Deploy Bravely — Secure your AI transformation with Prisma AIRS
  • Sign In
    • Customer
    • Partner
    • Employee
    • Login to download
    • Join us to become a member
  • EN
  • magnifying glass search icon to open search field
  • Contact Us
  • What's New
  • Get Support
  • Under Attack?
Palo Alto Networks logo
  • Products
  • Solutions
  • Services
  • Partners
  • Company
  • More
  • Sign In
    Sign In
    • Customer
    • Partner
    • Employee
    • Login to download
    • Join us to become a member
  • EN
    Language
  • Contact Us
  • What's New
  • Get support
  • Under Attack?
  • Demos and Trials
Podcast

39 Seconds to Breach

Apr 02, 2026
podcast default icon
podcast default icon

Threat Vector | 39 Seconds to Breach

00:00 00:00

Apple Podcasts Overcast Spotify RSS Feed YouTube

Can your organization survive a breach in 39 seconds? That's how fast attackers are moving now, and if your defenses are still running at human speed, you're already behind.

Wendi Whitmore, Chief Security Intelligence Officer at Palo Alto Networks, returns to Threat Vector for a candid conversation with David Moulton about what it actually takes to build resilience in an era where AI is accelerating both the threat and the defense. Wendi brings more than two decades of experience leading incident response and threat intelligence at organizations including Mandiant, CrowdStrike, IBM X-Force, and Unit 42. She's an inaugural member of the DHS Cyber Safety Review Board and serves on cybersecurity advisory boards at Duke University and the University of San Diego.


You'll learn:

  • Why fighting AI with AI is the only viable response to today's attack speeds, including exfiltration happening in under a minute

  • How Volt Typhoon and Salt Typhoon represent two fundamentally different threat objectives, and what that means for your defense posture

  • What "cybersecurity for AI" means versus "AI for cybersecurity," and why organizations need both

  • How the best incident response leaders translate between deep technical analysis and boardroom communication under pressure

  • Why curiosity, not certifications, is the trait that separates great security practitioners from the rest

Wendi is one of the most respected voices in national cybersecurity strategy, with a track record that spans major breaches, critical infrastructure defense, and the Paris Olympics. Her perspective on building teams, aligning talent to mission, and defending against nation-state actors at scale is grounded in real-world investigation, not theory.

This episode is essential listening if you're: a security leader trying to align your AI strategy with your risk posture, a practitioner wondering how to make the case for faster detection and response investment, or someone building or managing a threat intelligence or incident response team.


Related Episodes:

  • Confronting China's Expanding Cyber Threats with Wendi Whitmore — Wendi's first appearance on Threat Vector, focused on Chinese nation-state activity and critical infrastructure targeting.

  • Transform Your SOC and Get Ahead of the Threats — A deep dive on SOC transformation, AI-driven detection, and what it means to modernize your security operations center.

  • The Art of Threat Hunting — How human analysts and AI work together to find what attackers are trying to hide.

#CyberResilience #AIinCybersecurity


About Threat Vector

Threat Vector by Palo Alto Networks is your premier podcast for security thought leadership. Join us as we explore pressing cybersecurity threats, robust protection strategies, and the latest industry trends.

The podcast features in-depth discussions with industry leaders, Palo Alto Networks experts, and customers, providing crucial insights for security decision-makers.

Whether you're looking to stay ahead of the curve with innovative solutions or understand the evolving cybersecurity landscape, Threat Vector equips you with the knowledge needed to safeguard your organization.


Palo Alto Networks

Palo Alto Networks enables your team to prevent successful cyberattacks with an automated approach that delivers consistent security across the cloud, network, and mobile.⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ ⁠http://paloaltonetworks.com.⁠⁠


Protect yourself from the evolving threat landscape – more episodes of Threat Vector are a click away

Share page on facebook Share page on linkedin Share page by an email
Related Resources

Access a wealth of educational materials, such as datasheets, whitepapers, critical threat reports, informative cybersecurity topics, and top research analyst reports

See all resources

Get the latest news, invites to events, and threat alerts

By submitting this form, I understand my personal data will be processed in accordance with Palo Alto Networks Privacy Statement and Terms of Use.

Products and Services

  • AI-Powered Network Security Platform
  • Secure AI by Design
  • Prisma AIRS
  • AI Access Security
  • Cloud Delivered Security Services
  • Advanced Threat Prevention
  • Advanced URL Filtering
  • Advanced WildFire
  • Advanced DNS Security
  • Enterprise Data Loss Prevention
  • Enterprise IoT Security
  • Medical IoT Security
  • Industrial OT Security
  • SaaS Security
  • Next-Generation Firewalls
  • Hardware Firewalls
  • Software Firewalls
  • Strata Cloud Manager
  • SD-WAN for NGFW
  • PAN-OS
  • Panorama
  • Secure Access Service Edge
  • Prisma SASE
  • Application Acceleration
  • Autonomous Digital Experience Management
  • Enterprise DLP
  • Prisma Access
  • Prisma Browser
  • Prisma SD-WAN
  • Remote Browser Isolation
  • SaaS Security
  • AI-Driven Security Operations Platform
  • Cloud Security
  • Cortex Cloud
  • Application Security
  • Cloud Posture Security
  • Cloud Runtime Security
  • Prisma Cloud
  • AI-Driven SOC
  • Cortex XSIAM
  • Cortex XDR
  • Cortex XSOAR
  • Cortex Xpanse
  • Unit 42 Managed Detection & Response
  • Managed XSIAM
  • Threat Intel and Incident Response Services
  • Proactive Assessments
  • Incident Response
  • Transform Your Security Strategy
  • Discover Threat Intelligence

Company

  • About Us
  • Careers
  • Contact Us
  • Corporate Responsibility
  • Customers
  • Investor Relations
  • Location
  • Newsroom

Popular Links

  • Blog
  • Communities
  • Content Library
  • Cyberpedia
  • Event Center
  • Manage Email Preferences
  • Products A-Z
  • Product Certifications
  • Report a Vulnerability
  • Sitemap
  • Tech Docs
  • Unit 42
  • Do Not Sell or Share My Personal Information
PAN logo
  • Privacy
  • Trust Center
  • Terms of Use
  • Documents

Copyright © 2026 Palo Alto Networks. All Rights Reserved

  • Youtube
  • Podcast
  • Facebook
  • LinkedIn
  • Twitter
  • Select your language