Truth in IT
    • Sign In
    • Register
        • Videos
        • Channels
        • Pages
        • Galleries
        • News
        • Events
        • All
Truth in IT Truth in IT
  • Data Management ▼
    • Converged Infrastructure
    • DevOps
    • Networking
    • Storage
    • Virtualization
  • Cybersecurity ▼
    • Application Security
    • Backup & Recovery
    • Data Security
    • Identity & Access Management (IAM)
    • Zero Trust
    • Compliance & GRC
    • Endpoint Security
  • Cloud ▼
    • Hybrid Cloud
    • Private Cloud
    • Public Cloud
  • Webinar Library
  • TiPs
  • DRAW

AI-Driven Vulnerability Discovery & Security Response

Cohesity
05/12/2026
0
0 (0%)
Share
  • Comments
  • Download
  • Transcript
Report Like Favorite
  • Share/Embed
  • Email
Link
Embed

Transcript


TL;DR

  • AI is accelerating vulnerability discovery for both attackers and defenders, and Cohesity has built its platform with security-by-design principles to address this evolving threat landscape.
  • Cohesity employs continuous automated testing, penetration testing, and AI-assisted vulnerability analysis in partnership with Anthropic and OpenAI, with dedicated teams working alongside Fortune 500 customers.
  • Over 70% of Global 500 companies trust Cohesity, with major banks and enterprises collaborating on security protocols while ensuring customer data never leaves their environments.

Summary

Cohesity CEO Sanjay Poonen addresses how artificial intelligence is transforming vulnerability discovery for both attackers and defenders in cybersecurity. He emphasizes that Cohesity's platform was built with security-by-design principles for the cloud era, incorporating machine learning and AI techniques before the recent generative AI boom. The company employs continuous automated testing, ongoing penetration testing, and AI-assisted vulnerability analysis using non-publicly available AI systems in partnership with major AI providers like Anthropic and OpenAI. Poonen highlights that over 70% of the Global 500 companies are Cohesity customers, with major banks, public sector organizations, and telecommunications companies actively collaborating on security protocols. He reassures customers that their data never leaves their environment and that Cohesity's rapid vulnerability assessment and remediation processes are designed to stay ahead of emerging threats. The message centers on Cohesity's commitment to resilience as a trusted partner throughout the entire lifecycle of potential cyber events.

Chapters

0:00 - AI as Vulnerability Discovery Tool
0:23 - NIST Framework & Assumed Breach
1:05 - Secure by Design Architecture
2:03 - Rapid Vulnerability Response Process

Key Quotes

0:00 "AI is now becoming an incredible vulnerability discovery tool, and this is going to be an opportunity for defenders like us, but also for attackers."
0:42 "In our 13,000 customers, we have over 70% of the global 500. These are the biggest banks, and some of these banks are named banks that are working with us to ensure that their code is, you know, sort of protected."
1:05 "We have been built to be secure by design. We were built for a cloud and security era, and many of the machine learning and AI techniques were built into the kind of capabilities even before Genevieve AI was actually sort of come to bear in the last three years."

Categories:
  • » Webinar Library » Cohesity
  • » Data Protection » Backup & Recovery
  • » Cybersecurity » Cloud Security
  • » Data Protection
Channels:
News:
Events:
Tags:
  • Cloud Security
  • AI & Machine Learning
  • Threat Intelligence
  • Data Protection
  • Executive Briefing
  • AI-driven vulnerability discovery
  • Security by design
  • Continuous automated testing
  • Penetration testing
  • NIST cybersecurity framework
  • Assumed breach methodology
Show more Show less

Browse videos

  • Related
  • Featured
  • By date
  • Most viewed
  • Top rated
  •  

              Video's comments: AI-Driven Vulnerability Discovery & Security Response

              Upcoming Webinar Calendar

              • 05/12/2026
                11:30 PM
                05/12/2026
                Implementing Effective Strategies for Active Directory Security and Data Protection
                https://www.truthinit.com/index.php/channel/1888/implementing-effective-strategies-for-active-directory-security-and-data-protection/
              • 05/13/2026
                01:00 AM
                05/13/2026
                Transforming the Black Box: Reveal Hidden Threats and AI Risks through Data Lineage
                https://www.truthinit.com/index.php/channel/1890/transforming-the-black-box-reveal-hidden-threats-and-ai-risks-through-data-lineage/
              • 05/13/2026
                05:00 AM
                05/13/2026
                Transforming the Black Box: Revealing AI Risks and Hidden Threats through Data Lineage
                https://www.truthinit.com/index.php/channel/1894/transforming-the-black-box-revealing-ai-risks-and-hidden-threats-through-data-lineage/
              • 05/19/2026
                01:00 PM
                05/19/2026
                Establishing a Robust AI Governance Framework for GenAI Throughout Deployment Phases
                https://www.truthinit.com/index.php/channel/1936/establishing-a-robust-ai-governance-framework-for-genai-throughout-deployment-phases/
              • 05/20/2026
                08:00 AM
                05/20/2026
                Establishing a Robust AI Governance Framework for GenAI Throughout Its Lifecycle
                https://www.truthinit.com/index.php/channel/1937/establishing-a-robust-ai-governance-framework-for-genai-throughout-its-lifecycle/
              • 05/20/2026
                10:00 PM
                05/20/2026
                Establishing a Robust AI Governance Framework for GenAI Throughout Its Lifecycle
                https://www.truthinit.com/index.php/channel/1953/establishing-a-robust-ai-governance-framework-for-genai-throughout-its-lifecycle/
              • 05/21/2026
                11:00 AM
                05/21/2026
                The Autonomous Era: Orchestrating a Resilient Enterprise
                https://www.truthinit.com/index.php/channel/1372/the-autonomous-era-orchestrating-a-resilient-enterprise/
              • 05/27/2026
                04:00 AM
                05/27/2026
                Rivoluziona i rischi dell'AI in opportunità con Netskope AI Security
                https://www.truthinit.com/index.php/channel/1925/rivoluziona-i-rischi-dellai-in-opportunità-con-netskope-ai-security/
              • 05/27/2026
                10:00 AM
                05/27/2026
                Adopting AI: From Illusion to Intentional Control
                https://www.truthinit.com/index.php/channel/1924/harnessing-ai-transitioning-from-illusion-to-purposeful-mastery/
              • 05/28/2026
                01:00 PM
                05/28/2026
                Harnessing AI for Smaller Teams: Strategies for Secure Implementation
                https://www.truthinit.com/index.php/channel/1951/harnessing-ai-for-smaller-teams-strategies-for-secure-implementation/
              • 06/02/2026
                01:00 PM
                06/02/2026
                Spring of Satori: Delving into Recent Findings and the 2026 Threat Landscape
                https://www.truthinit.com/index.php/channel/1930/spring-of-satori-delving-into-recent-findings-and-the-2026-threat-landscape/
              • 06/04/2026
                02:00 AM
                06/04/2026
                Mastering the Unseen: Managing Shadow AI and Agentic MCP Traffic
                https://www.truthinit.com/index.php/channel/1948/mastering-the-unseen-managing-shadow-ai-and-agentic-mcp-traffic/
              • 06/16/2026
                07:00 AM
                06/16/2026
                Transforming Data Risk into Actionable Priorities: Essential Fixes First
                https://www.truthinit.com/index.php/channel/1952/transforming-data-risk-into-actionable-priorities-essential-fixes-first/

              Upcoming Events

              • May
                12

                Implementing Effective Strategies for Active Directory Security and Data Protection

                05/12/202611:30 PM ET
                • May
                  13

                  Transforming the Black Box: Reveal Hidden Threats and AI Risks through Data Lineage

                  05/13/202601:00 AM ET
                  • May
                    13

                    Transforming the Black Box: Revealing AI Risks and Hidden Threats through Data Lineage

                    05/13/202605:00 AM ET
                    • May
                      19

                      Establishing a Robust AI Governance Framework for GenAI Throughout Deployment Phases

                      05/19/202601:00 PM ET
                      • May
                        20

                        Establishing a Robust AI Governance Framework for GenAI Throughout Its Lifecycle

                        05/20/202608:00 AM ET
                        More events
                        Truth in IT
                        • Sponsor
                        • About Us
                        • Terms of Service
                        • Privacy Policy
                        • Contact Us
                        • Preference Management
                        Desktop version
                        Standard version