Richard Hummel, NETSCOUT | CUBE Conversation, July 2021
(upbeat music) >> Hey, welcome to this Cube conversation with NetScout. I'm Lisa Martin. Excited to talk to you. Richard Hummel, the manager of threat research for Arbor Networks, the security division of NetScout. Richard, welcome to theCube. >> Thanks for having me, Lisa, it's a pleasure to be here. >> We're going to unpack the sixth NetScout Threat Intelligence Report, which is going to be very interesting. But something I wanted to start with is we know that and yes, you're going to tell us, COVID and the pandemic has had a massive impact on DDoS attacks, ransomware. But before we dig into the report, I'd like to just kind of get some stories from you as we saw last year about this time rapid pivot to work from home, rapid pivot to distance learning. Talk to us about some of the attacks that you saw in particular that literally hit close to home. >> Sure and there's one really good prime example that comes to mind because it impacted a lot of people. There was a lot of media sensation around this but if you go and look, just Google it, Miami Dade County and DDoS, you'll see the first articles that pop up is the entire district school network going down because the students did not want to go to school and launched a DDoS attack. There was something upwards of 190,000 individuals that could no longer connect to the school's platform, whether that's a teacher, a student or parents. And so it had a very significant impact. And when you think about this in terms of the digital world, that impacted very severely, a large number of people and you can't really translate that to what would happen in a physical environment because it just doesn't compute. There's two totally different scenarios to talk about here. >> Amazing that a child can decide, "I don't want to go to school today." And as a result of a pandemic take that out for nearly 200,000 folks. So let's dig into, I said this is the sixth NetScout Threat Intelligence Report. One of the global trends and themes that is seen as evidence in what happened last year is up and to the right. Oftentimes when we're talking about technology, you know, with analyst reports up and to the right is a good thing. Not so in this case. We saw huge increases in threat vectors, more vectors weaponized per attack sophistication, expansion of threats and IOT devices. Walk us through the overall key findings from 2020 that this report discovered. >> Absolutely. And if yo glance at your screen there you'll see the key findings here where we talk about record breaking numbers. And just in 2020, we saw over 10 million attacks, which, I mean, this is a 20% increase over 2019. And what's significant about that number is COVID had a huge impact. In fact, if we go all the way back to the beginning, right around mid March, that's when the pandemic was announced, attacks skyrocketed and they didn't stop. They just kept going up and to the right. And that is true through 2021. So far in the first quarter, typically January, February is the down month that we observe in DDoS attacks. Whether this is, you know, kids going back to school from Christmas break, you have their Christmas routines and e-commerce is slowing down. January, February is typically a slow month. That was not true in 2021. In fact, we hit record numbers on a month by month in both January and February. And so not only do we see 2.9 million attacks in the first quarter of 2021, which, I mean, let's do the math here, right? We've got four quarters, you know, we're on track to hit 12 million attacks potentially, if not more. And then you have this normal where we said 800,000 approximately month over month since the pandemic started, we started 2021 at 950,000 plus. That's up and to the right and it's not slowing down. >> It's not slowing down. It's a trend that it shows, you know, significant impact across every industry. And we're going to talk about that but what are some of the new threat vectors that you saw weaponized in the last year? I mean, you talked about the example of the Miami-Dade school district but what were some of those new vectors that were really weaponized and used to help this up and to the right trend? >> So there's four in particular that we were tracking in 2020 and these nets aren't necessarily new vectors. Typically what happens when an adversary starts using this is there's a proof of concept code out there. In fact, a good example of this would be the RDP over UDP. So, I mean, we're all remotely connected, right? We're doing this over a Zoom call. If I want to connect to my organization I'm going to use some sort of remote capability whether that's a VPN or tunneling in, whatever it might be, right? And so remote desktop is something that everybody's using. And we saw actors start to kind of play around with this in mid 2020. And in right around September, November timeframe we saw a sudden spike. And typically when we see spikes in this kind of activity it's because adversaries are taking proof of concept code, that maybe has been around for a period of time, and they're incorporating those into DDoS for hire services. And so any person that wants to launch a DDoS attack can go into underground forums in marketplaces and they can purchase, maybe it's $10 in Bitcoin, and they can purchase an attack. That leverage is a bunch of different DDoS vectors. And so adversaries have no reason to remove a vector as new ones get discovered. They only have the motivation to add more, right? Because somebody comes into their platform and says, "I want to launch an attack that's going to take out my opponent." It's probably going to look a lot better if there's a lot of attack options in there where I can just go through and start clicking buttons left and right. And so all of a sudden now I've got this complex multi-vector attack that I don't have to pay anything extra for. Adversary already did all the work for me and now I can launch an attack. And so we saw four different vectors that were weaponized in 2020. One of those are notably the Jenkins that you see listed on the screen in the key findings. That one isn't necessarily a DDoS vector. It started out as one, it does amplify, but what happens is Jenkins servers are very vulnerable and when you actually initiate this attack, it tips over the Jenkins server. So it kind of operates as like a DoS event versus DDoS but it still has the same effect of availability, it takes a server offline. And then now just in the first part of 2021 we're tracking multiple other vectors that are starting to be weaponized. And when we see this, we go from a few, you know, incidents or alerts to thousands month over month. And so we're seeing even more vectors added and that's only going to continue to go up into the right. You know that theme that we talked about at the beginning here. >> As more vectors get added, and what did you see last year in terms of industries that may have been more vulnerable? As we talked about the work from home, everyone was dependent, really here we are on Zoom, dependent on Zoom, dependent on Netflix. Streaming media was kind of a lifeline for a lot of us but it also was healthcare and education. Did you see any verticals in particular that really started to see an increase in the exploitation and in the risk? >> Yeah, so let's start, let's separate this into two parts. The last part of the key findings that we had was talking about a group we, or a campaign we call Lazarus Borough Model. So this is a global DDoS extortion campaign. We're going to cover that a little bit more when we talk about kind of extorted events and how that operates but these guys, they started where the money is. And so when they first started targeting industries and this kind of coincides with COVID, so it started several months after the pandemic was announced, they started targeting a financial organizations, commercial banking. They went after stock exchange. Many of you would hear about the New Zealand Stock Exchange that went offline. That's this LBA campaign and these guys taking it off. So they started where the money is. They moved to a financial agation targeting insurance companies. They targeted currency exchange places. And then slowly from there, they started to expand. And in so much as our Arbor Cloud folks actually saw them targeting organizations that are part of vaccine development. And so these guys, they don't care who they hurt. They don't care who they're going after. They're going out there for a payday. And so that's one aspect of the industry targeting that we've seen. The other aspect is you'll see, on the next slide here, we actually saw a bunch of different verticals that we really haven't seen in the top 10 before. In fact, if you actually look at this you'll see the number one, two and three are pretty common for us. We almost always are going to see these kinds of telecommunications, wireless, satellite, broadband, these are always going to be in the top. And the reason for that is because gamers and DDoS attacks associated with gaming is kind of the predominant thing that we see in this landscape. And let's face it, gamers are on broadband operating systems. If you're in Asian communities, often they'll use mobile hotspots. So now you start to have wireless come in there. And so that makes sense seeing them. But what doesn't make sense is this internet publishing and broadcasting and you might say, "Well, what is that?" Well, that's things like Zoom and WebEx and Netflix and these other streaming services. And so we're seeing adversaries going after that because those have become critical to people's way of life. Their entertainment, what they're using to communicate for work and school. So they realized if we can go after this it's going to disrupt something and hopefully we can get some recognition. Maybe we can show this as a demonstration to get more customers on our platform or maybe we can get a payday. In a lot of the DDoS attacks that we see, in fact most of them, are all monetary focused. And so they're looking for a payday. They're going to go after something that's going to likely, you know, send out that payment. And then just walk down the line. You can see COVID through this whole thing. Electronic shopping is number five, right? Everybody turned to e-commerce because we're not going to in-person stores anymore. Electronic computer manufacturing, how many more people have to get computers at home now because they're no longer in a corporate environment? And so you can see how the pandemic has really influenced this industry target. >> Significant influencer and I also wonder too, you know, Zoom became a household name for every generation. You know, we're talking to five generations and maybe the generations that aren't as familiar with computer technology might be even more exploitable because it's easy to click on a phishing email when they don't understand how to look for the link. Let's now unpack the different types of DDoS attacks and what is on the rise. You talked about in the report the triple threat and we often think of that in entertainment. That's a good thing, but again, not here. Explain that triple threat. >> Yeah, so what we're seeing here is we have adversaries out there that are looking to take advantage of every possible angle to be able to get that payment. And everybody knows ransomware is a household name at this point, right? And so ransomware and DDoS have a lot in common because they both attack the availability of network resources, where computers or devices or whatever they might be. And so there's a lot of parallels to draw between the two of these. Now ransomware is a denial of service event, right? You're not going to have tens of thousands of computers hitting a single computer to take it down. You're going to have one exploitation of events. Somebody clicked on a link, there was a brute force attempt that managed to compromise a little boxes, credentials, whatever it might be, ransomware gets put on a system, it encrypts all your files. Well, all of a sudden, you've got this ransom note that says "If you want your files decrypted you're going to send us this amount of human Bitcoin." Well, what adversaries are doing now is they're capitalizing on the access that they already gained. So they already have access to the computer. Well, why not steal all the data first then let's encrypt whatever's there. And so now I can ask for a ransom payment to decrypt the files and I can ask for an extortion to prevent me from posting your data publicly. Maybe there's sensitive corporate information there. Maybe you're a local school system and you have all of your students' data on there. You're a hospital that has sensitive PI on it, whatever it might be, right? So now they're going to extort you to prevent them from posting that publicly. Well, why not add DDoS to this entire picture? Now you're already encrypted, we've already got your files, and I'm going to DDoS your system so you can't even access them if you wanted to. And I'm going to tell you, you have to pay me in order to stop this DDoS attack. And so this is that triple threat and we're seeing multiple different ransomware families. In fact, if you look at one of the slides here, you'll see that there's SunCrypt, there's Ragnar Cryptor, and then Maze did this initially back in September and then more recently, even the DarkSide stuff. I mean, who hasn't heard about DarkSide now with the Colonial Pipeline event, right? So they came out and said, "Hey we didn't intend for this collateral damage but it happened." Well, April 24th, they actually started offering DDoS as part of their tool kits. And so you can see how this has evolved over time. And adversaries are learning from each other and are incorporating this kind of methodology. And here we have triple extortion event. >> It almost seems like triple extortion event as a service with the opportunities, the number of vectors there. And you're right, everyone has heard of the Colonial Pipeline and that's where things like ransomware become a household term, just as much as Zoom and video conferencing and streaming media. Let's talk now about the effects that the threat report saw and uncovered region by region. Were there any regions in particular that were, that really stood out as most impacted? >> So not particularly. So one of the phenomena that we actually saw in the threat report, which, you know, we probably could have talked about it before now but it makes sense to talk about it regionally because we didn't see any one particular region, one particular vertical, a specific organization, specific country, none was more heavily targeted than another. In fact what we saw is organizations that we've never seen targeted before. We've seen industries that have never been targeted before all of a sudden are now getting DDoS attacks because we went from a local on-prem, I don't need to be connected to the internet, I don't need to have my employees remote access. And now all of a sudden you're dependent on the internet which is really, let's face it, that's critical infrastructure these days. And so now you have all of these additional people with a footprint connected to the internet then adversary can figure out and they can poke at it. And so what we saw here is just overall, all industries, all regions saw these upticks. The exception would be in China. We actually, in the Asia Pacific region specifically, but predominantly in China. But that often has to do with visibility rather than a decrease in attacks because they have their own kind of infrastructure in China. Brazil's the same way. They have their own kind of ecosystems. And so often you don't see what happens a lot outside the borders. And so from our perspective, we might see a decrease in attacks but, for all we know, they actually saw an increase in the attacks that is internal to their country against their country. And so across the board, just increases everywhere you look. >> Wow. So let's talk about what organizations can do in light of this. As we are here, we are still doing this program by video conferencing and things are opening up a little bit more, at least in the states anyway, and we're talking about more businesses going back to some degree but there's going to still be some mix, some hybrid of working from home and maybe even distance learning. So what can enterprises do to prepare for this when it happens? Because it sounds to me like with the sophistication, the up and to the right, it's not, if we get attacked, it's when. >> It's when, exactly. And that's just it. I mean, it's no longer something that you can put off. You can't just assume that I've never been DDoS attacked, I'm never going to be DDoS attacked anymore. You really need to consider this as part of your core security platform. I like to talk about defense in depth or a layer defense approach where you want to have a layered approach. So, you know, maybe they target your first layer and they don't get through. Or they do get through and now your second layer has to stop it. Well, if you have no layers or if you have one layer, it's not that hard for an adversary to figure out a way around that. And so preparation is key. Making sure that you have something in place and I'm going to give you an operational example here. One of the things we saw with the LBA campaigns is they actually started doing network of conasense for their targets. And what they would do is they would take the IP addresses belonging to your organization. They would look up the domains associated with that and they would figure out like, "Hey, this is bpn.organization.com or VPN two." And all of a sudden they've found your VPN concentrator and so that's where they're going to focus their attack. So something as simple as changing the way that you name your VPN concentrators might be sufficient to prevent them from hitting that weak link or right sizing the DDoS protection services for your company. Did you need something as big as like OnPrem Solutions? We need hardware. Do you instead want to do a managed service? Or do you want to go and talk to a cloud provider because there's right solutions and right sizes for all types of organizations. And the key here is preparation. In fact, all of the customers that we've worked with for the LBA extortion campaigns, if they were properly prepared they experienced almost no downtime or impact to their business. It's the people like the New Zealand Stock Exchange or their service provider that wasn't prepared to handle the attacks that were sent out them that were crippled. And so preparation is key. The other part is awareness. And that's part of what we do with this threat report because we want to make sure you're aware what adversaries are doing, when new attack vectors are coming out, how they're leveraging these, what industries they're targeting because that's really going to help you to figure out what your posture is, what your risk acceptance is for your organization. And in fact, there's a couple of resources that that we have here on the next slide. And you can go to both both of these. One of them is the threat report. You can view all of the details. And we only scratched the surface here in this Cube interview. So definitely recommend going there but the other one is called Horizon And netscout.com/horizon is a free resource you can register but you can actually see near real-time attacks based on industry and based on region. So if your organization out there and you're figuring, "Well I'm never attacked." Well go look up your industry. Go look up the country where you belong and see is there actually attacks against us? And I think you'll be quite surprised that there's quite a few attacks against you. And so definitely recommend checking these out >> Great resources netscout.com/horizon, netscout.com/threatreport. I do want to ask you one final question. That's in terms of timing. We saw the massive acceleration in digital transformation last year. We've already talked about this a number of times on this program. The dependence that businesses and consumers, like globally in every industry, in every country, have on streaming on communications right now. In terms of timing, though, for an organization to go from being aware to understanding what adversaries are doing, to being prepared, how quickly can an organization get up to speed and help themselves start reducing their risks? >> So I think that with DDoS, as opposed to things like ransomware, the ramp up time for that is much, much faster. There is a finite period of time with DDoS attacks that is actually going to impact you. And so maybe you're a smaller organization and you get DDoS attacked. There's a, probably a pretty high chance that that DDoS attack isn't going to last for multiple days. So maybe it's like an hour, maybe it's two hours, and then you recover. Your network resources are available again. That's not the same for something like ransomware. You get hit with ransomware, unless you pay or you have backups, you have to do the rigorous process of getting all your stuff back online. DDoS is more about as soon as the attack stops, the saturation goes away and you can start to get back online again. So it might not be as like immediate critical that you have to have something but there's also solutions, like a cloud solution, where it's as simple as signing up for the service and having your traffic redirected to their scrubbing center, their detection center. And then you may not have to do anything on-prem yourself, right? It's a matter of going out to an organization, finding a good contract, and then signing up, signing on the dotted line. And so I think that the ramp up time for mitigation services and DDoS protection can be a lot faster than many other security platforms and solutions. >> That's good to know cause with the up and to the right trend that you already said, the first quarter is usually slow. It's obviously not that way as what you've seen in 2021. And we can only expect what way, when we talk to you next year, that the up and to the right trend may continue. So hopefully organizations take advantage of these resources, Richard, that you talked about to be prepared to mediate and protect their you know, their customers, their employees, et cetera. Richard, we thank you for stopping by theCube. Talking to us about the sixth NetScout Threat Intelligence Report. Really interesting information. >> Absolutely; definitely a pleasure to have me here. Lisa, anytime you guys want to do it again, you know where I live? >> Yes. It's one of my favorite topics that you got and I got to point out the last thing, your Guardians of the Galaxy background, one of my favorite movies and it should be noted that on the NetScout website they are considered the Guardians of the Connected World. I just thought that connection was, as Richard told me before we went live, not planned, but I thought that was a great coincidence. Again, Richard, it's been a pleasure talking to you. Thank you for your time. >> Thank you so much. >> Richard Hummel, I'm Lisa Martin. You're watching this Cube conversation. (relaxing music)
SUMMARY :
Excited to talk to you. it's a pleasure to be here. that you saw in particular that that comes to mind because One of the global trends and themes And then you have this normal where and to the right trend? And so any person that wants that really started to see an increase In a lot of the DDoS attacks that we see, and maybe the generations that aren't And so there's a lot of parallels to draw effects that the threat report And so now you have all but there's going to still be some mix, and I'm going to give you to understanding what that is actually going to impact you. that the up and to the a pleasure to have me here. and I got to point out the last thing, You're watching this Cube conversation.
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
Richard | PERSON | 0.99+ |
Richard Hummel | PERSON | 0.99+ |
Lisa Martin | PERSON | 0.99+ |
two hours | QUANTITY | 0.99+ |
2020 | DATE | 0.99+ |
China | LOCATION | 0.99+ |
$10 | QUANTITY | 0.99+ |
New Zealand Stock Exchange | ORGANIZATION | 0.99+ |
April 24th | DATE | 0.99+ |
New Zealand Stock Exchange | ORGANIZATION | 0.99+ |
20% | QUANTITY | 0.99+ |
September | DATE | 0.99+ |
two | QUANTITY | 0.99+ |
2021 | DATE | 0.99+ |
July 2021 | DATE | 0.99+ |
Lisa | PERSON | 0.99+ |
second layer | QUANTITY | 0.99+ |
last year | DATE | 0.99+ |
mid 2020 | DATE | 0.99+ |
Guardians of the Galaxy | TITLE | 0.99+ |
February | DATE | 0.99+ |
NetScout | ORGANIZATION | 0.99+ |
first layer | QUANTITY | 0.99+ |
January | DATE | 0.99+ |
bpn.organization.com | OTHER | 0.99+ |
next year | DATE | 0.99+ |
one layer | QUANTITY | 0.99+ |
800,000 | QUANTITY | 0.99+ |
last year | DATE | 0.99+ |
12 million attacks | QUANTITY | 0.99+ |
both | QUANTITY | 0.99+ |
Colonial Pipeline | EVENT | 0.99+ |
190,000 individuals | QUANTITY | 0.99+ |
four | QUANTITY | 0.99+ |
an hour | QUANTITY | 0.99+ |
One | QUANTITY | 0.99+ |
netscout.com/horizon | OTHER | 0.99+ |
first articles | QUANTITY | 0.99+ |
Netflix | ORGANIZATION | 0.99+ |
Guardians of the Connected World | TITLE | 0.99+ |
Zoom | ORGANIZATION | 0.99+ |
one | QUANTITY | 0.99+ |
one final question | QUANTITY | 0.99+ |
two parts | QUANTITY | 0.98+ |
2.9 million attacks | QUANTITY | 0.98+ |
over 10 million attacks | QUANTITY | 0.98+ |
Arbor Networks | ORGANIZATION | 0.98+ |
one aspect | QUANTITY | 0.98+ |
pandemic | EVENT | 0.98+ |
2019 | DATE | 0.98+ |
five generations | QUANTITY | 0.97+ |
three | QUANTITY | 0.97+ |
tens of thousands | QUANTITY | 0.97+ |
first | QUANTITY | 0.96+ |
Ragnar Cryptor | PERSON | 0.96+ |
first quarter of 2021 | DATE | 0.96+ |
four quarters | QUANTITY | 0.95+ |
ORGANIZATION | 0.95+ | |
nearly 200,000 folks | QUANTITY | 0.95+ |
2021 002 Richard Hummel V1 FOR SLIDE REVIEW
(upbeat music) >> Hey, welcome to this Cube conversation with NetScout. I'm Lisa Martin. Excited to talk to you. Richard Hummel, the manager of threat research for Arbor Networks, the security division of NetScout. Richard, welcome to theCube. >> Thanks for having me, Lisa, it's a pleasure to be here. >> We're going to unpack the sixth NetScout Threat Intelligence Report, which is going to be very interesting. But something I wanted to start with is we know that and yes, you're going to tell us, COVID and the pandemic has had a massive impact on DDoS attacks, ransomware. But before we dig into the report, I'd like to just kind of get some stories from you as we saw last year about this time rapid pivot to work from home, rapid pivot to distance learning. Talk to us about some of the attacks that you saw in particular that literally hit close to home. >> Sure and there's one really good prime example that comes to mind because it impacted a lot of people. There was a lot of media sensation around this but if you go and look, just Google it, Miami Dade County and DDoS, you'll see the first articles that pop up is the entire district school network going down because the students did not want to go to school and launched a DDoS attack. There was something upwards of 190,000 individuals that could no longer connect to the school's platform, whether that's a teacher, a student or parents. And so it had a very significant impact. And when you think about this in terms of the digital world, that impacted very severely, a large number of people and you can't really translate that to what would happen in a physical environment because it just doesn't compute. There's two totally different scenarios to talk about here. >> Amazing that a child can decide, "I don't want to go to school today." And as a result of a pandemic take that out for nearly 200,000 folks. So let's dig into, I said this is the sixth NetScout Threat Intelligence Report. One of the global trends and themes that is seen as evidence in what happened last year is up and to the right. Oftentimes when we're talking about technology, you know, with analyst reports up and to the right is a good thing. Not so in this case. We saw huge increases in threat vectors, more vectors weaponized per attack sophistication, expansion of threats and IOT devices. Walk us through the overall key findings from 2020 that this report discovered. >> Absolutely. And if yo glance at your screen there you'll see the key findings here where we talk about record breaking numbers. And just in 2020, we saw over 10 million attacks, which, I mean, this is a 20% increase over 2019. And what's significant about that number is COVID had a huge impact. In fact, if we go all the way back to the beginning, right around mid March, that's when the pandemic was announced, attacks skyrocketed and they didn't stop. They just kept going up and to the right. And that is true through 2021. So far in the first quarter, typically January, February is the down month that we observe in DDoS attacks. Whether this is, you know, kids going back to school from Christmas break, you have their Christmas routines and e-commerce is slowing down. January, February is typically a slow month. That was not true in 2021. In fact, we hit record numbers on a month by month in both January and February. And so not only do we see 2.9 million attacks in the first quarter of 2021, which, I mean, let's do the math here, right? We've got four quarters, you know, we're on track to hit 12 million attacks potentially, if not more. And then you have this normal where we said 800,000 approximately month over month since the pandemic started, we started 2021 at 950,000 plus. That's up and to the right and it's not slowing down. >> It's not slowing down. It's a trend that it shows, you know, significant impact across every industry. And we're going to talk about that but what are some of the new threat vectors that you saw weaponized in the last year? I mean, you talked about the example of the Miami-Dade school district but what were some of those new vectors that were really weaponized and used to help this up and to the right trend? >> So there's four in particular that we were tracking in 2020 and these nets aren't necessarily new vectors. Typically what happens when an adversary starts using this is there's a proof of concept code out there. In fact, a good example of this would be the RDP over UDP. So, I mean, we're all remotely connected, right? We're doing this over a Zoom call. If I want to connect to my organization I'm going to use some sort of remote capability whether that's a VPN or tunneling in, whatever it might be, right? And so remote desktop is something that everybody's using. And we saw actors start to kind of play around with this in mid 2020. And in right around September, November timeframe we saw a sudden spike. And typically when we see spikes in this kind of activity it's because adversaries are taking proof of concept code, that maybe has been around for a period of time, and they're incorporating those into DDoS for hire services. And so any person that wants to launch a DDoS attack can go into underground forums in marketplaces and they can purchase, maybe it's $10 in Bitcoin, and they can purchase an attack. That leverage is a bunch of different DDoS vectors. And so adversaries have no reason to remove a vector as new ones get discovered. They only have the motivation to add more, right? Because somebody comes into their platform and says, "I want to launch an attack that's going to take out my opponent." It's probably going to look a lot better if there's a lot of attack options in there where I can just go through and start clicking buttons left and right. And so all of a sudden now I've got this complex multi-vector attack that I don't have to pay anything extra for. Adversary already did all the work for me and now I can launch an attack. And so we saw four different vectors that were weaponized in 2020. One of those are notably the Jenkins that you see listed on the screen in the key findings. That one isn't necessarily a DDoS vector. It started out as one, it does amplify, but what happens is Jenkins servers are very vulnerable and when you actually initiate this attack, it tips over the Jenkins server. So it kind of operates as like a DoS event versus DDoS but it still has the same effect of availability, it takes a server offline. And then now just in the first part of 2021 we're tracking multiple other vectors that are starting to be weaponized. And when we see this, we go from a few, you know, incidents or alerts to thousands month over month. And so we're seeing even more vectors added and that's only going to continue to go up into the right. You know that theme that we talked about at the beginning here. >> As more vectors get added, and what did you see last year in terms of industries that may have been more vulnerable? As we talked about the work from home, everyone was dependent, really here we are on Zoom, dependent on Zoom, dependent on Netflix. Streaming media was kind of a lifeline for a lot of us but it also was healthcare and education. Did you see any verticals in particular that really started to see an increase in the exploitation and in the risk? >> Yeah, so let's start, let's separate this into two parts. The last part of the key findings that we had was talking about a group we, or a campaign we call Lazarus Borough Model. So this is a global DDoS extortion campaign. We're going to cover that a little bit more when we talk about kind of extorted events and how that operates but these guys, they started where the money is. And so when they first started targeting industries and this kind of coincides with COVID, so it started several months after the pandemic was announced, they started targeting a financial organizations, commercial banking. They went after stock exchange. Many of you would hear about the New Zealand Stock Exchange that went offline. That's this LBA campaign and these guys taking it off. So they started where the money is. They moved to a financial agation targeting insurance companies. They targeted currency exchange places. And then slowly from there, they started to expand. And in so much as our Arbor Cloud folks actually saw them targeting organizations that are part of vaccine development. And so these guys, they don't care who they hurt. They don't care who they're going after. They're going out there for a payday. And so that's one aspect of the industry targeting that we've seen. The other aspect is you'll see, on the next slide here, we actually saw a bunch of different verticals that we really haven't seen in the top 10 before. In fact, if you actually look at this you'll see the number one, two and three are pretty common for us. We almost always are going to see these kinds of telecommunications, wireless, satellite, broadband, these are always going to be in the top. And the reason for that is because gamers and DDoS attacks associated with gaming is kind of the predominant thing that we see in this landscape. And let's face it, gamers are on broadband operating systems. If you're in Asian communities, often they'll use mobile hotspots. So now you start to have wireless come in there. And so that makes sense seeing them. But what doesn't make sense is this internet publishing and broadcasting and you might say, "Well, what is that?" Well, that's things like Zoom and WebEx and Netflix and these other streaming services. And so we're seeing adversaries going after that because those have become critical to people's way of life. Their entertainment, what they're using to communicate for work and school. So they realized if we can go after this it's going to disrupt something and hopefully we can get some recognition. Maybe we can show this as a demonstration to get more customers on our platform or maybe we can get a payday. In a lot of the DDoS attacks that we see, in fact most of them, are all monetary focused. And so they're looking for a payday. They're going to go after something that's going to likely, you know, send out that payment. And then just walk down the line. You can see COVID through this whole thing. Electronic shopping is number five, right? Everybody turned to e-commerce because we're not going to in-person stores anymore. Electronic computer manufacturing, how many more people have to get computers at home now because they're no longer in a corporate environment? And so you can see how the pandemic has really influenced this industry target. >> Significant influencer and I also wonder too, you know, Zoom became a household name for every generation. You know, we're talking to five generations and maybe the generations that aren't as familiar with computer technology might be even more exploitable because it's easy to click on a phishing email when they don't understand how to look for the link. Let's now unpack the different types of DDoS attacks and what is on the rise. You talked about in the report the triple threat and we often think of that in entertainment. That's a good thing, but again, not here. Explain that triple threat. >> Yeah, so what we're seeing here is we have adversaries out there that are looking to take advantage of every possible angle to be able to get that payment. And everybody knows ransomware is a household name at this point, right? And so ransomware and DDoS have a lot in common because they both attack the availability of network resources, where computers or devices or whatever they might be. And so there's a lot of parallels to draw between the two of these. Now ransomware is a denial of service event, right? You're not going to have tens of thousands of computers hitting a single computer to take it down. You're going to have one exploitation of events. Somebody clicked on a link, there was a brute force attempt that managed to compromise a little boxes, credentials, whatever it might be, ransomware gets put on a system, it encrypts all your files. Well, all of a sudden, you've got this ransom note that says "If you want your files decrypted you're going to send us this amount of human Bitcoin." Well, what adversaries are doing now is they're capitalizing on the access that they already gained. So they already have access to the computer. Well, why not steal all the data first then let's encrypt whatever's there. And so now I can ask for a ransom payment to decrypt the files and I can ask for an extortion to prevent me from posting your data publicly. Maybe there's sensitive corporate information there. Maybe you're a local school system and you have all of your students' data on there. You're a hospital that has sensitive PI on it, whatever it might be, right? So now they're going to extort you to prevent them from posting that publicly. Well, why not add DDoS to this entire picture? Now you're already encrypted, we've already got your files, and I'm going to DDoS your system so you can't even access them if you wanted to. And I'm going to tell you, you have to pay me in order to stop this DDoS attack. And so this is that triple threat and we're seeing multiple different ransomware families. In fact, if you look at one of the slides here, you'll see that there's SunCrypt, there's Ragnar Cryptor, and then Maze did this initially back in September and then more recently, even the DarkSide stuff. I mean, who hasn't heard about DarkSide now with the Colonial Pipeline event, right? So they came out and said, "Hey we didn't intend for this collateral damage but it happened." Well, April 24th, they actually started offering DDoS as part of their tool kits. And so you can see how this has evolved over time. And adversaries are learning from each other and are incorporating this kind of methodology. And here we have triple extortion event. >> It almost seems like triple extortion event as a service with the opportunities, the number of vectors there. And you're right, everyone has heard of the Colonial Pipeline and that's where things like ransomware become a household term, just as much as Zoom and video conferencing and streaming media. Let's talk now about the effects that the threat report saw and uncovered region by region. Were there any regions in particular that were, that really stood out as most impacted? >> So not particularly. So one of the phenomenon that we actually saw in the threat report, which, you know, we probably could have talked about it before now but it makes sense to talk about it regionally because we didn't see any one particular region, one particular vertical, a specific organization, specific country, none was more heavily targeted than another. In fact what we saw is organizations that we've never seen targeted before. We've seen industries that have never been targeted before all of a sudden are now getting DDoS attacks because we went from a local on-prem, I don't need to be connected to the internet, I don't need to have my employees remote access. And now all of a sudden you're dependent on the internet which is really, let's face it, that's critical infrastructure these days. And so now you have all of these additional people with a footprint connected to the internet then adversary can figure out and they can poke it. And so what we saw here is just overall, all industries, all regions saw these upticks. The exception would be in China. We actually, in the Asia Pacific region specifically, but predominantly in China. But that often has to do with visibility rather than a decrease in attacks because they have their own kind of infrastructure in China. Brazil's the same way. They have their own kind of ecosystems. And so often you don't see what happens a lot outside the borders. And so from our perspective, we might see a decrease in attacks but, for all we know, they actually saw an increase in the attacks that is internal to their country against their country. And so across the board, just increases everywhere you look. >> Wow. So let's talk about what organizations can do in light of this. As we are here, we are still doing this program by video conferencing and things are opening up a little bit more, at least in the states anyway, and we're talking about more businesses going back to some degree but there's going to still be some mix, some hybrid of working from home and maybe even distance learning. So what can enterprises do to prepare for this when it happens? Because it sounds to me like with the sophistication, the up and to the right, it's not, if we get attacked, it's when. >> It's when, exactly. And that's just it. I mean, it's no longer something that you can put off. You can't just assume that I've never been DDoS attacked, I'm never going to be DDoS attacked anymore. You really need to consider this as part of your core security platform. I like to talk about defense in depth or a layer defense approach where you want to have a layered approach. So, you know, maybe they target your first layer and they don't get through. Or they do get through and now your second layer has to stop it. Well, if you have no layers or if you have one layer, it's not that hard for an adversary to figure out a way around that. And so preparation is key. Making sure that you have something in place and I'm going to give you an operational example here. One of the things we saw with the LBA campaigns is they actually started doing network of conasense for their targets. And what they would do is they would take the IP addresses belonging to your organization. They would look up the domains associated with that and they would figure out like, "Hey, this is bpn.organization.com or VPN two." And all of a sudden they've found your VPN concentrator and so that's where they're going to focus their attack. So something as simple as changing the way that you name your VPN concentrators might be sufficient to prevent them from hitting that weak link or right sizing the DDoS protection services for your company. Did you need something as big as like OnPrem Solutions? We need hardware. Do you instead want to do a managed service? Or do you want to go and talk to a cloud provider because there's right solutions and right sizes for all types of organizations. And the key here is preparation. In fact, all of the customers that we've worked with for the LBA extortion campaigns, if they were properly prepared they experienced almost no downtime or impact to their business. It's the people like the New Zealand Stock Exchange or their service provider that wasn't prepared to handle the attacks that were sent out them that were crippled. And so preparation is key. The other part is awareness. And that's part of what we do with this threat report because we want to make sure you're aware what adversaries are doing, when new attack vectors are coming out, how they're leveraging these, what industries they're targeting because that's really going to help you to figure out what your posture is, what your risk acceptance is for your organization. And in fact, there's a couple of resources that that we have here on the next slide. And you can go to both both of these. One of them is the threat report. You can view all of the details. And we only scratched the surface here in this Cube interview. So definitely recommend going there but the other one is called Horizon And netscout.com/horizon is a free resource you can register but you can actually see near real-time attacks based on industry and based on region. So if your organization out there and you're figuring, "Well I'm never attacked." Well go look up your industry. Go look up the country where you belong and see is there actually attacks against us? And I think you'll be quite surprised that there's quite a few attacks against you. And so definitely recommend checking these out >> Great resources netscout.com/horizon, netscout.com/threatreport. I do want to ask you one final question. That's in terms of timing. We saw the massive acceleration in digital transformation last year. We've already talked about this a number of times on this program. The dependence that businesses and consumers, like globally in every industry, in every country, have on streaming on communications right now. In terms of timing, though, for an organization to go from being aware to understanding what adversaries are doing, to being prepared, how quickly can an organization get up to speed and help themselves start reducing their risks? >> So I think that with DDoS, as opposed to things like ransomware, the ramp up time for that is much, much faster. There is a finite period of time with DDoS attacks that is actually going to impact you. And so maybe you're a smaller organization and you get DDoS attacked. There's a, probably a pretty high chance that that DDoS attack isn't going to last for multiple days. So maybe it's like an hour, maybe it's two hours, and then you recover. Your network resources are available again. That's not the same for something like ransomware. You get hit with ransomware, unless you pay or you have backups, you have to do the rigorous process of getting all your stuff back online. DDoS is more about as soon as the attack stops, the saturation goes away and you can start to get back online again. So it might not be as like immediate critical that you have to have something but there's also solutions, like a cloud solution, where it's as simple as signing up for the service and having your traffic redirected to their scrubbing center, their detection center. And then you may not have to do anything on-prem yourself, right? It's a matter of going out to an organization, finding a good contract, and then signing up, signing on the dotted line. And so I think that the ramp up time for mitigation services and DDoS protection can be a lot faster than many other security platforms and solutions. >> That's good to know cause with the up and to the right trend that you already said, the first quarter is usually slow. It's obviously not that way as what you've seen in 2021. And we can only expect what way, when we talk to you next year, that the up and to the right trend may continue. So hopefully organizations take advantage of these resources, Richard, that you talked about to be prepared to mediate and protect their you know, their customers, their employees, et cetera. Richard, we thank you for stopping by theCube. Talking to us about the sixth NetScout Threat Intelligence Report. Really interesting information. >> Absolutely; definitely a pleasure to have me here. Lisa, anytime you guys want to do it again, you know where I live? >> Yes. It's one of my favorite topics that you got and I got to point out the last thing, your Guardians of the Galaxy background, one of my favorite movies and it should be noted that on the NetScout website they are considered the Guardians of the Connected World. I just thought that connection was, as Richard told me before we went live, not planned, but I thought that was a great coincidence. Again, Richard, it's been a pleasure talking to you. Thank you for your time. >> Thank you so much. >> Richard Hummel, I'm Lisa Martin. You're watching this Cube conversation. (relaxing music)
SUMMARY :
Excited to talk to you. it's a pleasure to be here. that you saw in particular that that comes to mind because One of the global trends and themes And then you have this normal where and to the right trend? And so any person that wants that really started to see an increase In a lot of the DDoS attacks that we see, and maybe the generations that aren't And so there's a lot of parallels to draw effects that the threat report But that often has to do with visibility but there's going to still be some mix, and I'm going to give you to understanding what that is actually going to impact you. that the up and to the a pleasure to have me here. and I got to point out the last thing, You're watching this Cube conversation.
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
Richard | PERSON | 0.99+ |
Richard Hummel | PERSON | 0.99+ |
Lisa Martin | PERSON | 0.99+ |
two hours | QUANTITY | 0.99+ |
2020 | DATE | 0.99+ |
$10 | QUANTITY | 0.99+ |
China | LOCATION | 0.99+ |
New Zealand Stock Exchange | ORGANIZATION | 0.99+ |
April 24th | DATE | 0.99+ |
New Zealand Stock Exchange | ORGANIZATION | 0.99+ |
20% | QUANTITY | 0.99+ |
September | DATE | 0.99+ |
two | QUANTITY | 0.99+ |
2021 | DATE | 0.99+ |
Lisa | PERSON | 0.99+ |
second layer | QUANTITY | 0.99+ |
last year | DATE | 0.99+ |
mid 2020 | DATE | 0.99+ |
February | DATE | 0.99+ |
NetScout | ORGANIZATION | 0.99+ |
first layer | QUANTITY | 0.99+ |
Guardians of the Galaxy | TITLE | 0.99+ |
January | DATE | 0.99+ |
bpn.organization.com | OTHER | 0.99+ |
next year | DATE | 0.99+ |
one layer | QUANTITY | 0.99+ |
800,000 | QUANTITY | 0.99+ |
last year | DATE | 0.99+ |
12 million attacks | QUANTITY | 0.99+ |
both | QUANTITY | 0.99+ |
Colonial Pipeline | EVENT | 0.99+ |
190,000 individuals | QUANTITY | 0.99+ |
four | QUANTITY | 0.99+ |
an hour | QUANTITY | 0.99+ |
One | QUANTITY | 0.99+ |
netscout.com/horizon | OTHER | 0.99+ |
first articles | QUANTITY | 0.99+ |
Netflix | ORGANIZATION | 0.99+ |
Zoom | ORGANIZATION | 0.99+ |
one | QUANTITY | 0.99+ |
Guardians of the Connected World | TITLE | 0.99+ |
one final question | QUANTITY | 0.99+ |
two parts | QUANTITY | 0.98+ |
2.9 million attacks | QUANTITY | 0.98+ |
over 10 million attacks | QUANTITY | 0.98+ |
Arbor Networks | ORGANIZATION | 0.98+ |
one aspect | QUANTITY | 0.98+ |
pandemic | EVENT | 0.98+ |
2019 | DATE | 0.98+ |
five generations | QUANTITY | 0.97+ |
three | QUANTITY | 0.97+ |
tens of thousands | QUANTITY | 0.97+ |
first | QUANTITY | 0.96+ |
Ragnar Cryptor | PERSON | 0.96+ |
first quarter of 2021 | DATE | 0.96+ |
four quarters | QUANTITY | 0.95+ |
ORGANIZATION | 0.95+ | |
nearly 200,000 folks | QUANTITY | 0.95+ |
Aileen Gemma Smith, Vizalytics Technology Inc | AWS Public Sector Summit 2019
>> Narrator: Live from Washington D.C. it's the Cube covering AWS Public Sector Summit. Brought to you by Amazon Web Services. >> Welcome back everyone to the Cube's live coverage of the AWS Public Sector Summit here in our nation's capital, I'm your host Rebecca Knight. We are joined by Aileen Gemma Smith, the CEO and co-founder of Vizalytics Technology. Thank you so much for coming on the cube. >> Thank you for having me, it's a pleasure to be here. >> Let's start by telling our viewers a little bit about Vizalytics, there's a story there about how you founded it. >> Thank you, the mission of Vizalytics is enabling change with data and we saw tremendous opportunity in open and public available data to say, let's make a difference for communities and the whole reason why we started was in 2012 Hurricane Sandy hit my home town of Staten Island and I saw firsthand digital divide, people need access to information, it's not put together in a format that they can use, but it actually is there, so I said, we've got to do something to make a difference. Our first product was a mobile app for shopkeepers. We had thousands of users throughout New York City and then that led on to out first enterprise client being the City of New York. >> The mobile app for shopkeepers could do what? What did it do? >> It let you know everything that was going on outside and around your business that could make a difference to your bottom line, so imagine all you had to do is business name, business address, I'm going to tell you here's your risk for fines, here's when there's going to be public works, here's when someone's filed for a different permit, et cetera, and shopkeepers loved it because we didn't have to do anything to get that information, you told me exactly what I needed to know and you made it really easy to share. >> And now you are a woman founder, a female founder with a she builds t-shirt on and an AWS Hero medallion. Tell me more about this. >> Absolutely, it is a distinct privilege to be an AWS Community Hero. Community Heroes are evangelists for the community where we're talking about how can we build and create more diverse and inclusive communities. I'm privileged and honored to be the only female hero in the Australia and New Zealand region, so I'm determined to say, how can we support more women, how can we support more underestimated founders and tech developers? We have this whole series called She Builds on AWS. We've got events in Sydney, Melbourne, soon to be in Perth, et cetera and that's how we're doing more for our community and as a Community Hero how can I find more voices who aren't me, give them a platform to say, we need to hear what you're building and what you're doing and how can we all support one another as we want to build on on AWS. >> What is it to be like at event like this, where as you said you're the only female Community Hero here, how often are you getting together, collaborating, learning, and how are best practices emerging and what are those best practices? >> First off I want to mention that we have the first ever developer's lounge here in the main hall which is great because we need to see that here in public sector and having those opportunities to meet and greet and talk with folks, hey, you're working on this as well? Tell me more about what you're doing, let me surface out what kind of solutions you're doing, that's where all of the energy and the excitement happens because then you start to discover, oh, I didn't know. Folks are working on this and this, hey we've got the same problem and especially in public sector where folks so often have the challenge of different siloes. I didn't know what I didn't know, how can we bring them all together, so seeing that here in public sector where we can champion, you've got all of these different folks who are working together, it's just a wonderful opportunity. >> And what are you hearing? The big theme here is about IT modernization in the public sector, the public sector, for better or for worse has a reputation of being a little slow or a little more antiquated, there's certain divisions of the government in particular and educational institutions that are incredibly innovative. >> Absolutely. >> Rebecca: Where do you think things stand right now? >> There's absolutely positive change and I like to celebrate here are the leaders and here are the folks that are doing more, yes, public sector does, for good reasons in some cases take a long time to say, how do we want to change, do we feel safe for this change, et cetera, but then you see pockets of excellence. I'm currently based in Sydney, Australia. Transport for New South Wales is one of our clients and I am honored and excited by all that they're doing where at the executive level you have buy-in and you have support. You have support for saying we need organizational change. You have support for saying, let's do proof of concept, let's do these explorations, let's actually have a startup accelerator hub so we as public sector can interact with startups and early-stage founders or university students to make that kind of a difference. When you see that, that's part of why, okay great, we're in Australia now because there's this energy and action and a willingness to move so that's where I think look to those centers of excellence and say, how can we do that within our organization and what can we do better. >> But not saying that we're not seeing quite that energy in the US or how did you think about the differences? >> Again, it depends district by district. Different municipalities have different challenges, different size, et cetera. When you look at this, for example, in San Francisco where you have the Startup in Residence program, started off small, cohort, five or six companies, great, now how can we scale that program and make it national where they had something like 700 applications for maybe a cohort of 50 or 60 companies that are working. That's where you start to see there's an energy that's flowing through, so I think the opportunity for change comes in that kind of cross collaboration and if you have an event like this where you've got public sector folks from all over the world saying, really interesting, you feel my pain, how can we work together on this, what's your team doing, how can I learn from that, how can I take that back to my teams or where can we think about some of the harder problems of organizational change and what do we do if we don't have that executive champion, how can we start to get there? I think that's the kind of energy and opportunity of all the things we're seeing here at Public Sector Summit. >> But as you said, it's also looking for the rest of us, looking at these centers of excellence, see what they're doing, see how they're experimenting, getting those proofs of concept and then saying, hey, we've got something there, let's see if we can replicate this. >> Absolutely, and within public sector, when you have that opportunity to say, and look at how we're doing this in London, look at how we're doing this in Toronto, look at how we're doing this in Sydney and how we're doing this in Melbourne then you can suddenly go back to New York and say, okay great, we do have these other examples, it is being done so we can use that as a guide for what we wanted to do as we continue to innovate. >> What are some of the most exciting things that you're seeing here, some new public sector initiatives, technology, services that you think are really going to be game changers. >> How much time do we have? (laughing) First off, the energy to we want to collaborate, we want to be more agile, we want to make a difference. The sense that this event has grown from just a small cohort to 1,000, couple of thousand, now I believe there's something like 15,000 attendees. >> 18,000 according to Theresa Carlson. >> Think about the fact that we're all willing to be here together, that's a line in the sand that we need to be able to do more, so it's not about a particular technology per se, but willingness to say, we need to be here, we need to face these problems. We've got this challenge of should we bring these legacy systems over, should we think about how we want to work together in public product partnerships that we can all come together and start to work at this and also think about, we've got Public Sector Summits throughout the world, please join us at Canberra Summit that's going to be going on in late August. We've got Tokyo Summit going on right now, so it's not just all here in D.C., you're starting to see these clusters move out and that's really wonderful and exciting for us. >> It's wonderful and exciting on the one hand and yet this summit is taking place against a backdrop where we're seeing a real backlash against technology. The public sentiment has really soured, regulators and lawmakers are sharpening their blades and saying, hey, maybe we should pay attention more to what these technology companies are doing and just how powerful they've become in all of our daily lives. What's the sentiment that you're hearing on the ground, particularly as the founder yourself. >> I think that's where knowledge can be powerful. Can we empathize with some of the challenges? I hope that all companies choose to act with integrity, not necessarily that they do, but there are a lot of folks saying, we need to be able to do more. From a policy perspective, how can tech companies partner with policymakers who may not understand how all of these technologies work and what they're capable of or not capable of, we need more clarity on that because I think that's where it becomes a black box of conflict and if you can change it to say, this is challenges that you have with facial recognition or sentiment analysis or what have you, let's really think about do the systems today do, what are the guard rails that we need to put in and how can we work as partners with policymakers so it's not just driven by lobbyists but there's actually an understanding of, this is the implication of these systems. >> Here are the unintended consequences. >> Absolutely and if I can come back to New York for a second, New York City has one of the strongest open data logs in the nation. Part of that is because Gale Brewer, the Borough President of Manhattan said we need to formalize this. How do we put this together? She didn't come from a tech background, but she saw a problem that needed to be solved and she said, how do we put this together and how do we get the right folks to the table to think about doing this in a really scalable, meaningful way, so the more that we see those opportunities in that backdrop of tensions and concerns, that's how we move forward, facing those hard questions. It's not Rome was built in a day, it's not. It's going to take us a lot of time and there's a lot of unanswered ethical questions as well that we have to start really thinking deeply about. >> But it starts, as you said, with making the data visible and then getting more voices who-- >> Making it visible and also understanding what's not included in the data. Coming back to when I started my company, there was a lot of, but this isn't being counted and what happens when you're saying, I'm making a bias based on this particular dataset that leaves out this whole community over here. Can we think about what's not included in that data or how the data collection itself or the organization itself is changing things, so that's why, coming back to, you need more female founders, you need more underrepresented populations to have those voices of have you considered this, have you given representation to this particular group, to this population. Without doing that, then you're just reinforcing the same siloes and the same biases and we have an obligation to our community and to one another to change that. >> I know you have a keen interest in diversity issues and, as you're talking about, bringing in more women and more underrepresented minorities to lend their perspective to these very important issues that are shaping our lives. How do we solve this problem? Technology has such a bro culture and we're seeing the problems with that. >> First off, from a founder's point of view, you have to know when not to listen, you have to know when not to let someone shut you down because they'll say-- >> The noise. >> Oh my goodness, the noise of, we've got ageism, we've got sexism, we've got racism, we've got elitism. I went to Brooklyn College, I'm very proud of that fact. I had venture capitalists say, I don't want to invest in you, you're too old and you didn't go to a pedigree school, well guess what, my company's still here, some of the folks you've invested in, they folded a long time ago, so part of it is a willingness to drive forward but it's also building networks of support. Coming back to being the community hero, how can I elevate these voices and say, we need to give them an opportunity to be here, we need to change this, so part of it is we want more seats at the table, but if that table's not going to welcome me, I'm creating a whole 'nother table over here where we can start to have that cluster effect and that's where the dedication, the tenacity and you see things like we power tech, where we're really looking to elevate those voices. That change can't happen unless we keep doing that and unless the folks who are like, but this is how we've always done it, are willing to say, actually, shortcoming here, let's think about changing this and broadening the conversation. >> Is that changing though? >> We were talking a lot about how there's a new generation of workers coming up who do think differently and they do grow up with this stuff and they say, we don't need this red tape, why is this taking so long? They're impatient and maybe a more willingness to listen to other voices, are you seeing a difference? >> Absolutely, I'm seeing a difference for sure. That doesn't mean sexism, ageism, elitism has gone away. It has not, but you're starting to see, again, clusters of excellence and I think if you really want to make change you focus on where that traction is, use that as your foothold to build and scale and then start to be able to do more because that's the only way. We've got some barriers that for other founders I empathize with how insurmountable it can be, but if you've got that dedication, if you refuse to be defined by what someone else says you are or what your company is capable of being and then you find those great partners to say, let's do this together, the whole conversation changes. >> Aileen Gemma Smith those are great words to end on. Thank you so much for coming on the Cube. >> Absolute pleasure, thank you. >> I'm Rebecca Knight, we will have much more of the Cube's live coverage of the AWS Public Sector Summit here in Washington D.C. coming up in just a bit. (techno music)
SUMMARY :
Brought to you by Amazon Web Services. of the AWS Public Sector Summit here in our nation's Vizalytics, there's a story there about how you founded it. and public available data to say, let's make a difference is business name, business address, I'm going to tell you And now you are a woman founder, a female founder to say, how can we support more women, how can we support and having those opportunities to meet and greet And what are you hearing? and you have support. and if you have an event like this where you've got But as you said, it's also looking for the rest of us, that opportunity to say, and look at how we're doing this technology, services that you think are really going First off, the energy to we want to collaborate, to be here, we need to face these problems. and saying, hey, maybe we should pay attention more that we need to put in and how can we work as partners the right folks to the table to think about doing this the same siloes and the same biases and we have I know you have a keen interest in diversity issues to be here, we need to change this, so part of it is and then start to be able to do more Thank you so much for coming on the Cube. live coverage of the AWS Public Sector Summit here
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
Rebecca Knight | PERSON | 0.99+ |
Perth | LOCATION | 0.99+ |
D.C. | LOCATION | 0.99+ |
Australia | LOCATION | 0.99+ |
Amazon Web Services | ORGANIZATION | 0.99+ |
Rebecca | PERSON | 0.99+ |
five | QUANTITY | 0.99+ |
Melbourne | LOCATION | 0.99+ |
Sydney | LOCATION | 0.99+ |
Aileen Gemma Smith | PERSON | 0.99+ |
New York | LOCATION | 0.99+ |
Toronto | LOCATION | 0.99+ |
Theresa Carlson | PERSON | 0.99+ |
London | LOCATION | 0.99+ |
Vizalytics | ORGANIZATION | 0.99+ |
San Francisco | LOCATION | 0.99+ |
Washington D.C. | LOCATION | 0.99+ |
Staten Island | LOCATION | 0.99+ |
AWS | ORGANIZATION | 0.99+ |
New York City | LOCATION | 0.99+ |
Gale Brewer | PERSON | 0.99+ |
50 | QUANTITY | 0.99+ |
60 companies | QUANTITY | 0.99+ |
six companies | QUANTITY | 0.99+ |
Vizalytics Technology Inc | ORGANIZATION | 0.99+ |
1,000 | QUANTITY | 0.99+ |
late August | DATE | 0.99+ |
New Zealand | LOCATION | 0.99+ |
US | LOCATION | 0.99+ |
Sydney, Australia | LOCATION | 0.99+ |
one | QUANTITY | 0.99+ |
700 applications | QUANTITY | 0.99+ |
first product | QUANTITY | 0.99+ |
first | QUANTITY | 0.99+ |
First | QUANTITY | 0.99+ |
thousands of users | QUANTITY | 0.98+ |
AWS Public Sector Summit | EVENT | 0.98+ |
Vizalytics Technology | ORGANIZATION | 0.97+ |
Canberra Summit | EVENT | 0.97+ |
Public Sector Summit | EVENT | 0.96+ |
a day | QUANTITY | 0.96+ |
15,000 attendees | QUANTITY | 0.95+ |
today | DATE | 0.95+ |
Brooklyn College | ORGANIZATION | 0.95+ |
Tokyo Summit | EVENT | 0.95+ |
AWS Public Sector Summit 2019 | EVENT | 0.92+ |
Rome | LOCATION | 0.91+ |
Cube | ORGANIZATION | 0.91+ |
first enterprise | QUANTITY | 0.9+ |
18,000 | QUANTITY | 0.9+ |
Transport for New | ORGANIZATION | 0.89+ |
Sector | EVENT | 0.89+ |
South Wales | LOCATION | 0.85+ |
Hurricane Sandy | EVENT | 0.83+ |
second | QUANTITY | 0.82+ |
Hero | COMMERCIAL_ITEM | 0.81+ |
Borough | PERSON | 0.78+ |
She Builds | TITLE | 0.78+ |
Startup in Residence | OTHER | 0.69+ |
Manhattan | LOCATION | 0.68+ |
couple of thousand | QUANTITY | 0.62+ |
2012 | EVENT | 0.53+ |
President | PERSON | 0.42+ |