Loading video player...

AI-accelerated cyber attacks require runtime security and automation

The window between discovering a security vulnerability and attackers exploiting it has shrunk from 1.5 years to just hours, and it’s heading toward minutes.

In this Techzine TV interview, Sergej Epp, CISO of cloud security leader Sysdig, reveals the dramatic acceleration of cyber threats driven by artificial intelligence. What he shares will fundamentally change how you think about vulnerability management, patching cycles, and security automation.

You’ll discover why traditional security approaches are failing against AI-powered attacks, how attackers are already using automation to achieve full system compromise in under 10 minutes, and what defenders must do to survive in this new landscape.

What you’ll learn in this interview

Epp explains the harsh realities facing security teams today. He shares research showing the dramatic collapse in exploitation timelines and explains the fundamental reason why AI gives attackers such a profound advantage over defenders.

The discussion covers Sysdig’s approach to runtime security, including how they capture telemetry at the kernel level where attackers cannot hide. You’ll understand why context graphs reveal attack paths that traditional security tools miss, and how this technology enabled Sysdig to pioneer runtime protection before the industry understood the need.

Epp also describes building a zero-day discovery environment in a single afternoon using AI, finding vulnerabilities in major security products despite not being a professional researcher. He details an actual attack where AI-powered tools achieved full admin access in eight minutes, complete with evidence of how defenders identified the AI involvement.

Key insights revealed in the video

The interview explores controversial territory, including Epp’s argument that defense must remove humans from the security loop entirely to match the speed of AI-powered attacks. You’ll learn why this isn’t about abandoning proven security principles, but rather about implementing them at machine speed.

The video also introduces the Zero Day Clock initiative that’s tracking this acceleration and providing executives with clear data to understand the urgency. Learn why only 1-2% of vulnerabilities are currently exploited, and what that means for the potential scale of future attacks.

The discussion also tackles practical challenges: How do you implement full automation in brownfield environments? Why does every patch serve as a blueprint for exploits? What role does open source play in transparent security? And why did German police recently wake up CEOs at 3 AM to demand emergency patching?

Why this matters for your security strategy

Our conversation with Epp isn’t theoretical fear-mongering. It is based on data-driven analysis from someone leading security at a company protecting critical infrastructure and Fortune 500 organizations. The insights challenge conventional wisdom about patch management, human decision-making in security, and the viability of detection-only approaches.

Whether you’re a CISO, security architect, or technology leader, the trends Epp describes will impact your organization. The interview provides concrete examples, measurable data, and a framework for understanding why the offense-defense balance is shifting so dramatically.

Watch the full interview to understand what the collapse from years to hours means for your security program, and what you need to change before the window shrinks to minutes.