A quick look at the marketing FUD of 'Automated Pentests' and a high level look at the various technical pieces that delineate the difference between scanning and the real-world attacks used in pentesting. Touches on technical and business processes to ensure that your organization is spending its resources in the right places.