The Cyber Threat Perspective

Episode 166: Why Your Pentest Didn’t Make You Safer

Jan 30, 2026
Tyler Roberts, an offensive security practitioner and penetration tester, explains why pentests often fail to improve real security. He discusses organizational vs tester responsibilities. He highlights false confidence from checklist thinking, compliance-driven limits, realistic scoping, ownership and remediation, and using tests to validate detection and response.
Ask episode
AI Snips
Chapters
Transcript
Episode notes
ADVICE

Run External First Then Stagger Internal Tests

  • Start with an external pentest if you've never tested before, then stage an internal test later to avoid overwhelm.
  • Spencer Alessi recommends staggering engagements to build a baseline and choose appropriate future testing like red team exercises.
ADVICE

Remediate Root Causes Not Just Findings

  • Fix root causes, not just symptoms reported in pentest findings to prevent recurrence.
  • Spencer Alessi recounts an ADCS certificate template remediated then later re-enabled due to missing internal communication and application needs.
ADVICE

Run Locksmith After Every ADCS Change

  • After any change in Active Directory Certificate Services, run locksmith and export mode 2 to a spreadsheet for review.
  • Spencer Alessi insists running invoke-locksmith mode 2 on each ADCS change to catch misconfigurations early.
Get the Snipd Podcast app to discover more snips from this episode
Get the app