The “AI Vulnerability Storm”: Building a “Mythos-ready” Security Program
A briefing for security leaders on how AI-driven vulnerability discovery is reshaping the defender timeline, the operating model of vulnerability management, and the minimum actions required now.
AI-driven vulnerability discovery and exploit development have accelerated dramatically. The time between disclosure and exploitation is shrinking, and security teams are being asked to respond faster than current operating models allow.

Why this matters
This is not about one model, one vendor, or one announcement. AI has materially accelerated vulnerability discovery while defenders have not yet matched that speed operationally.
This briefing is designed for the CISO who needs to walk into a room Monday morning with a credible plan. It outlines immediate actions, near-term priorities, and long-term shifts required to operate in a world where AI-driven offense is the new baseline.
Authors
By the CSA CISO Community, SANS, [un]prompted, and the wider community.
Authors:
Gadi Evron, CEO, Knostic, CISO-in-Residence for AI, Cloud Security Alliance
Rich Mogull, Chief Analyst, Cloud Security Alliance
Rob T. Lee, Chief AI Officer, Chief of Research, SANS Institute
Contributing authors include:
Jen Easterly, CEO, RSA Conference, former Director of CISA
Bruce Schneier, Chief of Security Architecture, Inrupt, Fellow and lecturer, Harvard Kennedy School
Chris Inglis, former National Cyber Director, The White House
Rob Joyce, former Cybersecurity Director, NSA
Heather Adkins, CISO, Google
Joshua Saxe, CTO and Co-founder at Security Superintelligence Labs; former AI and Llama Security Lead, Meta
Sounil Yu, CTO, Knostic, former Chief Security Scientist, Bank of America
John N. Stewart, Talons Ventures; former CSTO, Cisco Systems
Katie Moussouris, Founder and CEO, Luta Security
Dave Lewis, Global Advisory CISO, 1Password
Maxim Kovalsky, Managing Director, AI Security CoE, Consortium Networks
Thank you to the 250 CISOs who edited and redlined this live.
All listed authors and reviewers represent only themselves and not their employers.
What you’ll get
This paper combines executive framing with practical guidance. It explains why the current moment is different, how AI-driven vulnerability discovery changes security assumptions, and what leaders should begin this week, over the next 45 days, and over the next 12 months.
It introduces the concept of a Mythos-ready security program and frames VulnOps as a permanent organizational capability.
Contact
Contact cisos@cloudsecurityalliance.org with any inquiries.
DISCLAIMER: These materials are provided for convenience only and may not be relied upon for any purpose.
This document is released under the Attribution-NonCommercial 4.0 International (CC BY-NC 4.0) license.