of being a CIO is deciding what not to do. How did that come to be part of your own personal journey and kind of something that you lead with?
Snehal Antani (2:08)
It's interesting. So I'm an engineer by education and trade. I did my undergrad at Purdue in computer science, but started my career at IBM doing distributed systems, working on the mainframe, working on WebSphere, working with IBM Research and product. And then I left to be a CIO at GE Capital. And it was my first kind of big executive job. And it was amazing. One, to have that opportunity and work with this amazing team, but then two, to really start to have sympathy for the difficulty of decision making at that level. And one of those decisions was from a cybersecurity standpoint, I would get a list of 100,000 vulnerabilities that must be fixed right, according to some tool, some measure. And I would look at that and figure out, well, I don't have the capacity to do this, so what do I not fix on this list? And for the things I do have to fix, I've got to look my IT admin in the eyes and tell him or her they've got to skip their kids basketball game or, or cancel their weekend plans and stay behind and fix these issues. So the hardest part of the job was deciding what not to fix. The second hardest part of the job was telling people to fix stuff I knew weren't even exploitable or relevant to the attacker. And so that was quite difficult, especially in a large scale organization. And this idea of fiercely prioritizing problems that matter became a key part of my mantra.
![Pentesting at the speed of thought. [CyberWire-X] - CyberWire Daily cover](/_next/image?url=https%3A%2F%2Fmegaphone.imgix.net%2Fpodcasts%2F40dfa73c-f005-11f0-8f6e-8bad0b04a827%2Fimage%2Fcca6449db500549f3982c5870b5f89a9.png%3Fixlib%3Drails-4.3.1%26max-w%3D3000%26max-h%3D3000%26fit%3Dcrop%26auto%3Dformat%2Ccompress&w=1920&q=75)