From Fish Tanks to AI Agents: Why the Words “We’re Secure” Means Nothing Without Proof | A Black ...

Channel:
Subscribers:
4,680
Published on ● Video Link: https://www.youtube.com/watch?v=bocANSZshVQ



Duration: 0:00
20 views
2


When security becomes more than a checkbox, the conversation shifts from “how much” to “how well.” At Black Hat USA 2025, Sean Martin, CISSP, Co-Founder of ITSPmagazine, and Viktor Petersson, Founder of an SBOM artifact platform, unpack how regulatory forces, cultural change, and AI innovation are reshaping how organizations think about security.


Viktor points to the growing role of Software Bill of Materials (SBOMs) as not just a best practice, but a likely requirement in future compliance frameworks. The shift, he notes, is driven largely by regulation—especially in Europe—where security is no longer a “nice to have” but a mandated operational function. Sean connects this to a market reality: companies increasingly see transparent security practices as a competitive differentiator, though the industry still struggles with the hollow claim of simply being “secure.”


AI naturally dominates discussions, but the focus is nuanced. Rather than chasing hype, both stress the need for strong guardrails before scaling AI-driven development. Viktor envisions engineers supervising fleets of specialized AI agents—handling tasks from UX to code auditing—while Sean sees AI as a way to rethink entire operational models. Yet both caution that without foundational security practices, AI only amplifies existing risks.


The conversation extends to IoT and supply chain security, where market failures allow insecure, end-of-life devices to persist in critical environments. The infamous “smart fish tank” hack in a Las Vegas casino serves as a reminder: the weakest link often isn’t the target itself, but the entry point it provides.


DEFCON, Viktor notes, offers a playground for challenging assumptions—whether it’s lock-picking to illustrate perceived versus actual security, or examining the human factor in breaches. For both hosts, events like Black Hat and DEFCON aren’t just about the latest vulnerabilities or flashy demos—they’re about the human exchange of ideas, the reframing of problems, and the collaboration that fuels more resilient security strategies.


___________


Guest:


Viktor Petersson, Founder, sbomify | On LinkedIn: https://www.linkedin.com/in/vpetersson/


Hosts:
Sean Martin, Co-Founder at ITSPmagazine | Website: https://www.seanmartin.com/ (https://www.seanmartin.com/)


Marco Ciappelli, Co-Founder at ITSPmagazine | Website: https://www.marcociappelli.com/ (https://www.marcociappelli.com/)


___________


Episode Sponsors


ThreatLocker: https://itspm.ag/threatlocker-r974


BlackCloak: https://itspm.ag/itspbcweb


Akamai: https://itspm.ag/akamailbwc


DropzoneAI: https://itspm.ag/dropzoneai-641


Stellar Cyber: https://itspm.ag/stellar-9dj3


___________


Resources


Learn more and catch more stories from our Black Hat USA 2025 coverage: https://www.itspmagazine.com/bhusa25


ITSPmagazine Webinar: What’s Heating Up Before Black Hat 2025: Place Your Bet on the Top Trends Set to Shake Up this Year’s Hacker Conference — An ITSPmagazine Thought Leadership Webinar (https://www.crowdcast.io/c/whats-heating-up-before-black-hat-2025-place-your-bet-on-the-top-trends-set-to-shake-up-this-years-hacker-conference) | https://www.crowdcast.io/c/whats-heating-up-before-black-hat-2025-place-your-bet-on-the-top-trends-set-to-shake-up-this-years-hacker-conference


Catch all of our event coverage: https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage


Want to tell your Brand Story Briefing as part of our event coverage? Learn More 👉 https://itspm.ag/evtcovbrf


Want Sean and Marco to be part of your event or conference? Let Us Know 👉 https://www.itspmagazine.com/contact-us


___________


KEYWORDS


black hat usa 2025, sean martin, viktor petersson, sbom, compliance, ai, guardrails, iot, defcon, regulation, event coverage, on location, conference




Other Videos By ITSPmagazine


2025-08-13Your Business Apps Are Bringing Friends You Didn’t Invite | A Brand Story with Saša Zdjelar
2025-08-13Automate Cybersecurity Operations w/out Coding, Crying, or Calling IT at 2 AM | Mike Wayne, BlinkOps
2025-08-13How to Automate Cybersecurity Operations Without Coding, Crying, or Calling IT at 2 A.M. | A Bran...
2025-08-13How to Automate Cybersecurity Operations Without Coding, Crying, or Calling IT at 2 A.M. | A Bran...
2025-08-13Your Business Apps Are Bringing Friends You Didn’t Invite | A Brand Story with Saša Zdjelar, Chie...
2025-08-13Your Business Apps Are Bringing Friends You Didn’t Invite | A Brand Story with Saša Zdjelar, Chie...
2025-08-13Black Hat 2025: Crogl's CEO Monzy Merza Explains How AI Can Help Eliminate Alert Fatigue in Cyber...
2025-08-13Black Hat 2025: Crogl's CEO Monzy Merza Explains How AI Can Help Eliminate Alert Fatigue in Cyber...
2025-08-13Black Hat 2025: Crogl's CEO Monzy Merza Explains How AI Eliminates Alert Fatigue in Cybersecurity
2025-08-12The often-overlooked truth in cybersecurity: Seeing the Unseen in Vulnerability Management | A Br...
2025-08-11From Fish Tanks to AI Agents: Why the Words “We’re Secure” Means Nothing Without Proof | A Black ...
2025-08-10Fish Tanks to AI Agents: Why the Words “We’re Secure” Means Nothing w/out Proof | Viktor Petersson
2025-08-10From Boardroom to Living Room: Securing the Modern Executive | Brand Story with Chris Pierson
2025-08-10From Boardroom to Living Room: Securing the Modern Executive | A BlackCloak Event Coverage of Bla...
2025-08-10When Bots Rewrite the Buyer’s Journey: Protecting Brand Value in the Age of AI Agents | An Akamai...
2025-08-10When Bots Rewrite the Buyer’s Journey: Protecting Brand Value in the Age of AI Agents
2025-08-10From Boardroom to Living Room: Securing the Modern Executive | A BlackCloak Event Coverage of Bla...
2025-08-10Simplifying Security Without Sacrificing Control | A ThreatLocker Event Coverage of Black Hat USA...
2025-08-10When Bots Rewrite the Buyer’s Journey: Protecting Brand Value in the Age of AI Agents | An Akamai...
2025-08-10Simplifying CyberSecurity Without Sacrificing Control | A ThreatLocker Story From Black Hat USA 25
2025-08-09How Novel Is Novelty? Security Leaders Try To Cut Through the Cybersecurity Vendor Echo Chamber |...