Watch Now

Show Notes

Alton Johnson, Founder and Principal Security Consultant at Vonahi Security, automates his way out of his pen testing job in this week’s episode. An AOl hacking gone wild got Alton into defensive cybersecurity years ago, and now, as the Founder of Vonahi, Alton advocates for automation and efficiency in the pen testing process. Alton talks about his connection to defensive over offensive, customizing a pen test report to your audience, and finding that sweet spot between practitioner and entrepreneur. 

 

Timecoded Guide:

[00:00] Learning the importance of automation in defensive cyber

[07:48] Connecting with automation & defensive cybersecurity over offensive

[12:01] Showing the results that matter to the right people in a pen test report

[15:27] Prioritizing exploitations in the world of vulnerability assessments

[21:59] Maintaining the cyber practitioner & the entrepreneurial side of Vonahi

 

Sponsor Links:

Thank you to our sponsors Axonius and NetSPI for bringing this episode to life!

The Axonius solution correlates asset data from existing solutions to provide an always up-to-date inventory, uncover gaps, and automate action — giving IT and security teams the confidence to control complexity. Learn more at axonius.com/hackervalley

For more than 2 decades, NetSPI has helped companies discover and remediate critical security issues through its platform-driven, human delivered security test. NetSPI is much more than a pentesting company, bringing you the most comprehensive suite of offensive security solutions. Visit netspi.com/HVM to learn more.

 

How have you seen automation change yourself and your role? 

As a penetration tester, Alton explains that time is often not on his side. There’s a limited amount of time to do an assessment, and the measure of a good pen tester is often determined by fast, high quality reporting. Automating the repetitive tasks of pen testing not only saves time, but Alton believes it genuinely changes the role into something much more efficient, high value, and successful. 

“Automation obviously plays a huge part in growing in the career too, because the more you can do, the more value you can provide, and the faster you can provide that value makes you a better pentester.” 

 

How do you convey the story of a red team engagement in different ways so that message is received by everyone in the company? 

At Vonahi Security, Alton’s team separates pen testing reports into an executive summary and a technical report. The executive summary is high level, demonstrating the impact and severity of what was discovered from a business point of view. Many business executives don’t need the technical play by play, which is why that is saved for the technical report. The technical report acts as a scene by scene story of what was done and how to technically fix it.

“We separate the two conversations. Here's what we did at a high level to anyone that doesn't really care about the technical stuff, but only cares about how it impacts the business, and then, for the person that has to fix the issues, here's everything that they would need.”

 

What would you tell the newer generation of cybersecurity practitioners about the offensive side? 

When Alton first started his cybersecurity journey, he was very into hacking and coding. That passion for code has served him well, allowing him to become successful enough to start his own business with Vonahi. For the younger generation of cyber practitioners, Alton recommends not skipping that coding education. As technically advanced and automated as cybersecurity tools are, practitioners should be prepared to code when something breaks or doesn’t work as intended.

“I think coding is extremely valuable, because there's going to be many times that tools that you use don't work and you have to have the experience and knowledge to basically fix those problems with coding.”

 

What have you learned over the past few years that has helped you to maintain both the technical and business side of Vonahi? 21

Efficiency is the name of the game for Vonahi— and it’s the one thing that has allowed Alton to remain in a hands-on pen testing role while still being a business owner. Keeping it efficient is more than just technology and automation. Alton believes his success is a direct result of the efficient technology around him and the hardworking, intelligent, efficient team members working with him at Vonahi.

“It is really just about efficiency. We look to all these other leaders, but for me, I like to learn from other people's failures. I don't want to take the same growth processes as the person who failed and didn't do well.”

---------------

Links:

Keep up with our guest Alton Johnson on LinkedIn and his personal website

Learn more about Vonahi Security on LinkedIn and the Vonahi Security website

Connect with Ron Eddings on LinkedIn and Twitter

Connect with Chris Cochran on LinkedIn and Twitter

Purchase a HVS t-shirt at our shop

Continue the conversation by joining our Discord

Check out Hacker Valley Media and Hacker Valley Studio

Recent Episodes

Mar 21, 2025

Staying Ahead in the Age of AI Agents with Marco Figueroa

Marco Figueroa is back, and his AI predictions aren’t just coming true—they’re unfolding faster than anyone expected. AI agents aren’t on the horizon—they’re already here, and security teams are ...

Mar 14, 2025

I Built an AI Version of Myself – Here’s Why with Marcus J. Carey

The best time to be alive is right now—if you know how to use AI. Marcus J. Carey, Principal Research Scientist at ReliaQuest, is harnessing AI to supercharge creativity, cybersecurity, and ...

Mar 8, 2025

Cyber Warfare, Digital Deception, and the Hidden Threats We Ignore ...

We’re already in World War III—just not the kind you’re thinking of. Cyber warfare is here, and the battlefield is your inbox, your bank account, and your digital identity. So why are we still ...

Feb 28, 2025

The AI Shift You Can’t Ignore with Marco Figueroa

AI isn’t just evolving—it’s sprinting, and cybersecurity needs to keep up.  Ron Eddings is joined again by cybersecurity leader Marco Figueroa, Program Manager for Gen AI at the ODIN Bug Bounty ...

Feb 21, 2025

Superhuman Productivity and AI Mastery with Pedram Amini

What if you could have a conversation with yourself—years into the future? Or leave behind an AI-powered avatar that understands your thoughts, philosophies, and even your voice? In this ...

Feb 13, 2025

Cybersecurity Meets AI: The Good, The Bad & The Janky

There’s no doubt that AI is changing the game in cybersecurity, but not always in the ways we expect. In this episode, Ron Eddings shares his firsthand experience with AI-powered tools that make ...

Feb 4, 2025

A Human-Centric Approach to Cybersecurity with Edna Conway

What if cybersecurity was more than just tech—what if it was about the people it serves? In this episode, Edna Conway, Founder and CEO of EMC Advisors, shares her incredible journey from law to ...

Jan 28, 2025

Rise of the Machines: Why Your Attack Surface Has More Holes Than ...

Did you know nearly half of your enterprise devices are agentless—leaving your attack surface wide open? In this episode, Ron is joined by Pandian Gnanaprakasam, Co-Founder and Chief Product ...

Jan 22, 2025

How a Game Turned a Watchmaker into a Cybersecurity Pro with ...

What if cybersecurity training could be as engaging as your favorite game? In this episode, Simeon Kakpovi, founder of the KC7 Foundation, shares how his gamified approach is changing lives and ...

Jan 14, 2025

Managing and Mitigating Cyber Risks For Your Assets with Jerich ...

What’s the key to mitigating unseen cyber risks? In this episode, Wes Wright, Chief Healthcare Officer at Ordr and Jerich Beason, CISO at WM uncover the complexities of attack surface management ...

WORK WITH US

PODCASTS + SPEAKING + EVENTS

Are you the best kept secret in cybersecurity? Let's change that by partnering together for podcast ads, social campaigns, and your next event or keynote. Send us your details to get started.