AGI-Pilled Cyber Defense: Automating Digital Forensics w/ Asymmetric Security CEO Alexis Carlier
Episode
76 min
Read time
3 min
Topics
Leadership
AI-Generated Summary
Key Takeaways
- ✓Threat Actor Hierarchy: Approximately 80% of cyberattacks come from unsophisticated criminals using spray-and-pray tactics, while nation-states like China focus on IP theft from R&D-heavy industries and North Korea runs remote worker programs where operatives infiltrate Western tech companies to earn salaries funding the regime. Ransomware gangs occupy the middle ground, causing order-of-magnitude more economic damage than they capture in payments, with attacks like Jaguar requiring a $2 billion government loan after operations went down for one to two months.
- ✓Detection Gap Economics: Current cybersecurity relies on static rule-based monitoring systems that generate excessive false positives because suspicious behavior often mirrors normal activity. Digital forensics investigations that deeply analyze evidence can distinguish real threats but remain prohibitively expensive, with only 60 investigators at CrowdStrike capable of performing this work. This creates a paradigm where deep investigations only happen reactively after breaches, missing most attacks that go undetected for extended periods.
- ✓AI Capability Threshold: Off-the-shelf language models already achieve approximately 90% accuracy on email-based compromise investigations without specialized training, but the final reliability gap requires human oversight for production deployment. Asymmetric uses human-AI teams where agents perform first-pass analysis and investigators conduct quality control, building proprietary datasets from real incidents to close performance gaps. This services-first approach through insurance company partnerships provides both customer trust and the data flywheel needed for model improvement.
- ✓Defensive Asymmetry Opportunity: Digital forensics specialists who investigate breaches do not typically become skilled offensive hackers, suggesting limited skill transfer between defensive investigation and offensive exploitation. This contrasts with domains like penetration testing where capabilities are inherently dual-use. The separation creates an opportunity to differentially accelerate defensive AI capabilities through specialized datasets, evaluations, and training environments without proportionally advancing offensive capabilities, though this window closes as models achieve broader generalization.
- ✓Jagged Frontier Strategy: Reinforcement learning creates predictable capability improvements in domains with verifiable rewards like coding and math, but lags in areas lacking clear evaluation signals. Organizations can intentionally shape the AI capability frontier by curating specialized datasets, building realistic environments, and developing high-fidelity evaluations in strategically important domains. This approach could be replicated across biosecurity, AI safety, and other areas where hardening defenses matters, but requires subject matter experts willing to encode their expertise into AI systems.
What It Covers
Alexis Carlier, founder of Asymmetric Security, explains how his company automates digital forensics investigations using AI agents to detect cyber breaches proactively rather than reactively. He describes the current threat landscape from financially motivated criminals to nation-state actors, details how AI models achieve 90% accuracy on forensic tasks, and argues digital forensics represents a defensible domain for differential acceleration.
Key Questions Answered
- •Threat Actor Hierarchy: Approximately 80% of cyberattacks come from unsophisticated criminals using spray-and-pray tactics, while nation-states like China focus on IP theft from R&D-heavy industries and North Korea runs remote worker programs where operatives infiltrate Western tech companies to earn salaries funding the regime. Ransomware gangs occupy the middle ground, causing order-of-magnitude more economic damage than they capture in payments, with attacks like Jaguar requiring a $2 billion government loan after operations went down for one to two months.
- •Detection Gap Economics: Current cybersecurity relies on static rule-based monitoring systems that generate excessive false positives because suspicious behavior often mirrors normal activity. Digital forensics investigations that deeply analyze evidence can distinguish real threats but remain prohibitively expensive, with only 60 investigators at CrowdStrike capable of performing this work. This creates a paradigm where deep investigations only happen reactively after breaches, missing most attacks that go undetected for extended periods.
- •AI Capability Threshold: Off-the-shelf language models already achieve approximately 90% accuracy on email-based compromise investigations without specialized training, but the final reliability gap requires human oversight for production deployment. Asymmetric uses human-AI teams where agents perform first-pass analysis and investigators conduct quality control, building proprietary datasets from real incidents to close performance gaps. This services-first approach through insurance company partnerships provides both customer trust and the data flywheel needed for model improvement.
- •Defensive Asymmetry Opportunity: Digital forensics specialists who investigate breaches do not typically become skilled offensive hackers, suggesting limited skill transfer between defensive investigation and offensive exploitation. This contrasts with domains like penetration testing where capabilities are inherently dual-use. The separation creates an opportunity to differentially accelerate defensive AI capabilities through specialized datasets, evaluations, and training environments without proportionally advancing offensive capabilities, though this window closes as models achieve broader generalization.
- •Jagged Frontier Strategy: Reinforcement learning creates predictable capability improvements in domains with verifiable rewards like coding and math, but lags in areas lacking clear evaluation signals. Organizations can intentionally shape the AI capability frontier by curating specialized datasets, building realistic environments, and developing high-fidelity evaluations in strategically important domains. This approach could be replicated across biosecurity, AI safety, and other areas where hardening defenses matters, but requires subject matter experts willing to encode their expertise into AI systems.
- •Distribution Through Insurance: Asymmetric enters the market through cybersecurity insurance carriers rather than direct enterprise sales, getting approved on insurer panels that dispatch incident response vendors when policyholders get breached. This distribution model solves the trust problem inherent in cybersecurity where effectiveness is difficult to assess, following the CrowdStrike playbook of starting with services to build relationships and data before productizing. The approach reduces investigation time from two days to one week down to a few hours.
Notable Moment
Carlier reveals that most technical vulnerabilities exploited in cyberattacks are known issues that organizations simply have not patched, rather than sophisticated zero-day exploits. Attackers consistently choose the path of least resistance, with social engineering and phishing comprising 70 to 80% of attack volume, because there is no reason to burn valuable unknown vulnerabilities when a convincing email works just as effectively.
You just read a 3-minute summary of a 73-minute episode.
Get Cognitive Revolution summarized like this every Monday — plus up to 2 more podcasts, free.
Pick Your Podcasts — FreeKeep Reading
More from Cognitive Revolution
AI in the AM: 99% off search, GPT-5.5 is "clean", model welfare analysis, & efficient analog compute
Apr 26 · 158 min
The Mel Robbins Podcast
Do THIS Every Day to Rewire Your Brain From Stress and Anxiety
Apr 27
More from Cognitive Revolution
Does Learning Require Feeling? Cameron Berg on the latest AI Consciousness & Welfare Research
Apr 23 · 213 min
The Model Health Show
The Menopause Gut: Why Metabolism Changes & How to Reclaim Your Body - With Cynthia Thurlow
Apr 27
More from Cognitive Revolution
We summarize every new episode. Want them in your inbox?
AI in the AM: 99% off search, GPT-5.5 is "clean", model welfare analysis, & efficient analog compute
Does Learning Require Feeling? Cameron Berg on the latest AI Consciousness & Welfare Research
Vibe-Coding an Attention Firewall, w/ Steve Newman, creator of The Curve
Welcome to AI in the AM: RL for EE, Oversight w/out Nationalization, & the first AI-Run Retail Store
It's Crunch Time: Ajeya Cotra on RSI & AI-Powered AI Safety Work, from the 80,000 Hours Podcast
Similar Episodes
Related episodes from other podcasts
The Mel Robbins Podcast
Apr 27
Do THIS Every Day to Rewire Your Brain From Stress and Anxiety
The Model Health Show
Apr 27
The Menopause Gut: Why Metabolism Changes & How to Reclaim Your Body - With Cynthia Thurlow
The Rest is History
Apr 26
664. Britain in the 70s: Scandal in Downing Street (Part 3)
The Learning Leader Show
Apr 26
685: David Epstein - The Freedom Trap, Narrative Values, General Magic, The Nobel Prize Winner Who Simplified Everything, Wearing the Same Thing Everyday, and Why Constraints Are the Secret to Your Best Work
The AI Breakdown
Apr 26
Where the Economy Thrives After AI
Explore Related Topics
This podcast is featured in Best AI Podcasts (2026) — ranked and reviewed with AI summaries.
You're clearly into Cognitive Revolution.
Every Monday, we deliver AI summaries of the latest episodes from Cognitive Revolution and 192+ other podcasts. Free for up to 3 shows.
Start My Monday DigestNo credit card · Unsubscribe anytime