Wendi Whitmore, Palo Alto Networks | Palo Alto Networks Ignite22
>>The Cube presents Ignite 22, brought to you by Palo Alto Networks. >>Welcome back to Vegas. Guys. We're happy that you're here. Lisa Martin here covering with Dave Valante, Palo Alto Networks Ignite 22. We're at MGM Grand. This is our first day, Dave of two days of cube coverage. We've been having great conversations with the ecosystem with Palo Alto executives, with partners. One of the things that they have is unit 42. We're gonna be talking with them next about cyber intelligence. And the threat data that they get is >>Incredible. Yeah. They have all the data, they know what's going on, and of course things are changing. The state of play changes. Hold on a second. I got a text here. Oh, my Netflix account was frozen. Should I click on this link? Yeah. What do you think? Have you had a, it's, have you had a little bit more of that this holiday season? Yeah, definitely. >>Unbelievable, right? A lot of smishing going on. >>Yeah, they're very clever. >>Yeah, we're very pleased to welcome back one of our alumni to the queue. Wendy Whitmore is here, the SVP of Unit 42. Welcome back, Wendy. Great to have >>You. Thanks Lisa. So >>Unit 42 created back in 2014. One of the things that I saw that you said in your keynote this morning or today was everything old is still around and it's co, it's way more prolific than ever. What are some of the things that Unit 42 is seeing these days with, with respect to cyber threats as the landscape has changed so much the last two years alone? >>You know, it, it has. So it's really interesting. I've been responding to these breaches for over two decades now, and I can tell you that there are a lot of new and novel techniques. I love that you already highlighted Smishing, right? In the opening gate. Right. Because that is something that a year ago, no one knew what that word was. I mean, we, it's probably gonna be invented this year, right? But that said, so many of the tactics that we have previously seen, when it comes to just general espionage techniques, right? Data act filtration, intellectual property theft, those are going on now more than ever. And you're not hearing about them as much in the news because there are so many other things, right? We're under the landscape of a major war going on between Russia and Ukraine of ransomware attacks, you know, occurring on a weekly basis. And so we keep hearing about those, but ultimately these nations aid actors are using that top cover, if you will, as a great distraction. It's almost like a perfect storm for them to continue conducting so much cyber espionage work that like we may not be feeling that today, but years down the road, they're, the work that they're doing today is gonna have really significant impact. >>Ransomware has become a household word in the last couple of years. I think even my mom knows what it is, to some degree. Yeah. But the threat actors are far more sophisticated than they've ever written. They're very motivated. They're very well funded. I think I've read a stat recently in the last year that there's a ransomware attack once every 11 seconds. And of course we only hear about the big ones. But that is a concern that goes all the way up to the board. >>Yeah. You know, we have a stat in our ransomware threat report that talks about how often victims are posted on leak sites. And I think it's once every seven minutes at this point that a new victim is posted. Meaning a victim has had their data, a victim organization had their data stolen and posted on some leak site in the attempt to be extorted. So that has become so common. One of the shifts that we've seen this year in particular and in recent months, you know, a year ago when I was at Ignite, which was virtual, we talked about quadruple extortion, meaning four different ways that these ransomware actors would go out and try to make money from these attacks in what they're doing now is often going to just one, which is, I don't even wanna bother with encrypting your data now, because that means that in order to get paid, I probably have to decrypt it. Right? That's a lot of work. It's time consuming. It's kind of painstaking. And so what they've really looked to do now is do the extortion where they simply steal the data and then threaten to post it on these leak sites, you know, release it other parts of the web and, and go from there. And so that's really a blending of these techniques of traditional cyber espionage with intellectual property theft. Wow. >>How trustworthy are those guys in terms of, I mean, these are hackers, right? In terms of it's really the, the hacker honor system, isn't it? I mean, if you get compromised like that, you really beholden to criminals. And so, you >>Know, so that's one of the key reasons why having the threat intelligence is so important, right? Understanding which group that you're dealing with and what their likelihood of paying is, what's their modus operandi. It's become even more important now because these groups switch teams more frequently than NFL trades, you know, free agents during the regular season, right? Or players become free agents. And that's because their infrastructure. So the, you know, infrastructure, the servers, the systems that they're using to conduct these attacks from is actually largely being disrupted more from law enforcement, international intelligence agencies working together with public private partnerships. So what they're doing is saying, okay, great. All that infrastructure that I just had now is, is burned, right? It's no longer effective. So then they'll disband a team and then they'll recruit a new team and it's constant like mixing and matching in players. >>All that said, even though that's highly dynamic, one of the other areas that they pride themselves on is customer service. So, and I think it's interesting because, you know, when I said they're not wanting to like do all the decryption? Yeah. Cuz that's like painful techni technical slow work. But on the customer service side, they will create these customer service portals immediately stand one up, say, you know, hey it's, it's like an Amazon, you know, if you've ever had to return a package on Amazon for example, and you need to click through and like explain, you know, Hey, I didn't receive this package. A portal window pops up, you start talking to either a bot or a live agent on the backend. In this case they're hu what appeared to be very much humans who are explaining to you exactly what happened, what they're asking for, super pleasant, getting back within minutes of a response. And they know that in order for them to get paid, they need to have good customer service because otherwise they're not going to, you know, have a business. How, >>So what's the state of play look like from between nation states, criminals and how, how difficult or not so difficult is it for you to identify? Do you have clear signatures? My understanding in with Solar Winds it was a little harder, but maybe help us understand and help our audience understand what the state of play is right now. >>One of the interesting things that I think is occurring, and I highlighted this this morning, is this idea of convergence. And so I'll break it down for one example relates to the type of malware or tools that these attackers use. So traditionally, if we looked at a nation state actor like China or Russia, they were very, very specific and very strategic about the types of victims that they were going to go after when they had zero day. So, you know, new, new malware out there, new vulnerabilities that could be exploited only by them because the rest of the world didn't know about it. They might have one organization that they would target that at, at most, a handful and all very strategic for their objective. They wanted to keep that a secret as long as possible. Now what we're seeing actually is those same attackers going towards one, a much larger supply chain. >>So, so lorenzen is a great example of that. The Hafnia attacks towards Microsoft Exchange server last year. All great examples of that. But what they're also doing is instead of using zero days as much, or you know, because those are expensive to build, they take a lot of time, a lot of funding, a lot of patience and research. What they're doing is using commercially available tools. And so there's a tool that our team identified earlier this year called Brute Rael, C4 or BRC four for short. And that's a tool that we now know that nation state actors are using. But just two weeks ago we invested a ransomware attack where the ransomware actor was using that same piece of tooling. So to your point, yak can get difficult for defenders when you're looking through and saying, well wait, they're all using some of the same tools right now and some of the same approaches when it comes to nation states, that's great for them because they can blend into the noise and it makes it harder to identify as >>Quickly. And, and is that an example of living off the land or is that B BRC four sort of a homegrown hacker tool? Is it, is it a, is it a commercial >>Off the shelf? So it's a tool that was actually, so you can purchase it, I believe it's about 2,500 US dollars for a license. It was actually created by a former Red teamer from a couple well-known companies in the industry who then decided, well hey, I built this tool for work, I'm gonna sell this. Well great for Red teamers that are, you know, legitimately doing good work, but not great now because they're, they built a, a strong tool that has the ability to hide amongst a, a lot of protocols. It can actually hide within Slack and teams to where you can't even see the data is being exfiltrated. And so there's a lot of concern. And then now the reality that it gets into the wrong hands of nation state actors in ransomware actors, one of the really interesting things about that piece of malware is it has a setting where you can change wallpaper. And I don't know if you know offhand, you know what that means, but you know, if that comes to mind, what you would do with it. Well certainly a nation state actor is never gonna do something like that, right? But who likes to do that are ransomware actors who can go in and change the background wallpaper on a desktop that says you've been hacked by XYZ organization and let you know what's going on. So pretty interesting, obviously the developer doing some work there for different parts of the, you know, nefarious community. >>Tremendous amount of sophistication that's gone on the last couple of years alone. I was just reading that Unit 42 is now a founding member of the Cyber Threat Alliance includes now more than 35 organizations. So you guys are getting a very broad picture of today's threat landscape. How can customers actually achieve cyber resilience? Is it achievable and how do you help? >>So I, I think it is achievable. So let me kind of parse out the question, right. So the Cyber Threat Alliance, the J C D C, the Cyber Safety Review Board, which I'm a member of, right? I think one of the really cool things about Palo Alto Networks is just our partnerships. So those are just a handful. We've got partnerships with over 200 organizations. We work closely with the Ukrainian cert, for example, sharing information, incredible information about like what's going on in the war, sharing technical details. We do that with Interpol on a daily basis where, you know, we're sharing information. Just last week the Africa cyber surge operation was announced where millions of nodes were taken down that were part of these larger, you know, system of C2 channels that attackers are using to conduct exploits and attacks throughout the world. So super exciting in that regard and it's something that we're really passionate about at Palo Alto Networks in terms of resilience, a few things, you know, one is visibility, so really having a, an understanding of in a real, as much of real time as possible, right? What's happening. And then it goes into how you, how can we decrease operational impact. So that's everything from network segmentation to wanna add the terms and phrases I like to use a lot is the win is really increasing the time it takes for the attackers to get their work done and decreasing the amount of time it takes for the defenders to get their work done, right? >>Yeah. I I call it increasing the denominator, right? And the ROI equation benefit over or value, right? Equals equals or benefit equals value over cost if you can increase the cost to go go elsewhere, right? Absolutely. And that's the, that's the game. Yeah. You mentioned Ukraine before, what have we learned from Ukraine? I, I remember I was talking to Robert Gates years ago, 2016 I think, and I was asking him, yeah, but don't we have the best cyber technology? Can't we attack? He said, we got the most to lose too. Yeah. And so what have we learned from, from Ukraine? >>Well, I, I think that's part of the key point there, right? Is you know, a great offense essentially can also be for us, you know, deterrent. So in that aspect we have as an, as a company and or excuse me, as a country, as a company as well, but then as partners throughout all parts of the world have really focused on increasing the intelligence sharing and specifically, you know, I mentioned Ukrainian cert. There are so many different agencies and other sorts throughout the world that are doing everything they can to share information to help protect human life there. And so what we've really been concerned with, with is, you know, what cyber warfare elements are going to be used there, not only how does that impact Ukraine, but how does it potentially spread out to other parts of the world critical infrastructure. So you've seen that, you know, I mentioned CS rrb, but cisa, right? >>CISA has done a tremendous job of continuously getting out information and doing everything they can to make sure that we are collaborating at a commercial level. You know, we are sharing information and intelligence more than ever before. So partners like Mania and CrowdStrike, our Intel teams are working together on a daily basis to make sure that we're able to protect not only our clients, but certainly if we've got any information relevant that we can share that as well. And I think if there's any silver lining to an otherwise very awful situation, I think the fact that is has accelerated intelligence sharing is really positive. >>I was gonna ask you about this cause I think, you know, 10 or so years ago, there was a lot of talk about that, but the industry, you know, kind of kept things to themselves, you know, a a actually tried to monetize some of that private data. So that's changing is what I'm hearing from you >>More so than ever more, you know, I've, I mentioned I've been in the field for 20 years. You know, it, it's tough when you have a commercial business that relies on, you know, information to, in order to pay people's salaries, right? I think that has changed quite a lot. We see the benefit of just that continuous sharing. There are, you know, so many more walls broken down between these commercial competitors, but also the work on the public private partnership side has really increased some of those relationships. Made it easier. And you know, I have to give a whole lot of credit and mention sisa, like the fact that during log four J, like they had GitHub repositories, they were using Slack, they were using Twitter. So the government has really started pushing forward with a lot of the newer leadership that's in place to say, Hey, we're gonna use tools and technology that works to share and disseminate information as quickly as we can. Right? That's fantastic. That's helping everybody. >>We knew that every industry, no, nobody's spared of this. But did you notice in the last couple of years, any industries in particular that are more vulnerable? Like I think of healthcare with personal health information or financial services, any industries kind of jump out as being more susceptible than others? >>So I think those two are always gonna be at the forefront, right? Financial services and healthcare. But what's been really top of mind is critical infrastructure, just making sure right? That our water, our power, our fuel, so many other parts of right, the ecosystem that go into making sure that, you know, we're keeping, you know, houses heated during the winter, for example, that people have fresh water. Those are extremely critical. And so that is really a massive area of focus for the industry right now. >>Can I come back to public-private partnerships? My question is relates to regulations because the public policy tends to be behind tech, the technology industry as an understatement. So when you take something like GDPR is the obvious example, but there are many, many others, data sovereignty, you can't move the data. Are are, are, is there tension between your desire as our desire as an industry to share data and government's desire to keep data private and restrict that data sharing? How is that playing out? How do you resolve that? >>Well I think there have been great strides right in each of those areas. So in terms of regulation when it comes to breaches there, you know, has been a tendency in the past to do victim shaming, right? And for organizations to not want to come forward because they're concerned about the monetary funds, right? I think there's been tremendous acceleration. You're seeing that everywhere from the fbi, from cisa, to really working very closely with organizations to, to have a true impact. So one example would be a ransomware attack that occurred. This was for a client of ours within the United States and we had a very close relationship with the FBI at that local field office and made a phone call. This was 7:00 AM Eastern time. And this was an organization that had this breach gone public, would've made worldwide news. There would've been a very big impact because it would've taken a lot of their systems offline. >>Within the 30 minutes that local FBI office was on site said, we just saw this piece of malware last week, we have a decryptor for it from another organization who shared it with us. Here you go. And within 60 minutes, every system was back up and running. Our teams were able to respond and get that disseminated quickly. So efforts like that, I think the government has made a tremendous amount of headway into improving relationships. Is there always gonna be some tension between, you know, competing, you know, organizations? Sure. But I think that we're doing a whole lot to progress it, >>But governments will make exceptions in that case. Especially for something as critical as the example that you just gave and be able to, you know, do a reach around, if you will, on, on onerous regulations that, that ne aren't helpful in that situation, but certainly do a lot of good in terms of protecting privacy. >>Well, and I think there used to be exceptions made typically only for national security elements, right? And now you're seeing that expanding much more so, which I think is also positive. Right. >>Last question for you as we are wrapping up time here. What can organizations really do to stay ahead of the curve when it comes to, to threat actors? We've got internal external threats. What can they really do to just be ahead of that curve? Is that possible? >>Well, it is now, it's not an easy task so I'm not gonna, you know, trivialize it. But I think that one, having relationships with right organizations in advance always a good thing. That's a, everything from certainly a commercial relationships, but also your peers, right? There's all kinds of fantastic industry spec specific information sharing organizations. I think the biggest thing that impacts is having education across your executive team and testing regularly, right? Having a plan in place, testing it. And it's not just the security pieces of it, right? As security responders, we live these attacks every day, but it's making sure that your general counsel and your head of operations and your CEO knows what to do. Your board of directors, do they know what to do when they receive a phone call from Bloomberg, for example? Are they supposed supposed to answer? Do your employees know that those kind of communications in advance and training can be really critical and make or break a difference in an attack. >>That's a great point about the testing but also the communication that it really needs to be company wide. Everyone at every level needs to know how to react. Wendy, it's been so great having, >>Wait one last question. Sure. Do you have a favorite superhero growing up? >>Ooh, it's gotta be Wonder Woman. Yeah, >>Yeah, okay. Yeah, so cuz I'm always curious, there's not a lot of women in, in security in cyber. How'd you get into it? And many cyber pros like wanna save the world? >>Yeah, no, that's a great question. So I joined the Air Force, you know, I, I was a special agent doing computer crime investigations and that was a great job. And I learned about that from, we had an alumni day and all these alumni came in from the university and they were in flight suits and combat gear. And there was one woman who had long blonde flowing hair and a black suit and high heels and she was carrying a gun. What did she do? Because that's what I wanted do. >>Awesome. Love it. We >>Blonde >>Wonder Woman. >>Exactly. Wonder Woman. Wendy, it's been so great having you on the program. We, we will definitely be following unit 42 and all the great stuff that you guys are doing. Keep up the good >>Work. Thanks so much Lisa. Thank >>You. Day our pleasure. For our guest and Dave Valante, I'm Lisa Martin, live in Las Vegas at MGM Grand for Palo Alto Ignite, 22. You're watching the Cube, the leader in live enterprise and emerging tech coverage.
SUMMARY :
The Cube presents Ignite 22, brought to you by Palo Alto One of the things that they have is unit Have you had a, it's, have you had a little bit more of that this holiday season? A lot of smishing going on. Wendy Whitmore is here, the SVP One of the things that I saw that you said in your keynote this morning or I love that you already highlighted Smishing, And of course we only hear about the big ones. the data and then threaten to post it on these leak sites, you know, I mean, if you get compromised like that, you really So the, you know, infrastructure, the servers, the systems that they're using to conduct these attacks from immediately stand one up, say, you know, hey it's, it's like an Amazon, you know, if you've ever had to return a or not so difficult is it for you to identify? One of the interesting things that I think is occurring, and I highlighted this this morning, days as much, or you know, because those are expensive to build, And, and is that an example of living off the land or is that B BRC four sort of a homegrown for Red teamers that are, you know, legitimately doing good work, but not great So you guys are getting a very broad picture of today's threat landscape. at Palo Alto Networks in terms of resilience, a few things, you know, can increase the cost to go go elsewhere, right? And so what we've really been concerned with, with is, you know, And I think if there's any silver lining to an otherwise very awful situation, I was gonna ask you about this cause I think, you know, 10 or so years ago, there was a lot of talk about that, but the industry, And you know, I have to give a whole lot of credit and mention sisa, like the fact that during log four But did you notice in the last couple of years, making sure that, you know, we're keeping, you know, houses heated during the winter, is the obvious example, but there are many, many others, data sovereignty, you can't move the data. of regulation when it comes to breaches there, you know, has been a tendency in the past to Is there always gonna be some tension between, you know, competing, you know, Especially for something as critical as the example that you just And now you're seeing that expanding much more so, which I think is also positive. Last question for you as we are wrapping up time here. Well, it is now, it's not an easy task so I'm not gonna, you know, That's a great point about the testing but also the communication that it really needs to be company wide. Wait one last question. Yeah, How'd you get into it? So I joined the Air Force, you know, I, I was a special agent doing computer We Wendy, it's been so great having you on the program. For our guest and Dave Valante, I'm Lisa Martin, live in Las Vegas at MGM
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
Dave Valante | PERSON | 0.99+ |
Lisa Martin | PERSON | 0.99+ |
Wendy | PERSON | 0.99+ |
2014 | DATE | 0.99+ |
FBI | ORGANIZATION | 0.99+ |
Lisa | PERSON | 0.99+ |
Interpol | ORGANIZATION | 0.99+ |
Palo Alto Networks | ORGANIZATION | 0.99+ |
Dave | PERSON | 0.99+ |
Cyber Threat Alliance | ORGANIZATION | 0.99+ |
Bloomberg | ORGANIZATION | 0.99+ |
two days | QUANTITY | 0.99+ |
Cyber Safety Review Board | ORGANIZATION | 0.99+ |
Wendi Whitmore | PERSON | 0.99+ |
Las Vegas | LOCATION | 0.99+ |
last year | DATE | 0.99+ |
Wendy Whitmore | PERSON | 0.99+ |
20 years | QUANTITY | 0.99+ |
Amazon | ORGANIZATION | 0.99+ |
Palo Alto Networks | ORGANIZATION | 0.99+ |
last week | DATE | 0.99+ |
United States | LOCATION | 0.99+ |
two | QUANTITY | 0.99+ |
J C D C | ORGANIZATION | 0.99+ |
Palo Alto | ORGANIZATION | 0.99+ |
one woman | QUANTITY | 0.99+ |
CISA | ORGANIZATION | 0.99+ |
today | DATE | 0.99+ |
Netflix | ORGANIZATION | 0.99+ |
first day | QUANTITY | 0.99+ |
CrowdStrike | ORGANIZATION | 0.99+ |
Robert Gates | PERSON | 0.99+ |
a year ago | DATE | 0.99+ |
30 minutes | QUANTITY | 0.99+ |
XYZ | ORGANIZATION | 0.99+ |
Vegas | LOCATION | 0.99+ |
zero days | QUANTITY | 0.99+ |
over 200 organizations | QUANTITY | 0.99+ |
Unit 42 | ORGANIZATION | 0.99+ |
more than 35 organizations | QUANTITY | 0.99+ |
Mania | ORGANIZATION | 0.99+ |
GitHub | ORGANIZATION | 0.99+ |
Ignite | ORGANIZATION | 0.98+ |
this year | DATE | 0.98+ |
two weeks ago | DATE | 0.98+ |
one | QUANTITY | 0.98+ |
Microsoft | ORGANIZATION | 0.98+ |
one example | QUANTITY | 0.98+ |
each | QUANTITY | 0.98+ |
GDPR | TITLE | 0.98+ |
millions | QUANTITY | 0.98+ |
zero day | QUANTITY | 0.97+ |
2016 | DATE | 0.97+ |
MGM Grand | LOCATION | 0.97+ |
One | QUANTITY | 0.97+ |
Ukraine | LOCATION | 0.96+ |
one last question | QUANTITY | 0.96+ |
earlier this year | DATE | 0.95+ |
60 minutes | QUANTITY | 0.95+ |
Ukrainian | OTHER | 0.95+ |
unit 42 | OTHER | 0.95+ |
one organization | QUANTITY | 0.94+ |
fbi | ORGANIZATION | 0.93+ |
Intel | ORGANIZATION | 0.92+ |
Russia | ORGANIZATION | 0.92+ |
years ago | DATE | 0.92+ |
about 2,500 US dollars | QUANTITY | 0.92+ |
once every 11 seconds | QUANTITY | 0.9+ |
10 or so years ago | DATE | 0.9+ |
this morning | DATE | 0.89+ |
Derek Manky, Fortinet | CUBEconversation
>>Welcome to this cube conversation with 40 net. I'm your host. Lisa Martin, Derek Minky is back. He's the chief security insights and global threat alliances at 40 minutes, 40 guard labs, Derek. Welcome back to the program. >>Likewise, we've talked a lot this year. And of course, when I saw that there are, uh, you guys have predictions from 40 guard labs, global threat intelligence and research team about the cyber threat landscape for 2022. I thought it was going to be a lot to talk about with Derek here. So let's go ahead and dig. Right in. First of all, one of the things that caught my attention was the title of the press release about the predictions that was just revealed. The press release says 40 guard labs, predict cyber attacks aimed at everything from crypto wallets to satellite internet, nothing. There is no surface that is safe anymore. Talk to me about some of the key challenges that organizations in every industry are facing. >>Yeah, absolutely. So this is a, as you said, you, you had the keyword there surface, right? That, and that attack surface is, is open for attack. That's the attack surface that we talk about it is literally be pushed out from the edge to space, like a lot of these places that had no connection before, particularly in OT environments off grid, we're talking about, uh, you know, um, uh, critical infrastructure, oil and gas, as an example, there's a lot of these remote units that were living out there that relied on field engineers to go in and, uh, you know, plug into them. They were air gapped, those such low. Those are the things that are going to be accessible by Elio's low earth orbit satellites. And there are 4,000 of those out there right now. There's going to be over 30,000. We're talking Starlink, we're talking at least four or five other competitors entering this space, no pun intended. And, um, and that's a big deal because that it's a gateway. It opens the door for cyber criminals to be able to have accessibility to these networks. And so security has to come, you know, from, uh, friends of mine there, right. >>It absolutely does. We've got this fragmented perimeter tools that are siloed, the expand and very expanded attack surface, as you just mentioned, but some of the other targets, the 5g enabled edge, the core network, of course, the home environment where many of us still are. >>Yeah, yeah, definitely. So that home environment like the edge, it is a, uh, it's, it's the smart edge, right? So we have things called edge access Trojans. These are Trojans that will actually impact and infect edge devices. And if you think about these edge devices, we're talking things that have machine learning and, and auto automation built into them a lot of privilege because they're actually processing commands and acting on those commands in a lot of cases, right? Everything from smart office, smart home option, even until the OT environment that we're talking about. And that is a juicy target for attackers, right? Because these devices naturally have more privileged. They have APIs and connectivity to a lot of these things where they could definitely do some serious damage and be used as these pivot within the network from the edge. Right. And that's, that's a key point there. >>Let's talk about the digital wallet that we all walk around with. You know, we think out so easy, we can do quick, simple transactions with apple wallet, Google smart tab, Venmo, what have you, but that's another growing source of that, where we need to be concerned, right? >>Yeah. So I, I I've, I've worn my cyber security hat for over 20 years and 10 years ago, even we were talking all about online banking Trojans. That was a big threat, right? Because a lot of financial institutions, they hadn't late ruled out things like multifactor authentication. It was fairly easy to get someone's bank credentials go in siphoned fans out of an account. That's a lot harder nowadays. And so cyber criminals are shifting tactics to go after the low hanging fruit, which are these digital wallets and often cryptocurrency, right? We've actually seen this already in 40 guard labs. Some of this is already starting to happen right now. I expect this to happen a lot more in 20, 22 and beyond. And it's because, you know, these wallets are, um, hold a lot of whole lot of value right now, right. With the crypto. And they can be transferred easily without having to do a, like a, you know, EFT is a Meijer transfers and all those sorts of things that includes actually a lot of paperwork from the financial institutions. And, you know, we saw something where they were actually hijacking these wallets, right. Just intercepting a copy and paste command because it takes, you know, it's a 54 character address people aren't typing that in all the time. So when they're sending or receiving funds, they're asking what we've actually seen in malware today is they're taking that, intercepting it and replacing it with the attackers. Well, it's simple as that bypassing all the, you know, authentication measures and so forth. >>And is that happening for the rest of us that don't have a crypto wallet. So is that happening for folks with apple wallets? And is that a growing threat concern that people need to be? It is >>Absolutely. Yeah. So crypto wallets is, is the majority of overseeing, but yeah, no, no digital wallet is it's unpatched here. Absolutely. These are all valid targets and we are starting to see activity in. I am, >>I'm sure going after those stored credentials, that's probably low-hanging fruit for the attackers. Another thing that was interesting that the 2022 predictions threat landscape, uh, highlighted was the e-sports industry and the vulnerabilities there. Talk to me about that. That was something that I found surprising. I didn't realize it was a billion dollar revenue, a year industry, a lot of money, >>A lot of money, a lot of money. And these are our full-blown platforms that have been developed. This is a business, this isn't, you know, again, going back to what we've seen and we still do see the online gaming itself. We've seen Trojans written for that. And oftentimes it's just trying to get into, and user's gaming account so that they can steal virtual equipment and current, you know, there there's virtual currencies as well. So there was some monetization happening, but not on a grand scale. This is about a shift attackers going after a business, just like any organization, big business, right. To be able to hold that hostage effectively in terms of DDoSs threats, in terms of vulnerabilities, in terms of also, you know, crippling these systems with ransomware, like we've already seen starting to hit OT, this is just another big target. Right. Um, and if you think about it, these are live platforms that rely on low latency. So very quick connections, anything that interrupts that think about the Olympics, right on sports environment, it's a big deal to them. And there's a lot of revenue that could be lost in cybercriminals fully realizes. And this is why, you know, we're predicting that e-sports is going to be a, um, a big target for them moving forward. >>Got it. And tell, let's talk about what's going on with brands. So when you and I spoke a few months ago, I think it was ransomware was up nearly 11 X in the first half of a calendar year, 2021. What are you seeing from an evolution perspective, uh, in the actual ransomware, um, actions themselves as well as what the, what the cyber criminals are evolving to. >>Yeah. So to where it's aggressive, destructive, not good words, right. But, but this is what we're seeing with ransomware. Now, again, they're not just going after data as the currency, we're seeing, um, destructive capabilities put into ransomware, including wiper malware. So this used to be just in the realm of, uh, APTT nation state attacks. We saw that with should moon. We saw that with dark soil back in 2013, so destructive threats, but in the world of apt and nation state, now we're seeing this in cyber crime. We're seeing it with ransomware and this, I expect to be a full-blown tactic for cyber criminals simply because they have the, the threat, right. They've already leveraged a lot of extortion and double extortion schemes. We've talked about that. Now they're going to be onboarding this as a new threat, basically planting these time bombs. He's ticking time bombs, holding systems for, for, for ransom saying, and probably crippling a couple of, to show that they mean business and saying, unless you pay us within a day or two, we're going to take all of these systems offline. We're not just going to take them offline. We're going to destroy them, right. That's a big incentive for people to, to, to pay up. So they're really playing on that fear element. That's what I mean about aggressive, right? They're going to be really shifting tactics, >>Aggressive and destructive, or two things you don't want in a cybersecurity environment or to be called by your employer. Just wanted to point that out. Talk to me about wiper malware. Is this new emerging, or is this something that's seeing a resurgence because this came up at the Olympics in the summer, right? >>Absolutely. So a resurgence in, in a sort of different way. Right. So, as I said, we have seen it before, but it's been not too prevalent. It's been very, uh, it's, it's been a niche area for them, right. It's specifically for these very highly targeted attack. So yes, the Olympics, in fact, two times at the Olympics in Tokyo, but also in the last summer Olympics as well. We also saw it with, as I mentioned in South Korea at dark school in 2013, we saw it an OT environment with the moon as an example, but we're talking handfuls here. Uh, unfortunately we have blogged about three of these in the last month to month and a half. Right. And that, and you know, this is starting to be married with ransomware, which is particularly a very dangerous cause it's not just my wiper malware, but couple that with the ransom tactics. >>And that's what we're starting to see is this new, this resurgent. Yes. But a completely new form that's taking place. Uh, even to the point I think in the future that it could, it could severely a great, now what we're seeing is it's not too critical in a sense that it's not completely destroying the system. You can recover the system still we're talking to master boot records, those sorts of things, but in the future, I think they're going to be going after the formal firmware themselves, essentially turning some of these devices into paperweights and that's going to be a very big problem. >>Wow. That's a very scary thought that getting to the firmware and turning those devices into paperweights. One of the things also that the report talked about that that was really interesting. Was that more attacks against the supply chain and Linux, particularly talk to us about that. What did you find there? What does it mean? What's the threat for organizations? >>Yeah. So we're seeing a diversification in terms of the platforms that cyber criminals are going after. Again, it's that attack surface, um, lower hanging fruit in a sense, uh, because they've, you know, for a fully patched versions of windows, 10 windows 11, it's harder, right. For cyber criminals than it was five or 10 years ago to get into those systems. If we look at the, uh, just the prevalence, the amount of devices that are out there in IOT and OT environments, these are running on Linux, a lot of different flavors and forms of Linux, therefore this different security holes that come up with that. And that's, that's a big patch management issue as an example too. And so this is what we, you know, we've already seen it with them or I bought net and this was in our threat landscape report, or I was the number one threat that we saw. And that's a Linux-based bot net. Now, uh, Microsoft has rolled out something called WSL, which is a windows subsystem for Linux and windows 10 and windows 11, meaning that windows supports Linux now. So that all the code that's being written for botnets, for malware, all that stuff is able to run on, on new windows platforms effectively. So this is how they're trying to expand their, uh, attack surface. And, um, that ultimately gets into the supply chain because again, a lot of these devices in manufacturing and operational technology environments rely quite heavily actually on Linux. >>Well, and with all the supply chain issues that we've been facing during the pandemic, how can organizations protect themselves against this? >>Yeah. So this, this is a big thing, right? And we talked about also the weaponization of artificial intelligence, automation and all of these, there's a lot going on as you know, right from the threats a lot to get visibility on a lot, to be able to act quickly on that's a big key metric. There is how quick you can detect these and respond to them for that. You need good threat intelligence, of course, but you also truly need to enable, uh, uh, automation, things like SD wan, a mesh architecture as well, or having a security fabric that can actually integrate devices that talk to each other and can detect these threats and respond to them quickly. That's a very important piece because if you don't stop these attacks well, they're in that movement through the attack chain. So the kill chain concept we talk about, um, the risk is very high nowadays where, you know, everything we just talked about from a ransomware and destructive capabilities. So having those approaches is very important. Also having, um, you know, education and a workforce trained up is, is equally as important to, to be, you know, um, uh, to, to be aware of these threats. >>I'm glad you brought up that education piece and the training, and that's something that 49 is very dedicated to doing, but also brings up the cybersecurity skills gap. I know when I talked with Kenzie, uh, just a couple months ago at the, um, PGA tournament, it was talking about, you know, big investments in what 40 guard, 40, 40 net is doing to help reduce that gap. But the gap is still there. How do I teach teams not get overloaded with the expanding service? It seems like the surface, the surface has just, there is no limit anymore. So how does, how does it teams that are lean and small help themselves in the fact that the threat is landscape is, is expanding. The criminals are getting smarter or using AI intelligent automation, what our it teams do >>Like fire with fire. You got to use two of the same tools that they're using on their side, and you need to be able to use in your toolkit. We're talking about a security operation center perspective to have tools like, again, this comes to the threat intelligence to get visibility on these things. We're talking Simmons, sor uh, we have, you know, 40 AI out now, uh, deception products, all these sorts of things. These are all tools that need that, that, uh, can help, um, those people. So you don't have to have a, you know, uh, hire 40 or 50 people in your sock, right? It's more about how you can work together with the tools and technology to get, have escalation paths to do more people, process procedure, as we talk about to be able to educate and train on those, to be able to have incident response planning. >>So what do you do like, because inevitably you're going to be targeted, probably interacts where attack, what do you do? Um, playing out those scenarios, doing breach and attack simulation, all of those things that comes down to the skills gaps. So it's a lot about that education and awareness, not having to do that. The stuff that can be handled by automation and AI and, and training is you're absolutely right. We've dedicated a lot with our NSC program at 49. We also have our 40 net security academy. Uh, you know, we're integrating with those secondary so we can have the skillsets ready, uh, for, for new graduates. As an example, there's a lot of progress being made towards that. We've even created a new powered by 40 guard labs. There is a 40 guard labs play in our NSC seven as an example, it's, uh, you know, for, um, uh, threat hunting and offensive security as an example, understanding really how attackers are launching their, their campaigns and, um, all those things come together. But that's the good news actually, is that we've come a long way. We actually did our first machine learning and AI models over 10 years ago, Lisa, this isn't something new to us. So the technology has gone a long way. It's just a matter of how we can collaborate and obviously integrate with that for the, on the skills gap. >>And one more question on the actual threat landscape, were there any industries that came up in particular, as we talked about e-sports we talked about OT and any industries that came up in particular as, as really big hotspots that companies and organizations really need to be aware of. >>Yeah. So also, uh, this is part of OT about ICS critical infrastructure. That's a big one. Uh, absolutely there we're seeing, uh, also cyber-criminals offering more crime services now on dark web. So CAS, which is crime as a service, because it used to be a, again, a very specialized area that maybe only a handful of organized criminal organizations could actually, um, you know, launch attacks and, and impact to those targets where they're going after those targets. Now they're offering services right on to other coming cyber criminals, to be able to try to monetize that as well. Again, we're seeing this, we actually call it advanced persistent cybercrime APC instead of an apt, because they're trying to take cyber crime to these targets like ICS, critical infrastructure, um, healthcare as well is another one, again, usually in the realm of APMT, but now being targeted more by cybercriminals in ransomware, >>I've heard of ransomware as a service, is that a subcategory of crime as a service? >>Absolutely. Yeah. It is phishing as a service ransomware as, and service DDoSs as a service, but not as, as many of these subcategories, but a ransomware as a service. That's a, another big problem as well, because this is an affiliate model, right. Where they hire partners and pay them commission, uh, if they actually get payments of ransom, right? So they have literally a middle layer in this network that they're pushing out to scale their attacks, >>You know, and I think that's the last time we talked about ransomware, we talked about it's a matter of, and I talk to customers all the time who say, yes, it's a matter of when, not, if, is, is this the same sentiment? And you think for crime as a service in general, the attacks on e-sports on home networks, on, uh, internet satellites in space, is this just a matter of when, not if across the board? >>Well, yeah, absolutely. Um, you know, but the good news is it doesn't have to be a, you know, when it happens, it doesn't have to be a catastrophic situation. Again, that's the whole point about preparedness and planning and all the things I talked about, the filling the skills gap in education and having the proper, proper tools in place that will mitigate that risk. Right. And that's, and that's perfectly acceptable. And that's the way we should handle this from the industry, because we process we've talked about this, people are over a hundred billion threats a day in 40 guard labs. The volume is just going to continue to grow. It's very noisy out there. And there's a lot of automated threats, a lot of attempts knocking on organizations, doors, and networks, and, you know, um, phishing emails being sent out and all that. So it's something that we just need to be prepared for just like you do for a natural disaster planning and all these sorts of other things in the physical world. >>That's a good point. It doesn't have to be aggressive and destructive, but last question for you, how can, how is 4d guard helping companies in every industry get aggressive and disruptive against the threats? >>Yeah. Great, great, great question. So this is something I'm very passionate about, uh, as you know, uh, where, you know, we, we don't stop just with customer protection. Of course, that is as a security vendor, that's our, our primary and foremost objective is to protect and mitigate risk to the customers. That's how we're doing. You know, this is why we have 24 7, 365 operations at 40 guy labs. Then we're helping to find the latest and greatest on threat intelligence and hunting, but we don't stop there. We're actually working in the industry. Um, so I mentioned this before the cyber threat Alliance to, to collaborate and share intelligence on threats all the way down to disrupt cybercrime. This is what big target of ours is, how we can work together to disrupt cyber crime. Because unfortunately they've made a lot of money, a lot of profits, and we need to reduce that. We need to send a message back and fight that aggressiveness and we're we're on it, right? So we're working with Interpol or project gateway with the world economic forum, the partnership against cyber crime. It's a lot of initiatives with other, uh, you know, uh, the, uh, the who's who of cyber security in the industry to work together and tackle this collaboratively. Um, the good news is there's been some steps of success to that. There's a lot more, we're doing the scale of the efforts. >>Excellent. Well, Derek as always great and very informative conversation with you. I always look forward to these seeing what's going on with the threat landscape, the challenges, the increasing challenges, but also the good news, the opportunities in it, and what 40 guard is doing 40 left 40 net, excuse me, I can't speak today to help customers address that. And we always appreciate your insights and your time we look forward to talking to you and unveiling the next predictions in 2022. >>All right. Sounds good. Thanks, Lisa. >>My pleasure for Derek manky. I'm Lisa Martin. You're watching this cube conversation with 40 net. Thanks for watching.
SUMMARY :
Welcome to this cube conversation with 40 net. First of all, one of the things that caught my attention was the title of the press And so security has to come, you know, from, uh, friends of mine there, right. the expand and very expanded attack surface, as you just mentioned, but some of the other targets, So that home environment like the edge, it is a, Let's talk about the digital wallet that we all walk around with. Well, it's simple as that bypassing all the, you know, authentication measures and so forth. And is that a growing threat concern that people need to be? and we are starting to see activity in. Talk to me about that. And this is why, you know, we're predicting that e-sports is going to be a, So when you and I spoke a few months ago, and probably crippling a couple of, to show that they mean business and saying, unless you pay us within a day or Aggressive and destructive, or two things you don't want in a cybersecurity environment or to be called by your employer. And that, and you know, this is starting to be married with ransomware, but in the future, I think they're going to be going after the formal firmware themselves, essentially turning some of these devices into paperweights the supply chain and Linux, particularly talk to us about that. And so this is what we, you know, we've already seen it with them or I bought net and this was in our threat landscape report, automation and all of these, there's a lot going on as you know, right from the threats a lot to get visibility you know, big investments in what 40 guard, 40, 40 net is doing to help We're talking Simmons, sor uh, we have, you know, 40 AI out now, uh, as an example, it's, uh, you know, for, um, uh, threat hunting and offensive security as an example, as really big hotspots that companies and organizations really need to be aware organizations could actually, um, you know, launch attacks and, and impact to those targets where they're going So they have literally a middle layer in this network that they're pushing out to scale a lot of attempts knocking on organizations, doors, and networks, and, you know, It doesn't have to be aggressive and destructive, but last question for you, how can, uh, you know, uh, the, uh, the who's who of cyber security in the industry to work together and tackle I always look forward to these seeing All right. You're watching this cube conversation with 40 net.
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
Lisa Martin | PERSON | 0.99+ |
Derek | PERSON | 0.99+ |
Derek Minky | PERSON | 0.99+ |
40 | QUANTITY | 0.99+ |
Derek Manky | PERSON | 0.99+ |
two | QUANTITY | 0.99+ |
2013 | DATE | 0.99+ |
2022 | DATE | 0.99+ |
Microsoft | ORGANIZATION | 0.99+ |
Olympics | EVENT | 0.99+ |
Lisa | PERSON | 0.99+ |
windows 10 | TITLE | 0.99+ |
54 character | QUANTITY | 0.99+ |
4,000 | QUANTITY | 0.99+ |
windows 11 | TITLE | 0.99+ |
50 people | QUANTITY | 0.99+ |
South Korea | LOCATION | 0.99+ |
40 guard labs | QUANTITY | 0.99+ |
two times | QUANTITY | 0.99+ |
Interpol | ORGANIZATION | 0.99+ |
Starlink | ORGANIZATION | 0.99+ |
One | QUANTITY | 0.99+ |
Derek manky | PERSON | 0.99+ |
40 minutes | QUANTITY | 0.99+ |
Kenzie | PERSON | 0.99+ |
today | DATE | 0.99+ |
Linux | TITLE | 0.99+ |
Simmons | PERSON | 0.99+ |
windows | TITLE | 0.98+ |
2021 | DATE | 0.98+ |
over 30,000 | QUANTITY | 0.98+ |
this year | DATE | 0.98+ |
ORGANIZATION | 0.98+ | |
20 | QUANTITY | 0.97+ |
Tokyo | LOCATION | 0.97+ |
First | QUANTITY | 0.97+ |
apple | ORGANIZATION | 0.97+ |
WSL | TITLE | 0.96+ |
over a hundred billion threats a day | QUANTITY | 0.96+ |
one | QUANTITY | 0.96+ |
40 net | QUANTITY | 0.96+ |
a day | QUANTITY | 0.96+ |
22 | QUANTITY | 0.95+ |
a year | QUANTITY | 0.95+ |
10 windows 11 | TITLE | 0.95+ |
five | DATE | 0.94+ |
Fortinet | ORGANIZATION | 0.94+ |
40 net | ORGANIZATION | 0.94+ |
first half | QUANTITY | 0.94+ |
billion dollar | QUANTITY | 0.93+ |
4d guard | ORGANIZATION | 0.92+ |
pandemic | EVENT | 0.92+ |
40 AI | QUANTITY | 0.91+ |
seven | QUANTITY | 0.9+ |
10 years ago | DATE | 0.9+ |
Venmo | ORGANIZATION | 0.89+ |
two things | QUANTITY | 0.89+ |
last summer | DATE | 0.89+ |
last month | DATE | 0.88+ |
40 guard labs | QUANTITY | 0.87+ |
few months ago | DATE | 0.87+ |
a half | QUANTITY | 0.87+ |
five other competitors | QUANTITY | 0.86+ |
one more question | QUANTITY | 0.86+ |
couple months ago | DATE | 0.86+ |
24 7, 365 operations | QUANTITY | 0.85+ |
nearly 11 X | QUANTITY | 0.8+ |
40 guy labs | QUANTITY | 0.8+ |
first machine | QUANTITY | 0.78+ |
Derek Manky, Fortinet | CUBEConversation
>> Welcome to this Cube Conversation, I'm Lisa Martin. I'm joined by Derek Manky next, the Chief Security Insights and Global Threat Alliances at Fortiguard Labs. Derek, welcome back to the program. >> Hey, it's great to be here again. A lot of stuff's happened since we last talked. >> So Derek, one of the things that was really surprising from this year's Global Threat Landscape Report is a 10, more than 10x increase in ransomware. What's going on? What have you guys seen? >> Yeah so this is massive. We're talking over a thousand percent over a 10x increase. This has been building Lisa, So this has been building since December of 2020. Up until then we saw relatively low high watermark with ransomware. It had taken a hiatus really because cyber criminals were going after COVID-19 lawyers and doing some other things at the time. But we did see a seven fold increase in December, 2020. That has absolutely continued this year into a momentum up until today, it continues to build, never subsided. Now it's built to this monster, you know, almost 11 times increase from, from what we saw back last December. And the reason, what's fueling this is a new verticals that cyber criminals are targeting. We've seen the usual suspects like telecommunication, government in position one and two. But new verticals that have risen up into this third and fourth position following are MSSP, and this is on the heels of the Kaseya attack of course, that happened in 2021, as well as operational technology. There's actually four segments, there's transportation, automotive, manufacturing, and then of course, energy and utility, all subsequent to each other. So there's a huge focus now on, OT and MSSP for cyber criminals. >> One of the things that we saw last year this time, was that attackers had shifted their focus away from enterprise infrastructure devices, to home networks and consumer grade products. And now it looks like they're focusing on both. Are you seeing that? >> Yes, absolutely. In two ways, so first of all, again, this is a kill chain that we talk about. They have to get a foothold into the infrastructure, and then they can load things like ransomware on there. They can little things like information stealers as an example. The way they do that is through botnets. And what we reported in this in the first half of 2021 is that Mirai, which is about a two to three-year old botnet now is number one by far, it was the most prevalent botnet we've seen. Of course, the thing about Mirai is that it's an IOT based botnet. So it sits on devices, sitting inside consumer networks as an example, or home networks, right. And that can be a big problem. So that's the targets that cyber criminals are using. The other thing that we saw that was interesting was that one in four organizations detected malvertising. And so what that means Lisa, is that cyber criminals are shifting their tactics from going just from cloud-based or centralized email phishing campaigns to web born threats, right. So they're infecting sites, waterhole attacks, where, you know, people will go to read their daily updates as an example of things that they do as part of their habits. They're getting sent links to these sites that when they go to it, it's actually installing those botnets onto those systems, so they can get a foothold. We've also seen scare tactics, right. So they're doing new social engineering lures, pretending to be human resource departments. IT staff and personnel, as an example, with popups through the web browser that look like these people to fill out different forms and ultimately get infected on home devices. >> Well, the home device use is proliferate. It continues because we are still in this work from home, work from anywhere environment. Is that, you think a big factor in this increase from 7x to nearly 11x? >> It is a factor, absolutely. Yeah, like I said, it's also, it's a hybrid of sorts. So a lot of that activity is going to the MSSP angle, like I said to the OT. And to those new verticals, which by the way, are actually even larger than traditional targets in the past, like finance and banking, is actually lower than that as an example. So yeah, we are seeing a shift to that. And like I said, that's, further backed up from what we're seeing on with the, the botnet activity specifically with Mirai too. >> Are you seeing anything in terms of the ferocity, we know that the volume is increasing, are they becoming more ferocious, these attacks? >> Yeah, there is a lot of aggression out there, certainly from, from cyber criminals. And I would say that the velocity is increasing, but the amount, if you look at the cyber criminal ecosystem, the stakeholders, right, that is increasing, it's not just one or two campaigns that we're seeing. Again, we're seeing, this has been a record cases year, almost every week we've seen one or two significant, cyber security events that are happening. That is a dramatic shift compared to last year or even, two years ago too. And this is because, because the cyber criminals are getting deeper pockets now. They're becoming more well-funded and they have business partners, affiliates that they're hiring, each one of those has their own methodology, and they're getting paid big. We're talking up to 70 to 80% commission, just if they actually successfully, infect someone that pays for the ransom as an example. And so that's really, what's driving this too. It's a combination of this kind of perfect storm as we call it, right. You have this growing attack surface, work from home environments and footholds into those networks, but you have a whole bunch of other people now on the bad side that are orchestrating this and executing the attacks too. >> So what can organizations do to start- to slow down or limit the impacts of this growing ransomware as a service? >> Yeah, great question. Everybody has their role in this, I say, right? So if we look at, from a strategic point of view, we have to disrupt cyber crime, how do we do that? It starts with the kill chain. It starts with trying to build resilient networks. So things like ZTA and a zero trust network access, SD-WAN as an example for protecting that WAN infrastructure. 'Cause that's where the threats are floating to, right. That's how they get the initial footholds. So anything we can do on the preventative side, making networks more resilient, also education and training is really key. Things like multi-factor authentication are all key to this because if you build that preventatively and it's a relatively small investment upfront Lisa, compared to the collateral damage that can happen with these ransomware paths, the risk is very high. That goes a long way, it also forces the attackers to- it slows down their velocity, it forces them to go back to the drawing board and come up with a new strategy. So that is a very important piece, but there's also things that we're doing in the industry. There's some good news here, too, that we can talk about because there's things that we can actually do apart from that to really fight cyber crime, to try to take the cyber criminals offline too. >> All right, hit me with the good news Derek. >> Yeah, so a couple of things, right. If we look at the botnet activity, there's a couple of interesting things in there. Yes, we are seeing Mirai rise to the top right now, but we've seen big problems of the past that have gone away or come back, not as prolific as before. So two specific examples, EMOTET, that was one of the most prolific botnets that was out there for the past two to three years, there is a take-down that happened in January of this year. It's still on our radar but immediately after that takedown, it literally dropped to half of the activity it had before. And it's been consistently staying at that low watermark now at that half percentage since then, six months later. So that's very good news showing that the actual coordinated efforts that were getting involved with law enforcement, with our partners and so forth, to take down these are actually hitting their supply chain where it hurts, right. So that's good news part one. Trickbot was another example, this is also a notorious botnet, takedown attempt in Q4 of 2020. It went offline for about six months in our landscape report, we actually show that it came back online in about June this year. But again, it came back weaker and now the form is not nearly as prolific as before. So we are hitting them where it hurts, that's that's the really good news. And we're able to do that through new, what I call high resolution intelligence that we're looking at too. >> Talk to me about that high resolution intelligence, what do you mean by that? >> Yeah, so this is cutting edge stuff really, gets me excited, keeps me up at night in a good way. 'Cause we we're looking at this under the microscope, right. It's not just talking about the what, we know there's problems out there, we know there's ransomware, we know there's a botnets, all these things, and that's good to know, and we have to know that, but we're able to actually zoom in on this now and look at- So we, for the first time in the threat landscape report, we've published TTPs, the techniques, tactics, procedures. So it's not just talking about the what, it's talking about the how, how are they doing this? What's their preferred method of getting into systems? How are they trying to move from system to system? And exactly how are they doing that? What's the technique? And so we've highlighted that, it's using the MITRE attack framework TTP, but this is real time data. And it's very interesting, so we're clearly seeing a very heavy focus from cyber criminals and attackers to get around security controls, to do defense innovation, to do privilege escalation on systems. So in other words, trying to be common administrator so they can take full control of the system. As an example, lateral movement, there's still a preferred over 75%, 77 I believe percent of activity we observed from malware was still trying to move from system to system, by infecting removable media like thumb drives. And so it's interesting, right. It's a brand new look on these, a fresh look, but it's this high resolution, is allowing us to get a clear image, so that when we come to providing strategic guides and solutions in defense, and also even working on these takedown efforts, allows us to be much more effective. >> So one of the things that you said in the beginning was we talked about the increase in ransomware from last year to this year. You said, I don't think that we've hit that ceiling yet, but are we at an inflection point? Data showing that we're at an inflection point here with being able to get ahead of this? >> Yeah, I would like to believe so, there is still a lot of work to be done unfortunately. If we look at, there's a recent report put out by the Department of Justice in the US saying that, the chance of a criminal to be committing a crime, to be caught in the US is somewhere between 55 to 60%, the same chance for a cyber criminal lies less than 1%, well 0.5%. And that's the bad news, the good news is we are making progress in sending messages back and seeing results. But I think there's a long road ahead. So, there's a lot of work to be done, We're heading in the right direction. But like I said, they say, it's not just about that. It's, everyone has their role in this, all the way down to organizations and end users. If they're doing their part of making their networks more resilient through this, through all of the, increasing their security stack and strategy. That is also really going to stop the- really ultimately the profiteering that wave, 'cause that continues to build too. So it's a multi-stakeholder effort and I believe we are getting there, but I continue to still, I continue to expect the ransomware wave to build in the meantime. >> On the end-user front, that's always one of the vectors that we talk about, it's people, right? There's so much sophistication in these attacks that even security folks and experts are nearly fooled by them. What are some of the things that you're saying that governments are taking action on some recent announcements from the White House, but other organizations like Interpol, the World Economic Forum, Cyber Crime Unit, what are some of the things that governments are doing that you're seeing that as really advantageous here for the good guys? >> Yeah, so absolutely. This is all about collaboration. Governments are really focused on public, private sector collaboration. So we've seen this across the board with Fortiguard Labs, we're on the forefront with this, and it's really exciting to see that, it's great. There's always been a lot of will to work together, but we're starting to see action now, right? Interpol is a great example, they recently this year, held a high level forum on ransomware. I actually spoke and was part of that forum as well too. And the takeaways from that event were that we, this was a message to the world, that public, private sector we need. They actually called ransomware a pandemic, which is what I've referred to it as before in itself as well too. Because it is becoming that much of a problem and that we need to work together to be able to create action, action against this, measure success, become more strategic. The World Economic Forum were leading a project called the Partnership Against Cyber Crime Threat Map Project. And this is to identify, not just all this stuff we talked about in the threat landscape report, but also looking at, things like, how many different ransomware gangs are there out there. What do the money laundering networks look like? It's that side of the supply chain to map out, so that we can work together to actually take down those efforts. But it really is about this collaborative action that's happening and it's innovation and there's R&D behind this as well, that's coming to the table to be able to make it impactful. >> So it sounds to me like ransomware is no longer a- for any organization in any industry you were talking about the expansion of verticals. It's no longer a, "If this happens to us," but a matter of when and how do we actually prepare to remediate, prevent any damage? >> Yeah, absolutely, how do we prepare? The other thing is that there's a lot of, with just the nature of cyber, there's a lot of connectivity, there's a lot of different, it's not just always siloed attacks, right. We saw that with Colonial obviously, this year where you have attacks on IT, that can affect consumers, right down to consumers, right. And so for that very reason, everybody's infected in this. it truly is a pandemic I believe on its own. But the good news is, there's a lot of smart people on the good side and that's what gets me excited. Like I said, we're working with a lot of these initiatives. And like I said, some of those examples I called up before, we're actually starting to see measurable progress against this as well. >> That's good, well never a dull day I'm sure in your world. Any thing that you think when we talk about this again, in a few more months of the second half of 2021, anything you predict crystal ball wise that we're going to see? >> Yeah, I think that we're going to continue to see more of the, I mean, ransomware, absolutely, more of the targeted attacks. That's been a shift this year that we've seen, right. So instead of just trying to infect everybody for ransom, as an example, going after some of these new, high profile targets, I think we're going to continue to see that happening from the ransomware side and because of that, the average costs of these data breaches, I think they're going to continue to increase, it already did in 2021 as an example, if we look at the cost of a data breach report, it's gone up to about $5 million US on average, I think that's going to continue to increase as well too. And then the other thing too is, I think that we're going to start to see more, more action on the good side like we talked about. There was already a record amount of takedowns that have happened, five takedowns that happened in January. There were arrests made to these business partners, that was also new. So I'm expecting to see a lot more of that coming out towards the end of the year too. >> So as the challenges persist, so do the good things that are coming out of this. Where can folks go to get this first half 2021 Global Threat Landscape? What's the URL that they can go to? >> Yeah, you can check it out, all of our updates and blogs including the threat landscape reports on blog.fortinet.com under our threat research category. >> Excellent, I read that blog, it's fantastic. Derek, always a pleasure to talk to you. Thanks for breaking this down for us, showing what's going on. Both the challenging things, as well as the good news. I look forward to our next conversation. >> Absolutely, it was great chatting with you again, Lisa. Thanks. >> Likewise for Derek Manky, I'm Lisa Martin. You're watching this Cube Conversation. (exciting music)
SUMMARY :
Welcome to this Cube Hey, it's great to be here again. So Derek, one of the things Now it's built to this monster, you know, One of the things that So that's the targets that Well, the home device So a lot of that activity but the amount, if you look at that we can talk about because with the good news Derek. of the activity it had before. So it's not just talking about the what, So one of the things that 'cause that continues to build too. What are some of the things And this is to identify, So it sounds to me like And so for that very reason, that we're going to see? more of the targeted attacks. so do the good things that including the threat landscape I look forward to our next conversation. chatting with you again, Lisa. Likewise for Derek
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
Derek | PERSON | 0.99+ |
Lisa Martin | PERSON | 0.99+ |
January | DATE | 0.99+ |
Interpol | ORGANIZATION | 0.99+ |
Fortiguard Labs | ORGANIZATION | 0.99+ |
Derek Manky | PERSON | 0.99+ |
Derek Manky | PERSON | 0.99+ |
2021 | DATE | 0.99+ |
December, 2020 | DATE | 0.99+ |
one | QUANTITY | 0.99+ |
last year | DATE | 0.99+ |
10 | QUANTITY | 0.99+ |
December of 2020 | DATE | 0.99+ |
White House | ORGANIZATION | 0.99+ |
Lisa | PERSON | 0.99+ |
0.5% | QUANTITY | 0.99+ |
blog.fortinet.com | OTHER | 0.99+ |
Department of Justice | ORGANIZATION | 0.99+ |
77 | QUANTITY | 0.99+ |
US | LOCATION | 0.99+ |
World Economic Forum | ORGANIZATION | 0.99+ |
third | QUANTITY | 0.99+ |
two | QUANTITY | 0.99+ |
7x | QUANTITY | 0.99+ |
this year | DATE | 0.99+ |
five takedowns | QUANTITY | 0.99+ |
Both | QUANTITY | 0.99+ |
both | QUANTITY | 0.99+ |
less than 1% | QUANTITY | 0.99+ |
first time | QUANTITY | 0.99+ |
today | DATE | 0.99+ |
two ways | QUANTITY | 0.98+ |
two years ago | DATE | 0.98+ |
six months later | DATE | 0.98+ |
about $5 million | QUANTITY | 0.98+ |
two specific examples | QUANTITY | 0.98+ |
Global Threat Alliances | ORGANIZATION | 0.98+ |
last December | DATE | 0.98+ |
COVID-19 | OTHER | 0.98+ |
Cyber Crime Unit | ORGANIZATION | 0.98+ |
Global Threat Landscape Report | TITLE | 0.98+ |
60% | QUANTITY | 0.97+ |
over 75% | QUANTITY | 0.97+ |
fourth position | QUANTITY | 0.97+ |
four segments | QUANTITY | 0.97+ |
January of this year | DATE | 0.97+ |
One | QUANTITY | 0.97+ |
two campaigns | QUANTITY | 0.96+ |
four organizations | QUANTITY | 0.96+ |
second half of 2021 | DATE | 0.95+ |
this year | DATE | 0.95+ |
55 | QUANTITY | 0.95+ |
over a thousand percent | QUANTITY | 0.94+ |
EMOTET | ORGANIZATION | 0.94+ |
each one | QUANTITY | 0.93+ |
Colonial | ORGANIZATION | 0.93+ |
three-year old | QUANTITY | 0.92+ |
first | QUANTITY | 0.91+ |
half percentage | QUANTITY | 0.91+ |
about six months | QUANTITY | 0.9+ |
June this year | DATE | 0.89+ |
three years | QUANTITY | 0.88+ |
almost 11 times | QUANTITY | 0.87+ |
up to 70 | QUANTITY | 0.85+ |
more than 10x increase | QUANTITY | 0.83+ |
first half of 2021 | DATE | 0.83+ |
seven fold increase | QUANTITY | 0.82+ |
pandemic | EVENT | 0.82+ |
Global Threat Landscape | TITLE | 0.81+ |
position one | QUANTITY | 0.8+ |
Mirai | ORGANIZATION | 0.79+ |
Fortinet | ORGANIZATION | 0.79+ |
80% commission | QUANTITY | 0.78+ |
Derek Manky, Fortinet | CUBEConversation
>>Welcome to this cube conversation. I'm Lisa Martin. I'm joined by Derek manky next, the chief security insights and global threat alliances at 40 guard labs. Derek. Welcome back. >>Yeah, it's great to be here again. So then, uh, uh, a lot of stuff's happened since we last talked. >>One of the things that was really surprising from this year's global threat landscape report is a 10 more than 10 X increase in ransomware. What's going on? What have you guys seen? >>Yeah, so, uh, th th this is, is massive. We're talking about a thousand percent over a 10, a 10 X increase. This has been building police. So this, this has been building since, uh, December of 2020 up until then we saw relatively low, uh, high watermark with ransomware. Um, it had taken a hiatus really because cyber criminals were going after COVID-19 lawyers and doing some other things at the time, but we did see us a seven fold increase in December, 2020. That is absolutely continued. Uh, continued this year into a momentum up until today. It continues to build never subsided. Now it's built to this monster, you know, almost 11 times increase from, from what we saw back last December and what the, uh, the reason what's fueling. This is a new verticals that cyber criminals are targeting. We've seen the usual suspects like telecommunication government and, uh, position one and two, but new verticals that have risen up into this, uh, third and fourth position following our MSSP. And this is on the heels of the Casia attack. Of course, that happened in 2021, as well as operational technology. There's actually four segments, there's transportation, uh, automotive manufacturing, and then of course, energy and utility all subsequent to each other. So there's a huge focus now on, on OTA and MSSP for cybercriminals. >>One of the things that we saw last year, this time was that attackers had shifted their focus away from enterprise infrastructure devices, to home networks and consumer grade products. And now it looks like they're focusing on both. Are you seeing that? >>Yes, absolutely. I in two ways. So first of all, again, this is a kill chain that we talk about. They have to get a foothold into the infrastructure, and then they can load things like ransomware on there. They can little things like information Steelers as an example, the way they do that is through botnets. And, uh, what we reported in this, um, in the first half of 2021 is that Mariah, which is about a two to three-year old button that now is, is number one by far, it was the most prevalent bond that we've seen. Of course, the thing about Mariah is that it's an IOT based bot net. So it sits on devices, uh, sitting inside a consumer networks as an example, or home networks, right? And that, that can be a big problem. So that's the targets that cyber criminals are using. The other thing that we saw that was interesting was that one in four organizations detected malvertising. >>And so what that means at least, is that cyber criminals are shifting their tactics from going just from cloud-based or centralized email phishing campaigns to a web born threats, right? So they're infecting sites, waterhole attacks, where people would go to read their, their, their daily updates as an example of things that they do as part of their habits. Um, they're getting sent links to these sites that when they go to it, it's actually installing those botnets onto those systems. So they can get a foothold. We've also seen scare tactics, right? So they're doing new social engineering Lewis pretending to be human resource departments, uh, you know, uh, uh, it staff and personnel, as an example, with pop-ups through the web browser that looked like these people to fill out different forms and ultimately get infected on, on a home devices. >>Well, the home device we use is proliferate. It continues because we are still in this work from home work, from anywhere environment. Is that when you think a big factor in this increased from seven X to nearly 11 X, >>It is a factor. Absolutely. Yeah. Like I said, it's, it's also, it's a hybrid of sorts. So, so a lot of that activity is going to the MSSP, uh, angle, like I said, uh, to, to the OT. And so to those verticals, which by the way, are actually even larger than traditional targets in the past, like, uh, finance and banking is actually lower than that as an example. So yeah, we are seeing a shift to that. And like I said, that's, that's further, uh, backed up from what we're seeing on with the, the, the, the botnet activity specifically with Veronica too. Are >>You seeing anything in terms of the ferocity? We know that the volume is increasing. Are they becoming more ferocious? These attacks? >>Yeah. Yeah. There, there is. There's a lot of aggression out there, certainly from, from criminals. And I would say that the velocity is increasing, but the amount of, if you look at the cyber criminal ecosystem, the, the stakeholders, right. Um, that is increasing, it's not just one or two campaigns that we're seeing. Again, we're seeing, this has been a record cases here almost every week. We've seen one or two significant, you know, cyber security events that are happening. That is a dramatic shift compared to, to, to last year or even, you know, two years ago too. And this is because, um, because the cyber criminals are getting deeper pockets now, they're, they're becoming more well-funded and they have business partners, affiliates that they're hiring each one of those has their own methodology, and they're getting paid big. We're talking up to 70 to 80% commission, just if they actually successfully, you know, in fact, someone that pays for the ransom as an example. And so that's really, what's driving this too. It's, it's, it's a combination of this kind of perfect storm as we call it. Right. You have this growing attack surface and work from home, uh, environments, um, and footholds into those networks. But you have a whole bunch of other people now on the bad side that are orchestrating this and executing the attacks too. >>What can organizations do to start to slow down or limit the impacts of this growing ransomware as a service? >>Yeah, great question. Um, everybody has their role in this, I say, right? So, uh, if we look at, from a strategic point of view, we have to disrupt cyber crime. How do we do that? Um, it starts with the kill chain. It starts with trying to build resilient networks. So things like a ZTE and a zero trust network access, a SD LAN as an example, as an example for producting that land infrastructure on, because that's where the threats are floating to, right? That's how they get the initial footholds. So anything we can do on the, on the, you know, preventative, preventative side, making, uh, networks more resilient, um, also education and training is really key. Things like multi-factor authentication are all key to this because if you build that, uh, uh, preventatively and that's a relatively small investment upfront, Lisa compared to the collateral damage that can happen with these ransomware, it passes, the risk is very high. Um, that goes a long way. It also forces the attackers to it slows down their velocity. It forces them to go back to the drawing board and come up with a new strategy. So that is a very important piece, but there's also things that we're doing in the industry. There's some good news here too, uh, that we can talk about because there's, there's things that we can actually do. Um, apart from that to, to really fight cyber crime, to try to take the cyber criminal cell phone. >>All right. Hit me with the good news Derek. >>Yeah. So, so a couple of things, right. If we look at the bot net activity, there's a couple of interesting things in there. Yes, we are seeing Mariah rise to the top right now, but we've seen big problems of the past that have gone away or come back, not as prolific as before. So two specific examples, a motel that was one of the most prolific botnets that was out there for the past two to three years, there is a take-down that happened in January of this year. Uh, it's still on our radar, but immediately after that takedown, it literally dropped to half of the activity. It hadn't before. And it's been consistently staying at that low watermark now had that half percentage since, since that six months later. So that's very good news showing that the actual coordinated efforts that we're getting involved with law enforcement, with our partners and so forth to take down, these are actually hitting their supply chain where it hurts. >>Right. So that's good news part one trick. Bob was another example. This is also a notorious spot net take down attempt in Q4 of 2020. It went offline for about six months. Um, in our landscape report, we actually show that it came back online, uh, in about June this year. But again, it came down, it came back weaker and another form is not nearly as prolific as before. So we are hitting them where it hurts. That's, that's the really good news. And we're able to do that through new, um, what I call high resolution intelligence. >>Talk to me about that high resolution intelligence. What do you mean by that? >>Yeah, so this is cutting edge stuff really gets me excited and keeps, keeps me up at night in a good way. Uh, cause we're, we're looking at this under the microscope, right? It's not just talking about the why we know there's problems out there. We know there's, there's ransomware. We know there's the botnets, all these things, and that's good to know, and we have to know that, but we're able to actually zoom in on this now and look at it. So we, for the first time in the threat landscape report, we've published TTPs, the techniques, tactics procedures. So it's not just talking about the, what it's talking about, the how, how are they doing this? What's their preferred method of getting into systems? How are they trying to move from system to system and exactly how are they doing that? What's the technique. And so we've highlighted that it's using the MITRE attack framework TTP, but this is real-time data. >>And it's very interesting. So we're clearly seeing a very heavy focus from cyber criminals and attackers to get around security controls, to do defensive, Asian, to do privilege escalation on systems. So in other words, trying to be common administrator so they can take full control of the system. Uh, as an example, a lateral movement on there's still a preferred over 75%, 77, I believe percent of activity we observed from malware was still trying to move from system to system by infecting removable media like thumb drives. And so it's interesting, right? It's a brand new look on the, these a fresh look, but it's this high resolution is allowing us to get a clear image so that when we come to providing strategic guidance and solutions of defense, and also even working on these, take down that Fritz, it allows us to be much more effective. So >>One of the things that you said in the beginning was we talked about the increase in ransomware from last year to this year. You said, I don't think that we've hit that, that ceiling yet, but are we at an inflection points, the data showing that we're at an inflection point here with being able to get ahead of this? >>Yeah, I, I, I would like to believe so. Um, it, there is still a lot of work to be done. Unfortunately, if we look at, you know, there is a, a recent report put out by the department of justice in the S saying that, you know, the chance of, uh, criminal, uh, to be committing a crime, but to be caught in the U S is somewhere between 55 to 60%, the same chance for a cyber criminal lies less than 1% above 0.5%. And that's the bad news. The good news is we are making progress and sending messages back and seeing results. But I think there's a long road ahead. So, um, you know, there there's a lot of work to be done. We're heading in the right direction. But like I said, they say, it's not just about that. It's everyone has, has their role in this all the way down to organizations and end users. If they're doing their part and making their networks more resilient through this, through all the, you know, increasing their security stack and strategy, um, that is also really going to stop the, you know, really ultimately the profiteering, uh, that, that wave, you know, cause that continues to build too. So it's, it's a multi-stakeholder effort and I believe we are, we are getting there, but I continue to still, uh, you know, I continue to expect the ransomware wave to build. In the meantime, >>On the end user front, that's always one of the vectors that we talk about it's people, right? It's there's so there's so much sophistication in these attacks that even security folks and experts are nearly fooled by them. What are some of the things that you're saying that governments are taking action on some recent announcements from the white house, but other organizations like Interpol, the world, economic forum, cyber crime unit, what are some of the things that governments are doing that you're seeing that as really advantageous here for the good guys? >>Yeah, so absolutely. This is all about collaboration. Governments are really focused on public private sector collaboration. Um, so we've seen this across the board, uh, with 40 guard labs, we're on the forefront with this, and it's really exciting to see that it's great. Uh, there, there, there's always been a lot of will work together, but we're starting to see action now. Right. Um, Interpol is a great example. They recently this year held a high level forum on ransomware. I was actually spoken was part of that forum as well too. And the takeaways from that event were that we, this was a message to the world, that public private sector we need. They actually called ransomware a pandemic, which is what I've referred to it as before in itself as well too, because it is becoming that much of a problem and that we need to work together to be able to create action, action action against this measure, success become more strategic. >>The world economic forum, uh, were, were, uh, leading a project called the partnership against cyber crime threat map project. And this is to identify not just all this stuff we talked about in the threat landscape report, but also looking at, um, you know, things like how many different ransomware gangs are there out there. Uh, what are their money laundering networks look like? It's that side of the side of the supply chains of apple so that we can work together to actually take down those efforts. But it really is about this collaborative action that's happening and it's, um, innovation and there's R and D behind this as well. That's coming to the table to be able to make, you know, make it impactful. >>So it sounds to me like ransomware is no longer a for any organization in any, any industry you were talking about the expansion of verticals, it's no longer a, if this happens to us, but a matter of when and how do we actually prepare to remediate prevent any damage? Yeah, >>Absolutely. How do we prepare? The other thing is that there's a lot of, um, you know, with just the nature of, of, of cyber, there's a lot of, uh, connectivity. There's a lot of different, uh, it's not just always siloed attacks. Right? We saw that with colonial obviously this year where you have the talks on, on it that can affect consumers right now to consumers. Right. And so for that very reason, um, everybody's infected in this, uh, it, it truly is a pandemic, I believe on its own. Uh, but the good news is there's a lot of smart people, uh, on the good side and, you know, that's what gets me excited. Like I said, we're working with a lot of these initiatives and like I said, some of those examples I called up before, we're actually starting to see measurable progress against this as well. >>That's good. Well, never adult day, I'm sure. In your world, any thing that you think when we talk about this again, in a few more months of the second half of 2021, anything that, that you predict crystal ball wise that we're going to see? >>Yeah. I think that we're going to continue to see more of the, I mean, ransomware, absolutely. More of the targeted attacks. That's been a shift this year that we've seen. Right. So instead of just trying to infect everybody for ransom, but as an example of going after some of these new, um, you know, high profile targets, I think we're going to continue to see that happening from there. Add some more side on, on, and because of that, the average costs of these data breaches, I think they're going to continue to increase. Um, they had already did, uh, in, uh, 20, uh, 2021, as an example, if we look at the cost of the data breach report, it's gone up to about $5 million us on average, I think that's going to continue to increase as well too. And then the other thing too, is I think that we're going to start to see more, um, more, more action on the good side. Like we talked about, there was already a record amount of take downs that have happened five take downs that happened in January. Um, there were, uh, arrests made to these business partners that was also new. So I'm expecting to see a lot more of that coming out, uh, uh, towards the end of the year, too. >>So as the challenges persist, so do the good things that are coming out of this. They're working folks go to get this first half 2021 global threat landscape. What's the URL that they can go to. >>Yeah, you can check it all, all of our updates and blogs, including the threat landscape reports on blog about 40 nine.com under our threat research category. >>Excellent. I read that blog. It's fantastic. Derek, always a pleasure to talk to you. Thanks for breaking this down for us showing what's going on. Both the challenging things, as well as the good news. I look forward to our next conversation. >>Absolutely. It's great. Chatting with you again, Lisa. Thanks. >>Likewise for Derek manky. I'm Lisa Martin. You're watching this cube conversation.
SUMMARY :
the chief security insights and global threat alliances at 40 guard labs. So then, uh, uh, a lot of stuff's happened since we last talked. One of the things that was really surprising from this year's global threat landscape report is a 10 uh, December of 2020 up until then we saw relatively low, One of the things that we saw last year, this time was that attackers had shifted their focus away from enterprise So first of all, again, this is a kill chain that we talk about. So they're doing new social engineering Lewis pretending to be human resource departments, uh, Well, the home device we use is proliferate. So, so a lot of that activity is going to the MSSP, uh, angle, like I said, We know that the volume is increasing. It's, it's, it's a combination of this kind of perfect storm as we call it. It also forces the attackers to it slows Hit me with the good news Derek. Uh, it's still on our radar, but immediately after that takedown, it literally dropped to half of the activity. So we are hitting them where it hurts. What do you mean by that? It's not just talking about the why we know there's It's a brand new look on the, these a fresh look, but it's this high One of the things that you said in the beginning was we talked about the increase in ransomware from last year to this year. of justice in the S saying that, you know, the chance of, uh, criminal, uh, to be committing On the end user front, that's always one of the vectors that we talk about it's people, right? because it is becoming that much of a problem and that we need to work together to be able to create action, And this is to identify not just all this stuff we talked about in the threat landscape uh, on the good side and, you know, that's what gets me excited. anything that, that you predict crystal ball wise that we're going to see? So I'm expecting to see a lot more of that coming out, uh, uh, So as the challenges persist, so do the good things that are coming out of this. Yeah, you can check it all, all of our updates and blogs, including the threat landscape reports on blog about 40 nine.com under Both the challenging things, as well as the good news. Chatting with you again, Lisa. I'm Lisa Martin.
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
Lisa Martin | PERSON | 0.99+ |
Derek | PERSON | 0.99+ |
December, 2020 | DATE | 0.99+ |
January | DATE | 0.99+ |
December of 2020 | DATE | 0.99+ |
Interpol | ORGANIZATION | 0.99+ |
2021 | DATE | 0.99+ |
Lisa | PERSON | 0.99+ |
one | QUANTITY | 0.99+ |
77 | QUANTITY | 0.99+ |
Derek Manky | PERSON | 0.99+ |
apple | ORGANIZATION | 0.99+ |
last year | DATE | 0.99+ |
third | QUANTITY | 0.99+ |
two specific examples | QUANTITY | 0.99+ |
two | QUANTITY | 0.99+ |
Derek manky | PERSON | 0.99+ |
about $5 million | QUANTITY | 0.99+ |
less than 1% | QUANTITY | 0.99+ |
40 guard labs | QUANTITY | 0.99+ |
today | DATE | 0.99+ |
both | QUANTITY | 0.99+ |
Bob | PERSON | 0.98+ |
COVID-19 | OTHER | 0.98+ |
two years ago | DATE | 0.98+ |
fourth position | QUANTITY | 0.98+ |
six months later | DATE | 0.98+ |
seven fold | QUANTITY | 0.98+ |
Both | QUANTITY | 0.98+ |
this year | DATE | 0.98+ |
Veronica | PERSON | 0.98+ |
last December | DATE | 0.98+ |
first time | QUANTITY | 0.98+ |
two ways | QUANTITY | 0.98+ |
four organizations | QUANTITY | 0.97+ |
10 X | QUANTITY | 0.97+ |
U S | LOCATION | 0.97+ |
January of this year | DATE | 0.97+ |
Casia | ORGANIZATION | 0.97+ |
over 75% | QUANTITY | 0.97+ |
Mariah | PERSON | 0.97+ |
One | QUANTITY | 0.96+ |
60% | QUANTITY | 0.96+ |
two campaigns | QUANTITY | 0.96+ |
10 more than 10 X | QUANTITY | 0.95+ |
seven X | QUANTITY | 0.95+ |
June this year | DATE | 0.95+ |
Mariah | TITLE | 0.94+ |
Lewis | PERSON | 0.94+ |
55 | QUANTITY | 0.93+ |
half percentage | QUANTITY | 0.93+ |
three-year old | QUANTITY | 0.93+ |
second half of 2021 | DATE | 0.93+ |
2020 | DATE | 0.93+ |
pandemic | EVENT | 0.92+ |
each one | QUANTITY | 0.91+ |
first | QUANTITY | 0.9+ |
zero | QUANTITY | 0.9+ |
Q4 | DATE | 0.9+ |
Fortinet | PERSON | 0.88+ |
Steelers | ORGANIZATION | 0.88+ |
20 | DATE | 0.86+ |
five take downs | QUANTITY | 0.86+ |
up to 70 | QUANTITY | 0.86+ |
almost 11 times | QUANTITY | 0.85+ |
end | DATE | 0.84+ |
about six months | QUANTITY | 0.83+ |
first half of | DATE | 0.83+ |
four segments | QUANTITY | 0.83+ |
first half 2021 | DATE | 0.83+ |
80% commission | QUANTITY | 0.83+ |
ZTE | ORGANIZATION | 0.81+ |
about a thousand percent | QUANTITY | 0.76+ |
Asian | OTHER | 0.76+ |
11 X | QUANTITY | 0.73+ |
three years | QUANTITY | 0.72+ |
Derek Manky Chief, Security Insights & Global Threat Alliances at Fortinet's FortiGuard Labs
>>As we've been reporting, the pandemic has called CSOs to really shift their spending priorities towards securing remote workers. Almost overnight. Zero trust has gone from buzzword to mandate. What's more as we wrote in our recent cybersecurity breaking analysis, not only Maseca pro secured increasingly distributed workforce, but now they have to be wary of software updates in the digital supply chain, including the very patches designed to protect them against cyber attacks. Hello everyone. And welcome to this Q conversation. My name is Dave Vellante and I'm pleased to welcome Derek manky. Who's chief security insights, and global threat alliances for four guard labs with fresh data from its global threat landscape report. Derek. Welcome. Great to see you. >>Thanks so much for, for the invitation to speak. It's always a pleasure. Multicover yeah, >>You're welcome. So first I wonder if you could explain for the audience, what is for guard labs and what's its relationship to fortunate? >>Right. So 40 grand labs is, is our global sockets, our global threat intelligence operation center. It never sleeps, and this is the beat. Um, you know, it's, it's been here since inception at port in it. So it's it's 20, 21 years in the making, since Fortinet was founded, uh, we have built this in-house, uh, so we don't go yum technology. We built everything from the ground up, including creating our own training programs for our, our analysts. We're following malware, following exploits. We even have a unique program that I created back in 2006 to ethical hacking program. And it's a zero-day research. So we try to meet the hackers, the bad guys to their game. And we of course do that responsibly to work with vendors, to close schools and create virtual patches. Um, and, but, you know, so it's, it's everything from, uh, customer protection first and foremost, to following, uh, the threat landscape and cyber. It's very important to understand who they are, what they're doing, who they're, uh, what they're targeting, what tools are they using? >>Yeah, that's great. Some serious DNA and skills in that group. And it's, it's critical because like you said, you can, you can minimize the spread of those malware very, very quickly. So what, what now you have, uh, the global threat landscape report. We're going to talk about that, but what exactly is that? >>Right? So this a global threat landscape report, it's a summary of, uh, all, all the data that we collect over a period of time. So we released this, that biannually two times a year. Um, cyber crime is changing very fast, as you can imagine. So, uh, while we do release security blogs, and, uh, what we call threat signals for breaking security events, we have a lot of other vehicles to release threat intelligence, but this threat landscape report is truly global. It looks at all of our global data. So we have over 5 million censorship worldwide in 40 guard labs, we're processing. I know it seems like a very large amount, but North of a hundred billion, uh, threat events in just one day. And we have to take the task of taking all of that data and put that onto scale for half a year and compile that into something, um, that is, uh, the, you know, that that's digestible. That's a, a very tough task, as you can imagine, so that, you know, we have to work with a huge technologies back to machine learning and artificial intelligence automation. And of course our analyst view to do that. >>Yeah. So this year, of course, there's like the every year is a battle, but this year was an extra battle. Can you explain what you saw in terms of the hacker dynamics over the past? Let's say 12 months. I know you do this twice a year, but what trends did you see evolving throughout the year and what have you seen with the way that attackers have exploited this expanded attack surface outside of corporate network? >>Yeah, it was quite interesting last year. It certainly was not normal. Like we all say, um, and that was no exception for cybersecurity. You know, if we look at cyber criminals and how they pivoted and adapted to the scrap threat landscape, cyber cyber criminals are always trying to take advantage of the weakest link of the chain. They're trying to always prey off here and ride waves of global trends and themes. We've seen this before in, uh, natural disasters as an example, you know, um, trying to do charity kind of scams and campaigns. And they're usually limited to a region where that incident happened and they usually live about two to three weeks, maybe a month at the most. And then they'll move on to the next to the next trip. That's braking, of course, because COVID is so global and dominant. Um, we saw attacks coming in from, uh, well over 40 different languages as an example, um, in regions all across the world that wasn't lasting two to three weeks and it lasted for the better part of a year. >>And of course, what they're, they're using this as a vehicle, right? Not preying on the fear. They're doing everything from initial lockdown, uh, fishing. We were as COVID-19 movers to, um, uh, lay off notices then to phase one, reopenings all the way up to fast forward to where we are today with vaccine rollover development. So there's always that new flavor and theme that they were rolling out, but because it was so successful for them, they were able to, they didn't have to innovate too much, right. They didn't have to expand and shifted to new to new trends. And themes are really developed on new rats families as an example, or a new sophisticated malware. That was the first half of the year and the second half of the year. Um, of course people started to experience COVID fatigue, right? Um, people started to become, we did a lot of education around this. >>People started to become more aware of this threat. And so, um, cyber criminals have started to, um, as we expected, started to become more sophisticated with their attacks. We saw an expansion in different ransomware families. We saw more of a shift of focus on, on, um, uh, you know, targeting the digital supply chain as an example. And so that, that was, that was really towards Q4. Uh, so it, it was a long lived lead year with success on the Google themes, um, targeting healthcare as an example, a lot of, um, a lot of the organizations that were, you know, really in a vulnerable position, I would say >>So, okay. I want to clarify something because my assumption was that they actually did really increase the sophistication, but it sounds like that was kind of a first half trends. Not only did they have to adapt and not have to, but they adapt it to these new vulnerabilities. Uh, my sense was that when you talk about the digital supply chain, that that was a fairly sophisticated attack. Am I, am I getting that right? That they did their sort of their, their, their increased sophistication in the first half, and then they sort of deployed it, did it, uh, w what actually happened there from your data? >>Well, if we look at, so generally there's two types of attacks that we look at, we look at the, uh, the premeditated sophisticated attacks that can have, um, you know, a lot of ramp up work on their end, a lot of time developing the, the, the, the weaponization phase. So developing, uh, the exploits of the sophisticated malware that they're gonna use for the campaign reconnaissance, understanding the targets, where platforms are developed, um, the blueprinting that DNA of, of, of the supply chain, those take time. Um, in fact years, even if we look back to, um, uh, 10 plus years ago with the Stuxnet attacks, as an example that was on, uh, nuclear centrifuges, um, and that, that had four different zero-day weapons at the time. That was very sophisticated, that took over two years to develop as an example. So some of these can take years of time to develop, but they're, they're, uh, very specific in terms of the targets are going to go after obviously the ROI from their end. >>Uh, the other type of attack that we see is as ongoing, um, these broad, wide sweeping attacks, and the reality for those ones is they don't unfortunately need to be too sophisticated. And those ones were the ones I was talking about that were really just playing on the cool, the deem, and they still do today with the vaccine road and development. Uh, but, but it's really because they're just playing on, on, um, you know, social engineering, um, using, uh, topical themes. And in fact, the weapons they're using these vulnerabilities are from our research data. And this was highlighted actually the first pop landscape before last year, uh, on average were two to three years old. So we're not talking about fresh vulnerabilities. You've got to patch right away. I mean, these are things that should have been patched two years ago, but they're still unfortunately having success with that. >>So you mentioned stuck next Stuxnet as the former sort of example, of one of the types of attacks that you see. And I always felt like that was a watershed moment. One of the most sophisticated, if not the most sophisticated attack that we'd ever seen. When I talk to CSOs about the recent government hack, they, they, they suggest I infer maybe they don't suggest it. I infer that it was of similar sophistication. It was maybe thousands of people working on this for years and years and years. Is that, is that accurate or not necessarily? >>Yeah, there's definitely a, there's definitely some comparisons there. Uh, you know, one of the largest things is, uh, both attacks used digital circuits certificate personation, so they're digitally signed. So, you know, of course that whole technology using cryptography is designed by design, uh, to say that, you know, this piece of software installed in your system, hassles certificate is coming from the source. It's legitimate. Of course, if that's compromised, that's all out of the window. And, um, yeah, this is what we saw in both attacks. In fact, you know, stocks in that they also had digitally designed, uh, certificates that were compromised. So when it gets to that level of students or, uh, sophistication, that means definitely that there's a target that there has been usually months of, of, uh, homework done by cyber criminals, for reconnaissance to be able to weaponize that. >>W w what did you see with respect to ransomware? What were the trends there over the past 12 months? I've heard some data and it's pretty scary, but what did you see? >>Yeah, so we're actually, ransomware is always the thorn in our side, and it's going to continue to be so, um, you know, in fact, uh, ransomware is not a new itself. It was actually first created in 1989, and they demanded ransom payments through snail mail. This was to appeal a box, obviously that, that, that didn't take off. Wasn't a successful on the internet was porn at the time. But if you look at it now, of course, over the last 10 years, really, that's where it ran. The ransomware model has been, uh, you know, lucrative, right? I mean, it's been, um, using, uh, by force encrypting data on systems, so that users had to, if they were forced to pay the ransom because they wanted access to their data back data was the target currency for ransomware. That's shifted now. And that's actually been a big pivotal over the last year or so, because again, before it was this let's cast a wide net, in fact, as many people as we can random, um, and try to see if we can hold some of their data for ransom. >>Some people that data may be valuable, it may not be valuable. Um, and that model still exists. Uh, and we see that, but really the big shift that we saw last year and the threat landscape before it was a shift to targeted rats. So again, the sophistication is starting to rise because they're not just going out to random data. They're going out to data that they know is valuable to large organizations, and they're taking that a step further now. So there's various ransomware families. We saw that have now reverted to extortion and blackmail, right? So they're taking that data, encrypting it and saying, unless you pay us as large sum of money, we're going to release this to the public or sell it to a buyer on the dark web. And of course you can imagine the amount of, um, you know, damages that can happen from that. The other thing we're seeing is, is a target of going to revenue services, right? So if they can cripple networks, it's essentially a denial of service. They know that the company is going to be bleeding, you know, X, millions of dollars a day, so they can demand Y million dollars of ransom payments, and that's effectively what's happening. So it's, again, becoming more targeted, uh, and more sophisticated. And unfortunately the ransom is going up. >>So they go to where the money is. And of course your job is to, it's a lower the ROI for them, a constant challenge. Um, we talked about some of the attack vectors, uh, that you saw this year that, that cyber criminals are targeting. I wonder if, if, you know, given the work from home, if things like IOT devices and cameras and, you know, thermostats, uh, with 75% of the work force at home, is this infrastructure more vulnerable? I guess, of course it is. But what did you see there in terms of attacks on those devices? >>Yeah, so, uh, um, uh, you know, unfortunately the attack surface as we call it, uh, so the amount of target points is expanding. It's not shifting, it's expanding. We still see, um, I saw, I mentioned earlier vulnerabilities from two years ago that are being used in some cases, you know, over the holidays where e-commerce means we saw e-commerce heavily under attack in e-commerce has spikes since last summer, right. It's been a huge amount of traffic increase everybody's shopping from home. And, uh, those vulnerabilities going after a shopping cart, plugins, as an example, are five to six years old. So we still have this theme of old vulnerabilities are still new in a sense being attacked, but we're also now seeing this complication of, yeah, as you said, IOT, uh, B roll out everywhere, the really quick shift to work from home. Uh, we really have to treat this as if you guys, as the, uh, distributed branch model for enterprise, right. >>And it's really now the secure branch. How do we take, um, um, you know, any of these devices on, on those networks and secure them, uh, because yeah, if you look at the, what we highlighted in our landscape report and the top 10 attacks that we're seeing, so hacking attacks hacking in tabs, this is who our IPS triggers. You know, we're seeing attempts to go after IOT devices. Uh, right now they're mostly, uh, favoring, uh, well in terms of targets, um, consumer grade routers. Uh, but they're also looking at, um, uh, DVR devices as an example for, uh, you know, home entertainment systems, uh, network attached storage as well, and IP security cameras, um, some of the newer devices, uh, what, the quote unquote smart devices that are now on, you know, virtual assistance and home networks. Uh, we actually released a predictions piece at the end of last year as well. So this is what we call the new intelligent edge. And that's what I think is we're really going to see this year in terms of what's ahead. Um, cause we always have to look ahead and prepare for that. But yeah, right now, unfortunately, the story is, all of this is still happening. IOT is being targeted. Of course they're being targeted because they're easy targets. Um, it's like for cybercriminals, it's like shooting fish in a barrel. There's not just one, but there's multiple vulnerabilities, security holes associated with these devices, easy entry points into networks. >>I mean, it's, um, I mean, attackers they're, they're highly capable. They're organized, they're well-funded they move fast, they're they're agile, uh, and they follow the money. As we were saying, uh, you, you mentioned, you know, co vaccines and, you know, big pharma healthcare, uh, where >>Did you see advanced, persistent >>Threat groups really targeting? Were there any patterns that emerged in terms of other industry types or organizations being targeted? >>Yeah. So just to be clear again, when we talk about AP teams, um, uh, advanced, specific correct group, the groups themselves they're targeting, these are usually the more sophisticated groups, of course. So going back to that theme, these are usually the target, the, um, the premeditated targeted attacks usually points to nation state. Um, sometimes of course there's overlap. They can be affiliated with cyber crime, cyber crime, uh, uh, groups are typically, um, looking at some other targets for ROI, uh, bio there's there's a blend, right? So as an example, if we're looking at the, uh, apt groups I had last year, absolutely. Number one I would say would be healthcare. Healthcare was one of those, and it's, it's, it's, uh, you know, very unfortunate, but obviously with the shift that was happening at a pop up medical facilities, there's a big, a rush to change networks, uh, for a good cause of course, but with that game, um, you know, uh, security holes and concerns the targets and, and that's what we saw IPT groups targeting was going after those and, and ransomware and the cyber crime shrine followed as well. Right? Because if you can follow, uh, those critical networks and crippled them on from cybercriminals point of view, you can, you can expect them to pay the ransom because they think that they need to buy in order to, um, get those systems back online. Uh, in fact, last year or two, unfortunately we saw the first, um, uh, death that was caused because of a denial of service attack in healthcare, right. Facilities were weren't available because of the cyber attack. Patients had to be diverted and didn't make it on the way. >>All right. Jericho, sufficiently bummed out. So maybe in the time remaining, we can talk about remediation strategies. You know, we know there's no silver bullet in security. Uh, but what approaches are you recommending for organizations? How are you consulting with folks? >>Sure. Yeah. So a couple of things, um, good news is there's a lot that we can do about this, right? And, um, and, and basic measures go a long way. So a couple of things just to get out of the way I call it housekeeping, cyber hygiene, but it's always worth reminding. So when we talk about keeping security patches up to date, we always have to talk about that because that is reality as et cetera, these, these vulnerabilities that are still being successful are five to six years old in some cases, the majority two years old. Um, so being able to do that, manage that from an organization's point of view, really treat the new work from home. I don't like to call it a work from home. So the reality is it's work from anywhere a lot of the times for some people. So really treat that as, as the, um, as a secure branch, uh, methodology, doing things like segmentations on network, secure wifi access, multi-factor authentication is a huge muscle, right? >>So using multi-factor authentication because passwords are dead, um, using things like, uh, XDR. So Xers is a combination of detection and response for end points. This is a mass centralized management thing, right? So, uh, endpoint detection and response, as an example, those are all, uh, you know, good security things. So of course having security inspection, that that's what we do. So good threat intelligence baked into your security solution. That's supported by labs angles. So, uh, that's, uh, you know, uh, antivirus, intrusion prevention, web filtering, sandbox, and so forth, but then it gets that that's the security stack beyond that it gets into the end user, right? Everybody has a responsibility. This is that supply chain. We talked about. The supply chain is, is, is a target for attackers attackers have their own supply chain as well. And we're also part of that supply chain, right? The end users where we're constantly fished for social engineering. So using phishing campaigns against employees to better do training and awareness is always recommended to, um, so that's what we can do, obviously that's, what's recommended to secure, uh, via the endpoints in the secure branch there's things we're also doing in the industry, um, to fight back against that with prime as well. >>Well, I, I want to actually talk about that and talk about ecosystems and collaboration, because while you have competitors, you all want the same thing. You, SecOps teams are like superheroes in my book. I mean, they're trying to save the world from the bad guys. And I remember I was talking to Robert Gates on the cube a couple of years ago, a former defense secretary. And I said, yeah, but don't, we have like the best security people and can't we go on the offensive and weaponize that ourselves. Of course, there's examples of that. Us. Government's pretty good at it, even though they won't admit it. But his answer to me was, yeah, we gotta be careful because we have a lot more to lose than many countries. So I thought that was pretty interesting, but how do you collaborate with whether it's the U S government or other governments or other other competitors even, or your ecosystem? Maybe you could talk about that a little bit. >>Yeah. Th th this is what, this is what makes me tick. I love working with industry. I've actually built programs for 15 years of collaboration in the industry. Um, so, you know, we, we need, I always say we can't win this war alone. You actually hit on this point earlier, you talked about following and trying to disrupt the ROI of cybercriminals. Absolutely. That is our target, right. We're always looking at how we can disrupt their business model. Uh, and, and in order, there's obviously a lot of different ways to do that, right? So a couple of things we do is resiliency. That's what we just talked about increasing the security stack so that they go knocking on someone else's door. But beyond that, uh, it comes down to private, private sector collaborations. So, uh, we, we, uh, co-founder of the cyber threat Alliance in 2014 as an example, this was our fierce competitors coming in to work with us to share intelligence, because like you said, um, competitors in the space, but we need to work together to do the better fight. >>And so this is a Venn diagram. What's compared notes, let's team up, uh, when there's a breaking attack and make sure that we have the intelligence so that we can still remain competitive on the technology stack to gradation the solutions themselves. Uh, but let's, let's level the playing field here because cybercriminals moved out, uh, you know, um, uh, that, that there's no borders and they move with great agility. So, uh, that's one thing we do in the private private sector. Uh, there's also, uh, public private sector relationships, right? So we're working with Interpol as an example, Interfor project gateway, and that's when we find attribution. So it's not just the, what are these people doing like infrastructure, but who, who are they, where are they operating? What, what events tools are they creating? We've actually worked on cases that are led down to, um, uh, warrants and arrests, you know, and in some cases, one case with a $60 million business email compromise fraud scam, the great news is if you look at the industry as a whole, uh, over the last three to four months has been for take downs, a motet net Walker, uh, um, there's also IE Gregor, uh, recently as well too. >>And, and Ian Gregor they're actually going in and arresting the affiliates. So not just the CEO or the King, kind of these organizations, but the people who are distributing the ransomware themselves. And that was a unprecedented step, really important. So you really start to paint a picture of this, again, supply chain, this ecosystem of cyber criminals and how we can hit them, where it hurts on all angles. I've most recently, um, I've been heavily involved with the world economic forum. Uh, so I'm, co-author of a report from last year of the partnership on cyber crime. And, uh, this is really not just the pro uh, private, private sector, but the private and public sector working together. We know a lot about cybercriminals. We can't arrest them. Uh, we can't take servers offline from the data centers, but working together, we can have that whole, you know, that holistic effect. >>Great. Thank you for that, Derek. What if people want, want to go deeper? Uh, I know you guys mentioned that you do blogs, but are there other resources that, that they can tap? Yeah, absolutely. So, >>Uh, everything you can see is on our threat research blog on, uh, so 40 net blog, it's under expired research. We also put out, uh, playbooks, w we're doing blah, this is more for the, um, the heroes as he called them the security operation centers. Uh, we're doing playbooks on the aggressors. And so this is a playbook on the offense, on the offense. What are they up to? How are they doing that? That's on 40 guard.com. Uh, we also release, uh, threat signals there. So, um, we typically release, uh, about 50 of those a year, and those are all, um, our, our insights and views into specific attacks that are now >>Well, Derek Mackie, thanks so much for joining us today. And thanks for the work that you and your teams do. Very important. >>Thanks. It's yeah, it's a pleasure. And, uh, rest assured we will still be there 24 seven, three 65. >>Good to know. Good to know. And thank you for watching everybody. This is Dave Volante for the cube. We'll see you next time.
SUMMARY :
but now they have to be wary of software updates in the digital supply chain, Thanks so much for, for the invitation to speak. So first I wonder if you could explain for the audience, what is for guard labs Um, and, but, you know, so it's, it's everything from, uh, customer protection first And it's, it's critical because like you said, you can, you can minimize the um, that is, uh, the, you know, that that's digestible. I know you do this twice a year, but what trends did you see evolving throughout the year and what have you seen with the uh, natural disasters as an example, you know, um, trying to do charity Um, people started to become, we did a lot of education around this. on, um, uh, you know, targeting the digital supply chain as an example. in the first half, and then they sort of deployed it, did it, uh, w what actually happened there from um, you know, a lot of ramp up work on their end, a lot of time developing the, on, um, you know, social engineering, um, using, uh, topical themes. So you mentioned stuck next Stuxnet as the former sort of example, of one of the types of attacks is designed by design, uh, to say that, you know, um, you know, in fact, uh, ransomware is not a new of, um, you know, damages that can happen from that. and cameras and, you know, thermostats, uh, with 75% Yeah, so, uh, um, uh, you know, unfortunately the attack surface as we call it, uh, you know, home entertainment systems, uh, network attached storage as well, you know, big pharma healthcare, uh, where and it's, it's, it's, uh, you know, very unfortunate, but obviously with So maybe in the time remaining, we can talk about remediation strategies. So a couple of things just to get out of the way I call it housekeeping, cyber hygiene, So, uh, that's, uh, you know, uh, antivirus, intrusion prevention, web filtering, And I remember I was talking to Robert Gates on the cube a couple of years ago, a former defense secretary. Um, so, you know, we, we need, I always say we can't win this war alone. cybercriminals moved out, uh, you know, um, uh, that, but working together, we can have that whole, you know, that holistic effect. Uh, I know you guys mentioned that Uh, everything you can see is on our threat research blog on, uh, And thanks for the work that you and your teams do. And, uh, rest assured we will still be there 24 seven, And thank you for watching everybody.
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
Dave Vellante | PERSON | 0.99+ |
2006 | DATE | 0.99+ |
Derek Mackie | PERSON | 0.99+ |
1989 | DATE | 0.99+ |
2014 | DATE | 0.99+ |
Ian Gregor | PERSON | 0.99+ |
five | QUANTITY | 0.99+ |
15 years | QUANTITY | 0.99+ |
75% | QUANTITY | 0.99+ |
Derek | PERSON | 0.99+ |
Dave Volante | PERSON | 0.99+ |
20 | QUANTITY | 0.99+ |
Fortinet | ORGANIZATION | 0.99+ |
two | QUANTITY | 0.99+ |
$60 million | QUANTITY | 0.99+ |
Interpol | ORGANIZATION | 0.99+ |
two types | QUANTITY | 0.99+ |
Robert Gates | PERSON | 0.99+ |
last year | DATE | 0.99+ |
Derek Manky | PERSON | 0.99+ |
first half | QUANTITY | 0.99+ |
U S government | ORGANIZATION | 0.99+ |
12 months | QUANTITY | 0.99+ |
40 guard labs | QUANTITY | 0.99+ |
today | DATE | 0.99+ |
FortiGuard Labs | ORGANIZATION | 0.99+ |
one case | QUANTITY | 0.99+ |
one day | QUANTITY | 0.99+ |
first | QUANTITY | 0.99+ |
last summer | DATE | 0.99+ |
ORGANIZATION | 0.99+ | |
half a year | QUANTITY | 0.99+ |
a month | QUANTITY | 0.98+ |
three weeks | QUANTITY | 0.98+ |
one | QUANTITY | 0.98+ |
both attacks | QUANTITY | 0.98+ |
COVID-19 | OTHER | 0.98+ |
this year | DATE | 0.98+ |
10 plus years ago | DATE | 0.98+ |
Security Insights | ORGANIZATION | 0.98+ |
over two years | QUANTITY | 0.98+ |
Interfor | ORGANIZATION | 0.98+ |
two years ago | DATE | 0.97+ |
two times a year | QUANTITY | 0.96+ |
million dollars | QUANTITY | 0.96+ |
40 grand labs | QUANTITY | 0.96+ |
Zero trust | QUANTITY | 0.96+ |
four months | QUANTITY | 0.95+ |
Derek manky | PERSON | 0.95+ |
Jericho | PERSON | 0.95+ |
millions of dollars a day | QUANTITY | 0.95+ |
One | QUANTITY | 0.95+ |
40 net | QUANTITY | 0.94+ |
pandemic | EVENT | 0.94+ |
COVID | OTHER | 0.94+ |
thousands of people | QUANTITY | 0.94+ |
over 5 million censorship | QUANTITY | 0.94+ |
four | QUANTITY | 0.93+ |
twice a year | QUANTITY | 0.92+ |
one thing | QUANTITY | 0.9+ |
40 guard.com | OTHER | 0.9+ |
a hundred billion | QUANTITY | 0.89+ |
about 50 | QUANTITY | 0.89+ |
six years old | QUANTITY | 0.89+ |
Chief | PERSON | 0.89+ |
over 40 different languages | QUANTITY | 0.88+ |
three | QUANTITY | 0.87+ |
about two | QUANTITY | 0.86+ |
Stuxnet attacks | EVENT | 0.86+ |
zero-day weapons | QUANTITY | 0.86+ |
Q4 | DATE | 0.86+ |
21 years | QUANTITY | 0.85+ |
Maseca pro | ORGANIZATION | 0.85+ |
two years old | QUANTITY | 0.85+ |
Global Threat Alliances | ORGANIZATION | 0.83+ |
EMBARGO Derek Manky Chief, Security Insights & Global Threat Alliances, FortiGuard Labs
>>As we've been reporting, the pandemic has called CSOs to really shift their spending priorities towards securing remote workers. Almost overnight. Zero trust has gone from buzzword to mandate. What's more as we wrote in our recent cybersecurity breaking analysis, not only Maseca pro secured increasingly distributed workforce, but now they have to be wary of software updates in the digital supply chain, including the very patches designed to protect them against cyber attacks. Hello everyone. And welcome to this Q conversation. My name is Dave Vellante and I'm pleased to welcome Derek manky. Who's chief security insights, and global threat alliances for four guard labs with fresh data from its global threat landscape report. Derek. Welcome. Great to see you. >>Thanks so much for, for the invitation to speak. It's always a pleasure. Multicover yeah, >>You're welcome. So first I wonder if you could explain for the audience, what is for guard labs and what's its relationship to fortunate? >>Right. So 40 grand labs is, is our global sockets, our global threat intelligence operation center. It never sleeps, and this is the beat. Um, you know, it's, it's been here since inception at port in it. So it's it's 20, 21 years in the making, since Fortinet was founded, uh, we have built this in-house, uh, so we don't go yum technology. We built everything from the ground up, including creating our own training programs for our, our analysts. We're following malware, following exploits. We even have a unique program that I created back in 2006 to ethical hacking program. And it's a zero-day research. So we try to meet the hackers, the bad guys to their game. And we of course do that responsibly to work with vendors, to close schools and create virtual patches. Um, and, but, you know, so it's, it's everything from, uh, customer protection first and foremost, to following, uh, the threat landscape and cyber. It's very important to understand who they are, what they're doing, who they're, uh, what they're targeting, what tools are they using? >>Yeah, that's great. Some serious DNA and skills in that group. And it's, it's critical because like you said, you can, you can minimize the spread of those malware very, very quickly. So what, what now you have, uh, the global threat landscape report. We're going to talk about that, but what exactly is that? >>Right? So this a global threat landscape report, it's a summary of, uh, all, all the data that we collect over a period of time. So we released this, that biannually two times a year. Um, cyber crime is changing very fast, as you can imagine. So, uh, while we do release security blogs, and, uh, what we call threat signals for breaking security events, we have a lot of other vehicles to release threat intelligence, but this threat landscape report is truly global. It looks at all of our global data. So we have over 5 million censorship worldwide in 40 guard labs, we're processing. I know it seems like a very large amount, but North of a hundred billion, uh, threat events in just one day. And we have to take the task of taking all of that data and put that onto scale for half a year and compile that into something, um, that is, uh, the, you know, that that's digestible. That's a, a very tough task, as you can imagine, so that, you know, we have to work with a huge technologies back to machine learning and artificial intelligence automation. And of course our analyst view to do that. >>Yeah. So this year, of course, there's like the every year is a battle, but this year was an extra battle. Can you explain what you saw in terms of the hacker dynamics over the past? Let's say 12 months. I know you do this twice a year, but what trends did you see evolving throughout the year and what have you seen with the way that attackers have exploited this expanded attack surface outside of corporate network? >>Yeah, it was quite interesting last year. It certainly was not normal. Like we all say, um, and that was no exception for cybersecurity. You know, if we look at cyber criminals and how they pivoted and adapted to the scrap threat landscape, cyber cyber criminals are always trying to take advantage of the weakest link of the chain. They're trying to always prey off here and ride waves of global trends and themes. We've seen this before in, uh, natural disasters as an example, you know, um, trying to do charity kind of scams and campaigns. And they're usually limited to a region where that incident happened and they usually live about two to three weeks, maybe a month at the most. And then they'll move on to the next to the next trip. That's braking, of course, because COVID is so global and dominant. Um, we saw attacks coming in from, uh, well over 40 different languages as an example, um, in regions all across the world that wasn't lasting two to three weeks and it lasted for the better part of a year. >>And of course, what they're, they're using this as a vehicle, right? Not preying on the fear. They're doing everything from initial lockdown, uh, fishing. We were as COVID-19 movers to, um, uh, lay off notices then to phase one, reopenings all the way up to fast forward to where we are today with vaccine rollover development. So there's always that new flavor and theme that they were rolling out, but because it was so successful for them, they were able to, they didn't have to innovate too much, right. They didn't have to expand and shifted to new to new trends. And themes are really developed on new rats families as an example, or a new sophisticated malware. That was the first half of the year and the second half of the year. Um, of course people started to experience COVID fatigue, right? Um, people started to become, we did a lot of education around this. >>People started to become more aware of this threat. And so, um, cyber criminals have started to, um, as we expected, started to become more sophisticated with their attacks. We saw an expansion in different ransomware families. We saw more of a shift of focus on, on, um, uh, you know, targeting the digital supply chain as an example. And so that, that was, that was really towards Q4. Uh, so it, it was a long lived lead year with success on the Google themes, um, targeting healthcare as an example, a lot of, um, a lot of the organizations that were, you know, really in a vulnerable position, I would say >>So, okay. I want to clarify something because my assumption was that they actually did really increase the sophistication, but it sounds like that was kind of a first half trends. Not only did they have to adapt and not have to, but they adapt it to these new vulnerabilities. Uh, my sense was that when you talk about the digital supply chain, that that was a fairly sophisticated attack. Am I, am I getting that right? That they did their sort of their, their, their increased sophistication in the first half, and then they sort of deployed it, did it, uh, w what actually happened there from your data? >>Well, if we look at, so generally there's two types of attacks that we look at, we look at the, uh, the premeditated sophisticated attacks that can have, um, you know, a lot of ramp up work on their end, a lot of time developing the, the, the, the weaponization phase. So developing, uh, the exploits of the sophisticated malware that they're gonna use for the campaign reconnaissance, understanding the targets, where platforms are developed, um, the blueprinting that DNA of, of, of the supply chain, those take time. Um, in fact years, even if we look back to, um, uh, 10 plus years ago with the Stuxnet attacks, as an example that was on, uh, nuclear centrifuges, um, and that, that had four different zero-day weapons at the time. That was very sophisticated, that took over two years to develop as an example. So some of these can take years of time to develop, but they're, they're, uh, very specific in terms of the targets are going to go after obviously the ROI from their end. >>Uh, the other type of attack that we see is as ongoing, um, these broad, wide sweeping attacks, and the reality for those ones is they don't unfortunately need to be too sophisticated. And those ones were the ones I was talking about that were really just playing on the cool, the deem, and they still do today with the vaccine road and development. Uh, but, but it's really because they're just playing on, on, um, you know, social engineering, um, using, uh, topical themes. And in fact, the weapons they're using these vulnerabilities are from our research data. And this was highlighted actually the first pop landscape before last year, uh, on average were two to three years old. So we're not talking about fresh vulnerabilities. You've got to patch right away. I mean, these are things that should have been patched two years ago, but they're still unfortunately having success with that. >>So you mentioned stuck next Stuxnet as the former sort of example, of one of the types of attacks that you see. And I always felt like that was a watershed moment. One of the most sophisticated, if not the most sophisticated attack that we'd ever seen. When I talk to CSOs about the recent government hack, they, they, they suggest I infer maybe they don't suggest it. I infer that it was of similar sophistication. It was maybe thousands of people working on this for years and years and years. Is that, is that accurate or not necessarily? >>Yeah, there's definitely a, there's definitely some comparisons there. Uh, you know, one of the largest things is, uh, both attacks used digital circuits certificate personation, so they're digitally signed. So, you know, of course that whole technology using cryptography is designed by design, uh, to say that, you know, this piece of software installed in your system, hassles certificate is coming from the source. It's legitimate. Of course, if that's compromised, that's all out of the window. And, um, yeah, this is what we saw in both attacks. In fact, you know, stocks in that they also had digitally designed, uh, certificates that were compromised. So when it gets to that level of students or, uh, sophistication, that means definitely that there's a target that there has been usually months of, of, uh, homework done by cyber criminals, for reconnaissance to be able to weaponize that. >>W w what did you see with respect to ransomware? What were the trends there over the past 12 months? I've heard some data and it's pretty scary, but what did you see? >>Yeah, so we're actually, ransomware is always the thorn in our side, and it's going to continue to be so, um, you know, in fact, uh, ransomware is not a new itself. It was actually first created in 1989, and they demanded ransom payments through snail mail. This was to appeal a box, obviously that, that, that didn't take off. Wasn't a successful on the internet was porn at the time. But if you look at it now, of course, over the last 10 years, really, that's where it ran. The ransomware model has been, uh, you know, lucrative, right? I mean, it's been, um, using, uh, by force encrypting data on systems, so that users had to, if they were forced to pay the ransom because they wanted access to their data back data was the target currency for ransomware. That's shifted now. And that's actually been a big pivotal over the last year or so, because again, before it was this let's cast a wide net, in fact, as many people as we can random, um, and try to see if we can hold some of their data for ransom. >>Some people that data may be valuable, it may not be valuable. Um, and that model still exists. Uh, and we see that, but really the big shift that we saw last year and the threat landscape before it was a shift to targeted rats. So again, the sophistication is starting to rise because they're not just going out to random data. They're going out to data that they know is valuable to large organizations, and they're taking that a step further now. So there's various ransomware families. We saw that have now reverted to extortion and blackmail, right? So they're taking that data, encrypting it and saying, unless you pay us as large sum of money, we're going to release this to the public or sell it to a buyer on the dark web. And of course you can imagine the amount of, um, you know, damages that can happen from that. The other thing we're seeing is, is a target of going to revenue services, right? So if they can cripple networks, it's essentially a denial of service. They know that the company is going to be bleeding, you know, X, millions of dollars a day, so they can demand Y million dollars of ransom payments, and that's effectively what's happening. So it's, again, becoming more targeted, uh, and more sophisticated. And unfortunately the ransom is going up. >>So they go to where the money is. And of course your job is to, it's a lower the ROI for them, a constant challenge. Um, we talked about some of the attack vectors, uh, that you saw this year that, that cyber criminals are targeting. I wonder if, if, you know, given the work from home, if things like IOT devices and cameras and, you know, thermostats, uh, with 75% of the work force at home, is this infrastructure more vulnerable? I guess, of course it is. But what did you see there in terms of attacks on those devices? >>Yeah, so, uh, um, uh, you know, unfortunately the attack surface as we call it, uh, so the amount of target points is expanding. It's not shifting, it's expanding. We still see, um, I saw, I mentioned earlier vulnerabilities from two years ago that are being used in some cases, you know, over the holidays where e-commerce means we saw e-commerce heavily under attack in e-commerce has spikes since last summer, right. It's been a huge amount of traffic increase everybody's shopping from home. And, uh, those vulnerabilities going after a shopping cart, plugins, as an example, are five to six years old. So we still have this theme of old vulnerabilities are still new in a sense being attacked, but we're also now seeing this complication of, yeah, as you said, IOT, uh, B roll out everywhere, the really quick shift to work from home. Uh, we really have to treat this as if you guys, as the, uh, distributed branch model for enterprise, right. >>And it's really now the secure branch. How do we take, um, um, you know, any of these devices on, on those networks and secure them, uh, because yeah, if you look at the, what we highlighted in our landscape report and the top 10 attacks that we're seeing, so hacking attacks hacking in tabs, this is who our IPS triggers. You know, we're seeing attempts to go after IOT devices. Uh, right now they're mostly, uh, favoring, uh, well in terms of targets, um, consumer grade routers. Uh, but they're also looking at, um, uh, DVR devices as an example for, uh, you know, home entertainment systems, uh, network attached storage as well, and IP security cameras, um, some of the newer devices, uh, what, the quote unquote smart devices that are now on, you know, virtual assistance and home networks. Uh, we actually released a predictions piece at the end of last year as well. So this is what we call the new intelligent edge. And that's what I think is we're really going to see this year in terms of what's ahead. Um, cause we always have to look ahead and prepare for that. But yeah, right now, unfortunately, the story is, all of this is still happening. IOT is being targeted. Of course they're being targeted because they're easy targets. Um, it's like for cybercriminals, it's like shooting fish in a barrel. There's not just one, but there's multiple vulnerabilities, security holes associated with these devices, easy entry points into networks. >>I mean, it's, um, I mean, attackers they're, they're highly capable. They're organized, they're well-funded they move fast, they're they're agile, uh, and they follow the money. As we were saying, uh, you, you mentioned, you know, co vaccines and, you know, big pharma healthcare, uh, where >>Did you see advanced, persistent >>Threat groups really targeting? Were there any patterns that emerged in terms of other industry types or organizations being targeted? >>Yeah. So just to be clear again, when we talk about AP teams, um, uh, advanced, specific correct group, the groups themselves they're targeting, these are usually the more sophisticated groups, of course. So going back to that theme, these are usually the target, the, um, the premeditated targeted attacks usually points to nation state. Um, sometimes of course there's overlap. They can be affiliated with cyber crime, cyber crime, uh, uh, groups are typically, um, looking at some other targets for ROI, uh, bio there's there's a blend, right? So as an example, if we're looking at the, uh, apt groups I had last year, absolutely. Number one I would say would be healthcare. Healthcare was one of those, and it's, it's, it's, uh, you know, very unfortunate, but obviously with the shift that was happening at a pop up medical facilities, there's a big, a rush to change networks, uh, for a good cause of course, but with that game, um, you know, uh, security holes and concerns the targets and, and that's what we saw IPT groups targeting was going after those and, and ransomware and the cyber crime shrine followed as well. Right? Because if you can follow, uh, those critical networks and crippled them on from cybercriminals point of view, you can, you can expect them to pay the ransom because they think that they need to buy in order to, um, get those systems back online. Uh, in fact, last year or two, unfortunately we saw the first, um, uh, death that was caused because of a denial of service attack in healthcare, right. Facilities were weren't available because of the cyber attack. Patients had to be diverted and didn't make it on the way. >>All right. Jericho, sufficiently bummed out. So maybe in the time remaining, we can talk about remediation strategies. You know, we know there's no silver bullet in security. Uh, but what approaches are you recommending for organizations? How are you consulting with folks? >>Sure. Yeah. So a couple of things, um, good news is there's a lot that we can do about this, right? And, um, and, and basic measures go a long way. So a couple of things just to get out of the way I call it housekeeping, cyber hygiene, but it's always worth reminding. So when we talk about keeping security patches up to date, we always have to talk about that because that is reality as et cetera, these, these vulnerabilities that are still being successful are five to six years old in some cases, the majority two years old. Um, so being able to do that, manage that from an organization's point of view, really treat the new work from home. I don't like to call it a work from home. So the reality is it's work from anywhere a lot of the times for some people. So really treat that as, as the, um, as a secure branch, uh, methodology, doing things like segmentations on network, secure wifi access, multi-factor authentication is a huge muscle, right? >>So using multi-factor authentication because passwords are dead, um, using things like, uh, XDR. So Xers is a combination of detection and response for end points. This is a mass centralized management thing, right? So, uh, endpoint detection and response, as an example, those are all, uh, you know, good security things. So of course having security inspection, that that's what we do. So good threat intelligence baked into your security solution. That's supported by labs angles. So, uh, that's, uh, you know, uh, antivirus, intrusion prevention, web filtering, sandbox, and so forth, but then it gets that that's the security stack beyond that it gets into the end user, right? Everybody has a responsibility. This is that supply chain. We talked about. The supply chain is, is, is a target for attackers attackers have their own supply chain as well. And we're also part of that supply chain, right? The end users where we're constantly fished for social engineering. So using phishing campaigns against employees to better do training and awareness is always recommended to, um, so that's what we can do, obviously that's, what's recommended to secure, uh, via the endpoints in the secure branch there's things we're also doing in the industry, um, to fight back against that with prime as well. >>Well, I, I want to actually talk about that and talk about ecosystems and collaboration, because while you have competitors, you all want the same thing. You, SecOps teams are like superheroes in my book. I mean, they're trying to save the world from the bad guys. And I remember I was talking to Robert Gates on the cube a couple of years ago, a former defense secretary. And I said, yeah, but don't, we have like the best security people and can't we go on the offensive and weaponize that ourselves. Of course, there's examples of that. Us. Government's pretty good at it, even though they won't admit it. But his answer to me was, yeah, we gotta be careful because we have a lot more to lose than many countries. So I thought that was pretty interesting, but how do you collaborate with whether it's the U S government or other governments or other other competitors even, or your ecosystem? Maybe you could talk about that a little bit. >>Yeah. Th th this is what, this is what makes me tick. I love working with industry. I've actually built programs for 15 years of collaboration in the industry. Um, so, you know, we, we need, I always say we can't win this war alone. You actually hit on this point earlier, you talked about following and trying to disrupt the ROI of cybercriminals. Absolutely. That is our target, right. We're always looking at how we can disrupt their business model. Uh, and, and in order, there's obviously a lot of different ways to do that, right? So a couple of things we do is resiliency. That's what we just talked about increasing the security stack so that they go knocking on someone else's door. But beyond that, uh, it comes down to private, private sector collaborations. So, uh, we, we, uh, co-founder of the cyber threat Alliance in 2014 as an example, this was our fierce competitors coming in to work with us to share intelligence, because like you said, um, competitors in the space, but we need to work together to do the better fight. >>And so this is a Venn diagram. What's compared notes, let's team up, uh, when there's a breaking attack and make sure that we have the intelligence so that we can still remain competitive on the technology stack to gradation the solutions themselves. Uh, but let's, let's level the playing field here because cybercriminals moved out, uh, you know, um, uh, that, that there's no borders and they move with great agility. So, uh, that's one thing we do in the private private sector. Uh, there's also, uh, public private sector relationships, right? So we're working with Interpol as an example, Interfor project gateway, and that's when we find attribution. So it's not just the, what are these people doing like infrastructure, but who, who are they, where are they operating? What, what events tools are they creating? We've actually worked on cases that are led down to, um, uh, warrants and arrests, you know, and in some cases, one case with a $60 million business email compromise fraud scam, the great news is if you look at the industry as a whole, uh, over the last three to four months has been for take downs, a motet net Walker, uh, um, there's also IE Gregor, uh, recently as well too. >>And, and Ian Gregor they're actually going in and arresting the affiliates. So not just the CEO or the King, kind of these organizations, but the people who are distributing the ransomware themselves. And that was a unprecedented step, really important. So you really start to paint a picture of this, again, supply chain, this ecosystem of cyber criminals and how we can hit them, where it hurts on all angles. I've most recently, um, I've been heavily involved with the world economic forum. Uh, so I'm, co-author of a report from last year of the partnership on cyber crime. And, uh, this is really not just the pro uh, private, private sector, but the private and public sector working together. We know a lot about cybercriminals. We can't arrest them. Uh, we can't take servers offline from the data centers, but working together, we can have that whole, you know, that holistic effect. >>Great. Thank you for that, Derek. What if people want, want to go deeper? Uh, I know you guys mentioned that you do blogs, but are there other resources that, that they can tap? Yeah, absolutely. So, >>Uh, everything you can see is on our threat research blog on, uh, so 40 net blog, it's under expired research. We also put out, uh, playbooks, w we're doing blah, this is more for the, um, the heroes as he called them the security operation centers. Uh, we're doing playbooks on the aggressors. And so this is a playbook on the offense, on the offense. What are they up to? How are they doing that? That's on 40 guard.com. Uh, we also release, uh, threat signals there. So, um, we typically release, uh, about 50 of those a year, and those are all, um, our, our insights and views into specific attacks that are now >>Well, Derek Mackie, thanks so much for joining us today. And thanks for the work that you and your teams do. Very important. >>Thanks. It's yeah, it's a pleasure. And, uh, rest assured we will still be there 24 seven, three 65. >>Good to know. Good to know. And thank you for watching everybody. This is Dave Volante for the cube. We'll see you next time.
SUMMARY :
but now they have to be wary of software updates in the digital supply chain, Thanks so much for, for the invitation to speak. So first I wonder if you could explain for the audience, what is for guard labs Um, and, but, you know, so it's, it's everything from, uh, customer protection first And it's, it's critical because like you said, you can, you can minimize the um, that is, uh, the, you know, that that's digestible. I know you do this twice a year, but what trends did you see evolving throughout the year and what have you seen with the uh, natural disasters as an example, you know, um, trying to do charity Um, people started to become, we did a lot of education around this. on, um, uh, you know, targeting the digital supply chain as an example. in the first half, and then they sort of deployed it, did it, uh, w what actually happened there from um, you know, a lot of ramp up work on their end, a lot of time developing the, on, um, you know, social engineering, um, using, uh, topical themes. So you mentioned stuck next Stuxnet as the former sort of example, of one of the types of attacks is designed by design, uh, to say that, you know, um, you know, in fact, uh, ransomware is not a new of, um, you know, damages that can happen from that. and cameras and, you know, thermostats, uh, with 75% Yeah, so, uh, um, uh, you know, unfortunately the attack surface as we call it, uh, you know, home entertainment systems, uh, network attached storage as well, you know, big pharma healthcare, uh, where and it's, it's, it's, uh, you know, very unfortunate, but obviously with So maybe in the time remaining, we can talk about remediation strategies. So a couple of things just to get out of the way I call it housekeeping, cyber hygiene, So, uh, that's, uh, you know, uh, antivirus, intrusion prevention, web filtering, And I remember I was talking to Robert Gates on the cube a couple of years ago, a former defense secretary. Um, so, you know, we, we need, I always say we can't win this war alone. cybercriminals moved out, uh, you know, um, uh, that, but working together, we can have that whole, you know, that holistic effect. Uh, I know you guys mentioned that Uh, everything you can see is on our threat research blog on, uh, And thanks for the work that you and your teams do. And, uh, rest assured we will still be there 24 seven, And thank you for watching everybody.
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
Dave Vellante | PERSON | 0.99+ |
2006 | DATE | 0.99+ |
Derek Mackie | PERSON | 0.99+ |
1989 | DATE | 0.99+ |
2014 | DATE | 0.99+ |
Ian Gregor | PERSON | 0.99+ |
five | QUANTITY | 0.99+ |
15 years | QUANTITY | 0.99+ |
75% | QUANTITY | 0.99+ |
Derek | PERSON | 0.99+ |
20 | QUANTITY | 0.99+ |
Dave Volante | PERSON | 0.99+ |
Fortinet | ORGANIZATION | 0.99+ |
two | QUANTITY | 0.99+ |
$60 million | QUANTITY | 0.99+ |
Interpol | ORGANIZATION | 0.99+ |
two types | QUANTITY | 0.99+ |
Robert Gates | PERSON | 0.99+ |
last year | DATE | 0.99+ |
FortiGuard Labs | ORGANIZATION | 0.99+ |
first half | QUANTITY | 0.99+ |
U S government | ORGANIZATION | 0.99+ |
12 months | QUANTITY | 0.99+ |
40 guard labs | QUANTITY | 0.99+ |
today | DATE | 0.99+ |
one case | QUANTITY | 0.99+ |
one day | QUANTITY | 0.99+ |
first | QUANTITY | 0.99+ |
last summer | DATE | 0.99+ |
ORGANIZATION | 0.99+ | |
half a year | QUANTITY | 0.99+ |
a month | QUANTITY | 0.98+ |
three weeks | QUANTITY | 0.98+ |
one | QUANTITY | 0.98+ |
both attacks | QUANTITY | 0.98+ |
COVID-19 | OTHER | 0.98+ |
this year | DATE | 0.98+ |
10 plus years ago | DATE | 0.98+ |
EMBARGO | PERSON | 0.98+ |
over two years | QUANTITY | 0.98+ |
Interfor | ORGANIZATION | 0.98+ |
two years ago | DATE | 0.97+ |
two times a year | QUANTITY | 0.96+ |
million dollars | QUANTITY | 0.96+ |
40 grand labs | QUANTITY | 0.96+ |
Zero trust | QUANTITY | 0.96+ |
four months | QUANTITY | 0.95+ |
Derek manky | PERSON | 0.95+ |
Jericho | PERSON | 0.95+ |
millions of dollars a day | QUANTITY | 0.95+ |
One | QUANTITY | 0.95+ |
40 net | QUANTITY | 0.94+ |
pandemic | EVENT | 0.94+ |
COVID | OTHER | 0.94+ |
thousands of people | QUANTITY | 0.94+ |
over 5 million censorship | QUANTITY | 0.94+ |
four | QUANTITY | 0.93+ |
twice a year | QUANTITY | 0.92+ |
one thing | QUANTITY | 0.9+ |
40 guard.com | OTHER | 0.9+ |
Derek Manky | PERSON | 0.89+ |
a hundred billion | QUANTITY | 0.89+ |
about 50 | QUANTITY | 0.89+ |
six years old | QUANTITY | 0.89+ |
over 40 different languages | QUANTITY | 0.88+ |
Chief | PERSON | 0.87+ |
Security Insights & Global Threat Alliances | ORGANIZATION | 0.87+ |
three | QUANTITY | 0.87+ |
about two | QUANTITY | 0.86+ |
Stuxnet attacks | EVENT | 0.86+ |
zero-day weapons | QUANTITY | 0.86+ |
Q4 | DATE | 0.86+ |
21 years | QUANTITY | 0.85+ |
Maseca pro | ORGANIZATION | 0.85+ |
two years old | QUANTITY | 0.85+ |
cyber threat Alliance | ORGANIZATION | 0.83+ |
Jim Schaper & Nayaki Nayyar, Ivanti | CUBE Conversation January 2021
(bright upbeat music) >> Announcer: From theCUBE Studios in Palo Alto in Boston, connecting with thought leaders all around the world, this is theCUBE Conversation. >> Well happy New Year, one and all welcome to 2021 in Cube Conversation continuing our ongoing series. I hope your New Year is off to a great start. I know that the end of 2020 was a very good one for Ivanti. And Jim Schaper, the CEO is going to join us to talk about that as is Nayaki Nayyar, or rather the EVP and the Chief Product Officer. So Nayaki and Jim, good to have you here with you on theCUBE and Happy New Year to you. >> Thank you, John. Happy New Year to you. 2020, I think for a lot of us couldn't get out of here quick enough. Although we had some great things happen to our company at the very end of the year. So anxious to talk to you about it and we appreciate the opportunity. >> You bet. So we're talking about two major acquisitions that you made that both closed near the end of the year back in December, not too long ago. One with Pulse Secure, the other with MobileIron. Two companies that provide you with additional expertise in terms of mobile security and the enterprise security space. And so Jim, if you would, let's first talk about just for the big picture, the acquisitions that were made and what those moves will do for you going forward. >> Okay, great, John. We closed both acquisitions interestingly enough, on December 2nd. We've been fortunate to have them part of our company now for about the last 30 days. One of the things that we made a decision on a number of months ago was that we had a real opportunity in the markets that we serve to really build our business more quickly through a series of acquisitions that strategically made sense for us, our investors and more importantly our customers. And that really is why we chose MobileIron and Pulse, for different reasons but nonetheless all very consistent with our longterm strategy of securing the end points on every network, in every location around the world. And so consequently, when you think about it and we've all witnessed here over the last 30 days or so, all of the security breaches, all of the things that go along with that, and our real focus is ensuring that every company and every individual on their network, outside their firewall, inside their firewall, on any device is secure. And so with these two particular acquisitions, in addition to the assets that we already had as a part of Ivanti, really puts us in a competitively advantaged position to deliver to the edge, and Nayaki will talk about this. The ability to secure those devices and ensure that they're secure from phishing expeditions or breaches or all of those kinds of things. So these two particular acquisitions really puts us on the map and puts us in a leadership position in the security market. So we're thrilled to have both of them. >> Before I go off to Nayaki, I want to follow with the point that you've made Jim talking about security breaches. We're all well aware. You know, the news from what we've been hearing out from the federal level about the state actors and the kind of these infiltrations of major US systems if not international systems. Some Interpol data, I read 207 some odd percent increase in breaches just in the post COVID time or in the COVID time, the past year. That gets your attention, does it not? And what does that say to you about the aggressive nature of these kinds of activities? >> Well, that they're getting more sophisticated every day and they're getting more aggressive. I think one of the most frightening conversations I had was a briefing with our chief security officer about how many attempted breaches of our network and our systems that he sees every single day. And we're able to identify what foreign actors are really trying to penetrate our systems or what are they trying to do. But the one thing I will leave you with is they're becoming much more sophisticated, whether you're inside the firewall or whether you're on your iPhone as an extension of the network, there the level of sophistication is startling. And unfortunately in many cases, as evidenced by the recent breaches, you don't even know you've had a breach for could be months, weeks, days. And so what damage is done. And so as we look forward, and as Nayaki kind of walks you through our product strategy, what you're going to hear a lot of is how do we self protect? How do we self-learn the devices at the edge, on the end of the networks, such that they can recognize foreign actors or any breach capability that somebody is trying to employ? And so, yeah, it's frightening how sophisticated and how frequent they have become. >> I think the one thing that really struck me as I read about the breaches was not so much the damage that has been done, but the damage that could be done prospectively and about which we have no idea. You don't know, it's like somebody lurking in your closet and they're going to stay there for a couple of months and wait for the time that maybe your guard is even more down. So I was, that's what shocks me. And they Nayaki, let's talk about your strategy then. You picked up obviously a couple of companies, one in the, kind of the enterprise IT space. Now the one in the VPN space, add into your already extensive portfolio. So I imagine from your office, wearing the hat of the chief product officer, you're just to look in your chops right now. You've got a lot more resources at your disposal. >> Yeah, we are very very busy John, but to Jim's point, one of the trends we are seeing in the market as we enter into the post COVID era, where everyone is working from anywhere, be it from home, be it from office, while on the move, every organization, every enterprise is struggling with this. What we call this explosive growth of devices. Devices being mobile devices, client-based devices, IoT devices, the data that is being generated from these devices, and to your point, the cybersecurity threats. It is predicted that there has been 30000% increase in the cybersecurity threats that are being targeted primarily at the remote workers. So you can imagine whether it's phishing attacks, malware attacks, I mean just an explosive growth of devices, data, cybersecurity attacks at the remote workers. So organizations need automation to be able to address this growth and this complexity which is where Ivanti's focus in discovering all the devices and managing those devices. So as we bring the MobileIron portfolio and Ivanti's portfolio together, now we can help our customers manage every type of devices be it Windows devices, Mac devices, Linux, iOS, Android devices, and secure those devices. The zero trust access that users need, the remote users need, all the way from cloud access to the endpoint is what the strength of both MobileIron and Pulse brings to our entire portfolio holistically. So we are truly excited for our customers. Now they can leverage our entire end to end stack to discover, manage secure and service all those devices that they now have to service for their employees. >> Explain to me, or just walk me through zero trust in terms of how you define that. I've read about trust nothing, verify everything, those kinds of explanations. But if you would, from your perspective, what does zero trust encompass, not only on your side, but on your client's side? Because you want to give them tools to do things for themselves to self heal and self serve and those kinds of things. >> So, zero trust is you don't trust anything. You validate and certify everything. So the access users have on your network, the access they have on the mobile devices, the applications they are accessing, the data that they are accessing. So being able to validate every access that they have when they come into your network is what the whole zero trust access really means. So, the combination of Ivanti's portfolio and also Pulse that zero trust access all the way from as users are accessing that network data, cloud data, endpoint data, is where our entire zero trust access truly differentiates. And as we bring that with our UEM portfolio with the MobileIron, there is no other vendor in the market that has that holistic offering, internal offering. >> I'm sorry, go ahead, please. >> It's interesting, John, you talk about timing is everything, right? And when we began discussions with MobileIron, it was right before COVID hit. And we had a great level of expertise inside the pre-acquisition of Ivanti to be able to secure the end points at the desktop level. But we struggled a bit with having all of the capabilities that we needed to manage mobile devices and tablets and basically anything that is attached to the network. That's what they really brought to us. And having done a number of acquisitions historically in my career, this was probably the easiest integration that we had simply because we did what they didn't do and they did what we didn't do. And then they brought some additional technologies. But what's really changed in the environment because of this work from home or work from anywhere as as we like to articulate it, is you've got multiple environments that you've got to manage. It isn't just, what's on the end of the VPN, the network, it's what's on the end points of the cloud. What kind of cloud are you running? You're running a public cloud, you're running a private cloud. Is it a hybrid environment? And so the ability to and the need to be able to do that is pretty significant. And so that's one of the real advantages that both the Pulse as well as the MobileIron acquisitions really brought to the combined offering from a product standpoint. >> Yeah, I'd like to follow up on that then, just because the cloud environment provides so many benefits, obviously, but it also provides this huge layer of complexity that comes on top of all this because you just talked about it. You can have public, you can have hybrid cloud, you can have on-prem, whatever, right? You have all these options. And yet you, Ivanti, are having to provide security on multiple levels and multiple platforms or multiple environments. And how much more complex or challenging is your mission now because of consumer demand and the capabilities the technology is providing your clients. >> Well, it's certainly more complex and Nayaki is better equipped to probably talk in detail about this. But if you just take a step back and think about it, you think about internet of things, right? I used to have a thermostat. And that thermostat control was controlled by the thermostat on the wall. Now everything is on WiFi. If I've got a problem, I had a a problem with a streaming music capability which infected other parts of my home network. And so everything is, that's just one example of how complicated and how wired everything is really become. Except when it comes to the mobile devices, which are still always remote. You've always got it with you. I don't what it was like for you, John, but you know, historically I've used my phone on email, texts and phone calls. Now it's actually a business tool. But it's a remote business tool that you still have to secure, you still have to manage and you still have to find an identify on the end of the network. That's where we really come into play. Nayaki, anything you want to add to that? >> Yeah, so, to Jim's point, John, and to your question also, as customers have what we call the multi-cloud offering. There are public clouds, private clouds, on-prem data centers, devices on the edge, and as you extend into the IOT world, being able to provide that seamless access, this is a zero trust access all the way from the cloud applications to the applications that are running on-prem, in your data centers and also the applications that are running on your devices and the IoT applications, is what that entire end to end zero trust access, is where our competitive strength resides with Pulse coming into our portfolio. Before Ivanti didn't have this. We were primarily a patch management vendor in the security space, but now we truly extend beyond that patch to this end to end access all the way from cloud to edge is what we call. And then when we combine that with our UEM portfolio in our endpoint management with MobileIron and also service management, that convergence of positive three pillars is where we truly differentiate and compete and win in the market. >> Nayaki, how does internet of things factor into this? Cause I look at sensor technology, I'm just thinking about all the billions of what you have now, right? With whether it's farming or agricultural inputs, business inputs, meteorological, or whatever. I'm sure, you're considering this as well as part of a major play of yours in terms of providing IoT security. How more proliferated is that now and how much of that is kind of in your concern zone you might say? >> Yeah, absolutely. So, just taking these trends we have in managing the end points, we will extend that into the IoT world also. John, when we say IoT world, in an industry where the devices are like healthcare devices. So, stay tuned, in January release we'll be releasing how we will be discovering managing and securing for the healthcare devices like Siemens devices, Bayer devices, Canon devices. So, you're spot on how we can leverage the strength we have in managing end points. Also IoT devices, that same capabilities that we can bring to each of the industry verticals. Now we're not trying to solve the entire vertical market but certain industry verticals where we have a strong footprint. Healthcare is a strong footprint for us. Telcos is a strong footprint for us. So that's where you will see us extending into those IoT devices too. >> Okay, so, in going forward, Jim, if you would just, let's talk about your 2021 in terms of how you further integrate these offerings that you've acquired right now. All of a sudden you've got 30 days of, you know, which is snap of a finger. But what do you see how 2021 is going to lay out, especially with distributed workforces, right? We know that's here. That's a new normal. And with a whole new set of demands on networks and certainly the need for security. >> That's exactly correct, John. I mean, everything is changed and it's never going back to the way it was. You know, everybody has their own definition of the new normal. I guess my definition is at some point in time when things do return to some form of normality, a portion of our workforce will always work from home. To what degree remains to be seen. I don't think we're different from virtually any other industry or any other company. It does put increased demands ,complexity and requirements around how you run your internal IT business. But as Nayaki talked about kind of our virtual service desk offering where you're not going to have a service desk anymore. It's got to be virtual. Well, you have to be able to still provide those services outside of your normal network. And so that's going to be a continued big push for us. I'm incredibly pleased with the way in which the employee bases of the acquired companies have really folded in and become one with our company. And I think as we all recognize cultural differences between organizations can be quite significant and an impediment to really moving forward. Fortunately for us, we have found that both of these organizations fit really nicely from an employee, from a values perspective, from a goals and objectives perspective. And so we did most of the heavy lifting on all the integration shortly after we closed the transactions on the 2nd of December. And so we've moved beyond what I would call the normal kind of concerns and asked around what's going to happen in this and that. We're now kind of heads down in what's the long-term integration going to look like from a product standpoint. We're already looking at additional acquisitions that will continue to take us deeper and wider into our three product pillars, as Nayaki described. And that'll be an ongoing kind of steady dose of acquisitions as we continue to supplement our organic growth within organic growth. >> But you've got to answer my question. I was going to ask you, you founded the company four years ago. There were two big acquisitions back in 2017. We waited four years Jim, until you dip back into that pole again. So the plan, maybe not to wait four years before moving on. >> No trust me, you won't be waiting another four years. Now you've got to bear in mind, John. I wasn't here four years ago. >> That's right, okay. Fair enough. That's okay. I want to thank you both for the time today. Congratulations on sealing those deals back in December and we certainly wish you all the best going forward. And of course, a very happy and a very safe new year for you and yours. >> Same to you, John. Thanks so much for the time. And so it was a pleasure to spend time with you today. >> Thank you, John. Happy New Year again. Thank you. Thank you. (upbeat music)
SUMMARY :
leaders all around the world, I know that the end of 2020 So anxious to talk to you about it that both closed near the end of the year in the markets that we serve and the kind of these But the one thing I will leave you with is as I read about the breaches was one of the trends we But if you would, from your perspective, So the access users have on your network, and the need to be able to do and the capabilities on the end of the network. and also the applications that are running and how much of that is kind of leverage the strength we have the need for security. of the new normal. So the plan, maybe not to wait four years No trust me, you won't be and we certainly wish you Thanks so much for the time. Thank you, John.
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
Jim | PERSON | 0.99+ |
John | PERSON | 0.99+ |
Jim Schaper | PERSON | 0.99+ |
2017 | DATE | 0.99+ |
December 2nd | DATE | 0.99+ |
December | DATE | 0.99+ |
MobileIron | ORGANIZATION | 0.99+ |
Palo Alto | LOCATION | 0.99+ |
January | DATE | 0.99+ |
Nayaki | PERSON | 0.99+ |
Two companies | QUANTITY | 0.99+ |
January 2021 | DATE | 0.99+ |
30000% | QUANTITY | 0.99+ |
Nayaki Nayyar | PERSON | 0.99+ |
Canon | ORGANIZATION | 0.99+ |
first | QUANTITY | 0.99+ |
Telcos | ORGANIZATION | 0.99+ |
iPhone | COMMERCIAL_ITEM | 0.99+ |
30 days | QUANTITY | 0.99+ |
One | QUANTITY | 0.99+ |
Siemens | ORGANIZATION | 0.99+ |
2020 | DATE | 0.99+ |
both | QUANTITY | 0.99+ |
2nd of December | DATE | 0.99+ |
four years ago | DATE | 0.99+ |
2021 | DATE | 0.99+ |
Nayaki | ORGANIZATION | 0.99+ |
four years | QUANTITY | 0.99+ |
iOS | TITLE | 0.99+ |
two big acquisitions | QUANTITY | 0.98+ |
today | DATE | 0.98+ |
Ivanti | ORGANIZATION | 0.98+ |
Bayer | ORGANIZATION | 0.97+ |
Linux | TITLE | 0.97+ |
Android | TITLE | 0.97+ |
zero trust | QUANTITY | 0.97+ |
one | QUANTITY | 0.97+ |
theCUBE Studios | ORGANIZATION | 0.97+ |
two particular acquisitions | QUANTITY | 0.96+ |
Ivanti | PERSON | 0.96+ |
one example | QUANTITY | 0.96+ |
billions | QUANTITY | 0.96+ |
Pulse | ORGANIZATION | 0.95+ |
Windows | TITLE | 0.95+ |
Interpol | ORGANIZATION | 0.95+ |
three product pillars | QUANTITY | 0.95+ |
both acquisitions | QUANTITY | 0.94+ |
three pillars | QUANTITY | 0.94+ |
two major acquisitions | QUANTITY | 0.93+ |
Boston | LOCATION | 0.93+ |
COVID | OTHER | 0.92+ |
207 | QUANTITY | 0.91+ |
Inderpal Bhandari, IBM | MIT CDOIQ 2020
>>from around the globe If the cube with digital coverage of M I t. Chief data officer and Information quality symposium brought to you by Silicon Angle Media >>Hello, everyone. This is Day Volonte and welcome back to our continuing coverage of the M I t. Chief Data Officer CDO I Q event Interpol Bhandari is here. He's a leading voice in the CDO community and a longtime Cubillan Interpol. Great to see you. Thanks for coming on for this. Especially >>program. My pleasure. >>So when you you and I first met, you laid out what I thought was, you know, one of the most cogent frameworks to understand what a CDO is job was where the priority should be. And one of those was really understanding how, how, how data contributes to the monetization of station aligning with lines of business, a number of other things. And that was several years ago. A lot of change since then. You know, we've been doing this conference since probably twenty thirteen and back then, you know, Hadoop was coming on strong. A lot of CEOs didn't want to go near the technology that's beginning to change. CDOs and cto Zehr becoming much more aligned at the hip. The reporting organizations have changed. But I love your perspective on what you've observed as changing in the CDO roll over the last half decade or so. >>Well, did you know that I became chief data officer in two thousand six? December two thousand and six And I have done this job four times four major overnight have created of the organization from scratch each time. Now, in December of two thousand six, when I became chief data officer, there were only four. Chief Data Officer, uh, boom and I was the first in health care, and there were three, three others, you know, one of the Internet one and credit guns one and banking. And I think I'm the only one actually left standing still doing this job. That's a good thing or a bad thing. But like, you know, it certainly has allowed me to love the craft and then also scripted down to the level that, you know, I actually do think of it purely as a craft. That is. I know, going into a mutual what I'm gonna do. They were on the central second. No, the interesting things that have unfolded. Obviously, the professions taken off There are literally thousands off chief data officers now, and there are plenty off changes. I think the main change, but the job is it's, I think, a little less daunting in terms off convincing the senior leadership that it's need it because I think the awareness at the CEO level is much, much, much better than what it waas in two thousand six. Across the world. Now, having said that, I think it is still only awareness and don't think that there's really a deep understanding of those levels. And so there's a lot off infusion, which is why you will. You kind of think this is my period. But you saw all these professions take off with C titles, right? Chief Data officer, chief analytics officer, chief digital officer and chief technology officer. See, I off course is being there for a long time. And but I think these newer see positions. They're all very, very related, and they all kind of went to the same need which had to do with enterprise transformation, digital transformation, that enterprises chief digital officer, that's another and and people were all trying to essentially feel the elephants and they could only see part of it at the senior levels, and they came up with which have a role you know, seemed most meaningful to them. But really, all of us are trying to do the same job, which is to accelerate digital transformation in the enterprise. Your comment about you kind of see that the seat eels and sea deals now, uh, partnering up much more than in the past, and I think that's in available the major driving force full. That is, in my view, anyway. It's is artificial intelligence as people try to infuse artificial intelligence. Well, then it's very technical field. Still, it's not something that you know you can just hand over to somebody who has the business jobs, but not the deep technical chops to pull that off. And so, in the case off chief data officers that do have the technical jobs, you'll see them also pretty much heading up the I effort in total and you know, as I do for the IBM case, will be building the Data and AI Enablement internal platform for for IBM. But I think in other cases you you've got Chief date officers who are coming in from a different angle. You know, they built Marghera but the CTO now, because they have to. Otherwise you cannot get a I infused into the organization. >>So there were a lot of other priorities, obviously certainly digital transformation. We've been talking about it for years, but still in many organisations, there was a sense of, well, not on my watch, maybe a sense of complacency or maybe just other priorities. Cove. It obviously has changed that now one hundred percent of the companies that we talked to are really putting this digital transformation on the front burner. So how has that changed the role of CDO? Has it just been interpolate an acceleration of that reality, or has it also somewhat altered the swim lanes? >>I think I think it's It's It's Bolt actually, so I have a way of looking at this in my mind, the CDO role. But if you look at it from a business perspective, they're looking for three things. The CEO is looking for three things from the CDO. One is you know this person is going to help with the revenue off the company by enabling the production of new products, new products of resulting in new revenue and so forth. That's kind of one aspect of the monetization. Another aspect is the CEO is going to help with the efficiency within the organization by making data a lot more accessible, as well as enabling insights that reduce into and cycle time for major processes. And so that's another way that they have monitor. And the last one is a risk reduction that they're going to reduce the risk, you know, as regulations. And as you have cybersecurity exposure on incidents that you know just keep keep accelerating as well. You're gonna have to also step in and help with that. So every CDO, the way their senior leadership looks at them is some mix off three. And in some cases, one has given more importance than the other, and so far, but that's how they are essentially looking at it now. I think what digital transformation has done is it's managed to accelerate, accelerate all three off these outcomes because you need to attend to all three as you move forward. But I think that the individual balance that's struck for individuals reveals really depends on their ah, their company, their situation, who their peers are, who is actually leading the transformation and so >>forth, you know, in the value pie. A lot of the early activity around CDO sort of emanated from the quality portions of the organization. It was sort of a compliance waited roll, not necessarily when you started your own journey here. Obviously been focused on monetization how data contributes to that. But But you saw that generally, organizations, even if they didn't have a CDO, they had this sort of back office alliance thing that has totally changed the the in the value equation. It's really much more about insights, as you mentioned. So one of the big changes we've seen in the organization is that data pipeline you mentioned and and cycle time. And I'd like to dig into that a little bit because you and I have talked about this. This is one of the ways that a chief data officer and the related organizations can add the most value reduction in that cycle time. That's really where the business value comes from. So I wonder if we could talk about that a little bit and how that the constituents in the stakeholders in that in that life cycle across that data pipeline have changed. >>That's a very good question. Very insightful questions. So if you look at ah, company like idea, you know, my role in totally within IBM is to enable Ibn itself to become an AI enterprise. So infuse a on into all our major business processes. You know, things like our supply chain lead to cash well, process, you know, our finance processes like accounts receivable and procurement that soulful every major process that you can think off is using Watson mouth. So that's the That's the That's the vision that's essentially what we've implemented. And that's how we are using that now as a showcase for clients and customers. One of the things that be realized is the data and Ai enablement spots off business. You know, the work that I do also has processes. Now that's the pipeline you refer to. You know, we're setting up the data pipeline. We're setting up the machine learning pipeline, deep learning blank like we're always setting up these pipelines, And so now you have the opportunity to actually turn the so called EI ladder on its head because the Islander has to do with a first You collected data, then you curated. You make sure that it's high quality, etcetera, etcetera, fit for EI. And then eventually you get to applying, you know, ai and then infusing it into business processes. And so far, But once you recognize that the very first the earliest creases of work with the data those themselves are essentially processes. You can infuse AI into those processes, and that's what's made the cycle time reduction. And although things that I'm talking about possible because it just makes it much, much easier for somebody to then implement ai within a lot enterprise, I mean, AI requires specialized knowledge. There are pieces of a I like deep learning, but there are, you know, typically a company's gonna have, like a handful of people who even understand what that is, how to apply it. You know how models drift when they need to be refreshed, etcetera, etcetera, and so that's difficult. You can't possibly expect every business process, every business area to have that expertise, and so you've then got to rely on some core group which is going to enable them to do so. But that group can't do it manually because I get otherwise. That doesn't scale again. So then you come down to these pipelines and you've got to actually infuse AI into these data and ai enablement processes so that it becomes much, much easier to scale across another. >>Some of the CEOs, maybe they don't have the reporting structure that you do, or or maybe it's more of a far flung organization. Not that IBM is not far flung, but they may not have the ability to sort of inject AI. Maybe they can advocate for it. Do you see that as a challenge for some CEOs? And how do they so to get through that, what's what's the way in which they should be working with their constituents across the organization to successfully infuse ai? >>Yeah, that's it's. In fact, you get a very good point. I mean, when I joined IBM, one of the first observations I made and I in fact made it to a senior leadership, is that I didn't think that from a business standpoint, people really understood what a I met. So when we talked about a cognitive enterprise on the I enterprise a zaydi em. You know, our clients don't really understand what that meant, which is why it became really important to enable IBM itself to be any I enterprise. You know that. That's my data strategy. Your you kind of alluded to the fact that I have this approach. There are these five steps, while the very first step is to come up with the data strategy that enables a business strategy that the company's on. And in my case, it was, Hey, I'm going to enable the company because it wants to become a cloud and cognitive company. I'm going to enable that. And so we essentially are data strategy became one off making IBM. It's something I enterprise, but the reason for doing that the reason why that was so important was because then we could use it as a showcase for clients and customers. And so But I'm talking with our clients and customers. That's my role. I'm really the only role I'm playing is what I call an experiential selling there. I'm saying, Forget about you know, the fact that we're selling this particular product or that particular product that you got GPU servers. We've got you know what's an open scale or whatever? It doesn't really matter. Why don't you come and see what we've done internally at scale? And then we'll also lay out for you all the different pain points that we have to work through using our products so that you can kind of make the same case when you when you when you apply it internally and same common with regard to the benefit, you know the cycle, time reduction, some of the cycle time reductions that we've seen in my process is itself, you know, like this. Think about metadata business metadata generating that is so difficult. And it's again, something that's critical if you want to scale your data because you know you can't really have a good catalogue of data if you don't have good business, meditate. Eso. Anybody looking at what's in your catalog won't understand what it is. They won't be able to use it etcetera. And so we've essentially automated business metadata generation using AI and the cycle time reduction that was like ninety five percent, you know, haven't actually argue. It's more than that, because in the past, most people would not. For many many data sets, the pragmatic approach would be. Don't even bother with the business matter data. Then it becomes just put somewhere in the are, you know, data architecture somewhere in your data leg or whatever, you have data warehouse, and then it becomes the data swamp because nobody understands it now with regard to our experience applying AI, infusing it across all our major business processes are average cycle time reduction is seventy percent, so just a tremendous amount of gains are there. But to your point, unless you're able to point to some application at scale within the enterprise, you know that's meaningful for the enterprise, Which is kind of what the what the role I play in terms of bringing it forward to our clients and customers. It's harder to argue. I'll make a case or investment into A I would then be enterprise without actually being able to point to those types of use cases that have been scaled where you can demonstrate the value. So that's extremely important part of the equation. To make sure that that happens on a regular basis with our clients and customers, I will say that you know your point is vomited a lot off. Our clients and customers come back and say, Tell me when they're having a conversation. I was having a conversation just last week with major major financial service of all nations, and I got the same point saying, If you're coming out of regulation, how do I convince my leadership about the value of a I and you know, I basically responded. He asked me about the scale use cases You can show that. But perhaps the biggest point that you can make as a CDO after the senior readership is can we afford to be left up? That is the I think the biggest, you know, point that the leadership has to appreciate. Can you afford to be left up? >>I want to come back to this notion of seventy percent on average, the cycle time reduction. That's astounding. And I want to make sure people understand the potential impacts. And, I would say suspected many CEOs, if not most understand sort of system thinking. It's obviously something that you're big on but often times within organisations. You might see them trying to optimize one little portion of the data lifecycle and you know having. Okay, hey, celebrate that success. But unless you can take that systems view and reduce that overall cycle time, that's really where the business value is. And I guess my we're real question around. This is Every organization has some kind of Northstar, many about profit, and you can increase revenue are cut costs, and you can do that with data. It might be saving lives, but ultimately to drive this data culture, you've got to get people thinking about getting insights that help you with that North Star, that mission of the company, but then taking a systems view and that's seventy percent cycle time reduction is just the enormous business value that that drives, I think, sometimes gets lost on people. And these air telephone numbers in the business case aren't >>yes, No, absolutely. It's, you know, there's just a tremendous amount of potential on, and it's it's not an easy, easy thing to do by any means. So we've been always very transparent about the Dave. As you know, we put forward this this blueprint right, the cognitive enterprise blueprint, how you get to it, and I kind of have these four major pillars for the blueprint. There's obviously does this data and you're getting the data ready for the consummation that you want to do but also things like training data sets. How do you kind of run hundreds of thousands of experiments on a regular basis, which kind of review to the other pillar, which is techology? But then the last two pillars are business process, change and the culture organizational culture, you know, managing organizational considerations, that culture. If you don't keep all four in lockstep, the transformation is usually not successful at an end to end level, then it becomes much more what you pointed out, which is you have kind of point solutions and the role, you know, the CEO role doesn't make the kind of strategic impact that otherwise it could do so and this also comes back to some of the only appointee of you to do. If you think about how do you keep those four pillars and lock sync? It means you've gotta have the data leader. You also gotta have the technology, and in some cases they might be the same people. Hey, just for the moment, sake of argument, let's say they're all different people and many, many times. They are so the data leader of the technology of you and the operations leaders because the other ones own the business processes as well as the organizational years. You know, they've got it all worked together to make it an effective conservation. And so the organization structure that you talked about that in some cases my peers may not have that. You know, that's that. That is true. If the if the senior leadership is not thinking overall digital transformation, it's going to be difficult for them to them go out that >>you've also seen that culturally, historically, when it comes to data and analytics, a lot of times that the lines of business you know their their first response is to attack the quality of the data because the data may not support their agenda. So there's this idea of a data culture on, and I want to ask you how self serve fits into that. I mean, to the degree that the business feels as though they actually have some kind of ownership in the data, and it's largely, you know, their responsibility as opposed to a lot of the finger pointing that has historically gone on. Whether it's been decision support or enterprise data, warehousing or even, you know, Data Lakes. They've sort of failed toe live up to that. That promise, particularly from a cultural standpoint, it and so I wonder, How have you guys done in that regard? How did you get there? Many Any other observations you could make in that regard? >>Yeah. So, you know, I think culture is probably the hardest nut to crack all of those four pillars that I back up and you've got You've got to address that, Uh, not, you know, not just stop down, but also bottom up as well. As you know, period. Appear I'll give you some some examples based on our experience, that idea. So the way my organization is set up is there is a obviously a technology on the other. People who are doing all the data engineering were kind of laying out the foundational technical elements or the transformation. You know, the the AI enabled one be planning networks, and so so that are those people. And then there is another senior leader who reports directly to me, and his organization is all around adoptions. He's responsible for essentially taking what's available in the technology and then working with the business areas to move forward and make this make and infuse. A. I do the processes that the business and he is looking. It's done in a bottom upwards, deliberately set up, designed it to be bottom up. So what I mean by that is the team on my side is fully empowered to move forward. Why did they find a like minded team on the other side and go ahead and do it? They don't have to come back for funding they don't have, You know, they just go ahead and do it. They're basically empowered to do that. And that particular set up enabled enabled us in a couple of years to have one hundred thousand internal users on our Central data and AI enabled platform. And when I mean hundred thousand users, I mean users who were using it on a monthly basis. We company, you know, So if you haven't used it in a month, we won't come. So there it's over one hundred thousand, even very rapidly to that. That's kind of the enterprise wide storm. That's kind of the bottom up direction. The top down direction Waas the strategic element that I talked with you about what I said, Hey, be our data strategy is going to be to create, make IBM itself into any I enterprise and then use that as a showcase for plants and customers That kind of and be reiterated back. And I worked the senior leadership on that view all the time talking to customers, the central and our senior leaders. And so that's kind of the air cover to do this, you know, that mix gives you, gives you that possibility. I think from a peer to peer standpoint, but you get to these lot scale and to end processes, and that there, a couple of ways I worked that one way is we've kind of looked at our enterprise data and said, Okay, therefore, major pillars off data that we want to go after data, tomato plants, data about our offerings, data about financial data, that s and then our work full student and then within that there are obviously some pillars, like some sales data that comes in and, you know, been workforce. You could have contractors. Was his employees a center But I think for the moment, about these four major pillars off data. And so let me map that to end to end large business processes within the company. You know, the really large ones, like Enterprise Performance Management, into a or lead to cash generation into and risk insides across our full supply chain and to and things like that. And we've kind of tied these four major data pillars to those major into and processes Well, well, yes, that there's a mechanism they're obviously in terms off facilitating, and to some extent one might argue, even forcing some interaction between teams that are the way they talk. But it also brings me and my peers much closer together when you set it up that way. And that means, you know, people from the HR side people from the operation side, the data side technology side, all coming together to really move things forward. So all three tracks being hit very, very hard to move the culture fall. >>Am I also correct that you have, uh, chief data officers that reporting to you whether it's a matrix or direct within the division's? Is that right? >>Yeah, so? So I mean, you know, for in terms off our structure, as you know, way our global company, we're also far flung company. We have many different products in business units and so forth. And so, uh, one of the things that I realized early on waas we are going to need data officers, each of those business units and the business units. There's obviously the enterprise objective. And, you know, you could think of the enterprise objectives in terms of some examples based on what I said in the past, which is so enterprise objective would be We've gotta have a data foundation by essentially making data along these four pillars. I talked about clients offerings, etcetera, you know, very accessible self service. You have mentioned south, so thank you. This is where the South seven speaks. Comes it right. So you can you can get at that data quickly and appropriately, right? You want to make sure that the access control, all that stuff is designed out and you're able to change your policies and you'd swap manual. But, you know, those things got implemented very rapidly and quickly. And so you've got you've got that piece off off the off the puzzle due to go after. And then I think the other aspect off off. This is, though, when you recognize that every business unit also has its own objectives and they are looking at some of those things somewhat differently. So I'll give you an example. We've got data any our product units. Now, those CEOs right there, concern is going to be a lot more around the products themselves And how were monetizing those box and so they're not per se concerned with, You know, how you reduce the enter and cycle time off IBM in total supply chain so that this is my point. So they but they're gonna have substantial considerations and objectives that they want to accomplish. And so I recognize that early on, and we came up with this notion off a data officer council and I helped staff the council s. So this is why that's the Matrix to reporting that we talked about. But I selected some of the key Blair's that we have in those units, and I also made sure they were funded by the unit. So they report into the units because their paycheck is actually determined. Pilot unit and which makes them than aligned with the objectives off the unit, but also obviously part of my central approach so that I can disseminate it out to the organization. It comes in very, very handy when you are trying to do things across the company as well. So when we you know GDP our way, we have to get the company ready for Judy PR, I would say that this mechanism became a key key aspect of what enabled us to move forward and do it rapidly. Trouble them >>be because you had the structure that perhaps the lines of business weren't. Maybe is concerned about GDP are, but you had to be concerned with it overall. And this allowed you to sort of hiding their importance, >>right? Because think of in the case of Jeannie PR, they have to be a company wide policy and implementation, right? And if he did not have that structure already in place, it would have made it that much harder. Do you get that uniformity and consistency across the company, right, You know, So you will have to in the weapon that structure, but we already have it because way said Hey, this is around for data. We're gonna have these types of considerations that they are. And so we have this thing regular. You know, this man network that meat meets regularly every month, actually, and you know, when things like GDP are much more frequently than that, >>right? So that makes sense. We're out of time. But I wonder if we could just close if you could address the M I t CDO audience that probably this is the largest audience, Believe or not, now that it's that's virtual definitely expanded the audience, but it's still a very elite group. And the reason why I was so pleased that you agreed to do this is because you've got one of the more complex organizations out there and you've succeeded. And, ah, a lot of the hard, hard work. So what? What message would you leave the M I t CDO audience Interpol? >>So I would say that you know, it's it's this particular professional. Receiving a profession is, uh, if I have to pick one trait of let me pick two traits, I think what is your A change agent? So you have to be really comfortable with change things are going to change, the organization is going to look to you to make those changes. And so that's what aspect off your job, you know, may or may not be part of me immediately. But the those particular set of skills and characteristics and something that you know, one has to, uh one has to develop or time, And I think the other thing I would say is it's a continuous looming jaw. So you continue sexism and things keep changing around you and changing rapidly. And, you know, if you just even think just in terms off the subject areas, I mean this Syria today you've got to understand technology. Obviously, you've gotta understand data you've got to understand in a I and data science. You've got to understand cybersecurity. You've gotta understand the regulatory framework, and you've got to keep all that in mind, and you've got to distill it down to certain trends. That's that's happening, right? I mean, so this is an example of that is that there's a trend towards more regulation around privacy and also in terms off individual ownership of data, which is very different from what's before the that's kind of weather. Bucket's going and so you've got to be on top off all those things. And so the you know, the characteristic of being a continual learner, I think is a is a key aspect off this job. One other thing I would add. And this is All Star Coleman nineteen, you know, prik over nineteen in terms of those four pillars that we talked about, you know, which had to do with the data technology, business process and organization and culture. From a CDO perspective, the data and technology will obviously from consent, I would say most covert nineteen most the civil unrest. And so far, you know, the other two aspects are going to be critical as we move forward. And so the people aspect of the job has never bean, you know, more important down it's today, right? That's something that I find myself regularly doing the stalking at all levels of the organization, one on a one, which is something that we never really did before. But now we find time to do it so obviously is doable. I don't think it's just it's a change that's here to stay, and it ships >>well to your to your point about change if you were in your comfort zone before twenty twenty two things years certainly taking you out of it into Parliament. All right, thanks so much for coming back in. The Cuban addressing the M I t CDO audience really appreciate it. >>Thank you for having me. That my pleasant >>You're very welcome. And thank you for watching everybody. This is Dave a lot. They will be right back after this short >>break. You're watching the queue.
SUMMARY :
to you by Silicon Angle Media Great to see you. So when you you and I first met, you laid out what I thought was, you know, one of the most cogent frameworks and they came up with which have a role you know, seemed most meaningful to them. So how has that changed the role of CDO? And the last one is a risk reduction that they're going to reduce the risk, you know, So one of the big changes we've seen in the organization is that data pipeline you mentioned and and Now that's the pipeline you refer that you do, or or maybe it's more of a far flung organization. That is the I think the biggest, you know, and you know having. and the role, you know, the CEO role doesn't make the kind of strategic impact and it's largely, you know, their responsibility as opposed to a lot of the finger pointing that has historically gone And that means, you know, people from the HR side people from the operation side, So I mean, you know, for in terms off our structure, as you know, And this allowed you to sort of hiding their importance, and consistency across the company, right, You know, So you will have to in the weapon that structure, And the reason why I was so pleased that you agreed to do this is because you've got one And so the you know, the characteristic of being a two things years certainly taking you out of it into Parliament. Thank you for having me. And thank you for watching everybody. You're watching the queue.
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
IBM | ORGANIZATION | 0.99+ |
seventy percent | QUANTITY | 0.99+ |
December | DATE | 0.99+ |
Inderpal Bhandari | PERSON | 0.99+ |
seventy percent | QUANTITY | 0.99+ |
three | QUANTITY | 0.99+ |
first step | QUANTITY | 0.99+ |
five steps | QUANTITY | 0.99+ |
ninety five percent | QUANTITY | 0.99+ |
two thousand | QUANTITY | 0.99+ |
Silicon Angle Media | ORGANIZATION | 0.99+ |
hundred thousand users | QUANTITY | 0.99+ |
last week | DATE | 0.99+ |
Dave | PERSON | 0.99+ |
thousands | QUANTITY | 0.99+ |
one hundred thousand | QUANTITY | 0.99+ |
One | QUANTITY | 0.99+ |
one hundred percent | QUANTITY | 0.99+ |
four | QUANTITY | 0.99+ |
first | QUANTITY | 0.99+ |
one | QUANTITY | 0.99+ |
two traits | QUANTITY | 0.98+ |
each | QUANTITY | 0.98+ |
Northstar | ORGANIZATION | 0.98+ |
two aspects | QUANTITY | 0.98+ |
today | DATE | 0.98+ |
four pillars | QUANTITY | 0.97+ |
first response | QUANTITY | 0.97+ |
North Star | ORGANIZATION | 0.97+ |
Syria | LOCATION | 0.97+ |
three things | QUANTITY | 0.97+ |
second | QUANTITY | 0.96+ |
over one hundred thousand | QUANTITY | 0.95+ |
several years ago | DATE | 0.95+ |
one trait | QUANTITY | 0.94+ |
six | QUANTITY | 0.93+ |
years | QUANTITY | 0.93+ |
nineteen | QUANTITY | 0.93+ |
one way | QUANTITY | 0.93+ |
four major pillars | QUANTITY | 0.92+ |
last half decade | DATE | 0.92+ |
Ibn | ORGANIZATION | 0.92+ |
Interpol | PERSON | 0.91+ |
Bhandari | PERSON | 0.91+ |
first observations | QUANTITY | 0.91+ |
each time | QUANTITY | 0.9+ |
MIT | ORGANIZATION | 0.9+ |
hundreds of thousands of experiments | QUANTITY | 0.89+ |
CDO | TITLE | 0.89+ |
two pillars | QUANTITY | 0.87+ |
a month | QUANTITY | 0.86+ |
one aspect | QUANTITY | 0.86+ |
twenty thirteen | DATE | 0.85+ |
Jeannie | PERSON | 0.84+ |
two things | QUANTITY | 0.83+ |
four pillars | QUANTITY | 0.82+ |
2020 | DATE | 0.8+ |
Derek Manky and Aamir Lakhani, FortiGuard Labs | CUBE Conversation, August 2020
>> Announcer: From theCUBE studios in Palo Alto in Boston, connecting with thought leaders all around the world. This is a CUBE conversation. >> Hi everyone. Welcome to this CUBE Conversation. I'm John Furrier host of theCUBE here in the CUBEs, Palo Alto studios during the COVID crisis. We're quarantine with our crew, but we got the remote interviews. Got two great guests here from Fortinet FortiGuard Labs, Derek Mankey, Chief Security Insights and global threat alliances at Fortinet FortiGuard Labs. And Aamir Lakhani who's the Lead Researcher for the FortiGuard Labs. You guys is great to see you. Derek, good to see you again, Aamir, good to meet you too. >> It's been a while and it happens so fast. >> It just seems was just the other day, Derek, we've done a couple of interviews in between a lot of flow coming out of Fortinet FortiGuard, a lot of action, certainly with COVID everyone's pulled back home, the bad actors taking advantage of the situation. The surface areas increased really is the perfect storm for security in terms of action, bad actors are at an all time high, new threats. Here's going on, take us through what you guys are doing. What's your team makeup look like? What are some of the roles and you guys are seeing on your team and how does that transcend to the market? >> Yeah, sure, absolutely. So you're right. I mean like I was saying earlier that is, this always happens fast and furious. We couldn't do this without a world class team at FortiGuard Labs. So we've grown our team now to over 235 globally. There's different rules within the team. If we look 20 years ago, the rules used to be just very pigeonholed into say antivirus analysis, right? Now we have to account for, when we're looking at threats, we have to look at that growing attack surface. We have to look at where are these threats coming from? How frequently are they hitting? What verticals are they hitting? What regions, what are the particular techniques, tactics, procedures? So we have threat. This is the world of threat intelligence, of course, contextualizing that information and it takes different skill sets on the backend. And a lot of people don't really realize the behind the scenes, what's happening. And there's a lot of magic happening, not only from what we talked about before in our last conversation from artificial intelligence and machine learning that we do at FortiGuard Labs and automation, but the people. And so today we want to focus on the people and talk about how on the backend we approached a particular threat, we're going to talk to the word ransom and ransomware, look at how we dissect threats, how correlate that, how we use tools in terms of threat hunting as an example, and then how we actually take that to that last mile and make it actionable so that customers are protected. I would share that information with keys, right, until sharing partners. But again, it comes down to the people. We never have enough people in the industry, there's a big shortage as we know, but it's a really key critical element. And we've been building these training programs for over a decade with them FortiGuard Labs. So, you know John, this to me is exactly why I always say, and I'm sure Aamir can share this too, that there's never a adult day in the office and all we hear that all the time. But I think today, all of you is really get an idea of why that is because it's very dynamic and on the backend, there's a lot of things that we're doing to get our hands dirty with this. >> You know the old expression startup plan Silicon Valley is if you're in the arena, that's where the action is. And it's different than sitting in the stands, watching the game. You guys are certainly in that arena and you got, we've talked and we cover your, the threat report that comes out frequently. But for the folks that aren't in the weeds on all the nuances of security, can you kind of give the 101 ransomware, what's going on? What's the state of the ransomware situation? Set the stage because that's still continues to be threat. I don't go a week, but I don't read a story about another ransomware. And then at least I hear they paid 10 million in Bitcoin or something like, I mean, this is real, that's a real ongoing threat. What is it? >> The (indistinct) quite a bit. But yeah. So I'll give sort of the 101 and then maybe we can pass it to Aamir who is on the front lines, dealing with this every day. You know if we look at the world of, I mean, first of all, the concept of ransom, obviously you have people that has gone extended way way before cybersecurity in the world of physical crime. So of course, the world's first ransom where a virus is actually called PC Cyborg. This is a 1989 around some payment that was demanded through P.O Box from the voters Panama city at the time, not too effective on floppiness, a very small audience, not a big attack surface. Didn't hear much about it for years. Really, it was around 2010 when we started to see ransomware becoming prolific. And what they did was, what cyber criminals did was shift on success from a fake antivirus software model, which was, popping up a whole bunch of, setting here, your computer's infected with 50 or 60 viruses, PaaS will give you an antivirus solution, which was of course fake. People started catching on, the giggles out people caught on to that. So they, weren't making a lot of money selling this fraudulent software, enter ransomware. And this is where ransomware, it really started to take hold because it wasn't optional to pay for this software. It was mandatory almost for a lot of people because they were losing their data. They couldn't reverse engineer that the encryption, couldn't decrypt it, but any universal tool. Ransomware today is very rigid. We just released our threat report for the first half of 2020. And we saw, we've seen things like master boot record, MVR, ransomware. This is persistent. It sits before your operating system, when you boot up your computer. So it's hard to get rid of it. Very strong public private key cryptography. So each victim is effective with the direct key, as an example, the list goes on and I'll save that for the demo today, but that's basically, it's just very, it's prolific. We're seeing shuts not only just ransomware attacks for data, we're now starting to see ransom for extortion, for targeted around some cases that are going after critical business. Essentially it's like a DoS holding revenue streams go ransom too. So the ransom demands are getting higher because of this as well. So it's complicated. >> Was mentioning Aamir, why don't you weigh in, I mean, 10 million is a lot. And we reported earlier in this month. Garmin was the company that was hacked, IT got completely locked down. They pay 10 million, Garmin makes all those devices. And as we know, this is impact and that's real numbers. I mean, it's not other little ones, but for the most part, it's nuance, it's a pain in the butt to full on business disruption and extortion. Can you explain how it all works before we go to the demo? >> You know, you're absolutely right. It is a big number and a lot of organizations are willing to pay that number, to get their data back. Essentially their organization and their business is at a complete standstill when they don't pay, all their files are inaccessible to them. Ransomware in general, what it does end up from a very basic overview is it basically makes your files not available to you. They're encrypted. They have essentially a passcode on them that you have to have the correct passcode to decode them. A lot of times that's in a form of a program or actually a physical password you have to type in, but you don't get that access to get your files back unless you pay the ransom. A lot of corporations these days, they are not only paying the ransom. They're actually negotiating with the criminals as well. They're trying to say, "Oh, you want 10 million? "How about 4 million?" Sometimes that goes on as well. But it's something that organizations know that if they didn't have the proper backups and the hackers are getting smart, they're trying to go after the backups as well. They're trying to go after your duplicated files. So sometimes you don't have a choice in organizations. Will pay the ransom. >> And it's, they're smart, there's a business. They know the probability of buy versus build or pay versus rebuild. So they kind of know where to attack. They know that the tactics and it's vulnerable. It's not like just some kitty script thing going on. This is real sophisticated stuff it's highly targeted. Can you talk about some use cases there and what goes on with that kind of a attack? >> Absolutely. The cyber criminals are doing reconnaissance and trying to find out as much as they can about their victims. And what happens is they're trying to make sure that they can motivate their victims in the fastest way possible to pay the ransom as well. So there's a lot of attacks going on. We usually, what we're finding now is ransomware is sometimes the last stage of an attack. So an attacker may go into an organization. They may already be taking data out of that organization. They may be stealing customer data, PII, which is personal identifiable information, such as social security numbers, or driver's licenses, or credit card information. Once they've done their entire tap. Once they've gone everything, they can. A lot of times their end stage, their last attack is ransomware. And they encrypt all the files on the system and try and motivate the victim to pay as fast as possible and as much as possible as well. >> I was talking to my buddy of the day. It's like casing the joint there, stay, check it out. They do their recon, reconnaissance. They go in identify what's the best move to make, how to extract the most out of the victim in this case, the target. And it really is, I mean, it's just to go on a tangent, why don't we have the right to bear our own arms? Why can't we fight back? I mean, at the end of the day, Derek, this is like, who's protecting me? I mean, what to protect my, build my own arms, or does the government help us? I mean, at some point I got a right to bear my own arms here. I mean, this is the whole security paradigm. >> Yeah. So, I mean, there's a couple of things. So first of all, this is exactly why we do a lot of, I was mentioning the skill shortage in cyber cybersecurity professionals as an example. This is why we do a lot of the heavy lifting on the backend. Obviously from a defensive standpoint, you obviously have the red team, blue team aspect. How do you first, there's what is to fight back by being defensive as well, too. And also by, in the world of threat intelligence, one of the ways that we're fighting back is not necessarily by going and hacking the bad guys because that's illegal jurisdictions. But how we can actually find out who these people are, hit them where it hurts, freeze assets, go after money laundering networks. If you follow the cash transactions where it's happening, this is where we actually work with key law enforcement partners, such as Interpol as an example, this is the world of threat intelligence. This is why we're doing a lot of that intelligence work on the backend. So there's other ways to actually go on the offense without necessarily weaponizing it per se, right? Like using, bearing your own arms as you said, there there's different forms that people may not be aware of with that. And that actually gets into the world of, if you see attacks happening on your system, how you can use the security tools and collaborate with threat intelligence. >> I think that's the key. I think the key is these new sharing technologies around collective intelligence is going to be a great way to kind of have more of an offensive collective strike. But I think fortifying, the defense is critical. I mean, that's, there's no other way to do that. >> Absolutely, I mean, we say this almost every week, but it's in simplicity. Our goal is always to make it more expensive for the cybercriminal to operate. And there's many ways to do that, right? You can be a pain to them by having a very rigid, hardened defense. That means if it's too much effort on their end, I mean, they have ROIs and in their sense, right? It's too much effort on there and they're going to go knocking somewhere else. There's also, as I said, things like disruption, so ripping infrastructure offline that cripples them, whack-a-mole, they're going to set up somewhere else. But then also going after people themselves, again, the cash networks, these sorts of things. So it's sort of a holistic approach between- >> It's an arms race, better AI, better cloud scale always helps. You know, it's a ratchet game. Aamir, I want to get into this video. It's a ransomware four minute video. I'd like you to take us through as you the Lead Researcher, take us through this video and explain what we're looking at. Let's roll the video. >> All right. Sure. So what we have here is we have the victims that's top over here. We have a couple of things on this victim's desktop. We have a batch file, which is essentially going to run the ransomware. We have the payload, which is the code behind the ransomware. And then we have files in this folder. And this is where you would typically find user files and a real world case. This would be like Microsoft or Microsoft word documents, or your PowerPoint presentations, or we're here we just have a couple of text files that we've set up. We're going to go ahead and run the ransomware. And sometimes attackers, what they do is they disguise this. Like they make it look like an important word document. They make it look like something else. But once you run the ransomware, you usually get a ransom message. And in this case, a ransom message says, your files are encrypted. Please pay this money to this Bitcoin address. That obviously is not a real Bitcoin address. I usually they look a little more complicated, but this is our fake Bitcoin address. But you'll see that the files now are encrypted. You cannot access them. They've been changed. And unless you pay the ransom, you don't get the files. Now, as researchers, we see files like this all the time. We see ransomware all the time. So we use a variety of tools, internal tools, custom tools, as well as open source tools. And what you're seeing here is an open source tool. It's called the Cuckoo Sandbox, and it shows us the behavior of the ransomware. What exactly is ransomware doing. In this case, you can see just clicking on that file, launched a couple of different things that launched basically a command executable, a power shell. They launched our windows shell. And then at, then add things on the file. It would basically, you had registry keys, it had on network connections. It changed the disk. So that's kind of gives us a behind the scenes, look at all the processes that's happening on the ransomware. And just that one file itself, like I said, does multiple different things. Now what we want to do as a researchers, we want to categorize this ransomware into families. We want to try and determine the actors behind that. So we dump everything we know in a ransomware in the central databases. And then we mine these databases. What we're doing here is we're actually using another tool called Maldito and use custom tools as well as commercial and open source tools. But this is a open source and commercial tool. But what we're doing is we're basically taking the ransomware and we're asking Maldito to look through our database and say like, do you see any like files? Or do you see any types of incidences that have similar characteristics? Because what we want to do is we want to see the relationship between this one ransomware and anything else we may have in our system, because that helps us identify maybe where the ransomware is connecting to, where it's going to other processes that I may be doing. In this case, we can see multiple IP addresses that are connected to it. So we can possibly see multiple infections. We can block different external websites that we can identify a command and control system. We can categorize this to a family, and sometimes we can even categorize this to a threat actor as claimed responsibility for it. So it's essentially visualizing all the connections and the relationship between one file and everything else we have in our database. And this example, of course, I'd put this in multiple ways. We can save these as reports, as PDF type reports or usually HTML or other searchable data that we have back in our systems. And then the cool thing about this is this is available to all our products, all our researchers, all our specialty teams. So when we're researching botnets, when we're researching file-based attacks, when we're researching IP reputation, we have a lot of different IOC or indicators of compromise that we can correlate where attacks go through and maybe even detect new types of attacks as well. >> So the bottom line is you got the tools using combination of open source and commercial products to look at the patterns of all ransomware across your observation space. Is that right? >> Exactly. I showed you like a very simple demo. It's not only open source and commercial, but a lot of it is our own custom developed products as well. And when we find something that works, that logic, that technique, we make sure it's built into our own products as well. So our own customers have the ability to detect the same type of threats that we're detecting as well. At FortiGuard Labs, the intelligence that we acquire, that product, that product of intelligence it's consumed directly by our prospects. >> So take me through what what's actually going on, what it means for the customer. So FortiGuard Labs, you're looking at all the ransomware, you seeing the patterns, are you guys proactively looking? Is it, you guys are researching, you look at something pops in the radar. I mean, take us through what goes on and then how does that translate into a customer notification or impact? >> So, yeah, John, if you look at a typical life cycle of these attacks, there's always proactive and reactive. That's just the way it is in the industry, right? So of course we try to be (indistinct) as we look for some of the solutions we talked about before, and if you look at an incoming threat, first of all, you need visibility. You can't protect or analyze anything that you can see. So you got to get your hands on visibility. We call these IOC indicators of compromise. So this is usually something like an actual executable file, like the virus or the malware itself. It could be other things that are related to it, like websites that could be hosting the malware as an example. So once we have that SEED, we call it a SEED. We can do threat hunting from there. So we can analyze that, right? If we have to, it's a piece of malware or a botnet, we can do analysis on that and discover more malicious things that this is doing. Then we go investigate those malicious things. And we really, it's similar to the world of CSI, right? These different dots that they're connecting, we're doing that at hyper-scale. And we use that through these tools that Aamir was talking about. So it's really a lifecycle of getting the malware incoming, seeing it first, analyzing it, and then doing action on that. So it's sort of a three step process. And the action comes down to what Aamir was saying, waterfall and that to our customers, so that they're protected. But then in tandem with that, we're also going further and I'm sharing it if applicable to say law enforcement partners, other threat Intel sharing partners too. And it's not just humans doing that. So the proactive piece, again, this is where it comes to artificial intelligence, machine learning. There's a lot of cases where we're automatically doing that analysis without humans. So we have AI systems that are analyzing and actually creating protection on its own too. So it's quite interesting that way. >> It say's at the end of the day, you want to protect your customers. And so this renders out, if I'm a Fortinet customer across the portfolio, the goal here is protect them from ransomware, right? That's the end game. >> Yeah. And that's a very important thing. When you start talking to these big dollar amounts that were talking earlier, it comes to the damages that are done from that- >> Yeah, I mean, not only is it good insurance, it's just good to have that fortification. So Derek, I going to ask you about the term the last mile, because, we were, before we came on camera, I'm a band with junkie always want more bandwidth. So the last mile, it used to be a term for last mile to the home where there was telephone lines. Now it's fiber and wifi, but what does that mean to you guys in security? Does that mean something specific? >> Yeah, absolutely. The easiest way to describe that is actionable. So one of the challenges in the industry is we live in a very noisy industry when it comes to cybersecurity. What I mean by that is that because of that growing attacks for FIS and you have these different attack factors, you have attacks not only coming in from email, but websites from DoS attacks, there's a lot of volume that's just going to continue to grow is the world that 5G and OT. So what ends up happening is when you look at a lot of security operations centers for customers, as an example, there are, it's very noisy. It's you can guarantee almost every day, you're going to see some sort of probe, some sort of attack activity that's happening. And so what that means is you get a lot of protection events, a lot of logs. And when you have this worldwide shortage of security professionals, you don't have enough people to process those logs and actually start to say, "Hey, this looks like an attack." I'm going to go investigate it and block it. So this is where the last mile comes in, because a lot of the times that, these logs, they light up like Christmas. And I mean, there's a lot of events that are happening. How do you prioritize that? How do you automatically add action? Because the reality is if it's just humans doing it, that last mile is often going back to your bandwidth terms. There's too much latency. So how do you reduce that latency? That's where the automation, the AI machine learning comes in to solve that last mile problem to automatically add that protection. It's especially important 'cause you have to be quicker than the attacker. It's an arms race, like you said earlier. >> I think what you guys do with FortiGuard Labs is super important, not only for the industry, but for society at large, as you have kind of all this, shadow, cloak and dagger kind of attack systems, whether it's national security international, or just for, mafias and racketeering, and the bad guys. Can you guys take a minute and explain the role of FortiGuards specifically and why you guys exist? I mean, obviously there's a commercial reason you built on the Fortinet that trickles down into the products. That's all good for the customers, I get that. But there's more at the FortiGuards. And just that, could you guys talk about this trend and the security business, because it's very clear that there's a collective sharing culture developing rapidly for societal benefit. Can you take a minute to explain that? >> Yeah, sure. I'll give you my thoughts, Aamir will add some to that too. So, from my point of view, I mean, there's various functions. So we've just talked about that last mile problem. That's the commercial aspect. We created a through FortiGuard Labs, FortiGuard services that are dynamic and updated to security products because you need intelligence products to be able to protect against intelligent attacks. That's just a defense again, going back to, how can we take that further? I mean, we're not law enforcement ourselves. We know a lot about the bad guys and the actors because of the intelligence work that we do, but we can't go in and prosecute. We can share knowledge and we can train prosecutors, right? This is a big challenge in the industry. A lot of prosecutors don't know how to take cybersecurity courses to court. And because of that, a lot of these cyber criminals reign free, and that's been a big challenge in the industry. So this has been close my heart over 10 years, I've been building a lot of these key relationships between private public sector, as an example, but also private sector, things like Cyber Threat Alliance. We're a founding member of the Cyber Threat Alliance. We have over 28 members in that Alliance, and it's about sharing intelligence to level that playing field because attackers roam freely. What I mean by that is there's no jurisdictions for them. Cyber crime has no borders. They can do a million things wrong and they don't care. We do a million things right, one thing wrong and it's a challenge. So there's this big collaboration. That's a big part of FortiGuard. Why exists too, as to make the industry better, to work on protocols and automation and really fight this together while remaining competitors. I mean, we have competitors out there, of course. And so it comes down to that last mile problems on is like, we can share intelligence within the industry, but it's only intelligence is just intelligence. How do you make it useful and actionable? That's where it comes down to technology integration. >> Aamir, what's your take on this societal benefit? Because, I would say instance, the Sony hack years ago that, when you have nation States, if they put troops on our soil, the government would respond, but yet virtually they're here and the private sector has to fend for themselves. There's no support. So I think this private public partnership thing is very relevant, I think is ground zero of the future build out of policy because we pay for freedom. Why don't we have cyber freedom if we're going to run a business, where is our help from the government? We pay taxes. So again, if a military showed up, you're not going to see companies fighting the foreign enemy, right? So again, this is a whole new changeover. What's your thought? >> It really is. You have to remember that cyber attacks puts everyone on an even playing field, right? I mean, now don't have to have a country that has invested a lot in weapons development or nuclear weapons or anything like that. Anyone can basically come up to speed on cyber weapons as long as an internet connection. So it evens the playing field, which makes it dangerous, I guess, for our enemies. But absolutely I think a lot of us, from a personal standpoint, a lot of us have seen research does I've seen organizations fail through cyber attacks. We've seen the frustration, we've seen, like besides organization, we've seen people like, just like grandma's lose their pictures of their other loved ones because they kind of, they've been attacked by ransomware. I think we take it very personally when people like innocent people get attacked and we make it our mission to make sure we can do everything we can to protect them. But I will add that at least here in the U.S. the federal government actually has a lot of partnerships and a lot of programs to help organizations with cyber attacks. The US-CERT is always continuously updating, organizations about the latest attacks and regard is another organization run by the FBI and a lot of companies like Fortinet. And even a lot of other security companies participate in these organizations. So everyone can come up to speed and everyone can share information. So we all have a fighting chance. >> It's a whole new wave of paradigm. You guys are on the cutting edge. Derek always great to see you, Aamir great to meet you remotely, looking forward to meeting in person when the world comes back to normal as usual. Thanks for the great insights. Appreciate it. >> Pleasure as always. >> Okay. Keep conversation here. I'm John Furrier, host of theCUBE. Great insightful conversation around security ransomware with a great demo. Check it out from Derek and Aamir from FortiGuard Labs. I'm John Furrier. Thanks for watching.
SUMMARY :
leaders all around the world. Derek, good to see you again, and it happens so fast. advantage of the situation. and automation, but the people. But for the folks that aren't in the weeds and I'll save that for the demo today, it's a pain in the butt to and the hackers are getting smart, They know that the tactics is sometimes the last stage of an attack. the best move to make, And that actually gets into the world of, the defense is critical. for the cybercriminal to operate. Let's roll the video. And this is where you would So the bottom line is you got the tools the ability to detect you look at something pops in the radar. So the proactive piece, again, It say's at the end of the day, it comes to the damages So Derek, I going to ask you because a lot of the times that, and the security business, because of the intelligence the government would respond, So it evens the playing field, Aamir great to meet you remotely, I'm John Furrier, host of theCUBE.
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
Derek | PERSON | 0.99+ |
John | PERSON | 0.99+ |
FBI | ORGANIZATION | 0.99+ |
Garmin | ORGANIZATION | 0.99+ |
Aamir Lakhani | PERSON | 0.99+ |
Aamir | PERSON | 0.99+ |
Derek Mankey | PERSON | 0.99+ |
August 2020 | DATE | 0.99+ |
Fortinet | ORGANIZATION | 0.99+ |
10 million | QUANTITY | 0.99+ |
FortiGuard Labs | ORGANIZATION | 0.99+ |
John Furrier | PERSON | 0.99+ |
Palo Alto | LOCATION | 0.99+ |
Microsoft | ORGANIZATION | 0.99+ |
Derek Manky | PERSON | 0.99+ |
50 | QUANTITY | 0.99+ |
Cyber Threat Alliance | ORGANIZATION | 0.99+ |
Panama | LOCATION | 0.99+ |
Fortinet FortiGuard Labs | ORGANIZATION | 0.99+ |
FortiGuard | ORGANIZATION | 0.99+ |
today | DATE | 0.99+ |
FortiGuards | ORGANIZATION | 0.99+ |
60 viruses | QUANTITY | 0.99+ |
Christmas | EVENT | 0.99+ |
1989 | DATE | 0.99+ |
Boston | LOCATION | 0.99+ |
four minute | QUANTITY | 0.99+ |
over 10 years | QUANTITY | 0.99+ |
one | QUANTITY | 0.98+ |
Sony | ORGANIZATION | 0.98+ |
each victim | QUANTITY | 0.98+ |
first ransom | QUANTITY | 0.98+ |
first half of 2020 | DATE | 0.98+ |
over 28 members | QUANTITY | 0.98+ |
101 ransomware | QUANTITY | 0.98+ |
20 years ago | DATE | 0.98+ |
three step | QUANTITY | 0.98+ |
windows | TITLE | 0.97+ |
Maldito | TITLE | 0.97+ |
Interpol | ORGANIZATION | 0.97+ |
P.O Box | ORGANIZATION | 0.96+ |
first | QUANTITY | 0.96+ |
one file | QUANTITY | 0.96+ |
over 235 | QUANTITY | 0.96+ |
US-CERT | ORGANIZATION | 0.95+ |
Silicon Valley | LOCATION | 0.95+ |
FIS | ORGANIZATION | 0.94+ |
PowerPoint | TITLE | 0.94+ |
a week | QUANTITY | 0.94+ |
two great guests | QUANTITY | 0.94+ |
IOC | ORGANIZATION | 0.93+ |
2010 | DATE | 0.91+ |
one thing | QUANTITY | 0.9+ |
Bitcoin | OTHER | 0.9+ |
Inderpal Bhandari, IBM | IBM DataOps 2020
from the cube studios in Palo Alto in Boston connecting with thought leaders all around the world this is a cube conversation hi buddy welcome this special digital presentation where we're covering the topic of data ops and specifically how IBM is really operationalizing and automating the data pipeline with data ops and with me is Interpol Bhandari who is the global chief data officer at IBM in Nepal has always great to see you thanks for coming on my pleasure you know the standard throw away question from guys like me is you know what keeps the chief data officer up at night well I know what's keeping you up at night it's kovat 19 how are you doing it's keeping keeping all of us yeah for sure so how you guys making out as a leader I'm interested in you know how you have responded with whether it's you know communications obviously you're doing much more stuff you know remotely you're not on airplanes certainly like you used to be but but what was your first move when you actually realized this was going to require a shift well I think one of the first things that I did was to test the ability of my organization who worked remotely this was well before the the recommendations came in from the government but just so that we wanted you know to be sure that this is something that we could pull off if there were extreme circumstances where even everybody was good and so that was one of the first things we did along with that I think another major activity that we embarked on is even that we had created this central data and AI platform for IBM using our hybrid multi cloud approach how could that be adapting very very quickly you helped with the covert situation but those were the two big items that my team embarked on very quickly and again like I said this is well before there was any recommendations from the government or even internally within IBM any recommendations but B we decided that we wanted to run ahead and make sure that we were ready to ready to operate in that fashion and I believe a lot of my colleagues did the same yeah there's a there's a conversation going on right now just around productivity hits that people may be taking because they really weren't prepared it sounds like you're pretty comfortable with the productivity impact that you're achieving oh I'm totally comfortable with the productivity in fact I will tell you that while we've gone down this spot we've realized that in some cases the productivity is actually going to be better when people are working from home and they're able to focus a lot more on the work aspect you know and this could this runs the gamut from the nature of the job where you know somebody who basically needs to be in the front of a computer and is remotely taking care of operations you know if they don't have to come in their productivity is gonna go up somebody like myself who had a long drive into work you know which I would use on phone calls but now that entire time is can be used a lot more productivity but not maybe in a lot more productive manner so there is a we realize that that there's going to be some aspects of productivity that will actually be helped by the situation provided you're able to deliver the services that you deliver with the same level of quality and satisfaction that you've always done now there were certain other aspects where you know productivity is going to be affected so you know my team there's a lot of whiteboarding that gets done there are lots of informal conversations that spark creativity but those things are much harder to replicate in a remote in life so we've got a sense of you know where we have to do some work what things together versus where we were actually going to be more productive but all in all they are very comfortable that we can pull this off no that's great I want to stay on Kovac for a moment and in the context of just data and data ops and you know why now obviously with a crisis like this it increases the imperative to really have your data act together but I want to ask you both specifically as it relates to Co vid why data ops is so important and then just generally why at this this point in our time so I mean you know the journey we've been on they you know when I joined our data strategy centered around the cloud data and AI mainly because IBM's business strategy was around that and because there wasn't the notion of ái in enterprise right there was everybody understood what AI means for the consumer but for the enterprise people don't really understand what it meant so our data strategy became one of actually making IBM itself into an AI and a BA and then using that as a showcase for our clients and customers who look a lot like us to make them into a eye on the prize and in a nutshell what that translated to was that one had to in few AI into the workflow of the key business processes of enterprise so if you think about that workflow is very demanding why do you have to be able to deliver data and insights on time just when it's needed otherwise you can essentially slow down the whole workflow of a major process with but to be able to pull all that off you need to have your own data very very streamlined so that a lot of it is automated and you're able to deliver those insights as the people who are involved in the workflow needed so we've spent a lot of time while we were making IBM into an AI enterprise and infusing AI into our keepers and thus processes into essentially a data ops pipeline that was very very streamlined which then allowed us to very quickly adapt to the covert 19 situation and I'll give you one specific example that we'll go to you know how one would say one could essentially leverage that capability that I just talked about to do this so one of the key business processes that we had taken aim at was our supply chain you know we're a global company and our supply chain is critical we have lots of suppliers and they are all over the globe and we have different types of products so that you know it has a multiplicative fact is we go from each of those you have other additional suppliers and you have events you have other events you have calamities you have political events so we have to be able to very quickly understand the risk associated with any of those events with regard to our supply chain and make appropriate adjustments on the fly so that was one of the key applications that we built on our central data and the Aqua and as part of a data ops pipeline that meant he ingested the ingestion of the several hundred sources of data had to be blazingly fast and also refreshed very very quickly also we had to then aggregate data from the outside from external sources that had to do with weather related events that had to do with political events social media feeds etcetera and overlay that on top of our map of interest with regard to our supply chain sites and also where they were supposed to deliver we'd also weaved in our capabilities here to track those shipments as they flowed and have that data flow back as well so that we would know exactly where where things were this is only possible because we had a streamlined data ops capability and we had built this central data Nai platform for IBM now you flip over to the covert 19 situation when go with 19 you know emerged and we began to realize that this was going to be a significant significant pandemic what we were able to do very quickly was to overlay the Kovach 19 incidents on top of our sites of interest as well as pick up what was being reported about those sites of interest and provide that over to our business continuity so this became an immediate exercise that we embarked but it wouldn't have been possible if you didn't have the foundation of the data ops pipeline as well as that central data Nai platform in place to help you do that very very quickly and adapt so so what I really like about this story and something that I want to drill into is it essentially a lot of organizations have a real tough time operationalizing AI and fusing it to use your word and the fact that you're doing it is really a good proof point that I want to explore a little bit so you're essentially there was a number of aspects of what you just described there was the data quality piece with your data quality in theory anyway is gonna go up with more data if you can handle it and the other was speed time to insight so you can respond more quickly if it's think about this Kovan situation if your days behind or weeks behind which is not uncommon you know sometimes even worse you just can't respond I mean these things change daily sometimes certainly within the day so is that right that's kind of the the business outcome and objective that you guys were after yes you know so trauma from an infused AI into your business processes by the overarching outcome metric that one focuses on is end to end cycle so you take that process the end-to-end process and you're trying to reduce the end-to-end cycle time by you know several factors several orders of magnitude we did for instance in my organization that have to do with the generation of metadata is data about data and that's usually a very time-consuming process and we've reduced that by over 95% by using AI you actually help in the metadata generation itself and that's applied now across the board for many different business processes that you know iBM has that's the same kind of principle that was you you'll be able to do that so that foundation essentially enables you to go after that cycle time reduction right off the bat so when you get to a situation like of open 19 situation which demands urgent action your foundation is already geared to deliver on that so I think actually we might have a graphic and then the second graphic guys if you bring up this second one I think this is Interpol what you're talking about here that sort of 95 percent reduction guys if you could bring that up would take a look at it so this is maybe not a co vid use case yeah here it is so that 95 percent reduction in in cycle time improving and data quality what we talked about there's actually some productivity metrics right this is what you're talking about here in this metadata example correct yeah yes the middle do that right it's so central to everything that one does with data I mean it's basically data about data and this is really the business metadata that we're talking about which is once you have data in your data Lee if you don't have business metadata describing what that data is then it's very hard for people who are trying to do things to determine whether they can even whether they even have access to the right data and typically this process has been done manually because somebody looks at the data they looks at the fields and they describe it and it could easily take months and what we did was we essentially use a deep learning and a natural language processing approach looked at all the data that we've had historically over an idea and we've automated the metadata generation so whether it was you know you were talking about both the data relevant for probit team or for supply chain or for a receivable process any one of our business processes this is one of those fundamental steps that one must go through to be able to get your data ready for action and if you were able to take that cycle time for that step and reduce it by 95% you can imagine the acceleration yeah and I liked it we were saying before you talk about the end to end a concept you're applying system thinking here which is very very important because you know a lot of a lot of points that I talked you'll they'll be they're so focused on one metric may be optimizing one component of that end to end but it's really the overall outcome that you're trying to achieve you you may sometimes you know be optimizing one piece but not the whole so that systems thinking is is very very important isn't it the system's thinking is extremely important overall no matter you know where you're involved in the process of designing the system but if you're the data guy it's incredibly important because not only does that give you an insight into the cycle time reduction but it also gives it clues you in into what standardization is necessary in the data so that you're able to support an eventual out you know a lot of people will go down the path of data governance and creation of data standard and you can easily boil the ocean trying to do that but if you actually start with an end-to-end view of your key processes and that by extension the outcomes associated with those processes as well as the user experience at the end of those processes and kind of then work backwards as to what are the standards that you need for the data that's going to feed into all that that's how you arrive at you know a viable practical data standards effort that you can essentially push forward with so there's there are multiple aspects when you take that end-to-end system you that helps the chief later one of the other tenets of data ops is really the ability across the organization for everybody to have visibility communications it's very key we've got another graphic that I want to show around the organizational you know in the right regime and this is a complicated situation for a lot of people but it's imperative guys if you bring up the first graphic it's imperative that organizations you know fine bring in the right stakeholders and actually identify those individuals that are going to participate so that there's full visibility everybody understands what their their roles are they're not in in silos so a guys if you could show us that first graphic that would be great but talk about the organization and the right regime they're Interpol yes yes I believe you're going to what you're gonna show up is actually my organization but I think it's yes it's very very illustrative of what one has to set up to be able to pull off the kind of impact you know so let's say we talked about that central data and AI platform that's driving the entire enterprise and you're infusing AI into key business processes like the supply chain you then create applications like the operational risk insights that we talked about and then extend it over to a faster merging and changing situation like the overt nineteen you need an organization that obviously reflects the technical aspects of the plan right so you have to have the data engineering arm and in my case there's a lot of emphasis around because that's one of those skill set areas that's really quite rare and but also very very powerful so they're the major technology arms of that there's also the governance arm that I talked about where you have to produce a set of standards and implement them and enforce them so that you're able to make this end-to-end impact but then there's also there's a there's an adoption where there's a there's a group that reports in to me very very you know empowered which essentially has to convince the rest of the organization to adopt but the key to their success has been in power in the sense that they are empowered to find like-minded individuals in our key business processes who are also empowered and if they agree they just move forward and go ahead and do it because you know we've already provided the central capabilities by central I don't mean they're all in one location we're completely global and you know it's it's it's a hybrid multi-cloud set up but it's central in the sense that it's one source to come for for trusted data as well as the expertise that you need from an AI standpoint to be able to move forward and deliver the business outcome so when these business schemes come together with the adoption that's where the magic hand so that's another another aspect of the organization that's critical and then we've also got a data officer council that I chair and that has to do with the people who are the chief data officer z' of the individual business units that we have and they're kind of my extended team into the rest of the organization and we leverage that bolt from a adoption of the platform standpoint but also in terms of defining and enforcing standard it helps us do want to come back the Ovid talked a little bit about business resiliency people I think you've probably seen the news that IBM's you know providing super computer resources to the government to fight coronavirus you've also just announced that some some RTP folks are helping first responders and nonprofits and providing capabilities for no charge which is awesome I mean it's the kind of thing look I'm sensitive the companies like IBM you know you don't want to appear to be ambulance-chasing in these times however IBM and other big tech companies you're in a position to help and that's what you're doing here so maybe you could talk a little bit about what you're doing in this regard and then we'll tie it up with just business resiliency and the importance of data right right so you know I'd explained the operational risk insights application that we had which we were using internally and be covert nineteen even be using it we were using it primarily to assess the risk to our supply chain from various events and then essentially react very very quickly to those through those events so you could manage the situation well we realize that this is something that you know several non government NGOs that big they could essentially use the ability because they have to manage many of these situations like natural disasters and so we've given that same capability to the NGOs to you and to help them to help them streamline their planning and their thinking by the same token but you talked about Oh with nineteen that same capability with the poet mine team data overlaid on top of them essentially becomes a business continuity planning and resilience because let's say I'm a supply chambers right now I can look the incidence of probe ignite and I can and I know where my suppliers are and I can see the incidence and I can say oh yes know this supplier and I can see that the incidence is going up this is likely to be affected let me move ahead and start making plans backup plans just in case it reaches a crisis level then on the other hand if you're somebody in our revenue planning you know on the finance side and you know where your keep clients and customers are located again by having that information overlaid with those sites you can make your own judgments and you can make your own assessment to do that so that's how it translates over into a business continuity and resilient resilience planning - we are internally doing that now - every department you know that's something that we are actually providing them this capability because we could build rapidly on what we had already done and to be able to do that and then as we get inside into what each of those departments do with that data because you know once they see that data once they overlay it to their sites of interest and this is you know anybody and everybody in IBM because no matter what department they're in there are going to be sites of interest that are going to be affected and they have an understanding of what those sites of interest mean in the context of the planning that they're doing and so they'll be able to make judgments but as we gain a better understanding of that we will automate those capabilities more and more for each of those specific areas and now you're talking about a comprehensive approach an AI approach to business continuity and resilience planning in the context of a large complicated organization like IBM which obviously will be of great interest to enterprise clients and customers right one of the things that we're researching now is trying to understand you know what about this crisis is gonna be permanent some things won't be but but we think many things will be there's a lot of learnings do you think that organizations will rethink business resiliency in this context that they might sub optimize profitability for example to be more prepared for crises like this with better business resiliency and what role would data play in that so no it's a very good question and timely question Dave so I mean clearly people have understood that with regard to such a pandemic the first line of beef right is it is it's not going to be so much on the medicine side because the vaccine is not even we won't be available for a period of time it has to go to development so the first line of defense is actually to take a quarantine like a pro like we've seen play out across the world and then that in effect results in an impact on the businesses right in the economic climate and the businesses there's an impact I think people have realized this now they will obviously factor this in into their into how they do business will become one of those things from if this is time talking about how this becomes permanent I think it's going to become one of those things that if you're a responsible enterprise you are going to be planning for you're going to know how to implement this on the second go-around so obviously you put those frameworks and structures in place and there will be a certain cost associated with them and one could argue that that could eat into the profitability on the other hand what I would say is because these two points really that these are fast emerging fluid situations you have to respond very very quickly to those you will end up laying out a foundation pretty much like we did which enables you to really accelerate your pipeline right so the data ops pipelines we talked about there there's a lot of automation so that you can react very quickly you know data ingestion very very rapidly that you're able to you know do that kind of thing the metadata generation just the entire pipeline that we're talking about that you're able to respond and very quickly bring in new data and then aggregated at the right levels infuse it into the workflows and then deliver it to the right people at the right time I will you know that will become a must now but once you do that you could argue that there is a cost associated with doing that but we know that the cycle time reductions on things like that they can run you know I mean I gave you the example of 95 percent you know on average we see like a 70% end to end cycle time era where we've implemented the approach that's been pretty pervasive with an idea across a business process so that in a sense in in essence then actually becomes a driver for profitability so yes it might you know this might back people into doing that but I would argue that that's probably something that's going to be very good long term for the enterprises involved and they'll be able to leverage that in their in their business and I think that just the competitive pressure of having to do that will force everybody down that path mean but I think it'll be eventually a good that end and cycle time compression is huge and I like what you're saying because it's it's not just a reduction in the expected loss during a crisis there's other residual benefits to the organization Interpol thanks so much for coming on the cube and sharing this really interesting and deep case study I know there's a lot more information out there so really appreciate your time all right take care buddy thanks for watching and this is Dave Allante for the cube and we will see you next time [Music]
**Summary and Sentiment Analysis are not been shown because of improper transcript**
ENTITIES
Entity | Category | Confidence |
---|---|---|
Dave Allante | PERSON | 0.99+ |
IBM | ORGANIZATION | 0.99+ |
95 percent | QUANTITY | 0.99+ |
95 percent | QUANTITY | 0.99+ |
70% | QUANTITY | 0.99+ |
Palo Alto | LOCATION | 0.99+ |
Dave | PERSON | 0.99+ |
95% | QUANTITY | 0.99+ |
Interpol | ORGANIZATION | 0.99+ |
Nepal | LOCATION | 0.99+ |
Interpol Bhandari | PERSON | 0.99+ |
two points | QUANTITY | 0.99+ |
nineteen | QUANTITY | 0.99+ |
first graphic | QUANTITY | 0.99+ |
first move | QUANTITY | 0.99+ |
Boston | LOCATION | 0.99+ |
first line | QUANTITY | 0.99+ |
one | QUANTITY | 0.98+ |
two big items | QUANTITY | 0.98+ |
one piece | QUANTITY | 0.98+ |
Kovach 19 | EVENT | 0.97+ |
pandemic | EVENT | 0.97+ |
one metric | QUANTITY | 0.96+ |
Inderpal Bhandari | PERSON | 0.96+ |
Kovac | ORGANIZATION | 0.95+ |
each | QUANTITY | 0.94+ |
one component | QUANTITY | 0.94+ |
Kovan | EVENT | 0.94+ |
over 95% | QUANTITY | 0.93+ |
both | QUANTITY | 0.93+ |
several hundred sources | QUANTITY | 0.92+ |
first line of beef | QUANTITY | 0.92+ |
iBM | ORGANIZATION | 0.91+ |
second graphic | QUANTITY | 0.91+ |
second one | QUANTITY | 0.91+ |
one source | QUANTITY | 0.9+ |
one of those things | QUANTITY | 0.9+ |
first things | QUANTITY | 0.88+ |
a lot of people | QUANTITY | 0.88+ |
lot of a lot of points | QUANTITY | 0.79+ |
IBM DataOps | ORGANIZATION | 0.78+ |
coronavirus | OTHER | 0.77+ |
second go | QUANTITY | 0.77+ |
lot | QUANTITY | 0.75+ |
first | QUANTITY | 0.74+ |
a lot of people | QUANTITY | 0.73+ |
19 | OTHER | 0.73+ |
19 situation | QUANTITY | 0.72+ |
one of those fundamental steps | QUANTITY | 0.71+ |
non government | QUANTITY | 0.6+ |
Ovid | ORGANIZATION | 0.55+ |
2020 | DATE | 0.55+ |
more | QUANTITY | 0.51+ |
19 | EVENT | 0.41+ |
Julie Lockner, IBM | IBM DataOps 2020
>>from the Cube Studios in Palo Alto and Boston connecting with thought leaders all around the world. This is a cube conversation. >>Hi, everybody. This is Dave Volante with Cuban. Welcome to the special digital presentation. We're really digging into how IBM is operational izing and automating the AI and data pipeline not only for its clients, but also for itself. And with me is Julie Lockner, who looks after offering management and IBM Data and AI portfolio really great to see you again. >>Great, great to be here. Thank you. Talk a >>little bit about the role you have here at IBM. >>Sure, so my responsibility in offering >>management and the data and AI organization is >>really twofold. One is I lead a team that implements all of the back end processes, really the operations behind any time we deliver a product from the Data and AI team to the market. So think about all of the release cycle management are seeing product management discipline, etcetera. The other role that I play is really making sure that I'm We are working with our customers and making sure they have the best customer experience and a big part of that is developing the data ops methodology. It's something that I needed internally >>from my own line of business execution. But it's now something that our customers are looking for to implement in their shops as well. >>Well, good. I really want to get into that. So let's let's start with data ops. I mean, I think you know, a lot of people are familiar with Dev Ops. Not maybe not everybody's familiar with data ops. What do we need to know about data? >>Well, I mean, you bring up the point that everyone knows Dev ops. And in fact, I think you know what data ops really >>does is bring a lot of the benefits that Dev Ops did for application >>development to the data management organizations. So when we look at what is data ops, it's a data management. Uh, it is a data management set of principles that helps organizations bring business ready data to their consumers. Quickly. It takes it borrows from Dev ops. Similarly, where you have a data pipeline that associates a business value requirement. I have this business initiative. It's >>going to drive this much revenue or this must cost >>savings. This is the data that I need to be able to deliver it. How do I develop that pipeline and map to the data sources Know what data it is? Know that I can trust it. So ensuring >>that it has the right quality that I'm actually using, the data that it was meant >>for and then put it to use. So in in history, most data management practices deployed a waterfall like methodology. Our implementation methodology and what that meant is all the data pipeline >>projects were implemented serially, and it was done based on potentially a first in first out program management office >>with a Dev Ops mental model and the idea of being able to slice through all of the different silos that's required to collect the data, to organize it, to integrate it, the validate its quality to create those data integration >>pipelines and then present it to the dashboard like if it's a Cognos dashboard >>or a operational process or even a data science team, that whole end to end process >>gets streamlined through what we're pulling data ops methodology. >>So I mean, as you well know, we've been following this market since the early days of Hadoop people struggle with their data pipelines. It's complicated for them, there's a a raft of tools and and and they spend most of their time wrangling data preparing data moving data quality, different roles within the organization. So it sounds like, you know, to borrow from from Dev Ops Data offices is all about streamlining that data pipeline, helping people really understand and communicate across. End the end, as you're saying, But but what's the ultimate business outcome that you're trying to drive? >>So when you think about projects that require data to again cut costs Teoh Artemia >>business process or drive new revenue initiatives, >>how long does it take to get from having access to the data to making it available? That duration for every time delay that is spent wasted trying to connect to data sources, trying to find subject matter experts that understand what the data means and can verify? It's quality, like all of those steps along those different teams and different disciplines introduces delay in delivering high quality data fat, though the business value of data ops is always associated with something that the business is trying to achieve but with a time element so if it's for every day, we don't have this data to make a decision where either making money or losing money, that's the value proposition of data ops. So it's about taking things that people are already doing today and figuring out the quickest way to do it through automation or work flows and just cutting through all the political barriers >>that often happens when these data's cross different organizational boundaries. >>Yes, sir, speed, Time to insights is critical. But in, you know, with Dev Ops, you really bringing together of the skill sets into, sort of, you know, one Super Dev or one Super ops. It sounds with data ops. It's really more about everybody understanding their role and having communication and line of sight across the entire organization. It's not trying to make everybody else, Ah, superhuman data person. It's the whole It's the group. It's the team effort, Really. It's really a team game here, isn't it? >>Well, that's a big part of it. So just like any type of practice, there's people, aspects, process, aspects and technology, right? So people process technology, and while you're you're describing it, like having that super team that knows everything about the data. The only way that's possible is if you have a common foundation of metadata. So we've seen a surgeons in the data catalog market in the last, you know, 67 years. And what what the what? That the innovation in the data catalog market has actually enabled us to be able >>to drive more data ops pipelines. >>Meaning as you identify data assets you captured the metadata capture its meaning. You capture information that can be shared, whether they're stakeholders, it really then becomes more of a essential repository for people don't really quickly know what data they have really quickly understand what it means in its quality and very quickly with the right proper authority, like privacy rules included. Put it to use >>for models, um, dashboards, operational processes. >>Okay. And we're gonna talk about some examples. And one of them, of course, is IBM's own internal example. But help us understand where you advise clients to start. I want to get into it. Where do I get started? >>Yeah, I mean, so traditionally, what we've seen with these large data management data governance programs is that sometimes our customers feel like this is a big pill to swallow. And what we've said is, Look, there's an operator. There's an opportunity here to quickly define a small project, align into high value business initiative, target something that you can quickly gain access to the data, map out these pipelines and create a squad of skills. So it includes a person with Dev ops type programming skills to automate an instrument. A lot of the technology. A subject matter expert who understands the data sources in it's meeting the line of business executive who translate bringing that information to the business project and associating with business value. So when we say How do you get started? We've developed A I would call it a pretty basic maturity model to help organizations figure out. Where are they in terms of the technology, where are they in terms of organizationally knowing who the right people should be involved in these projects? And then, from a process perspective, we've developed some pretty prescriptive project plans. They help you nail down. What are the data elements that are critical for this business business initiative? And then we have for each role what their jobs are to consolidate the data sets map them together and present them to the consumer. We find that six week projects, typically three sprints, are perfect times to be able to a timeline to create one of these very short, quick win projects. Take that as an opportunity to figure out where your bottlenecks are in your own organization, where your skill shortages are, and then use the outcome of that six week sprint to then focus on billing and gaps. Kick off the next project and iterating celebrate the success and promote the success because >>it's typically tied to a business value to help them create momentum for the next one. >>That's awesome. I want to get into some examples, I mean, or we're both Massachusetts based. Normally you'd be in our studio and we'd be sitting here for face to face of obviously with Kobe. 19. In this crisis world sheltering in place, you're up somewhere in New England. I happened to be in my studio, but I'm the only one here, so relate this to cove it. How would data ops, or maybe you have a, ah, a concrete example in terms of how it's helped, inform or actually anticipate and keep up to date with what's happening with both. >>Yeah, well, I mean, we're all experiencing it. I don't think there's a person >>on the planet who hasn't been impacted by what's been going on with this Cupid pandemic prices. >>So we started. We started down this data obscurity a year ago. I mean, this isn't something that we just decided to implement a few weeks ago. We've been working on developing the methodology, getting our own organization in place so that we could respond the next time we needed to be able todo act upon a data driven decision. So part of the step one of our journey has really been working with our global chief data officer, Interpol, who I believe you have had an opportunity to meet with an interview. So part of this year Journey has been working with with our corporate organization. I'm in a line of business organization where we've established the roles and responsibilities we've established the technology >>stack based on our cloud pack for data and Watson knowledge padlock. >>So I use that as the context. For now, we're faced with a pandemic prices, and I'm being asked in my business unit to respond very quickly. How can we prioritize the offerings that are going to help those in critical need so that we can get those products out to market? We can offer a 90 day free use for governments and hospital agencies. So in order for me to do that as a operations lead or our team, I needed to be able to have access to our financial data. I needed to have access to our product portfolio information. I needed to understand our cloud capacity. So in order for me to be able to respond with the offers that we recently announced and you'll you can take a look at some of the examples with our Watson Citizen Assistant program, where I was able to provide the financial information required for >>us to make those products available from governments, hospitals, state agencies, etcetera, >>that's a That's a perfect example. Now, to set the stage back to the corporate global, uh, the chief data office organization, they implemented some technology that allowed us to, in just data, automatically classify it, automatically assign metadata, automatically associate data quality so that when my team started using that data, we knew what the status of that information >>was when we started to build our own predictive models. >>And so that's a great example of how we've been partnered with a corporate central organization and took advantage of the automated, uh, set of capabilities without having to invest in any additional resources or head count and be able to release >>products within a matter of a couple of weeks. >>And in that automation is a function of machine intelligence. Is that right? And obviously, some experience. But you couldn't you and I when we were consultants doing this by hand, we couldn't have done this. We could have done it at scale anyway. It is it is it Machine intelligence and AI that allows us to do this. >>That's exactly right. And you know, our organization is data and AI, so we happen to have the research and innovation teams that are building a lot of this technology, so we have somewhat of an advantage there, but you're right. The alternative to what I've described is manual spreadsheets. It's querying databases. It's sending emails to subject matter experts asking them what this data means if they're out sick or on vacation. You have to wait for them to come back, and all of this was a manual process. And in the last five years, we've seen this data catalog market really become this augmented data catalog, and the augmentation means it's automation through AI. So with years of experience and natural language understanding, we can home through a lot of the metadata that's available electronically. We can calm for unstructured data, but we can categorize it. And if you have a set of business terms that have industry standard definitions through machine learning, we can automate what you and I did as a consultant manually in a matter of seconds. That's the impact that AI is have in our organization, and now we're bringing this to the market, and >>it's a It's a big >>part of where I'm investing. My time, both internally and externally, is bringing these types >>of concepts and ideas to the market. >>So I'm hearing. First of all, one of the things that strikes me is you've got multiple data, sources and data that lives everywhere. You might have your supply chain data in your er p. Maybe that sits on Prem. You might have some sales data that's sitting in a sas in a cloud somewhere. Um, you might have, you know, weather data that you want to bring in in theory. Anyway, the more data that you have, the better insights that you could gather assuming you've got the right data quality. But so let me start with, like, where the data is, right? So So it's it's anywhere you don't know where it's going to be, but you know you need it. So that's part of this right? Is being able >>to get >>to the data quickly. >>Yeah, it's funny. You bring it up that way. I actually look a little differently. It's when you start these projects. The data was in one place, and then by the time you get through the end of a project, you >>find out that it's moved to the cloud, >>so the data location actually changes. While we're in the middle of projects, we have many or even during this this pandemic crisis. We have many organizations that are using this is an opportunity to move to SAS. So what was on Prem is now cloud. But that shouldn't change the definition of the data. It shouldn't change. It's meaning it might change how you connect to it. It might also change your security policies or privacy laws. Now, all of a sudden, you have to worry about where is that data physically located? And am I allowed to share it across national boundaries right before we knew physically where it waas. So when you think about data ops, data ops is a process that sits on top of where the data physically resides. And because we're mapping metadata and we're looking at these data pipelines and automated work flows, part of the design principles are to set it up so that it's independent of where it resides. However, you have to have placeholders in your metadata and in your tool chain, where we're automating these work flows so that you can accommodate when the data decides to move. Because the corporate policy change >>from on prem to cloud. >>And that's a big part of what Data ops offers is the same thing. By the way, for Dev ops, they've had to accommodate building in, you know, platforms as a service versus on from the development environments. It's the same for data ops, >>and you know, the other part that strikes me and listening to you is scale, and it's not just about, you know, scale with the cloud operating model. It's also about what you were talking about is you know, the auto classification, the automated metadata. You can't do that manually. You've got to be able to do that. Um, in order to scale with automation, That's another key part of data office, is it not? >>It's a well, it's a big part of >>the value proposition and a lot of the part of the business case. >>Right then you and I started in this business, you know, and big data became the thing. People just move all sorts of data sets to these Hadoop clusters without capturing the metadata. And so as a result, you know, in the last 10 years, this information is out there. But nobody knows what it means anymore. So you can't go back with the army of people and have them were these data sets because a lot of the contact was lost. But you can use automated technology. You can use automated machine learning with natural, understand natural language, understanding to do a lot of the heavy lifting for you and a big part of data ops, work flows and building these pipelines is to do what we call management by exception. So if your algorithms say 80% confident that this is a phone number and your organization has a low risk tolerance, that probably will go to an exception. But if you have a you know, a match algorithm that comes back and says it's 99% sure this is an email address, right, and you have a threshold that's 98%. It will automate much of the work that we used to have to do manually. So that's an example of how you can automate, eliminate manual work and have some human interaction based on your risk threshold. >>That's awesome. I mean, you're right, the no schema on write said. I throw it into a data lake. Data Lake becomes a data swamp. We all know that joke. Okay, I want to understand a little bit, and maybe you have some other examples of some of the use cases here, but there's some of the maturity of where customers are. It seems like you've got to start by just understanding what data you have, cataloging it. You're getting your metadata act in order. But then you've got you've got a data quality component before you can actually implement and get yet to insight. So, you know, where are customers on the maturity model? Do you have any other examples that you can share? >>Yeah. So when we look at our data ops maturity model, we tried to simplify, and I mentioned this earlier that we try to simplify it so that really anybody can get started. They don't have to have a full governance framework implemented to to take advantage of the benefits data ops delivers. So what we did is we said if you can categorize your data ops programs into really three things one is how well do you know your data? Do you even know what data you have? The 2nd 1 is, and you trust it like, can you trust it's quality? Can you trust it's meeting? And the 3rd 1 is Can you put it to use? So if you really think about it when you begin with what data do you know, write? The first step is you know, how are you determining what data? You know? The first step is if you are using spreadsheets. Replace it with a data catalog. If you have a department line of business catalog and you need to start sharing information with the department's, then start expanding to an enterprise level data catalog. Now you mentioned data quality. So the first step is do you even have a data quality program, right. Have you even established what your criteria are for high quality data? Have you considered what your data quality score is comprised of? Have you mapped out what your critical data elements are to run your business? Most companies have done that for there. They're governed processes. But for these new initiatives And when you identify, I'm in my example with the covert prices, what products are we gonna help bring to market quickly? I need to be able to >>find out what the critical data elements are. And can I trust it? >>Have I even done a quality scan and have teams commented on it's trustworthiness to be used in this case, If you haven't done anything like that in your organization, that might be the first place to start. Pick the critical data elements for this initiative, assess its quality, and then start to implement the work flows to re mediate. And then when you get to putting it to use, there's several methods for making data available. One is simply making a gate, um, are available to a small set of users. That's what most people do Well, first, they make us spreadsheet of the data available, But then, if they need to have multiple people access it, that's when, like a Data Mart might make sense. Technology like data virtualization eliminates the need for you to move data as you're in this prototyping phase, and that's a great way to get started. It doesn't cost a lot of money to get a virtual query set up to see if this is the right join or the right combination of fields that are required for this use case. Eventually, you'll get to the need to use a high performance CTL tool for data integration. But Nirvana is when you really get to that self service data prep, where users can weary a catalog and say these are the data sets I need. It presents you a list of data assets that are available. I can point and click at these columns I want as part of my data pipeline and I hit go and automatically generates that output or data science use cases for it. Bad news, Dashboard. Right? That's the most mature model and being able to iterate on that so quickly that as soon as you get feedback that that data elements are wrong or you need to add something, you can do it. Push button. And that's where data obscurity should should bring organizations too. >>Well, Julie, I think there's no question that this covert crisis is accentuated the importance of digital. You know, we talk about digital transformation a lot, and it's it's certainly riel, although I would say a lot of people that we talk to we'll say, Well, you know, not on my watch. Er, I'll be retired before that all happens. Well, this crisis is accelerating. That transformation and data is at the heart of it. You know, digital means data. And if you don't have data, you know, story together and your act together, then you're gonna you're not gonna be able to compete. And data ops really is a key aspect of that. So give us a parting word. >>Yeah, I think This is a great opportunity for us to really assess how well we're leveraging data to make strategic decisions. And if there hasn't been a more pressing time to do it, it's when our entire engagement becomes virtual like. This interview is virtual right. Everything now creates a digital footprint that we can leverage to understand where our customers are having problems where they're having successes. You know, let's use the data that's available and use data ops to make sure that we can generate access. That data? No, it trust it, Put it to use so that we can respond to >>those in need when they need it. >>Julie Lockner, your incredible practitioner. Really? Hands on really appreciate you coming on the Cube and sharing your knowledge with us. Thank you. >>Thank you very much. It was a pleasure to be here. >>Alright? And thank you for watching everybody. This is Dave Volante for the Cube. And we will see you next time. >>Yeah, yeah, yeah, yeah, yeah
SUMMARY :
from the Cube Studios in Palo Alto and Boston connecting with thought leaders all around the world. portfolio really great to see you again. Great, great to be here. from the Data and AI team to the market. But it's now something that our customers are looking for to implement I mean, I think you know, I think you know what data ops really Similarly, where you have a data pipeline that associates a This is the data that I need to be able to deliver it. for and then put it to use. So it sounds like, you know, that the business is trying to achieve but with a time element so if it's for every you know, with Dev Ops, you really bringing together of the skill sets into, sort of, in the data catalog market in the last, you know, 67 years. Meaning as you identify data assets you captured the metadata capture its meaning. But help us understand where you advise clients to start. So when we say How do you get started? it's typically tied to a business value to help them create momentum for the next or maybe you have a, ah, a concrete example in terms of how it's helped, I don't think there's a person on the planet who hasn't been impacted by what's been going on with this Cupid pandemic Interpol, who I believe you have had an opportunity to meet with an interview. So in order for me to Now, to set the stage back to the corporate But you couldn't you and I when we were consultants doing this by hand, And if you have a set of business terms that have industry part of where I'm investing. Anyway, the more data that you have, the better insights that you could The data was in one place, and then by the time you get through the end of a flows, part of the design principles are to set it up so that it's independent of where it for Dev ops, they've had to accommodate building in, you know, and you know, the other part that strikes me and listening to you is scale, and it's not just about, So you can't go back with the army of people and have them were these data I want to understand a little bit, and maybe you have some other examples of some of the use cases So the first step is do you even have a data quality program, right. And can I trust it? able to iterate on that so quickly that as soon as you get feedback that that data elements are wrong And if you don't have data, you know, Put it to use so that we can respond to Hands on really appreciate you coming on the Cube and sharing Thank you very much. And we will see you next time.
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
Julie | PERSON | 0.99+ |
Julie Lockner | PERSON | 0.99+ |
IBM | ORGANIZATION | 0.99+ |
Dave Volante | PERSON | 0.99+ |
New England | LOCATION | 0.99+ |
90 day | QUANTITY | 0.99+ |
99% | QUANTITY | 0.99+ |
80% | QUANTITY | 0.99+ |
Massachusetts | LOCATION | 0.99+ |
Data Mart | ORGANIZATION | 0.99+ |
first step | QUANTITY | 0.99+ |
98% | QUANTITY | 0.99+ |
Palo Alto | LOCATION | 0.99+ |
Boston | LOCATION | 0.99+ |
67 years | QUANTITY | 0.99+ |
six week | QUANTITY | 0.99+ |
Cube Studios | ORGANIZATION | 0.99+ |
both | QUANTITY | 0.99+ |
one | QUANTITY | 0.99+ |
a year ago | DATE | 0.99+ |
first | QUANTITY | 0.98+ |
Dev Ops | ORGANIZATION | 0.98+ |
2nd 1 | QUANTITY | 0.97+ |
One | QUANTITY | 0.97+ |
First | QUANTITY | 0.97+ |
Interpol | ORGANIZATION | 0.97+ |
one place | QUANTITY | 0.97+ |
each role | QUANTITY | 0.97+ |
Hadoop | TITLE | 0.95+ |
Kobe | PERSON | 0.95+ |
SAS | ORGANIZATION | 0.95+ |
Cupid pandemic | EVENT | 0.94+ |
today | DATE | 0.93+ |
3rd 1 | QUANTITY | 0.93+ |
this year | DATE | 0.93+ |
few weeks ago | DATE | 0.88+ |
Prem | ORGANIZATION | 0.87+ |
last five years | DATE | 0.87+ |
2020 | DATE | 0.85+ |
three sprints | QUANTITY | 0.81+ |
one Super | QUANTITY | 0.8+ |
Nirvana | ORGANIZATION | 0.79+ |
Cuban | ORGANIZATION | 0.77+ |
three things | QUANTITY | 0.76+ |
pandemic | EVENT | 0.74+ |
step one | QUANTITY | 0.71+ |
one of them | QUANTITY | 0.7+ |
last 10 years | DATE | 0.69+ |
Dev Ops | TITLE | 0.69+ |
Teoh Artemia | ORGANIZATION | 0.68+ |
Cognos | ORGANIZATION | 0.61+ |
Watson Citizen Assistant | TITLE | 0.6+ |
Dev ops | TITLE | 0.6+ |
Cube | COMMERCIAL_ITEM | 0.57+ |
ops | ORGANIZATION | 0.54+ |
weeks | QUANTITY | 0.48+ |
Cube | ORGANIZATION | 0.47+ |
couple | QUANTITY | 0.47+ |
Watson | TITLE | 0.42+ |
Ritika Gunnar, IBM | IBM Think 2020
>>Yeah, >>from the Cube Studios in Palo Alto and Boston. It's the Cube covering IBM. Think brought to you by IBM. >>Everybody, this is Dave Vellante of the Cube. Welcome back. The continuous coverage that we're running here of the IBM Think Digital 2020 Experience. I'm with Radica Gunnar, who is a longtime Cube alum. She's the vice president for Data and AI. Expert labs and learning Radica. Always a pleasure. I wish we were seeing each other face to face in San Francisco. But, you know, we have to make the best. >>Always a pleasure to be with you, Dave. >>So, listen, um, we last saw each other in Miami Attain IBM data event. You hear a lot of firsts in the industry. You hear about Cloud? First, you hear about data. First hear about AI first. I'm really interested in how you see AI first coming customers. They want to operationalize ai. They want to be data first. They see cloud, you know, is basic infrastructure to get there, but ultimately they want insights out of data. And that's where AI comes in. What's your point of view on this? >>I think any client that's really trying to establish how to be able to develop a AI factory in their organization so that they're embedding AI across the most pervasive problems that they have in their order. They need to be able to start first with the data. That's why we have the AI ladder, where we really think the foundation is about how clients organized there to collect their data, organize their data, analyze it, infuse it in the most important applications and, of course, use that whole capability to be able to modernize what they're doing. So we all know to be able to have good ai, you need a good foundational information, architecture and the US A lot of the first steps we have with our clients is really starting with data doing an analysis of where are you with the data maturity? Once you have that, it becomes easier to start applying AI and then to scale AI across the business. >>So unpack that a little bit and talk about some of the critical factors and the ingredients that are really necessary to be successful. What are you seeing with customers? >>Well, to be successful with, a lot of these AI projects have mentioned. It starts with the data, and when we come to those kind of characteristics, you would often think that the most important thing is the technology. It's not that is a myth. It's not the reality. What we found is some of the most important things start with really understanding and having a sponsor who understands the importance of the AI capabilities that you're trying to be able to drive through business. So do you have the right hunger and curiosity of across your organization from top to bottom to really embark on a lot of these AI project? So that's cultural element. I would say that you have to be able to have that in beds within it, like the skills capabilities that you need to be able to have, not just by having the right data scientists or the right data engineers, but by having every person who is going to be able to touch these new applications and to use these new applications, understand how AI is going to impact them, and then it's really about the process. You know, I always talk about AI is not a thing. It's an ingredient that makes everything else better, and that means that you have to be able to change your processes. Those same applications that had Dev ops process is to be able to put it in production. Need to really consider what it means to have something that's ever changing, like AI as part of that which is also really critical. So I think about it as it is a foundation in the data, the cultural changes that you need to have from top to bottom of the organization, which includes the skills and then the process components that need to be able to change. >>Do you really talking about like Dev ops for AI data ops, I think is a term that's gonna gaining popularity of you guys have applied some of that in internally. Is that right? >>Yeah, it's about the operations of the AI life cycle in, and how you can automate as much of that is possible by AI. They're as much as possible, and that's where a lot of our investments in the Data and AI space are going into. How do you use AI for AI to be able to automate that whole AI life site that you need to be able to have in it? Absolutely >>So I've been talking a lot of C. XO CEO CEOs. We've held some C so and CEO roundtables with our data partner ET are. And one of the things that's that's clear is they're accelerating certain things as a result of code 19. There's certainly much more receptive to cloud. Of course, the first thing you heard from them was a pivot to work from home infrastructure. Many folks weren't ready, so okay, but the other thing that they've said is even in some hard hit industries, we've essentially shut down all spending, with the exception of very, very critical things, including, interestingly, our digital transformation. And so they're still on that journey. They realized the strategic imperative. Uh, and they don't want to lose out. In fact, they want to come out of this stronger AI is a critical part of that. So I'm wondering what you've seen specifically with respect to the pandemic and customers, how they're approaching ai, whether or not you see it accelerating or sort of on the same track. What are you seeing out there with clients? >>You know, this is where, um in pandemics In areas where, you know, we face a lot of uncertainty. I am so proud to be an IBM. Er, um, we actually put out offer when the pandemic started in a March timeframe. Teoh Many of our organizations and communities out there to be able to use our AI technologies to be able to help citizens really understand how Kobe 19 was gonna affect them. What are the symptoms? Where can I get tested? Will there be school tomorrow? We've helped hundreds of organizations, and not only in the public sector in the healthcare sector, across every sector be able to use AI capabilities. Like what we have with Watson assistant to be able to understand how code in 19 is impacting their constituents. As I mentioned, we have hundreds of them. So one example was Children's health care of Atlanta, where they wanted to be able to create an assistant to be able to help parents really understand what symptoms are and how to handle diagnosis is so. We have been leveraging a lot of AI technologies, especially right now, to be able to help, um, not just citizens and other organizations in the public and healthcare sector, but even in the consumer sector, really understand how they can use AI to be able to engage with their constituents a lot more closely. That's one of the areas where we have done quite a bit of work, and we're seeing AI actually being used at a much more rapid rate than ever >>before. Well, I'm excited about this because, you know, we were talking about the recovery, What there's a recovery look like is it v shaped? Nobody really expects that anymore. But maybe a U shaped. But the big concern people have, you know, this w shape recovery. And I'm hopeful that machine intelligence and data can be used to just help us really understand the risks. Uh, and then also getting out good quality information. I think it's critical. Different parts of the country in the world are gonna open at different rates. We're gonna learn from those experiences, and we need to do this in near real time. I mean, things change. Certainly there for a while they were changing daily. They kind of still are. You know, maybe we're on a slower. Maybe it's three or four times a week now, but that pace of change is critical and, you know, machine machines and the only way to keep up with that wonder if you could comment. >>Well, machines are the only way to keep, and not only that, but you want to be able to have the most up to date relevant information that's able to be communicated to the masses and ways that they can actually consume that data. And that's one of the things that AI and one of the assistant technologies that we have right now are able to do. You can continually update and train them such that they can continually engage with that end consumer and that end user and be able to give them the answers they want. And you're absolutely right, Dave. In this world, the answers change every single day and that kind of workload, um, and and the man you can't leave that alone to human laborers. Even human human labors need an assistant to be able to help them answer, because it's hard for them to keep up with what the latest information is. So using AI to be able to do that, it's absolutely critical, >>and I want to stress that I said machines you can't do without machines. And I believe that, but machines or a tool for humans to ultimately make the decisions in a crisis like this because, you see, I mean, I know we have a global audience, but here in the United States, you got you have 50 different governors making decisions about when and how certainly the federal government putting down guidelines. But the governor of Georgia is going to come back differently than the governor of New York, Different from the governor of California. They're gonna make different decisions, and they need data. And AI and Machine intelligence will inform that ultimately their public policy is going to be dictated by a combination of things which obviously includes, you know, machine intelligence. >>Absolutely. I think we're seeing that, by the way, I think many of those governors have made different decisions at different points, and therefore their constituents need to really have a place to be able to understand that as well. >>You know, you're right. I mean, the citizens ultimately have to make the decision while the governor said sick, safe to go out. You know, I'm gonna do some of my own research and you know, just like if you're if you're investing in the stock market, you got to do your own research. It's your health and you have to decide. And to the extent that firms like IBM can provide that data, I think it's critical. Where does the cloud fit in all this? I mentioned the cloud before. I mean, it seems to be critical infrastructure to get information that will talk about >>all of the capabilities that we have. They run on the IBM cloud, and I think this is where you know, when you have data that needs to be secured and needs to be trusted. And you need these AI capabilities. A lot of the solutions that I talked about, the hundreds of implementations that we have done over the past just six weeks. If you kind of take a look at 6 to 8 weeks, all of that on the IBM Public cloud, and so cloud is the thing that facilitates that it facilitates it in a way where it is secure. It is trusted, and it has the AI capabilities that augmented >>critical. There's learning in your title. Where do people go toe? Learn more How can you help them learn about AI And I think it started or keep going? >>Well, you know, we think about a lot of these technologies as it isn't just about the technology. It is about the expertise and the methodologies that we bring to bear. You know, when you talk about data and AI, you want to be able to blend the technology with expertise. Which is why are my title is expert labs that come directly from the labs and we take our learnings through thousands of different clients that we have interacted with, working with the technologies in the lab, understanding those outcomes and use cases and helping our clients be successful with their data and AI projects. So we that's what we do That's our mission. Love doing that every day. >>Well, I think this is important, because I mean, ah company, an organization the size of IBM, a lot of different parts of that organization. So I would I would advise our audience the challenge IBM and say, Okay, you've got that expertise. How are you applying that expertise internally? I mean, I've talked into public Sorry about how you know the data. Science is being applied within IBM. How that's then being brought out to the customers. So you've actually you've got a Petri dish inside this massive organization and it sounds like, you know, through the, you know, the expert labs. And so the Learning Center's you're sort of more than willing to and aggressively actually sharing that with clients. >>Yeah, I think it's important for us to not only eat our own dog food, so you're right. Interpol, The CDO Office Depot office we absolutely use our own technology is to be able to drive the insights we need for our large organization and through the learnings that we have, not only from ourselves but from other clients. We should help clients, our clients and our communities and organizations progress their use of their data and their AI. We really firmly believe this is the only way. Not only these organizations will progress that society as a whole breast, that we feel like it's part of our mission, part of our duty to make sure that it isn't just a discussion on the technology. It is about helping our clients and the community get to the outcomes that they need to using ai. >>Well, guy, I'm glad you invoke the dog food ing because, you know, we use that terminology a lot. A lot of people marketing people stepped back and said, No, no, it's sipping our champagne. Well, to get the champagne takes a lot of work, and the grapes at the early stages don't taste that pain I have to go through. And so that's why I think it's a sort of an honest metaphor, but critical your you've been a friend of the Cube, but we've been on this data journey together for many, many years. Really appreciate you coming on back on the Cube and sharing with the think audience. Great to see you stay safe. And hopefully we'll see you face to face soon. >>All right. Thank you. >>Alright. Take care, my friend. And thank you for watching everybody. This is Dave Volante for the Cube. You're watching IBM think 2020. The digital version of think we'll be right back after this short break. >>Yeah, yeah, yeah.
SUMMARY :
Think brought to you by IBM. you know, we have to make the best. They see cloud, you know, is basic infrastructure to get there, know to be able to have good ai, you need a good foundational information, that are really necessary to be successful. and that means that you have to be able to change your processes. gonna gaining popularity of you guys have applied some of that in internally. to be able to automate that whole AI life site that you need to be able to have in it? Of course, the first thing you heard from them and communities out there to be able to use our AI technologies to be able But the big concern people have, you know, this w shape recovery. Well, machines are the only way to keep, and not only that, but you want to be able to have the most up to date relevant But the governor of Georgia is going to come back differently than the governor of at different points, and therefore their constituents need to really have a place to be able to understand that I mean, it seems to be critical infrastructure to get information that will and I think this is where you know, when you have data that needs to be secured and needs to be Learn more How can you help them learn about It is about the expertise and the methodologies that we bring to bear. and it sounds like, you know, through the, you know, the expert labs. It is about helping our clients and the community get to the outcomes that they need to Great to see you stay safe. And thank you for watching everybody.
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
IBM | ORGANIZATION | 0.99+ |
San Francisco | LOCATION | 0.99+ |
Dave | PERSON | 0.99+ |
Dave Vellante | PERSON | 0.99+ |
Dave Volante | PERSON | 0.99+ |
Palo Alto | LOCATION | 0.99+ |
Ritika Gunnar | PERSON | 0.99+ |
hundreds | QUANTITY | 0.99+ |
Boston | LOCATION | 0.99+ |
United States | LOCATION | 0.99+ |
Miami | LOCATION | 0.99+ |
three | QUANTITY | 0.99+ |
6 | QUANTITY | 0.99+ |
tomorrow | DATE | 0.99+ |
thousands | QUANTITY | 0.99+ |
First | QUANTITY | 0.99+ |
Atlanta | LOCATION | 0.99+ |
March | DATE | 0.99+ |
50 different governors | QUANTITY | 0.99+ |
CDO | ORGANIZATION | 0.99+ |
8 weeks | QUANTITY | 0.99+ |
Interpol | ORGANIZATION | 0.99+ |
code 19 | OTHER | 0.99+ |
Radica Gunnar | PERSON | 0.98+ |
one | QUANTITY | 0.97+ |
first steps | QUANTITY | 0.97+ |
first | QUANTITY | 0.96+ |
New York | LOCATION | 0.94+ |
pandemic | EVENT | 0.94+ |
hundreds of organizations | QUANTITY | 0.94+ |
US | LOCATION | 0.93+ |
firsts | QUANTITY | 0.9+ |
Cube Studios | ORGANIZATION | 0.88+ |
four times a week | QUANTITY | 0.87+ |
Cube | COMMERCIAL_ITEM | 0.87+ |
ET | ORGANIZATION | 0.86+ |
Think | COMMERCIAL_ITEM | 0.85+ |
one example | QUANTITY | 0.84+ |
six weeks | QUANTITY | 0.84+ |
Dev ops | TITLE | 0.82+ |
IBM Think Digital 2020 Experience | EVENT | 0.82+ |
California | LOCATION | 0.81+ |
Watson | TITLE | 0.8+ |
first thing | QUANTITY | 0.8+ |
pandemics | EVENT | 0.77+ |
Georgia | LOCATION | 0.74+ |
governor | PERSON | 0.74+ |
C. XO | PERSON | 0.7+ |
Radica | PERSON | 0.7+ |
single day | QUANTITY | 0.69+ |
Kobe 19 | COMMERCIAL_ITEM | 0.59+ |
think 2020 | TITLE | 0.56+ |
implementations | QUANTITY | 0.54+ |
Depot | ORGANIZATION | 0.49+ |
Cube | ORGANIZATION | 0.4+ |
2020 | TITLE | 0.32+ |
19 | TITLE | 0.31+ |
UNLISTED FOR REVIEW Julie Lockner, IBM | DataOps In Action
from the cube studios in Palo Alto in Boston connecting with thought leaders all around the world this is a cube conversation hi everybody this is David on tape with the cube and welcome to the special digital presentation we're really digging into how IBM is operationalizing and automating the AI and data pipeline not only for its clients but also for itself and with me is Julie Lochner who looks after offering management and IBM's data and AI portfolio Julie great to see you again okay great to be here thank you talk a little bit about the role you have here at IBM sure so my responsibility in offering management in the data and AI organization is really twofold one is I lead a team that implements all of the back-end processes really the operations behind anytime we deliver a product from the data AI team to the market so think about all of the release cycle management pricing product management discipline etc the other roles that I play is really making sure that um we are working with our customers and making sure they have the best customer experience and a big part of that is developing the data ops methodology it's something that I needed internally from my own line of business execution but it's now something that our customers are looking for to implement in their shops as well well good I really want to get into that and so let's let's start with data ops I mean I think you know a lot of people are familiar with DevOps not maybe not everybody's familiar with the data Ops what do we need to know about data well I mean you bring up the point that everyone knows DevOps and and then in fact I think you know what data Ops really does is bring a lot of the benefits that DevOps did for application development to the data management organizations so when we look at what is data ops it's a data management it's a it's a data management set of principles that helps organizations bring business ready data to their consumers quickly it takes it borrows from DevOps similarly where you have a data pipeline that associates a business value requirement I have this business initiative it's gonna drive this much revenue or this much cost savings this is the data that I need to be able to deliver it how do I develop that pipeline and map to the data sources know what data it is know that I can trust it so ensuring that it has the right quality that I'm actually using the data that it was meant for and then put it to use so in in history most dated management practices deployed a waterfall like methodology or implementation methodology and what that meant is all the data pipeline projects were implemented serially and it was dawn based on potentially a first-in first-out program management office with a DevOps mental model and the idea of being able to slice through all of the different silos that's required to collect the data to organize it to integrate it to validate its quality to create those data integration pipelines and then present it to the dashboard like if it's a Cognos dashboard for a operational process or even a data science team that whole end-to-end process gets streamlined through what we're calling data ops methodology so I mean as you well know we've been following this market since the early days of a dupe and people struggle with their data pipelines it's complicated for them there's a raft of tools and and and they spend most of their time wrangling data preparing data improving data quality different roles within the organization so it sounds like you know to borrow from from DevOps data OPS's is all about REME lining that data pipeline helping people really understand and communicate across end to end as you're saying but but what's the ultimate business outcome that you're trying to drive so when you think about projects that require data to again cut cost to automate a business process or drive new revenue initiatives how long does it take to get from having access to the data to making it available that duration for every time delay that is spent wasted trying to connect to data sources trying to find subject matter experts that understand what the data means and can verify its quality like all of those steps along those different teams and different disciplines introduces delay in delivering high quality data fast so the business value of data Ops is always associated with something that the business is trying to achieve but with a time element so if it's for every day we don't have this data to make a decision we're either making money or losing money that's the value proposition of data ops so it's about taking things that people are already doing today and figuring out the quickest way to do it through automation through workflows and just cutting through all of the political barriers that often happens when these data's cross different organizational boundaries yeah so speed time to insights is critical but to in and then you know with DevOps you're really bringing together the skill sets into sort of you know one super dev or one super ops it sounds with data ops it's really more about everybody understanding their role and having communication and line-of-sight across the entire organization it's not trying to make everybody a superhuman data person it's the whole it's the group it's the team effort really it's really a team game here isn't it well that's a big part of it so just like any type of practice there's people aspects process aspects and technology right so people process technology and while you're you're describing it like having that super team that knows everything about the data the only way that's possible is if you have a common foundation of metadata so we've seen a surgeons in the data catalog market and last you know six seven years and what what the what that the innovation in the data catalog market has actually enabled us to be able to drive more data ops pipelines meaning as you identify data assets you've captured the metadata you capture its meaning you capture information that can be shared whether they're stakeholders it really then becomes more of a essential repository for people to really quickly know what data they have really quickly understand what it means in its quality and very quickly with the right proper authority like privacy rules included put it to use for models you know dashboards operational processes okay and and we're gonna talk about some examples and one of them of course is ibm's own internal example but but help us understand where you advise clients to start I want to get into it where do I get started yeah I mean so traditionally what we've seen with these large data management data governance programs is that sometimes our customers feel like this is a big pill to swallow and what we've said is look there's an opera there's an opportunity here to quickly define a small project align it to a high-value business initiative target something that you can quickly gain access to the data map out these pipelines and create a squad of skills so it includes a person with DevOps type programming skills to automate an instrument a lot of the technology a subject matter expert who understands the data sources and its meaning a line of business executive who can translate bringing that information to the business project and associating with business value so when we say how do you get started we've developed a I would call it a pretty basic maturity model to help organizations figure out where are they in terms of the technology where are they in terms of organizationally knowing who the right people should be involved in these projects and then from a process perspective we've developed some pretty prescriptive project plans that help you nail down what are the data elements that are critical for this business business initiative and then we have for each role what their jobs are to consolidate the datasets map them together and present them to the consumer we find that six-week projects typically three sprints are perfect times to be able to in a timeline to create one of these very short quick win projects take that as an opportunity to figure out where your bottlenecks are in your own organization where your skill shortages are and then use the outcome of that six-week sprint to then focus on filling in gaps kick off the next project and iterate celebrate the success and promote the success because it's typically tied to a business value to help them create momentum for the next one all right that's awesome I want to now get into some examples I mean or you're we're both massachusetts-based normally you'd be in our studio and we'd be sitting here face-to-face obviously with kovat 19 in this crisis we're all sheltering in place you're up in somewhere in New England I happen to be in my studio believe it but I'm the only one here so relate this to kovat how would data ops or maybe you have a concrete example in in terms of how it's helped inform or actually anticipate and keep up-to-date with what's happening with building yeah well I mean we're all experiencing it I don't think there's a person on the planet who hasn't been impacted by what's been going on with this coded pandemic crisis so we started we started down this data obscurity a year ago I mean this isn't something that we just decided to implement a few weeks ago we've been working on developing the methodology getting our own organization in place so that we could respond the next time we needed to be able to you know act upon a data-driven decision so part of step one of our journey has really been working with our global chief data officer Interpol who I believe you have had an opportunity to meet with an interview so part of this year journey has been working with with our corporate organization I'm in the line of business organization where we've established the roles and responsibilities we've established the technology stack based on our cloud pack for data and Watson knowledge catalog so I use that as the context for now we're faced with a pandemic crisis and I'm being asked in my business unit to respond very quickly how can we prioritize the offerings that are gonna help those in critical need so that we can get those products out to market we can offer a you know 90-day free use for governments and Hospital agencies so in order for me to do that as a operations lead for our team I needed to be able to have access to our financial data I needed to have access to our product portfolio information I needed to understand our cloud capacity so in order for me to be able to respond with the offers that we recently announced you know you can take a look at some of the examples with our Watson citizen assistant program where I was able to provide the financial information required for us to make those products available for governments hospitals state agencies etc that's a that's a perfect example now to to set the stage back to the corporate global chief data office organization they implemented some technology that allowed us to ingest data automatically classify it automatically assign metadata automatically associate data quality so that when my team started using that data we knew what the status of that information was when we started to build our own predictive models and so that's a great example of how we've partnered with a corporate central organization and took advantage of the automated set of capabilities without having to invest in any additional resources or headcount and be able to release products within a matter of a couple of weeks and in that automation is a function of machine intelligence is that right and obviously some experience but but you couldn't you and I when we were consultants doing this by hand we couldn't have done this we could have done it at scale anyways it is it machine intelligence an AI that allows us to do this that's exactly right and as you know our organization is data and AI so we happen to have the a research and innovation teams that are building a lot of this technology so we have somewhat of an advantage there but you're right the alternative to what I've described is manual spreadsheets it's querying databases it's sending emails to subject matter experts asking them what this data means if they're out sick or on vacation you have to wait for them to come back and all of this was a manual process and in the last five years we've seen this data catalog market really become this augmented data catalog and that augmentation means it's automation through AI so with years of experience and natural language understanding we can comb through a lot of the metadata that's available electronically we can comb through unstructured data we can categorize it and if you have a set of business terms that have industry standard definitions through machine learning we can automate what you and I did as a consultant manually in a matter of seconds that's the impact the AI is had in our organization and now we're bringing this to the market and it's a it's a big part of where I'm investing my time both internally and externally is bringing these types of concepts and ideas to the market so I'm hearing first of all one of the things that strikes me is you've got multiple data sources and data lives everywhere you might have your supply chain data and your ERP maybe that sits on Prem you might have some sales data that's sitting in the SAS store in a cloud somewhere you might have you know a weather data that you want to bring in in theory anyway the more data that you have the better insights that you can gather assuming you've got the right data quality but so let me start with like where the data is right so so it sits anywhere you don't know where it's gonna be but you know you need it so that that's part of this right is being able to read it quickly yeah it's funny you bring it up that way I actually look a little differently it's when you start these projects the data was in one place and then by the time you get through the end of a project you find out that it's a cloud so the data location actually changes while we're in the middle of projects we have many or coming even during this this pandemic crisis we have many organizations that are using this as an opportunity to move to SAS so what was on Prem is now cloud but that shouldn't change the definition of the data it shouldn't change its meaning it might change how you connect to it um it might also change your security policies or privacy laws now all of a sudden you have to worry about where is that data physically located and am I allowed to share it across national boundaries right before we knew physically where it was so when you think about data ops data ops is a process that sits on top of where the data physically resides and because we're mapping metadata and we're looking at these data pipelines and automated workflows part of the design principles are to set it up so that it's independent of where it resides however you have to have placeholders in your metadata and in your tool chain where we oughta mating these workflows so that you can accommodate when the data decides to move because of corporate policy change from on-prem to cloud then that's a big part of what data Ops offers it's the same thing by the way for DevOps they've had to accommodate you know building in you know platforms as a service versus on from the development environments it's the same for data ops and you know the other part that strikes me and listening to you is scale and it's not just about you know scale with the cloud operating model it's also about what you're talking about is you know the auto classification the automated metadata you can't do that manually you've got to be able to do that in order to scale with automation that's another key part of data Ops is it not it's well it's a big part of the value proposition and a lot of a part of the business base right then you and I started in this business you know and Big Data became the thing people just move all sorts of data sets to these Hadoop clusters without capturing the metadata and so as a result you know in the last 10 years this information is out there but nobody knows what it means anymore so you can't go back with the army of people and have them query these data sets because a lot of the contact was lost but you can use automated technology you can use automated machine learning with natural under Snatcher Alang guaa Jing to do a lot of the heavy lifting for you and a big part of data ops workflows and building these pipelines is to do what we call management-by-exception so if your algorithms say you know 80% confident that this is a phone number and your organization has a you know low risk tolerance that probably will go to an exception but if you have a you know a match algorithm that comes back and says it's 99 percent sure this is an email address right and you I have a threshold that's 98% it will automate much of the work that we used to have to do manually so that's an example of how you can automate eliminate manual work and have some human interaction based on your risk threshold now that's awesome I mean you're right the no schema on right said I throw it into a data leg the data link becomes the data swap we all know that joke okay I want to understand a little bit and maybe you have some other examples of some of the use cases here but there's some of the maturity of where customers are I mean it seems like you got to start by just understanding what data you have cataloging it you're getting your metadata act in order but then you've got a you've got a data quality component before you can actually implement and get yet to insight so you know where our customers on the on the maturity model do you have any other examples that you can share yeah so when we look at our data ops maturity model we tried to simplify it I mentioned this earlier that we try to simplify it so that really anybody can get started they don't have to have a full governance framework implemented to take advantage of the benefits data ops delivers so what we did we said if you can categorize your data ops programs into really three things one is how well do you know your data do you even know what data you have the second one is and you trust it like can you trust its quality can you trust its meeting and the third one is can you put it to use so if you really think about it when you begin with what data do you know right the first step is you know how are you determining what data you know the first step is if you are using spreadsheets replace it with a data catalog if you have a department line of business catalog and you need to start sharing information with the departments then start expanding to an enterprise level data catalog now you mentioned data quality so the first step is do you even have a data quality program right have you even established what your criteria are for high quality data have you considered what your data quality score is comprised of have you mapped out what your critical data elements are to run your business most companies have done that for they're they're governed processes but for these new initiatives and when you identify I'm in my example with the Kovach crisis what products are we gonna help bring to market quickly I need to be able to find out what the critical data elements are and can I trust it have I even done a quality scan and have teams commented on its trustworthiness to be used in this case if you haven't done anything like that in your organization that might be the first place to start pick the critical data elements for this initiative assess its quality and then start to implement the workflows to remediate and then when you get to putting it to use there's several methods for making data available you know one is simply making a data Mart available to a small set of users that's what most people do well first they make a spreadsheet of the data available but then if they need to have multiple people access it that's when like a data Mart might make sense technology like data virtualization eliminates the need for you to move data as you're in this prototyping phase and that's a great way to get started it doesn't cost a lot of money to get a virtual query set up to see if this is the right join or the right combination of fields that are required for this use case eventually you'll get to the need to use a high performance ETL tool for data integration but Nirvana is when you really get to that self-service data prep where users can query a catalog and say these are the data sets I need it presents you a list of data assets that are available I can point and click at these columns I want as part of my you know data pipeline and I hit go and it automatically generates that output for data science use cases for a Cognos dashboard right that's the most mature model and being able to iterate on that so quickly that as soon as you get feedback that that data elements are wrong or you need to add something you can do it push button and that's where data observation to bring organizations to well Julie I think there's no question that this kovat crisis is accentuated the importance of digital you know we talk about digital transformation a lot and it's it's certainly real although I would say a lot of people that we talk to will say well you know not on my watch or I'll be retired before that all happens will this crisis is accelerating that transformation and data is at the heart of it you know digital means data and if you don't have your data you know story together and your act together then you're gonna you're not going to be able to compete and data ops really is a key aspect of that so you know give us a parting word all right I think this is a great opportunity for us to really assess how well we're leveraging data to make strategic decisions and if there hasn't been a more pressing time to do it it's when our entire engagement becomes virtual like this interview is virtual write everything now creates a digital footprint that we can leverage to understand where our customers are having problems where they're having successes you know let's use the data that's available and use data ops to make sure that we can iterate access that data know it trust it put it to use so that we can respond to those in need when they need it Julie Locker your incredible practitioner really hands-on really appreciate you coming on the Kuban and sharing your knowledge with us thank you okay thank you very much it was a pleasure to be here all right and thank you for watching everybody this is Dave Volante for the cube and we will see you next time [Music]
**Summary and Sentiment Analysis are not been shown because of improper transcript**
ENTITIES
Entity | Category | Confidence |
---|---|---|
Julie Lochner | PERSON | 0.99+ |
Dave Volante | PERSON | 0.99+ |
Julie Lockner | PERSON | 0.99+ |
90-day | QUANTITY | 0.99+ |
IBM | ORGANIZATION | 0.99+ |
99 percent | QUANTITY | 0.99+ |
Julie Locker | PERSON | 0.99+ |
80% | QUANTITY | 0.99+ |
six-week | QUANTITY | 0.99+ |
first step | QUANTITY | 0.99+ |
New England | LOCATION | 0.99+ |
Palo Alto | LOCATION | 0.99+ |
first step | QUANTITY | 0.99+ |
98% | QUANTITY | 0.99+ |
Julie | PERSON | 0.99+ |
DevOps | TITLE | 0.99+ |
a year ago | DATE | 0.99+ |
Boston | LOCATION | 0.99+ |
David | PERSON | 0.98+ |
Watson | TITLE | 0.98+ |
second one | QUANTITY | 0.98+ |
six seven years | QUANTITY | 0.97+ |
Interpol | ORGANIZATION | 0.97+ |
third one | QUANTITY | 0.97+ |
one | QUANTITY | 0.97+ |
both | QUANTITY | 0.96+ |
Mart | ORGANIZATION | 0.94+ |
first place | QUANTITY | 0.93+ |
today | DATE | 0.92+ |
each role | QUANTITY | 0.91+ |
first | QUANTITY | 0.91+ |
a couple of weeks | QUANTITY | 0.88+ |
pandemic | EVENT | 0.88+ |
kovat | PERSON | 0.87+ |
three sprints | QUANTITY | 0.87+ |
three things | QUANTITY | 0.84+ |
step one | QUANTITY | 0.8+ |
guaa Jing | PERSON | 0.8+ |
few weeks ago | DATE | 0.78+ |
OPS | ORGANIZATION | 0.77+ |
one place | QUANTITY | 0.77+ |
ibm | ORGANIZATION | 0.75+ |
Nirvana | ORGANIZATION | 0.74+ |
last five years | DATE | 0.72+ |
DevOps | ORGANIZATION | 0.71+ |
this year | DATE | 0.7+ |
pandemic crisis | EVENT | 0.7+ |
last 10 years | DATE | 0.69+ |
a lot of people | QUANTITY | 0.68+ |
Cognos | TITLE | 0.66+ |
lot of money | QUANTITY | 0.66+ |
Kuban | LOCATION | 0.56+ |
DataOps | ORGANIZATION | 0.55+ |
Kovach | ORGANIZATION | 0.55+ |
Snatcher | PERSON | 0.51+ |
kovat | ORGANIZATION | 0.49+ |
lot | QUANTITY | 0.46+ |
19 | PERSON | 0.44+ |
massachusetts | PERSON | 0.42+ |
SAS | ORGANIZATION | 0.37+ |
Alang | PERSON | 0.31+ |
UNLISTED FOR REVIEW Inderpal Bhandari, IBM | DataOps In Action
>>from the Cube Studios in >>Palo Alto and Boston connecting with thought leaders all around the world. This is a cube conversation. Everybody welcome this special digital presentation where we're covering the topic of data ops and specifically how IBM is really operationalize ing and automating the data pipeline with data office. And with me is Interpol Bhandari, who is the global chief data officer at IBM and Paul. It's always great to see you. Thanks for coming on. >>My pleasure. >>So, you know the standard throwaway question from guys like me And you know what keeps the chief data officer up at night? Well, I know what's keeping you up that night. It's coverted 19. How you >>doing? It's keeping keeping all of us. >>Yeah, for sure. Um, So how are you guys making out as a leader I'm interested in, You know, how you have responded would whether it's communications. Obviously you're doing much more stuff you remotely You're not on airplanes. Certainly like you used to be. But But what was your first move when you actually realized this was going to require a shift? >>Well, I think one of the first things that I did wants to test the ability of my organization, You work remotely. This was well before the the recommendations came in from the government just so that we wanted to be sure that this is something that we could pull off if there were extreme circumstances where even everybody was. And so that was one of the first things we did along with that. I think another major activity that's being boxed off is even that we have created this Central Data and AI platform for idea using our hybrid, multi cloud approach. How could that the adaptive very, very quickly help them look over the city? But those were the two big items that my team and my embarked on and again, like I said, this is before there was any recommendations from the government or even internally, within IBM. Have any recommendations be? We decided that we wanted to run ahead and make sure that we were ready to ready to operate in that fashion. And I believe a lot of my colleagues did the same. Yeah, >>there's a there's a conversation going on right now just around productivity hits that people may be taking because they really weren't prepared it sounds like you're pretty comfortable with the productivity impact that you're achieving. >>Oh, I'm totally comfortable with the politics. I mean, in fact, I will tell you that while we've gone down this spot, we've realized that in some cases the productivity is actually going to be better when people are working from home and they're able to focus a lot more on the work, you know, And this could. This one's the gamut from the nature of the jaw, where you know somebody who basically needs to be in the front of the computer and is remotely taking care of operations. You know, if they don't have to come in, their productivity is going to go up Somebody like myself who had a long drive into work, you know, which I would use a phone calls, but that that entire time it can be used a lot more productivity, locked in a lot more productive manner. So there is. We realized that there's going to be some aspect of productivity that will actually be helped by the situation. Why did you are able to deliver the services that you deliver with the same level of quality and satisfaction that you want Now there were certain other aspect where you know the whole activity is going to be effective. So you know my team. There's a lot off white boarding that gets done there lots off informal conversations that spot creativity. But those things are much harder to replicate in a remote and large. So we've got a sense off. You know where we have to do some work? Well, things together. This is where we're actually going to be mobile. But all in all, they're very comfortable that we can pull this off. >>That's great. I want to stay on Cove it for a moment and in the context of just data and data ops, and you know why Now, obviously, with a crisis like this, it increases the imperative to really have your data act together. But I want to ask you both specifically as it relates to covert, why Data office is so important. And then just generally, why at this this point in time, >>So, I mean, you know, the journey we've been on. Thank you. You know, when I joined our data strategy centered around cloud data and ai, mainly because IBM business strategy was around that, and because there wasn't the notion off AI and Enterprise, right, there was everybody understood what AI means for the consumer. But for the enterprise, people don't really understand. Well, what a man. So our data strategy became one off, actually making IBM itself into an AI and and then using that as a showcase for our clients and customers who look a lot like us, you make them into AI. And in a nutshell, what that translated to was that one had two in few ai into the workflow off the key business processes off enterprise. So if you think about that workflow is very demanding, right, you have to be able to deliver. They did not insights on time just when it's needed. Otherwise, you can essentially slow down the whole workflow off a major process within an end. But to be able to pull all that off you need to have your own data works very, very streamlined so that a lot of it is automated and you're able to deliver those insights as the people who are involved in the work floor needed. So we've spent a lot of time while we were making IBM into any I enterprise and infusing AI into our key business processes into essentially a data ops pipeline that was very, very streamlined, which then allowed us to do very quickly adapt do the over 19 situation and I'll give you one specific example that will go to you know how one would someone would essentially leverage that capability that I just talked about to do this. So one of the key business processes that we have taken a map, it was our supply chain. You know, if you're a global company and our supply chain is critical, you have lots of suppliers, and they are all over the globe. And we have different types of products so that, you know, has a multiplication factors for each of those, you have additional suppliers and you have events. You have other events, you have calamities, you have political events. So we have to be able to very quickly understand the risks associated with any of those events with regard to our supply chain and make appropriate adjustments on the fly. So that was one off the key applications that we built on our central data. And as Paul about data ops pipeline. That meant we ingest the ingestion off those several 100 sources of data not to be blazingly fast and also refresh very, very quickly. Also, we have to then aggregate data from the outside from external sources that had to do with weather related events that had to do with political events. Social media feeds a separate I'm overly that on top off our map of interest with regard to our supply chain sites and also where they were supposed to deliver. We also leave them our capabilities here, track of those shipments as they flowed and have that data flow back as well so that we would know exactly where where things were. This is only possible because we had a streamline data ops capability and we have built this Central Data and AI platform for IBM. Now you flip over to the Coleman 19 situation when Corbyn 19 merged and we began to realize that this was going to be a significant significant pandemic. What we were able to do very quickly wants to overlay the over 19 incidents on top of our sites of interest, as well as pick up what was being reported about those sites of interests and provide that over to our business continuity. So this became an immediate exercise that we embark. But it wouldn't have been possible if you didn't have the foundation off the data office pipeline as well as that Central Data and AI platform even plays to help you do that very, very quickly and adapt. >>So what I really like about this story and something that I want to drill into is it Essentially, a lot of organizations have a really tough time operational izing ai, infusing it to use your word and the fact that you're doing it, um is really a good proof point that I want to explore a little bit. So you're essentially there was a number of aspects of what you just described. There was the data quality piece with your data quality in theory, anyway, is going to go up with more data if you can handle it and the other was speed time to insight, so you can respond more quickly if it's talk about this Covic situation. If you're days behind for weeks behind, which is not uncommon, sometimes even worse, you just can't respond. I mean, the things change daily? Um, sometimes, Certainly within the day. Um, so is that right? That's kind of the the business outcome. An objective that you guys were after. >>Yes, you know, So Rama Common infuse ai into your business processes right over our chain. Um, don't come metric. That one focuses on is end to end cycle time. So you take that process the end to end process and you're trying to reduce the end to end cycle time by several factors, several orders of magnitude. And you know, there are some examples off things that we did. For instance, in my organ organization that has to do with the generation of metadata is data about data. And that's usually a very time consuming process. And we've reduced that by over 95%. By using AI, you actually help in the metadata generation itself. And that's applied now across the board for many different business processes that, you know IBM has. That's the same kind of principle that was you. You'll be able to do that so that foundation essentially enables you to go after that cycle time reduction right off the bat. So when you get to a situation like over 19 situation which demands urgent action. Your foundation is already geared to deliver on that. >>So I think actually, we might have a graphic. And then the second graphic, guys, if you bring up a 2nd 1 I think this is Interpol. What you're talking about here, that sort of 95% reduction. Ah, guys, if you could bring that up, would take a look at it. So, um, this is maybe not a cove. It use case? Yeah. Here it is. So that 95% reduction in the cycle time improvement in data quality. What we talked about this actually some productivity metrics, right? This is what you're talking about here in this metadata example. Correct? >>Yeah. Yes, the metadata. Right. It's so central to everything that one does with. I mean, it's basically data about data, and this is really the business metadata that you're talking about, which is once you have data in your data lake. If you don't have business metadata describing what that data is, then it's very hard for people who are trying to do things to determine whether they can, even whether they even have access to the right data. And typically this process is being done manually because somebody looks at the data that looks at the fields and describe it. And it could easily take months. And what we did was we essentially use a deep learning and natural language processing of road. Look at all the data that we've had historically over an idea, and we've automated metadata generation. So whether it was, you know, you were talking about the data relevant for 19 or for supply chain or far receivable process any one of our business processes. This is one of those fundamental steps that one must go through. You'll be able to get your data ready for action. And if you were able to take that cycle time for that step and reduce it by 95% you can imagine the acceleration. >>Yeah, and I like you were saying before you talk about the end to end concept, you're applying system thinking here, which is very, very important because, you know, a lot of a lot of clients that I talk to, they're so focused on one metric maybe optimizing one component of that end to end, but it's really the overall outcome that you're trying to achieve. You may sometimes, you know, be optimizing one piece, but not the whole. So that systems thinking is very, very important, isn't it? >>The systems thinking is extremely important overall, no matter you know where you're involved in the process off designing the system. But if you're the data guy, it's incredibly important because not only does that give you an insight into the cycle time reduction, but it also give clues U N into what standardization is necessary in the data so that you're able to support an eventual out. You know, a lot of people will go down the part of data governance and the creation of data standards, and you can easily boil the ocean trying to do that. But if you actually start with an end to end, view off your key processes and that by extension the outcomes associated with those processes as well as the user experience at the end of those processes and kind of then work backwards as one of the standards that you need for the data that's going to feed into all that, that's how you arrive at, you know, a viable practical data standards effort that you can essentially push forward so that there are multiple aspect when you take that end to end system view that helps the chief legal. >>One of the other tenants of data ops is really the ability across the organization for everybody to have visibility. Communications is very key. We've got another graphic that I want to show around the organizational, you know, in the right regime, and it's a complicated situation for a lot of people. But it's imperative, guys, if you bring up the first graphic, it's a heritage that organizations, you know, find bringing the right stakeholders and actually identify those individuals that are going to participate so that this full visibility everybody understands what their roles are. They're not in silos. So, guys, if you could show us that first graphic, that would be great. But talk about the organization and the right regime there. Interpol? >>Yes, yes, I believe you're going to know what you're going to show up is actually my organization, but I think it's yes, it's very, very illustrative what one has to set up. You'll be able to pull off the kind of impact that I thought So let's say we talked about that Central Data and AI platform that's driving the entire enterprise, and you're infusing AI into key business processes like the supply chain. Then create applications like the operational risk in size that we talked about that extended over. Do a fast emerging and changing situation like the over 19. You need an organization that obviously reflects the technical aspects of the right, so you have to have the data engineering on and AI on. You know, in my case, there's a lot of emphasis around deep learning because that's one of those skill set areas that's really quite rare, and it also very, very powerful. So uh huh you know, the major technology arms off that. There's also the governance on that I talked about. You have to produce the set off standards and implement them and enforce them so that you're able to make this into an impact. But then there's also there's a there's an adoption there. There's a There's a group that reports into me very, very, you know, Empowered Group, which essentially has to convince the rest of the organization to adopt. Yeah, yeah, but the key to their success has been in power in the sense that they're on power. You find like minded individuals in our key business processes. We're also empowered. And if they agree that just move forward and go and do it because you know, we've already provided the central capabilities by Central. I don't mean they're all in one location. You're completely global and you know it's it's It's a hybrid multi cloud set up, but it's a central in the sense that it's one source to come for for trusted data as well as the the expertise that you need from an AI standpoint to be able to move forward and deliver the business out. So when these business teams come together, be an option, that's where the magic happens. So that's another another aspect of the organization that's critical. And then we've also got, ah, Data Officer Council that I chair, and that has to do with no people who are the chief data officers off the individual business units that we have. And they're kind of my extended teams into the rest of the organization, and we levers that bolt from a adoption off the platform standpoint. But also in terms of defining and enforcing standards. It helps them stupid. >>I want to come back over and talk a little bit about business resiliency people. I think it probably seen the news that IBM providing supercomputer resource is that the government to fight Corona virus. You've also just announced that that some some RTP folks, um, are helping first responders and non profits and providing capabilities for no charge, which is awesome. I mean, it's the kind of thing. Look, I'm sensitive companies like IBM. You know, you don't want to appear to be ambulance chasing in these times. However, IBM and other big tech companies you're in a position to help, and that's what you're doing here. So maybe you could talk a little bit about what you're doing in this regard. Um, and then we'll tie it up with just business resiliency and importance of data. >>Right? Right. So, you know, I explained that the operational risk insights application that we had, which we were using internally, we call that 19 even we're using. We're using it primarily to assess the risks to our supply chain from various events and then essentially react very, very quickly. Do those doodles events so you could manage the situation. Well, we realize that this is something that you know, several non government NGOs that they could essentially use. There's a stability because they have to manage many of these situations like natural disaster. And so we've given that same capability, do the NGOs to you and, uh, to help that, to help them streamline their planning. And there's thinking, by the same token, But you talked about over 19 that same capability with the moment 19 data over layed on double, essentially becomes a business continuity, planning and resilience. Because let's say I'm a supply chain offers right now. I can look at incidents off over night, and I can I know what my suppliers are and I can see the incidents and I can say, Oh, yes, no, this supplier and I can see that the incidences going up this is likely to be affected. Let me move ahead and stop making plans backup plans, just in case it reaches a crisis level. On the other hand, if you're somebody in revenue planning, you know, on the finance side and you know where you keep clients and customers are located again by having that information over laid that those sites, you can make your own judgments and you can make your own assessment to do that. So that's how it translates over into business continuity and resolute resilience planning. True, we are internally. No doing that now to every department. You know, that's something that we're actually providing them this capability because we build rapidly on what we have already done to be able to do that as we get inside into what each of those departments do with that data. Because, you know, once they see that data, once they overlay it with their sights of interest. And this is, you know, anybody and everybody in IBM, because no matter what department they're in, there are going to decide the interests that are going to be affected. And they haven't understanding what those sites of interest mean in the context off the planning that they're doing and so they'll be able to make judgments. But as we get a better understanding of that, we will automate those capabilities more and more for each of those specific areas. And now you're talking about the comprehensive approach and AI approach to business continuity and resilience planning in the context of a large IT organization like IBM, which obviously will be of great interest to our enterprise, clients and customers. >>Right? One of the things that we're researching now is trying to understand. You know, what about this? Prices is going to be permanent. Some things won't be, but we think many things will be. There's a lot of learnings. Do you think that organizations will rethink business resiliency in this context that they might sub optimize profitability, for example, to be more prepared crises like this with better business resiliency? And what role would data play in that? >>So, you know, it's a very good question and timely fashion, Dave. So I mean, clearly, people have understood that with regard to that's such a pandemic. Um, the first line of defense, right is is not going to be so much on the medicine side because the vaccine is not even available and will be available for a period of time. It has to go through. So the first line of defense is actually think part of being like approach, like we've seen play out across the world and then that in effect results in an impact on the business, right in the economic climate and on the business is there's an impact. I think people have realized this now they will honestly factor this in and do that in to how they do become. One of those things from this is that I'm talking about how this becomes a permanent. I think it's going to become one of those things that if you go responsible enterprise, you are going to be landing forward. You're going to know how to implement this, the on the second go round. So obviously you put those frameworks and structures in place and there will be a certain costs associated with them, and one could argue that that would eat into the profitability. On the other hand, what I would say is because these two points really that these are fast emerging fluid situations. You have to respond very, very quickly. You will end up laying out a foundation pretty much like we did, which enables you to really accelerate your pipeline, right? So the data ops pipelines we talked about, there's a lot of automation so that you can react very quickly, you know, data injection very, very rapidly that you're able to do that kind of thing, that meta data generation. That's the entire pipeline that you're talking about, that you're able to respond very quickly, bring in new data and then aggregated at the right levels, infuse it into the work flows on the delivery, do the right people at the right time. Well, you know that will become a must. But once you do that, you could argue that there's a cost associated with doing that. But we know that the cycle time reductions on things like that they can run, you know? I mean, I gave you the example of 95% 0 you know, on average, we see, like a 70% end to end cycle time where we've implemented the approach, and that's been pretty pervasive within IBM across the business. So that, in essence, then actually becomes a driver for profitability. So yes, it might. You know this might back people into doing that, but I would argue that that's probably something that's going to be very good long term for the enterprises and world, and they'll be able to leverage that in their in their business and I think that just the competitive director off having to do that will force everybody down that path. But I think it'll be eventually ago >>that end and cycle time. Compression is huge, and I like what you're saying because it's it's not just a reduction in the expected loss during of prices. There's other residual benefits to the organization. Interpol. Thanks so much for coming on the Cube and sharing this really interesting and deep case study. I know there's a lot more information out there, so really appreciate your done. >>My pleasure. >>Alright, take everybody. Thanks for watching. And this is Dave Volante for the Cube. And we will see you next time. Yeah, yeah, yeah.
SUMMARY :
how IBM is really operationalize ing and automating the data pipeline with So, you know the standard throwaway question from guys like me And you know what keeps the chief data officer up It's keeping keeping all of us. You know, how you have responded would whether it's communications. so that was one of the first things we did along with that. productivity impact that you're achieving. This one's the gamut from the nature of the jaw, where you know somebody But I want to ask you both specifically as it relates to covert, But to be able to pull all that off you need to have your own data works is going to go up with more data if you can handle it and the other was speed time to insight, So you take that process the end to end process and you're trying to reduce the end to end So that 95% reduction in the cycle time improvement in data quality. So whether it was, you know, you were talking about the data relevant Yeah, and I like you were saying before you talk about the end to end concept, you're applying system that you need for the data that's going to feed into all that, that's how you arrive you know, in the right regime, and it's a complicated situation for a lot of people. So uh huh you know, the major technology arms off that. So maybe you could talk a little bit about what you're doing in this regard. do the NGOs to you and, uh, to help that, Do you think that organizations will I think it's going to become one of those things that if you go responsible enterprise, Thanks so much for coming on the Cube and sharing And we will see you next time.
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
IBM | ORGANIZATION | 0.99+ |
Dave | PERSON | 0.99+ |
95% | QUANTITY | 0.99+ |
70% | QUANTITY | 0.99+ |
two | QUANTITY | 0.99+ |
Dave Volante | PERSON | 0.99+ |
Palo Alto | LOCATION | 0.99+ |
One | QUANTITY | 0.99+ |
Interpol Bhandari | PERSON | 0.99+ |
Inderpal Bhandari | PERSON | 0.99+ |
two points | QUANTITY | 0.99+ |
first graphic | QUANTITY | 0.99+ |
one piece | QUANTITY | 0.99+ |
one | QUANTITY | 0.99+ |
Cube Studios | ORGANIZATION | 0.99+ |
100 sources | QUANTITY | 0.99+ |
second graphic | QUANTITY | 0.99+ |
second | QUANTITY | 0.98+ |
first graphic | QUANTITY | 0.98+ |
Interpol | ORGANIZATION | 0.98+ |
over 95% | QUANTITY | 0.98+ |
first line | QUANTITY | 0.98+ |
first move | QUANTITY | 0.98+ |
19 | QUANTITY | 0.97+ |
each | QUANTITY | 0.97+ |
one source | QUANTITY | 0.97+ |
Boston | LOCATION | 0.97+ |
Paul | PERSON | 0.97+ |
pandemic | EVENT | 0.97+ |
both | QUANTITY | 0.97+ |
two big items | QUANTITY | 0.96+ |
one metric | QUANTITY | 0.96+ |
one component | QUANTITY | 0.95+ |
one location | QUANTITY | 0.95+ |
over 19 | QUANTITY | 0.94+ |
double | QUANTITY | 0.94+ |
first things | QUANTITY | 0.93+ |
Data Officer Council | ORGANIZATION | 0.93+ |
19 | OTHER | 0.92+ |
Empowered Group | ORGANIZATION | 0.91+ |
Cove | ORGANIZATION | 0.87+ |
Rama Common | ORGANIZATION | 0.87+ |
Corona virus | OTHER | 0.85+ |
Cube | COMMERCIAL_ITEM | 0.82+ |
over 19 situation | QUANTITY | 0.82+ |
over 19 incidents | QUANTITY | 0.81+ |
first responders | QUANTITY | 0.73+ |
Coleman 19 | EVENT | 0.71+ |
Central Data | ORGANIZATION | 0.7+ |
2nd 1 | QUANTITY | 0.69+ |
example | QUANTITY | 0.64+ |
Central Data | TITLE | 0.6+ |
data | ORGANIZATION | 0.54+ |
Corbyn 19 | ORGANIZATION | 0.53+ |
0 | QUANTITY | 0.51+ |
Covic | ORGANIZATION | 0.49+ |
Derek Manky, FortiGuard Labs | RSAC USA 2020
>> Narrator: Live from San Francisco. It's theCUBE, covering RSA Conference 2020, San Francisco. Brought to you by, SiliconANGLE Media. >> Welcome back everyone. CUBE coverage here in Moscone in San Francisco for RSA, 2020. I'm John Furrier host of theCUBE. We've got a great guest here talking about cybersecurity and the impact with AI and the role of data. It's always great to have Derek Manky on Chief Security Insights Global Threat Alliances with FortiGuard Lab, part of Fortinet, FortiGuard Labs is great. Great organization. Thanks for coming on. >> It's a pleasure always to be here-- >> So you guys do a great threat report that we always cover. So it covers all the bases and it really kind of illustrates state of the art of viruses, the protection, threats, et cetera. But you're part of FortiGuard Labs. >> Yeah, that's right. >> Part of Fortinet, which is a security company, public. What is FortiGuard Labs? What do you guys do, what's your mission? >> So FortiGuard Labs has existed since day one. You can think of us as the intelligence that's baked into the product, It's one thing to have a world-class product, but you need a world-class intelligence team backing that up. We're the ones fighting those fires against cybercrime on the backend, 24/7, 365 on a per second basis. We're processing threat intelligence. We've got over 10 million attacks or processing just per minute, over a hundred billion events, in any given day that we have to sift through. We have to find out what's relevant. We have to find gaps that we might be missing detection and protection. We got to push that out to a customer base of 450,000 customers through FortiGuard services and 5 million firewalls, 5 million plus firewalls we have now. So it's vitally important. You need intelligence to be able to detect and then protect and also to respond. Know the enemy, build a security solution around that and then also be able to act quickly about it if you are under active attack. So we're doing everything from creating security controls and protections. So up to, real time updates for customers, but we're also doing playbooks. So finding out who these attackers are, why are they coming up to you. For a CSO, why does that matter? So this is all part of FortiGuard Labs. >> How many people roughly involved ? Take us a little inside the curtain here. What's going on? Personnel size, scope. >> So we're over 235. So for a network security vendor, this was the largest global SOC, that exists. Again, this is behind the curtain like you said. These are the people that are, fighting those fires every day. But it's a large team and we have experts to cover the entire attack surface. So we're looking at not just a viruses, but we're looking at as zero-day weapons, exploits and attacks, everything from cyber crime to, cyber warfare, operational technology, all these sorts of things. And of course, to do that, we need to really heavily rely on good people, but also automation and artificial intelligence and machine learning. >> You guys are walking on a tight rope there. I can only imagine how complex and stressful it is, just imagining the velocity alone. But one of the trends that's coming up here, this year at RSA and is kind of been talking about in the industry is the who? Who is the attacker because, the shifts could shift and change. You got nation states are sitting out there, they're not going to have their hands dirty on this stuff. You've got a lot of dark web activity. You've got a lot of actors out there that go by different patterns. But you guys have an aperture and visibility into a lot of this stuff. >> Absolutely. >> So, you can almost say, that's that guy. That's the actor. That's a really big part. Talk about why that's important. >> This is critically important because in the past, let's say the first generation of, threat intelligence was very flat. It was to watch. So it was just talking about here's a bad IP, here's a bad URL, here's a bad file block hit. But nowadays, obviously the attackers are very clever. These are large organizations that are run a lot of people involved. There's real world damages happening and we're talking about, you look at OT attacks that are happening now. There's, in some cases, 30, $40 million from targeted ransom attacks that are happening. These people, A, have to be brought to justice. So we need to understand the who, but we also need to be able to predict what their next move is. This is very similar to, this is what you see online or CSI. The police trynna investigate and connect the dots like, plotting the strings and the yarn on the map. This is the same thing we're doing, but on a way more advanced level. And it's very important to be able to understand who these groups are, what tools they use, what are the weapons, cyber weapons, if you will, and what's their next move potentially going to be. So there's a lot of different reasons that's important. >> Derek, I was riffing with another guest earlier today about this notion of, government protection. You've got a military troops drop on our shores and my neighborhood, the Russians drop in my neighborhood. Guess what, the police will probably come in, and, or the army should take care of it. But if I got to run a business, I got to build my own militia. There's no support out there. The government's not going to support me. I'm hacked. Damage is done. You guys are in a way providing that critical lifeline that guard or shield, if you will, for customers. And they're going to want more of it. So I've got to ask you the hard question, which is, how are you guys going to constantly be on the front edge of all this? Because at the end of the day, you're in the protection business. Threats are coming at the speed of milliseconds and nanoseconds, in memory. You need memory, you need database. You've got to have real time. It's a tsunami of attack. You guys are the front lines of this. You're the heat shield. >> Yes, absolutely. >> How do you take it to the next level? >> Yeah, so collaboration, integration, having a broad integrated platform, that's our bread and butter. This is what we do. End-to-end security. The attack surface is growing. So we have to be able to, A, be able to cover all aspects of that attack surface and again, have intelligence. So we're doing sharing through partners. We have our core intelligence network. Like I said, we're relying heavily on machine learning models. We're able to find that needle in the haystack. Like, as I said earlier, we're getting over a hundred billion potential threat events a day. We have to dissect that. We have to break it down. We have to say, is this affecting endpoint? Is this effect affecting operational technology? What vertical, how do we process it? How do we verify that this is a real threat? And then most importantly, get that out in time and speed to our customers. So I started with automation years ago, but now really the way that we're doing this is through broad platform coverage. But also machine learning models for and-- >> I want to dig into machine learning because, I love that needle in the haystack analogy, because, if you take that to the next step, you got to stack a needles now. So you find the needle in the haystack. Now you got a bunch of needles, where do you find that? You need AI, you got to have some help. But you still got the human component. So talk about how you guys are advising customers on how you're using machine learning and get that AI up and running for customers and for yourselves. >> So we're technology people. I always look at this as the stack. The stack model, the bottom of the stack, you have automation. You have layer one, layer two. That's like the basic things for, feeds, threat feeds, how we can push out, automate, integrate that. Then you have the human. So the layer seven. This is where our human experts are coming in to actually advise our customers. We're creating a threat signals with FortiGuard Labs as an example. These are bulletins that's a quick two to three page read that a CSO can pick up and say, here's what FortiGuard Labs has discovered this week. Is this relevant to my network? Do I have these protections in place. There's also that automated, and so, I refer to this as a centaur model. It's half human half machine and, the machines are driving a lot of that, the day to day mundane tasks, if you will, but also finding, collecting the needles of needles. But then ultimately we have our humans that are processing that, analyzing it, creating the higher level strategic advice. We recently, we've launched a FortiAI, product as well. This has a concept of a virtual-- >> Hold on, back up a second. What's it called? >> FortiAI. >> So it's AI components. Is it a hardware box or-- >> This is a on-premise appliance built off of five plus years of learning that we've done in the cloud to be able to identify threats and malware, understand what that malware does to a detailed level. And, where we've seen this before, where is it potentially going? How do we protect against it? Something that typically you would need, four to five headcount in your security operations center to do, we're using this as an assist to us. So that's why it's a virtual analyst. It's really a bot, if you will, something that can actually-- >> So it's an enabling opportunity for the customers. So is this virtual assistant built into the box. What does that do, virtual analyst. >> So the virtual analyst is able to, sit on premises. So it's localized learning, collect threats to understand the nature of those threats, to be able to look at the needles of the needles, if you will, make sense of that and then automatically generate reports based off of that. So it's really an assist tool that a network admin or a security analyst was able to pick up and virtually save hours and hours of time of resources. >> So, if you look at the history of like our technology industry from a personalization standpoint, AI and data, whether you're a media business, personalization is ultimately the result of good data AI. So personalization for an analyst, would be how not to screw up their job. (laughs) One level. The other one is to be proactive on being more offensive. And then third collaboration with others. So, you starting to see that kind of picture form. What's your reaction to that? >> I think it's great. There's stepping stones that we have to go through. The collaboration is not always easy. I'm very familiar with this. I mean I was, with the Cyber Threat Alliance since day one, I head up and work with our Global Threat Alliances. There's always good intentions, there's problems that can be created and obviously you have things like PII now and data privacy and all these little hurdles they have to come over. But when it works right together, this is the way to do it. It's the same thing with, you talked about the data naturally when he started building up IT stacks, you have silos of data, but ultimately those silos need to be connected from different departments. They need to integrate a collaborate. It's the same thing that we're seeing from the security front now as well. >> You guys have proven the model of FortiGuard that the more you can see, the more visibility you can see and more access to the data in real time or anytime scale, the better the opportunity. So I got to take that to the next level. What you guys are doing, congratulations. But now the customer. How do I team up with, if I'm a customer with other customers because the bad guys are teaming up. So the teaming up is now a real dynamic that companies are deploying. How are you guys looking at that? How is FortiGuard helping that? Is it through services? Is it through the products like virtual assistant? Virtual FortiAI? >> So you can think of this. I always make it an analogy to the human immune system. Artificial neural networks are built off of neural nets. If I have a problem and an infection, say on one hand, the rest of the body should be aware of that. That's collaboration from node to node. Blood cells to blood cells, if you will. It's the same thing with employees. If a network admin sees a potential problem, they should be able to go and talk to the security admin, who can go in, log into an appliance and create a proper response to that. This is what we're doing in the security fabric to empower the customer. So the customer doesn't have to always do this and have the humans actively doing those cycles. I mean, this is the integration. The orchestration is the big piece of what we're doing. So security orchestration between devices, that's taking that gap out from the human to human, walking over with a piece of paper to another or whatever it is. That's one of the key points that we're doing within the actual security fabric. >> So that's why silos is problematic. Because you can't get that impact. >> And it also creates a lag time. We have a need for speed nowadays. Threats are moving incredibly fast. I think we've talked about this on previous episodes with swarm technology, offensive automation, the weaponization of artificial intelligence. So it becomes critically important to have that quick response and silos, really create barriers of course, and make it slower to respond. >> Okay Derek, so I got to ask you, it's kind of like, I don't want to say it sounds like sports, but it's, what's the state of the art in the attack vectors coming in. What are you guys seeing as some of the best of breed tax that people should really be paying attention to? They may, may not have fortified down. What are SOCs looking at and what are security pros focused on right now in terms of the state of the art. >> So the things that keep people up at night. We follow this in our Threat Landscape Report. Obviously we just released our key four one with FortiGuard Labs. We're still seeing the same culprits. This is the same story we talked about a lot of times. Things like, it used to be a EternalBlue and now BlueKeep, these vulnerabilities that are nothing new but still pose big problems. We're still seeing that exposed on a lot of networks. Targeted ransom attacks, as I was saying earlier. We've seen the shift or evolution from ransomware from day to day, like, pay us three or $400, we'll give you access to your data back to going after targeted accounts, high revenue business streams. So, low volume, high risk. That's the trend that we're starting to see as well. And this is what I talk about for trying to find that needle in the haystack. This is again, why it's important to have eyes on that. >> Well you guys are really advanced and you guys doing great work, so congratulations. I got to ask you to kind of like, the spectrum of IT. You've got a lot of people in the high end, financial services, healthcare, they're regulated, they got all kinds of challenges. But as IT and the enterprise starts to get woke to the fact that everyone's vulnerable. I've heard people say, well, I'm good. I got a small little to manage, I'm only a hundred million dollar business. All I do is manufacturing. I don't really have any IP. So what are they going to steal? So that's kind of a naive approach. The answer is, what? Your operations and ransomware, there's a zillion ways to get taken down. How do you respond to that. >> Yeah, absolutely. Going after the crown jewels, what hurts? So it might not be a patent or intellectual property. Again, the things that matter to these businesses, how they operate day to day. The obvious examples, what we just talked about with revenue streams and then there's other indirect problems too. Obviously, if that infrastructure of a legitimate organization is taken over and it's used as a botnet and an orchestrated denial-of-service attack to take down other organizations, that's going to have huge implications. >> And they won't even know it. >> Right, in terms of brand damage, has legal implications as well that happened. This is going even down to the basics with consumers, thinking that, they're not under attack, but at the end of the day, what matters to them is their identity. Identity theft. But this is on another level when it comes to things to-- >> There's all kinds of things to deal with. There's, so much more advanced on the attacker side. All right, so I got to ask you a final question. I'm a business. You're a pro. You guys are doing great work. What do I do, what's my strategy? How would you advise me? How do I get my act together? I'm working the mall every day. I'm trying my best. I'm peddling as fast as I can. I'm overloaded. What do I do? How do I go the next step? >> So look for security solutions that are the assist model like I said. There's never ever going to be a universal silver bullet to security. We all know this. But there are a lot of things that can help up to that 90%, 95% secure. So depending on the nature of the threats, having a first detection first, that's always the most important. See what's on your network. This is things where SIM technology, sandboxing technology has really come into play. Once you have those detections, how can you actually take action? So look for a integration. Really have a look at your security solutions to see if you have the integration piece. Orchestration and integration is next after detection. Finally from there having a proper channel, are there services you looked at for managed incident response as an example. Education and cyber hygiene are always key. These are free things that I push on everybody. I mean we release weekly threat intelligence briefs. We're doing our quarterly Threat Landscape Reports. We have something called threat signals. So it's FortiGuard response to breaking industry events. I think that's key-- >> Hygiene seems to come up over and over as the, that's the foundational bedrock of security. >> And then, as I said, ultimately, where we're heading with this is the AI solution model. And so that's something, again that I think-- >> One final question since it's just popped into my head. I wanted, and that last one. But I wanted to bring it up since you kind of were, we're getting at it. I know you guys are very sensitive to this one topic cause you live it every day. But the notion of time and time elapsed is a huge concern because you got to know, it's not if it's when. So the factor of time is a huge variable in all kinds of impact. Positive and negative. How do you talk about time and the notion of time elapsing. >> That's great question. So there's many ways to stage that. I'll try to simplify it. So number one, if we're talking about breaches, time is money. So the dwell time. The longer that a threat sits on a network and it's not cleaned up, the more damage is going to be done. And we think of the ransom attacks, denial-of-service, revenue streams being down. So that's the incident response problem. So time is very important to detect and respond. So that's one aspect of that. The other aspect of time is with machine learning as well. This is something that people don't always think about. They think that, artificial intelligence solutions can be popped up overnight and within a couple of weeks they're going to be accurate. It's not the case. Machines learn like humans too. It takes time to do that. It takes processing power. Anybody can get that nowadays, data, most people can get that. But time is critical to that. It's a fascinating conversation. There's many different avenues of time that we can talk about. Time to detect is also really important as well, again. >> Let's do it, let's do a whole segment on that, in our studio, I'll follow up on that. I think it's a huge topic, I hear about all the time. And since it's a little bit elusive, but it kind of focuses your energy on, wait, what's going on here? I'm not reacting. (laughs) Time's a huge issue. >> I refer to it as a latency. I mean, latency is a key issue in cybersecurity, just like it is in the stock exchange. >> I mean, one of the things I've been talking about with folks here, just kind of in fun conversation is, don't be playing defense all the time. If you have a good time latency, you going to actually be a little bit offensive. Why not take a little bit more offense. Why play defense the whole time. So again, you're starting to see this kind of mentality not being, just an IT, we've got to cover, okay, respond, no, hold on the ballgame. >> That comes back to the sports analogy again. >> Got to have a good offense. They must cross offense. Derek, thanks so much. Quick plug for you, FortiGuard, share with the folks what you guys are up to, what's new, what's the plug. >> So FortiGuard Labs, so we're continuing to expand. Obviously we're focused on, as I said, adding all of the customer protection first and foremost. But beyond that, we're doing great things in industry. So we're working actively with law enforcement, with Interpol, Cyber Threat Alliance, with The World Economic Forum and the Center for Cyber Security. There's a lot more of these collaboration, key stakeholders. You talked about the human to human before. We're really setting the pioneering of setting that world stage. I think that is, so, it's really exciting to me. It's a lot of good industry initiatives. I think it's impactful. We're going to see an impact. The whole goal is we're trying to slow the offense down, the offense being the cyber criminals. So there's more coming on that end. You're going to see a lot great, follow our blogs at fortinet.com and all-- >> Great stuff. >> great reports. >> I'm a huge believer in that the government can't protect us digitally. There's going to be protection, heat shields out there. You guys are doing a good job. It's only going to be more important than ever before. So, congratulations. >> Thank you. >> Thanks for coming I really appreciate. >> Never a dull day as we say. >> All right, it's theCUBE's coverage here in San Francisco for RSA 2020. I'm John Furrier, your host. Thanks for watching. (upbeat music)
SUMMARY :
Brought to you by, SiliconANGLE Media. and the impact with AI and the role of data. and it really kind of illustrates state of the art of viruses, What do you guys do, what's your mission? and then protect and also to respond. How many people roughly involved ? And of course, to do that, But one of the trends that's coming up here, That's the actor. This is the same thing we're doing, So I've got to ask you the hard question, but now really the way that we're doing this I love that needle in the haystack analogy, the day to day mundane tasks, if you will, Hold on, back up a second. So it's AI components. to be able to identify threats and malware, So it's an enabling opportunity for the customers. So the virtual analyst is able to, sit on premises. The other one is to be proactive on being more offensive. It's the same thing that we're seeing that the more you can see, So the customer doesn't have to always do this So that's why silos is problematic. and make it slower to respond. focused on right now in terms of the state of the art. So the things that keep people up at night. I got to ask you to kind of like, the spectrum of IT. Again, the things that matter to these businesses, This is going even down to the basics with consumers, All right, so I got to ask you a final question. So depending on the nature of the threats, that's the foundational bedrock of security. is the AI solution model. So the factor of time is a huge variable So that's the incident response problem. but it kind of focuses your energy on, I refer to it as a latency. I mean, one of the things I've been talking about share with the folks what you guys are up to, You talked about the human to human before. that the government can't protect us digitally. I really appreciate. I'm John Furrier, your host.
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
Interpol | ORGANIZATION | 0.99+ |
Derek | PERSON | 0.99+ |
Derek Manky | PERSON | 0.99+ |
Center for Cyber Security | ORGANIZATION | 0.99+ |
FortiGuard Labs | ORGANIZATION | 0.99+ |
John Furrier | PERSON | 0.99+ |
$400 | QUANTITY | 0.99+ |
95% | QUANTITY | 0.99+ |
five plus years | QUANTITY | 0.99+ |
FortiGuard | ORGANIZATION | 0.99+ |
San Francisco | LOCATION | 0.99+ |
Fortinet | ORGANIZATION | 0.99+ |
FortiGuard Lab | ORGANIZATION | 0.99+ |
Cyber Threat Alliance | ORGANIZATION | 0.99+ |
5 million | QUANTITY | 0.99+ |
five | QUANTITY | 0.99+ |
two | QUANTITY | 0.99+ |
SiliconANGLE Media | ORGANIZATION | 0.99+ |
three | QUANTITY | 0.99+ |
450,000 customers | QUANTITY | 0.98+ |
fortinet.com | OTHER | 0.98+ |
one | QUANTITY | 0.98+ |
RSA Conference 2020 | EVENT | 0.98+ |
Moscone | LOCATION | 0.98+ |
RSA | ORGANIZATION | 0.98+ |
365 | QUANTITY | 0.98+ |
Global Threat Alliances | ORGANIZATION | 0.98+ |
One level | QUANTITY | 0.97+ |
RSA | EVENT | 0.97+ |
this week | DATE | 0.97+ |
four | QUANTITY | 0.97+ |
RSAC | ORGANIZATION | 0.97+ |
One final question | QUANTITY | 0.97+ |
EternalBlue | ORGANIZATION | 0.96+ |
over a hundred billion events | QUANTITY | 0.95+ |
this year | DATE | 0.95+ |
first | QUANTITY | 0.94+ |
30, $40 million | QUANTITY | 0.94+ |
first generation | QUANTITY | 0.94+ |
first detection | QUANTITY | 0.94+ |
three page | QUANTITY | 0.94+ |
one aspect | QUANTITY | 0.93+ |
over 10 million attacks | QUANTITY | 0.93+ |
over a hundred billion potential threat events a day | QUANTITY | 0.92+ |
Russians | PERSON | 0.92+ |
third collaboration | QUANTITY | 0.91+ |
one topic | QUANTITY | 0.9+ |
hundred million dollar | QUANTITY | 0.89+ |
Threat Landscape Report | TITLE | 0.88+ |
one thing | QUANTITY | 0.87+ |
years | DATE | 0.86+ |
5 million firewalls | QUANTITY | 0.85+ |
World Economic Forum | ORGANIZATION | 0.85+ |
day one | QUANTITY | 0.84+ |
90% | QUANTITY | 0.81+ |
layer one | QUANTITY | 0.78+ |
layer seven | QUANTITY | 0.76+ |
earlier today | DATE | 0.75+ |
zillion ways | QUANTITY | 0.74+ |
theCUBE | ORGANIZATION | 0.74+ |
over 235 | QUANTITY | 0.72+ |
RSA 2020 | TITLE | 0.72+ |
Narrator: Live | TITLE | 0.7+ |
second | QUANTITY | 0.69+ |
CSI | ORGANIZATION | 0.69+ |
nanoseconds | QUANTITY | 0.65+ |
PII | ORGANIZATION | 0.64+ |
key four one | QUANTITY | 0.63+ |
BlueKeep | ORGANIZATION | 0.63+ |
Security Insights Global Threat Alliances | ORGANIZATION | 0.62+ |
Seth Dobrin, IBM | IBM Data and AI Forum
>>live from Miami, Florida It's the Q covering. IBM is data in a I forum brought to you by IBM. >>Welcome back to the port of Miami, everybody. We're here at the Intercontinental Hotel. You're watching the Cube? The leader and I live tech covered set. Daubert is here. He's the vice president of data and I and a I and the chief data officer of cloud and cognitive software. And I'd be upset too. Good to see you again. >>Good. See, Dave, thanks for having me >>here. The data in a I form hashtag data. I I It's amazing here. 1700 people. Everybody's gonna hands on appetite for learning. Yeah. What do you see out in the marketplace? You know what's new since we last talked. >>Well, so I think if you look at some of the things that are really need in the marketplace, it's really been around filling the skill shortage. And how do you operationalize and and industrialize? You're a I. And so there's been a real need for things ways to get more productivity out of your data. Scientists not necessarily replace them. But how do you get more productivity? And we just released a few months ago, something called Auto A I, which really is, is probably the only tool out there that automates the end end pipeline automates 80% of the work on the Indian pipeline, but isn't a black box. It actually kicks out code. So your data scientists can then take it, optimize it further and understand it, and really feel more comfortable about it. >>He's got a eye for a eyes. That's >>exactly what is a eye for an eye. >>So how's that work? So you're applying machine intelligence Two data to make? Aye. Aye, more productive pick algorithms. Best fit. >>Yeah, So it does. Basically, you feed it your data and it identifies the features that are important. It does feature engineering for you. It does model selection for you. It does hyper parameter tuning and optimization, and it does deployment and also met monitors for bias. >>So what's the date of scientists do? >>Data scientist takes the code out the back end. And really, there's some tweaks that you know, the model, maybe the auto. Aye, aye. Maybe not. Get it perfect, Um, and really customize it for the business and the needs of the business. that the that the auto A I so they not understand >>the data scientist, then can can he or she can apply it in a way that is unique to their business that essentially becomes their I p. It's not like generic. Aye, aye for everybody. It's it's customized by And that's where data science to complain that I have the time to do this. Wrangling data >>exactly. And it was built in a combination from IBM Research since a great assets at IBM Research plus some cattle masters at work here at IBM that really designed and optimize the algorithm selection and things like that. And then at the keynote today, uh, wonderment Thompson was up there talking, and this is probably one of the most impactful use cases of auto. Aye, aye to date. And it was also, you know, my former team, the data science elite team, was engaged, but wonderment Thompson had this problem where they had, like, 17,000 features in their data sets, and what they wanted to do was they wanted to be able to have a custom solution for their customers. And so every time they get a customer that have to have a data scientist that would sit down and figure out what the right features and how the engineer for this customer. It was an intractable problem for them. You know, the person from wonderment Thompson have prevented presented today said he's been trying to solve this problem for eight years. Auto Way I, plus the data science elite team solve the form in two months, and after that two months, it went right into production. So in this case, oughta way. I isn't doing the whole pipeline. It's helping them identify the features and engineering the features that are important and giving them a head start on the model. >>What's the, uh, what's the acquisition bottle for all the way as a It's a license software product. Is it assassin part >>of Cloudpack for data, and it's available on IBM Cloud. So it's on IBM Cloud. You can use it paper use so you get a license as part of watching studio on IBM Cloud. If you invest in Cloudpack for data, it could be a perpetual license or committed term license, which essentially assassin, >>it's essentially a feature at dawn of Cloudpack for data. >>It's part of Cloudpack per day and you're >>saying it can be usage based. So that's key. >>Consumption based hot pack for data is all consumption based, >>so people want to use a eye for competitive advantage. I said by my open that you know, we're not marching to the cadence of Moore's Law in this industry anymore. It's a combination of data and then cloud for scale. So so people want competitive advantage. You've talked about some things that folks are doing to gain that competitive advantage. But the same time we heard from Rob Thomas that only about 4 to 10% penetration for a I. What? What are the key blockers that you see and how you're knocking them >>down? Well, I think there's. There's a number of key blockers, so one is of access to data, right? Cos have tons of data, but being able to even know what data is, they're being able to pull it all together and being able to do it in a way that is compliant with regulation because you got you can't do a I in a vacuum. You have to do it in the context of ever increasing regulation like GDP R and C, C, P A and all these other regulator privacy regulations that are popping up. So so that's that's really too so access to data and regulation can be blockers. The 2nd 1 or the 3rd 1 is really access to appropriate skills, which we talked a little bit about. Andi, how do you retrain, or how do you up skill, the talent you have? And then how do you actually bring in new talent that can execute what you want on then? Sometimes in some cos it's a lack of strategy with appropriate measurement, right? So what is your A II strategy, and how are you gonna measure success? And you and I have talked about this on Cuban on Cube before, where it's gotta measure your success in dollars and cents right cost savings, net new revenue. That's really all your CFO is care about. That's how you have to be able to measure and monitor your success. >>Yes. Oh, it's so that's that Last one is probably were where most organizations start. Let's prioritize the use cases of the give us the best bang for the buck, and then business guys probably get really excited and say Okay, let's go. But to up to truly operationalize that you gotta worry about these other things. You know, the compliance issues and you gotta have the skill sets. Yeah, it's a scale. >>And sometimes that's actually the first thing you said is sometimes a mistake. So focusing on the one that's got the most bang for the buck is not necessarily the best place to start for a couple of reasons. So one is you may not have the right data. It may not be available. It may not be governed properly. Number one, number two the business that you're building it for, may not be ready to consume it right. They may not be either bought in or the processes need to change so much or something like that, that it's not gonna get used. And you can build the best a I in the world. If it doesn't get used, it creates zero value, right? And so you really want to focus on for the first couple of projects? What are the one that we can deliver the best value, not Sarah, the most value, but the best value in the shortest amount of time and ensure that it gets into production because especially when you're starting off, if you don't show adoption, people are gonna lose interest. >>What are you >>seeing in terms of experimentation now in the customer base? You know, when you talk to buyers and you talk about, you know, you look at the I T. Spending service. People are concerned about tariffs. The trade will hurt the 2020 election. They're being a little bit cautious. But in the last two or three years have been a lot of experimentation going on. And a big part of that is a I and machine learning. What are you seeing in terms of that experimentation turning into actually production project that we can learn from and maybe do some new experiments? >>Yeah, and I think it depends on how you're doing the experiments. There's, I think there's kind of academic experimentation where you have data science, Sistine Data science teams that come work on cool stuff that may or may not have business value and may or may not be implemented right. They just kind of latch on. The business isn't really involved. They latch on, they do projects, and that's I think that's actually bad experimentation if you let it that run your program. The good experimentation is when you start identity having a strategy. You identify the use cases you want to go after and you experiment by leveraging, agile to deliver these methodologies. You deliver value in two weeks prints, and you can start delivering value quickly. You know, in the case of wonderment, Thompson again 88 weeks, four sprints. They got value. That was an experiment, right? That was an experiment because it was done. Agile methodologies using good coding practices using good, you know, kind of design up front practices. They were able to take that and put it right into production. If you're doing experimentation, you have to rewrite your code at the end. And it's a waste of time >>T to your earlier point. The moon shots are oftentimes could be too risky. And if you blow it on a moon shot, it could set you back years. So you got to be careful. Pick your spots, picked ones that maybe representative, but our lower maybe, maybe lower risk. Apply agile methodologies, get a quick return, learn, develop those skills, and then then build up to the moon ship >>or you break that moon shot down its consumable pieces. Right, Because the moon shot may take you two years to get to. But maybe there are sub components of that moon shot that you could deliver in 34 months and you start delivering knows, and you work up to the moon shot. >>I always like to ask the dog food in people. And I said, like that. Call it sipping your own champagne. What do you guys done internally? When we first met, it was and I think, a snowy day in Boston, right at the spark. Some it years ago. And you did a big career switch, and it's obviously working out for you, But But what are some of the things? And you were in part, brought in to help IBM internally as well as Interpol Help IBM really become data driven internally? Yeah. How has that gone? What have you learned? And how are you taking that to customers? >>Yeah, so I was hired three years ago now believe it was that long toe lead. Our internal transformation over the last couple of years, I got I don't want to say distracted there were really important business things I need to focus on, like gpr and helping our customers get up and running with with data science, and I build a data science elite team. So as of a couple months ago, I'm back, you know, almost entirely focused on her internal transformation. And, you know, it's really about making sure that we use data and a I to make appropriate decisions on DSO. Now we have. You know, we have an app on her phone that leverages Cognos analytics, where at any point, Ginny Rometty or Rob Thomas or Arvin Krishna can pull up and look in what we call E P M. Which is enterprise performance management and understand where the business is, right? What what do we do in third quarter, which just wrapped up what was what's the pipeline for fourth quarter? And it's at your fingertips. We're working on revamping our planning cycle. So today planning has been done in Excel. We're leveraging Planning Analytics, which is a great planning and scenario planning tool that with the tip of a button, really let a click of a button really let you understand how your business can perform in the future and what things need to do to get it perform. We're also looking across all of cloud and cognitive software, which data and A I sits in and within each business unit and cloud and cognitive software. The sales teams do a great job of cross sell upsell. But there's a huge opportunity of how do we cross sell up sell across the five different businesses that live inside of cloud and cognitive software. So did an aye aye hybrid cloud integration, IBM Cloud cognitive Applications and IBM Security. There's a lot of potential interplay that our customers do across there and providing a I that helps the sales people understand when they can create more value. Excuse me for our customers. >>It's interesting. This is the 10th year of doing the Cube, and when we first started, it was sort of the beginning of the the big data craze, and a lot of people said, Oh, okay, here's the disruption, crossing the chasm. Innovator's dilemma. All that old stuff going away, all the new stuff coming in. But you mentioned Cognos on mobile, and that's this is the thing we learned is that the key ingredients to data strategies. Comprised the existing systems. Yes. Throw those out. Those of the systems of record that were the single version of the truth, if you will, that people trusted you, go back to trust and all this other stuff built up around it. Which kind of created dissidents. Yeah. And so it sounds like one of the initiatives that you you're an IBM I've been working on is really bringing in the new pieces, modernizing sort of the existing so that you've got sort of consistent data sets that people could work. And one of the >>capabilities that really has enabled this transformation in the last six months for us internally and for our clients inside a cloud pack for data, we have this capability called IBM data virtualization, which we have all these independent sources of truth to stomach, you know? And then we have all these other data sources that may or may not be as trusted, but to be able to bring them together literally. With the click of a button, you drop your data sources in the Aye. Aye, within data. Virtualization actually identifies keys across the different things so you can link your data. You look at it, you check it, and it really enables you to do this at scale. And all you need to do is say, pointed out the data. Here's the I. P. Address of where the data lives, and it will bring that in and help you connect it. >>So you mentioned variances in data quality and consumer of the data has to have trust in that data. Can you use machine intelligence and a I to sort of give you a data confidence meter, if you will. Yeah. So there's two things >>that we use for data confidence. I call it dodging this factor, right. Understanding what the dodging this factor is of the data. So we definitely leverage. Aye. Aye. So a I If you have a date, a dictionary and you have metadata, the I can understand eight equality. And it can also look at what your data stewards do, and it can do some of the remediation of the data quality issues. But we all in Watson Knowledge catalog, which again is an in cloudpack for data. We also have the ability to vote up and vote down data. So as much as the team is using data internally. If there's a data set that had a you know, we had a hive data quality score, but it wasn't really valuable. It'll get voted down, and it will help. When you search for data in the system, it will sort it kind of like you do a search on the Internet and it'll it'll down rank that one, depending on how many down votes they got. >>So it's a wisdom of the crowd type of. >>It's a crowd sourcing combined with the I >>as that, in your experience at all, changed the dynamics of politics within organizations. In other words, I'm sure we've all been a lot of meetings where somebody puts foursome data. And if the most senior person in the room doesn't like the data, it doesn't like the implication he or she will attack the data source, and then the meeting's over and it might not necessarily be the best decision for the organization. So So I think it's maybe >>not the up, voting down voting that does that, but it's things like the E PM tool that I said we have here. You know there is a single source of truth for our finance data. It's on everyone's phone. Who needs access to it? Right? When you have a conversation about how the company or the division or the business unit is performing financially, it comes from E. P M. Whether it's in the Cognos app or whether it's in a dashboard, a separate dashboard and Cognos or is being fed into an aye aye, that we're building. This is the source of truth. Similarly, for product data, our individual products before me it comes from here's so the conversation at the senior senior meetings are no longer your data is different from my data. I don't believe it. You've eliminated that conversation. This is the data. This is the only data. Now you can have a conversation about what's really important >>in adult conversation. Okay, Now what are we going to do? It? It's >>not a bickering about my data versus your data. >>So what's next for you on? You know, you're you've been pulled in a lot of different places again. You started at IBM as an internal transformation change agent. You got pulled into a lot of customer situations because yeah, you know, you're doing so. Sales guys want to drag you along and help facilitate activity with clients. What's new? What's what's next for you. >>So really, you know, I've only been refocused on the internal transformation for a couple months now. So really extending IBM struck our cloud and cognitive software a data and a I strategy and starting to quickly implement some of these products, just like project. So, like, just like I just said, you know, we're starting project without even knowing what the prioritized list is. Intuitively, this one's important. The team's going to start working on it, and one of them is an aye aye project, which is around cross sell upsell that I mentioned across the portfolio and the other one we just got done talking about how in the senior leadership meeting for Claude Incognito software, how do we all work from a Cognos dashboard instead of Excel data data that's been exported put into Excel? The challenge with that is not that people don't trust the data. It's that if there's a question you can't drill down. So if there's a question about an Excel document or a power point that's up there, you will get back next meeting in a month or in two weeks, we'll have an e mail conversation about it. If it's presented in a really live dashboard, you can drill down and you can actually answer questions in real time. The value of that is immense, because now you as a leadership team, you can make a decision at that point and decide what direction you're going to do. Based on data, >>I said last time I have one more questions. You're CDO but you're a polymath on. So my question is, what should people look for in a chief data officer? What sort of the characteristics in the attributes, given your >>experience, that's kind of a loaded question, because there is. There is no good job, single job description for a chief date officer. I think there's a good solid set of skill sets, the fine for a cheap date officer and actually, as part of the chief data officer summits that you you know, you guys attend. We had were having sessions with the chief date officers, kind of defining a curriculum for cheap date officers with our clients so that we can help build the chief. That officer in the future. But if you look a quality so cheap, date officer is also a chief disruption officer. So it needs to be someone who is really good at and really good at driving change and really good at disrupting processes and getting people excited about it changes hard. People don't like change. How do you do? You need someone who can get people excited about change. So that's one thing. On depending on what industry you're in, it's got to be. It could be if you're in financial or heavy regulated industry, you want someone that understands governance. And that's kind of what Gardner and other analysts call a defensive CDO very governance Focus. And then you also have some CDOs, which I I fit into this bucket, which is, um, or offensive CDO, which is how do you create value from data? How do you caught save money? How do you create net new revenue? How do you create new business models, leveraging data and a I? And now there's kind of 1/3 type of CDO emerging, which is CDO not as a cost center but a studio as a p N l. How do you generate revenue for the business directly from your CDO office. >>I like that framework, right? >>I can't take credit for it. That's Gartner. >>Its governance, they call it. We say he called defensive and offensive. And then first time I met Interpol. He said, Look, you start with how does data affect the monetization of my organization? And that means making money or saving money. Seth, thanks so much for coming on. The Cube is great to see you >>again. Thanks for having me >>again. All right, Keep it right to everybody. We'll be back at the IBM data in a I form from Miami. You're watching the Cube?
SUMMARY :
IBM is data in a I forum brought to you by IBM. Good to see you again. What do you see out in the marketplace? And how do you operationalize and and industrialize? He's got a eye for a eyes. So how's that work? Basically, you feed it your data and it identifies the features that are important. And really, there's some tweaks that you know, the data scientist, then can can he or she can apply it in a way that is unique And it was also, you know, my former team, the data science elite team, was engaged, Is it assassin part You can use it paper use so you get a license as part of watching studio on IBM Cloud. So that's key. What are the key blockers that you see and how you're knocking them the talent you have? You know, the compliance issues and you gotta have the skill sets. And sometimes that's actually the first thing you said is sometimes a mistake. You know, when you talk to buyers and you talk You identify the use cases you want to go after and you experiment by leveraging, And if you blow it on a moon shot, it could set you back years. Right, Because the moon shot may take you two years to And how are you taking that to customers? with the tip of a button, really let a click of a button really let you understand how your business And so it sounds like one of the initiatives that you With the click of a button, you drop your data sources in the Aye. to sort of give you a data confidence meter, if you will. So a I If you have a date, a dictionary and you have And if the most senior person in the room doesn't like the data, so the conversation at the senior senior meetings are no longer your data is different Okay, Now what are we going to do? a lot of customer situations because yeah, you know, you're doing so. So really, you know, I've only been refocused on the internal transformation for What sort of the characteristics in the attributes, given your And then you also have some CDOs, which I I I can't take credit for it. The Cube is great to see you Thanks for having me We'll be back at the IBM data in a I form from Miami.
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
Seth | PERSON | 0.99+ |
Arvin Krishna | PERSON | 0.99+ |
IBM | ORGANIZATION | 0.99+ |
Daubert | PERSON | 0.99+ |
Boston | LOCATION | 0.99+ |
Rob Thomas | PERSON | 0.99+ |
Dave | PERSON | 0.99+ |
Ginny Rometty | PERSON | 0.99+ |
Seth Dobrin | PERSON | 0.99+ |
IBM Research | ORGANIZATION | 0.99+ |
two years | QUANTITY | 0.99+ |
Miami | LOCATION | 0.99+ |
Excel | TITLE | 0.99+ |
eight years | QUANTITY | 0.99+ |
88 weeks | QUANTITY | 0.99+ |
Rob Thomas | PERSON | 0.99+ |
Gardner | PERSON | 0.99+ |
Sarah | PERSON | 0.99+ |
Miami, Florida | LOCATION | 0.99+ |
34 months | QUANTITY | 0.99+ |
17,000 features | QUANTITY | 0.99+ |
two things | QUANTITY | 0.99+ |
10th year | QUANTITY | 0.99+ |
two weeks | QUANTITY | 0.99+ |
1700 people | QUANTITY | 0.99+ |
Gartner | ORGANIZATION | 0.99+ |
Cognos | TITLE | 0.99+ |
three years ago | DATE | 0.99+ |
two months | QUANTITY | 0.99+ |
first time | QUANTITY | 0.98+ |
one | QUANTITY | 0.98+ |
today | DATE | 0.98+ |
each business | QUANTITY | 0.97+ |
first couple | QUANTITY | 0.97+ |
Interpol | ORGANIZATION | 0.96+ |
about 4 | QUANTITY | 0.96+ |
Thompson | PERSON | 0.96+ |
third quarter | DATE | 0.96+ |
five different businesses | QUANTITY | 0.95+ |
Two data | QUANTITY | 0.95+ |
Intercontinental Hotel | ORGANIZATION | 0.94+ |
IBM Data | ORGANIZATION | 0.94+ |
first | QUANTITY | 0.93+ |
single job | QUANTITY | 0.93+ |
first thing | QUANTITY | 0.92+ |
Cognos | ORGANIZATION | 0.91+ |
last couple of years | DATE | 0.91+ |
single source | QUANTITY | 0.89+ |
few months ago | DATE | 0.89+ |
one more questions | QUANTITY | 0.89+ |
couple months ago | DATE | 0.88+ |
Cloudpack | TITLE | 0.87+ |
single version | QUANTITY | 0.87+ |
Cube | COMMERCIAL_ITEM | 0.86+ |
80% of | QUANTITY | 0.85+ |
last six months | DATE | 0.84+ |
Claude Incognito | ORGANIZATION | 0.84+ |
agile | TITLE | 0.84+ |
10% | QUANTITY | 0.84+ |
years | DATE | 0.84+ |
Moore | ORGANIZATION | 0.82+ |
zero | QUANTITY | 0.81+ |
three years | QUANTITY | 0.8+ |
2020 election | EVENT | 0.8+ |
E PM | TITLE | 0.79+ |
four sprints | QUANTITY | 0.79+ |
Watson | ORGANIZATION | 0.77+ |
2nd 1 | QUANTITY | 0.75+ |
Alan Cohen, DCVC | CUBEConversation, September 2019
>>from our studios in the heart of Silicon Valley, Palo Alto, California It is a cute conversation. >>Hey, welcome back already, Jeffrey. Here with the cue, we're in our pal Amato Studios for acute conversation or excited, have ah, many Time Cube alone. I has been at all types of companies. He's moving around. We like to keep him close because he's got a great feel for what's going on. And now he's starting a new adventure. Eso really happy to welcome Alan Cohen back to the studio. Only great to see you. >>Hey, Draft, how are you >>in your new adventure? Let's get it right. It's the D C v c your partner. So this is ah, on the venture side. I'm gonna dark. You've gone to the dark side of the money side That is not a new firm, dark side. You know what's special about this town of money adventure right now, but you guys kind of have a special thesis. So tell us about yeah, and I think you've spoken >>to Matt and Zack. You know my partners in the past, So D. C. V. C is been in the venture business for about a decade and, um, you know, the 1st 5 years, the fund was very much focused on building, ah, lot of the infrastructure that we kind of take for granted. No things have gone into V m wear and into Citrix, and it's AWS, and hence the data collect of the D. C out of D. C. V. C. Really, the focus of the firm in the last five years and going forward is an area we call deep tech, which think about more about the intersection of science and engineering so less about. How do you improve the IittIe infrastructure? But how do you take all this computational power and put it to work in in specific industries, whether it's addressing supply chains, new forms of manufacturing, new forms of agriculture. So we're starting to see all that all the stuff that we've built our last 20 years and really apply it against kind of industrial transformation. So and we're excited. We just raise the $725 million fund. So we I got a little bit of ammunition to work with, >>Congratulate says, It's fun. Five. That's your eighth fund. Yeah, and really, it's consistent with where we're seeing all the time about applied a I and applied machine. Exactly. Right in New York, a company that's gonna build a I itt s'more the where you applying a i within an application, Where you applying machine, learning within what you do. And then you can just see the applications grow exactly right. Or are you targeting specific companies that are attacking a particular industrial focus and just using a eyes, their secret sauce or using deep taxes or secret uh, all of the above? Right. So, like I >>did when I think about D c v c like it's like so don't think about, um, I ops or throughput Orban with think about, um uh, rockets, robots, microbes, building blocks of effectively of human life and and of materials and then playing computational power and a I against those areas. So a little bit, you know, different focus. So, you know, it's the intersection of compute really smart computer science, but I'll give you a great example of something. It would be a little bit different. So we are investors and very active in a company called Pivot Bio, which is not exactly a household name. Pivot bio is a company that is replacing chemical fertilizer with microbes. And what I mean by that is they create microbes they used. So they've used all this big data and a I and computational power to construct microbes that when you plant corn, you insert the microbe into the planting cycle and it continuously produces nitrogen, which means you don't have to apply fertilizer. Right? Which fertilizer? Today in the U. S. A. $212 billion industry and two things happen. One you don't have. All of the runoff doesn't leech into the ground. The nitrous does. Nitrogen doesn't go into the air, and the crop yield has been a being been between about 12 and 15% higher. Right? >>Is it getting put? You know, the food industry is such a great place, and there's so many opportunities, both in food production. This is like beyond a chemical fertilizer instead of me. But it's great, but it's funny because you think of GMO, right? So all food is genetically modified. It's just It took a long time in the past because you had to get trees together, and yet you replant the pretty apples and throw the old apple trees away. Because if you look at an apple today versus an apple 50 years, 100 years, right, very, very different. And yet when we apply a man made kind of acceleration of that process than people, you know, kind of pushed back Well, this is this is not this is not nature, So I'm just curious in, in, in in, Well, this is like a microbe, you know? You know, they actually it is nature, right? So nature. But there'll be some crazy persons that wait, This is not, you know, you're introducing some foreign element into Well, you could take >>potash and pour it on corn. Or you could create a use, a microbe that creates nitrogen. So which one is the chemical on which one is nature, >>right, That that's why they get out. It's a funny part of that conversation, but but it's a different area. So >>you guys look, you guys spent a lot of time on the road. You talked a lot of startups. You talked a lot of companies. You actually talked to venture capitalists and most of the time where you know, we're working on the $4 trillion I t sector, not an insignificant sector, right? So that's globally. It's that's about the size of the economy. You know, manufacturing, agriculture and health care is more like 20 to $40 billion of the economy. So what we've also done is open the aperture to areas that have not gone through the technical disruption that we've seen an I t. Right now in these industries. And that's what's that mean? That's why I joined the firm. That's why I'm really excited, because on one hand you're right. There is a lot of cab you mentioned we were talking before. There is a lot of capital in venture, but there's not a CZ much targeted at the's area. So you have a larger part of global economy and then a much more of specific focus on it. >>Yeah, I think it's It's such a you know, it's kind of the future's here kind of the concept because no one knows, you know, the rate of which tech is advancing across all industries currently. And so that's where you wake up one day and you're like, Oh, my goodness, you know, look at the impacts on transportation. Look at the impacts on construction of the impacts on health care. Look at the impacts on on agriculture. So the opportunity is fantastic and still following the basic ideas of democratizing data. Not using a sample of old data but using, you know, real time analytics on hold data sets. You know, all these kind of concepts that come over really, really well to a more commercial application in a nightie application. Yeah. So, Jeff, I'm kind of like >>looking over your shoulder. And I'm looking at Tom Friedman's book The world is flat. And you know, if we think about all of us have been kind of working on the Internet for the last 20 years, we've done some amazing things like we've democratized information, right? Google's fairly powerful part of our lives. We've been able to allow people to buy things from all over the world and ship it. So we've done a lot of amazing things in the economy, but it hasn't been free. So if I need a 2032 c r. 20 to 32 battery for my key fob for my phone, and I buy it from Amazon and it comes in a big box. Well, there's a little bit of a carbon footprint issue that goes with that. So one of our key focus is in D. C V. C, which I think is very unique, is we think two things can happen is that weaken deal with some of the excess is over the economy that we built and as well as you know, unlock really large profit pulls. At the end of the day, you know, it has the word Venture Patrol says the word capital, right? And so we have limited partners. They expect returns. We're doing this obviously, to build large franchises. So this is not like this kind of political social thing is that we have large parts of the economy. They were not sustainable. And I'll give you some examples. Actually, you know, Jeff Bezos put out a pledge last week to try to figure out how to turn Amazon carbon neutral. >>Pretty amazing thing >>right with you from the was the richest person Now that half this richest person in the world, right? But somebody who has completely transformed the consumer economy as well as computing a comedy >>and soon transportation, right? So people like us are saying, Hey, >>how can we help Jeff meet his pledge? Right? And like, you know, there are things that we work on, like, you know, next generation of nuclear plants. Like, you know, we need renewables. We need solar, but there's no way to replace electricity. The men electricity, we're gonna need to run our economy and move off of coal and natural gas, Right? So, you know, being able to deal with the climate impacts, the social impacts are going to be actually some of the largest economic opportunities. But you can look at it and say, Hey, this is a terrible problem. It's ripping people across. I got caught in a traffic jam in San Francisco yesterday upon the top of the hill because there was climate protest, right? And you know, so I'm not kind of judging the politics of that. We could have a long conversation about that. The question is, how do you deal with these real issues, right and obviously and heady deal with them profitably and ethically, and I think that something is very unique about you know, D. C. V. C's focus and the ability to raise probably the largest deep tech fund ever to go after. It means that you know, a lot of people who back us also see the economic opportunity. And at the end of day there, you know, a lot of our our limited partners, our pension funds, you know, in universities, like, you know, there was a professor who has a pension fund who's gotta retire, right? So a little bit of that money goes into D C V C. So we have a responsibility to provide a return to them as well as go after these very interesting opportunities. >>So is there any very specific kind of investment thesis or industry focus Or, you know, kind of a subset within, you know, heavy lifting technology and science and math. That's a real loaded question in front of that little. So we like problems >>that can be solved through massive computational capability. And so and that reflects our heritage and where we all came from, right, you and I, and folks in the industry. So, you know, we're not working at the intersection of lab science at at a university, but we would take something like that and invest in it. So we like you know we have a lot of lessons in agriculture and health care were, surprisingly, one of the largest investors in space. We have investments and rocket labs, which is the preferred launch vehicle for any small satellite under two and 1/2 kilograms. We are large investors and planet labs, which is a constellation of 200 small satellites over investors and compel a space. So, uh, well, you know, we like space, and, you know, it's not space for the sake of space. It's like it's about geospatial intelligence, right? So Planet Labs is effectively the search engine for the planet Earth, right? They've been effectively Google for the planet, right? Right. And all that information could be fed to deal with housing with transportation with climate change. Um, it could be used with economic activity with shipping. So, you know, we like those kinds of areas where that technology can really impact and in the street so and so we're not limited. But, you know, we also have a bio fund, so we have, you know, we're like, you know, we like agriculture and said It's a synthetic biology types of investments and, you know, we've still invest in things like cyber we invest in physical security were investors and evolve, which is the lead system for dealing with active shooters and venues. Israel's Fordham, which is a drone security company. So, um, but they're all built on a Iot and massive >>mess. Educational power. I'm just curious. Have you private investment it if I'm tree of a point of view because you got a point of view. Most everything on the way. Just hear all this little buzz about Quantum. Um, you know, a censure opened up their new innovation hub in the Salesforce tower of San Francisco, and they've got this little dedicated kind of quantum computer quanta computer space. And regardless of how close it is, you know there's some really interesting computational opportunities last challenges that we think will come with some period of time so we don't want them in encryption and leather. We have lost their quantum >>investments were in literally investors and Righetti computing. Okay, on control, cue down in Australia, so no, we like quantum. Now, Quantum is a emerging area like it's we're not quite at the X 86 level of quantum. We have a little bit of work to get there, but it offers some amazing, you know, capabilities. >>One thing >>that also I think differentiates us. And I was listening to What you're saying is we're not afraid. The gold long, I mean a lot of our investments. They're gonna be between seven and 15 years, and I think that's also it's very different if you follow the basic economics adventure. Most funds are expected to be about 10 years old, right? And in the 1st 3 or four years, you do the bulk of the preliminary investing, and then you have reserves traditional, you know, you know, the big winners emerged that you can continue to support the companies, some of ours, they're going to go longer because of what we do. And I think that's something very special. I'm not. Look, we'd like to return in life of the fun. Of course, I mean, that's our do share a responsibility. But I think things like Quantum some of these things in the environment. They're going to take a while, and our limited partners want to be in that long ride. Now we have a thesis that they will actually be bigger economic opportunities. They'll take longer. So by having a dedicated team dedicated focus in those areas, um, that gives us, I think, a unique advantage, one of one of things when we were launching the fund that we realized is way have more people that have published scientific papers and started companies than NBA's, um, in the firm. So we are a little bit, you know, we're a little G here. That >>that's good. I said a party one time when I was talking to this guy. You were not the best people at parties we don't, but it is funny. The guy was He was a VC in medical medical tech, and I didn't ask him like So. Are you like a doctor? Did you work in a hospital where you worked at A at a university that doesn't even know I was investment banker on Wall Street and Michael, that's that's how to make money move. But do you have? Do you have the real world experience of being in the trenches? Were Some of these applications are being used, but I'm also curious. Where do you guys like to come in? ABC? What's your well, sweets? Traditionally >>we are have been a seed in Siri's. A investor would like to be early. >>Okay, Leader, follow on. Uh, everybody likes the lead, right? Right, right, right. You know what? Your term feet, you >>know? Yeah, right. And you have to learn howto something lead. Sometimes you follow. So we you know, we do both. Okay, Uh, there are increasing as because of the size of the fund. We will have the opportunity to be a little bit more multi stage than we traditionally are known for doings. Like, for example, we were seed investors in little companies, like conflict an elastic that worked out. Okay, But we were not. Later stage right. Investors and company likes companies like that with the new fund will more likely to also be in the later stages as well for some of the big banks. But we love seed we love. Precede. We'd like three guys in in a dog, right? If they have a brilliant >>tough the 7 50 to work when you're investing in the three guys in a dog and listen well and that runs and runs and you know you >>we do things we call experiments. Just you know, uh, we >>also have >>a very unique asset. We don't talk about publicly. We have a lot of really brilliant people around the firm that we call equity partners. So there's about 60 leaning scientists and executives around the world who were also attached to the firm. They actually are, have a financial stake in the firm who work with us. That gives us the ability to be early Now. Clearly, if you put in a $250,000 seed investment you don't put is the same amount of time necessarily as if you just wrote a $12 million check. What? That's the traditional wisdom I found. We actually work. Address this hard on. >>Do you have any? Do you have any formal relationships within the academic institutions? How's that >>work? Well, well, I mean, we work like everybody else with Stanford in M I t. I mean, we have many universities who are limited partners in the fund. You know, I'll give you an example of So we helped put together a company in Canada called Element A I, which actually just raised $150 million they, the founder of that company is Ah, cofounder is a fellow named Joshua Benji. Oh, he was Jeff Hinton's phD student. Him in the Vatican. These guys invented neural networks ing an a I and this company was built at a Yasha his position at the University of Montreal. There, 125 PhDs and a I that work at this firm. And so we're obviously deeply involved. Now, the Montreal A icing, my child is one of the best day I scenes in the world and cool food didn't and oh, yeah, And well, because of you, Joshua, because everybody came out of his leg, right? So I think, Yes, I think so. You know, we've worked with Carnegie Mellon, so we do work with a lot of universities. I would, I would say his university's worked with multiple venture firm Ah, >>such an important pipeline for really smart, heavy duty, totally math and tech tech guys. All right, May, that's for sure. Yeah, you always one that you never want to be the smartest guy in the room, right, or you're in the wrong room is what they say you said is probably >>an equivalent adventure. They always say you should buy the smallest house in the best neighborhood. Exactly. I was able to squeeze its PCB sees. I'm like, the least smart technical guy in the smartest technical. There >>you go. That's the way to go. All right, Alan. Well, thanks for stopping by and we look forward. Thio, you bring in some of these exciting new investment companies inside the key, right? Thanks for the time. Alright. He's Alan. I'm Jeff. You're watching the Cube. We're Interpol about the studios. Thanks for watching. We'll see you next time.
SUMMARY :
from our studios in the heart of Silicon Valley, Palo Alto, We like to keep him close because he's got a great feel for what's going on. You know what's special about this town of money adventure right now, but you guys kind of have a special thesis. um, you know, the 1st 5 years, the fund was very much focused on building, build a I itt s'more the where you applying a i within an application, So a little bit, you know, different focus. acceleration of that process than people, you know, kind of pushed back Well, this is this is not this Or you could create a use, It's a funny part of that conversation, but but it's a different area. You actually talked to venture capitalists and most of the time where you know, Yeah, I think it's It's such a you know, it's kind of the future's here kind of the concept because no one And you know, And at the end of day there, you know, a lot of our our limited partners, our pension funds, Or, you know, kind of a subset within, you know, heavy lifting technology So we like you know we have a lot of lessons in agriculture and health care Um, you know, a censure opened up their new innovation hub in the Salesforce tower of San Francisco, you know, capabilities. And in the 1st 3 or four years, you do the bulk of the preliminary investing, Do you have the real world experience of being in the trenches? we are have been a seed in Siri's. Your term feet, you So we you know, Just you know, uh, put is the same amount of time necessarily as if you just wrote a $12 million check. I'll give you an example of So we helped put together a company in Canada called Yeah, you always one that you never want to be the smartest guy in the room, They always say you should buy the smallest house in the best neighborhood. you bring in some of these exciting new investment companies inside the key, right?
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
Jeff Hinton | PERSON | 0.99+ |
Jeff | PERSON | 0.99+ |
Alan Cohen | PERSON | 0.99+ |
Joshua | PERSON | 0.99+ |
Jeffrey | PERSON | 0.99+ |
Matt | PERSON | 0.99+ |
NBA | ORGANIZATION | 0.99+ |
Carnegie Mellon | ORGANIZATION | 0.99+ |
Alan | PERSON | 0.99+ |
Canada | LOCATION | 0.99+ |
Joshua Benji | PERSON | 0.99+ |
Jeff Bezos | PERSON | 0.99+ |
Australia | LOCATION | 0.99+ |
Stanford | ORGANIZATION | 0.99+ |
Silicon Valley | LOCATION | 0.99+ |
Zack | PERSON | 0.99+ |
San Francisco | LOCATION | 0.99+ |
$725 million | QUANTITY | 0.99+ |
September 2019 | DATE | 0.99+ |
Tom Friedman | PERSON | 0.99+ |
$4 trillion | QUANTITY | 0.99+ |
Pivot Bio | ORGANIZATION | 0.99+ |
AWS | ORGANIZATION | 0.99+ |
Amazon | ORGANIZATION | 0.99+ |
$150 million | QUANTITY | 0.99+ |
New York | LOCATION | 0.99+ |
100 years | QUANTITY | 0.99+ |
three guys | QUANTITY | 0.99+ |
$12 million | QUANTITY | 0.99+ |
$250,000 | QUANTITY | 0.99+ |
50 years | QUANTITY | 0.99+ |
ORGANIZATION | 0.99+ | |
Pivot bio | ORGANIZATION | 0.99+ |
Thio | PERSON | 0.99+ |
Element A I | ORGANIZATION | 0.99+ |
Siri | TITLE | 0.99+ |
Five | QUANTITY | 0.99+ |
four years | QUANTITY | 0.99+ |
University of Montreal | ORGANIZATION | 0.99+ |
U. S. A. | LOCATION | 0.99+ |
200 small satellites | QUANTITY | 0.99+ |
Today | DATE | 0.99+ |
last week | DATE | 0.99+ |
two things | QUANTITY | 0.99+ |
1/2 kilograms | QUANTITY | 0.99+ |
Fordham | ORGANIZATION | 0.99+ |
yesterday | DATE | 0.99+ |
Amato Studios | ORGANIZATION | 0.99+ |
both | QUANTITY | 0.98+ |
one | QUANTITY | 0.98+ |
15% | QUANTITY | 0.98+ |
Draft | PERSON | 0.98+ |
today | DATE | 0.98+ |
$40 billion | QUANTITY | 0.98+ |
The world is flat | TITLE | 0.98+ |
Vatican | LOCATION | 0.97+ |
about 10 years old | QUANTITY | 0.97+ |
20 | QUANTITY | 0.97+ |
Planet Labs | ORGANIZATION | 0.97+ |
32 | QUANTITY | 0.97+ |
One | QUANTITY | 0.97+ |
15 years | QUANTITY | 0.97+ |
125 PhDs | QUANTITY | 0.96+ |
eighth fund | QUANTITY | 0.96+ |
Venture Patrol | ORGANIZATION | 0.95+ |
Michael | PERSON | 0.95+ |
Palo Alto, California | LOCATION | 0.95+ |
one time | QUANTITY | 0.94+ |
Israel | LOCATION | 0.94+ |
1st 5 years | QUANTITY | 0.93+ |
ABC | ORGANIZATION | 0.93+ |
one day | QUANTITY | 0.92+ |
One thing | QUANTITY | 0.92+ |
Salesforce | ORGANIZATION | 0.91+ |
Earth | LOCATION | 0.9+ |
$212 billion | QUANTITY | 0.9+ |
1st 3 | QUANTITY | 0.89+ |
last 20 years | DATE | 0.87+ |
last five years | DATE | 0.86+ |
under two | QUANTITY | 0.85+ |
about 60 leaning | QUANTITY | 0.84+ |
about a decade | QUANTITY | 0.82+ |
Eso | PERSON | 0.8+ |
Yasha | PERSON | 0.77+ |
Orban | PERSON | 0.76+ |
Derek Manky, Fortinet | Fortinet Accelerate 2019
>> live from Orlando, Florida It's the que covering accelerate nineteen. Brought to you by important >> Hey, welcome back to the Cube. We are live at forty nine. Accelerate nineteen in Orlando, Florida I am Lisa Martin with Peter Births, and Peter and I are pleased to welcome one of our alumni back to the program during Mickey, the chief of security insights for forty nine. Derek. It's great to have you back on the program, >> so it's always a pleasure to be here. It's tze always good conversations. I really look forward to it and it's It's never a boring day in my office, so we're than happy to talk about this. >> Fantastic. Excellent. Well, we've been here for a few hours, talking with a lot of your leaders. Partners as well. The keynote this morning was energetic. Talked a lot about the evocation, talked a lot about the evolution of not just security and threat, but obviously of infrastructure, multi cloud hybrid environment in which we live. You have been with forty girl lives for a long time. Talk to us about the evolution that you've seen of the threat landscape and where we are today. >> Sure, Yeah, so you know? Yeah, I've been fifteen years now, forty guards. So I flashed back. Even a two thousand, for it was a vastly different landscape back there and Internet and even in terms of our security technology in terms of what the attack surface was like back then, you know, Ken Kennedy was talking about EJ computing, right? Because that's what you know. Seventy percent of data is not going to be making it to the cloud in the future. A lot of processing is happening on the edge on DH. Threats are migrating that way as well, right? But there's always this mirror image that we see with the threat landscape again. Threat landscape. Back in nineteen eighty nine, we started with the Morris Worm is very simple instructions. It took down about eighty percent of the Internet at the time, but he was It is very simple. It wasn't to quote unquote intelligence, right? Of course, if we look through the two thousands, we had a lot of these big worms that hit the scene like Conficker. I love you, Anna Kournikova. Blaster slammer. All these famous rooms I started Teo become peer to peer, right? So they were able to actually spread from network to network throughout organizations take down critical services and so forth. That was a big evolutionary piece at the time. Of course, we saw fake anti virus ransomware. Come on stage last. Whereas I called it, which was destructive Mauer That was a big shift that we saw, right? So actually physically wiping out data on systems these air typically in like star but warfare based attacks. And that takes us up to today, right? And what we're seeing today, of course, we're still seeing a lot of ransom attacks, but we're starting to see a big shift in technology because of this edge computing used case. So we're seeing now things like Swarm networks have talked about before us. So these are not only like we saw in the two thousand's threats that could shift very quickly from network to network talk to each other, right? In terms of worms and so forth. We're also seeing now in intelligence baked in. And that's a key difference in technology because these threats are actually able, just like machine to machine. Communication happens through a pea eye's protocols and so forth threats are able to do this a swell. So they ableto understand their own local environment and how to adapt to that local environment and capitalized on that effort on DH. That's a very, very big shift in terms of technology that we're seeing now the threat landscape. >> So a lot of those old threats were depending upon the action of a human being, right? So in many respects, the creativity was a combination of Can you spook somebody make it interesting so that they'll do something that was always creativity in the actual threat itself. What you're describing today is a world where it's almost like automated risk. We're just as we're trying to do automation to dramatically increase the speed of things, reduce the amount of manual intervention. The bad guy's doing the same thing with the swarms there, introducing technology that is almost an automated attack and reconfigures itself based on whatever environment, conditions of encounters. >> Yeah, and the interesting thing is, what's happening here is we're seeing a reduction in what I call a t t be a time to breach. So if you look at the attack lifecycle, everything does doesn't happen in the blink of an instant it's moving towards that right? But if you look at the good, this's what's to come. I mean, we're seeing a lot of indications of this already. So we work very closely with Miter, the minor attack framework. It describes different steps for the attack life cycle, right? You start with reconnaissance weaponization and how do you penetrator system moving the system? Collect data monetize out as a cyber criminal. So even things like reconnaissance and weaponization. So if you look at fishing campaigns, right, people trying to fish people using social engineering, understanding data points about them that's becoming automated, that you sought to be a human tryingto understand their target, try toe fish them so they could get access to their network. There's tool kits now that will actually do that on their own by learning about data points. So it's scary, yes, but we are seeing indications of that. And and look, the endgame to this is that the attacks were happening much, much quicker. So you've got to be on your game. You have to be that much quicker from the defensive point of view, of course, because otherwise, if successful breach happens, you know we're talking about some of these attacks. They could. They could be successful in matter of seconds or or minutes instead of days or hours like before. You know, we're talking about potentially millions dollars of revenue loss, you know, services. They're being taken out flying intellectual properties being reached. So far, >> though. And this is, you know, I think of health care alone and literally life and death situations. Absolutely. How is Fortinet, with your ecosystem of partners poised to help customers mitigate some of these impending risk changing risk >> coverage? Strengthen numbers. Right. So we have, ah, strong ecosystem, of course, through our public ready program. So that's a technology piece, right? And to end security, how we can integrate how we can use automation to, you know, push security policies instead of having an administrator having to do that. Humans are slow a lot of the time, so you need machine to machine speed. It's our fabric ready program. You know, we have over fifty seven partners there. It's very strong ecosystem. From my side of the House on Threat Intelligence. I had up our global threat alliances, right? So we are working with other security experts around the World Cyberthreat Alliance is a good example. We've created intelligence sharing platforms so that we can share what we call indicators of compromise. So basically, blueprints are fingerprints. You can call them of attacks as they're happening in real time. We can share that world wide on a platform so that we can actually get a heads up from other security vendors of something that we might not see on. We can integrate that into our security fabric in terms of adding new, new, you know, intelligence definitions, security packages and so forth. And that's a very powerful thing. Beyond that, I've also created other alliances with law enforcement. So we're working with Interpol that's attribution Base work right that's going after the source of the problem. Our end game is to make it more expensive for cyber criminals to operate. And so we're doing that through working with Interpol on law enforcement. As an example, we're also working with national computer emergency response, so ripping malicious infrastructure off line, that's all about partnership, right? So that's what I mean strengthen numbers collaboration. It's It's a very powerful thing, something close to my heart that I've been building up over over ten years. And, you know, we're seeing a lot of success and impact from it, I think. >> But some of the, uh if you go back and look at some of the old threats that were very invasive, very problematic moved relatively fast, but they were still somewhat slow. Now we're talking about a new class of threat that happens like that. It suggests that the arrangement of assets but a company like Ford and that requires to respond and provide valued customers has to change. Yes, talk a little about how not just the investment product, but also the investment in four guard labs is evolving. You talked about partnerships, for example, to ensure that you have the right set of resources able to be engaged in the right time and applied to the right place with the right automation. Talk about about that. >> Sure, sure. So because of the criticality of this nature way have to be on point every day. As you said, you mentioned health care. Operational technology is a big thing as well. You know, Phyllis talking about sci fi, a swell right. The cyber physical convergence so way have to be on our game and on point and how do we do that? A couple of things. One we need. People still way. Can't you know Ken was talking about his his speech in Davos at the World Economic Forum with three to four million people shortage in cyber security of professionals There's never going to be enough people. So what we've done strategically is actually repositioned our experts of forty guard labs. We have over two hundred thirty five people in forty guard lab. So as a network security vendor, it's the largest security operation center in the world. But two hundred thirty five people alone are going to be able to battle one hundred billion threat events that we process today. Forty guard lab. So so what we've done, of course, is take up over the last five years. Machine learning, artificial intelligence. We have real practical applications of a I and machine learning. We use a supervised learning set so we actually have our machines learning about threats, and we have our human experts. Instead of tackling the threat's one on one themselves on the front lines, they let them in. The machine learning models do that and their training the machine. Just it's It's like a parent and child relationship. It takes time to learn a CZ machines learn. Over time they started to become more and more accurate. The only way they become more accurate is by our human experts literally being embedded with these machines and training them >> apart for suspended training. But also, there's assortment ation side, right? Yeah, we're increasing. The machines are providing are recognizing something and then providing a range of options. Thie security, professional in particular, doesn't have to go through the process of discovery and forensics to figure out everything. Absolution is presenting that, but also presenting potential remedial remediation options. Are you starting to see that become a regular feature? Absolutely, and especially in concert with your two hundred thirty five experts? >> Yeah, absolutely. And that's that's a necessity. So in my world, that's what I refer to is actionable intelligence, right? There's a lot of data out there. There's a lot of intelligence that the world's becoming data centric right now, but sometimes we don't have too much data. Askew Mons, a CZ analysts administrators so absolutely remediation suggestions and actually enforcement of that is the next step is well, we've already out of some features in in forty six two in our fabric to be able to deal with this. So where I think we're innovating and pioneering in the space, sir, it's it's ah, matter of trust. If you have the machines O R. You know, security technology that's making decisions on its own. You really have to trust that trust doesn't happen overnight. That's why for us, we have been investing in this for over six years now for our machine learning models that we can very accurate. It's been a good success story for us. I think. The other thing going back to your original question. How do we stack up against this? Of course, that whole edge computing use case, right? So we're starting to take that machine learning from the cloud environment also into local environments, right? Because a lot of that data is unique, its local environments and stays there. It stays there, and it has to be processed that such too. So that's another shift in technology as we move towards edge computing machine learning an artificial intelligence is absolutely part of that story, too. >> You mentioned strengthen numbers and we were talking about. You know, the opportunity for Fortinet to help customers really beat successful here. I wanted to go back to forty guard labs for a second because it's a very large numbers. One hundred billion security events. Forty Guard labs ingests and analyzes daily. Really? Yes, that is a differentiator. >> Okay, that that's a huge huge differentiator. So, again, if I look back to when I started in two thousand four, that number would have been about five hundred thousand events today, compared to one hundred billion today. In fact, even just a year ago, we were sitting about seventy five to eighty billion, so that numbers increased twenty billion and say twenty percent right in in just a year. So that's that's going to continue to happen. But it's that absolutely huge number, and it's a huge number because we have very big visibility, right. We have our four hundred thousand customers worldwide. We have built a core intelligence network for almost twenty years now, since for Deena was founded, you know, we we worked together with with customers. So if customers wish to share data about attacks that are happening because attackers are always coming knocking on doors. Uh, we can digest that. We can learn about the attacks. We know you know what weapons that these cybercriminals they're trying to use where the cybercriminals are. We learned more about the cyber criminals, so we're doing a lot of big data processing. I have a date, a science team that's doing this, in fact, and what we do is processes data. We understand the threat, and then we take a multi pronged approach. So we're consuming that data from automation were pushing that out first and foremost to our customers. So that's that automated use case of pushing protection from new threats that we're learning about were contextualizing the threat. So we're creating playbooks, so that playbook is much like football, right? You have to know your your your offense, right? And you have to know how to best understand their tactics. And so we're doing that right. We're mapping these playbooks understanding, tactics, understanding where these guys are, how they operate. We take that to law enforcement. As I was saying earlier as an example, we take that to the Cyber Threat Alliance to tow our other partners. And the more that we learn about this attack surface, the more that we can do in terms of protection as well. But it's it's a huge number. We've had a scale and our data center massively to be able to support this over the years. But we are poised for scale, ability for the future to be able to consume this on our anti. So it's it's, um it's what I said You know the start. It's never a boring day in my office. >> How can it be? But it sounds like, you know, really the potential there to enable customers. Any industry too convert Transport sees for transform Since we talked about digital transformation transformed from being reactive, to being proactive, to eventually predictive and >> cost effective to write, this's another thing without cybersecurity skills gap. You know this. The solution shouldn't be for any given customer to try. Toe have two hundred and thirty people in their security center, right? This is our working relationship where we can do a lot of that proactive automation for them, you know, by the fabric by the all this stuff that we're doing through our investment in efforts on the back end. I think it's really important to and yeah, at the end of the day, the other thing that we're doing with that data is generating human readable reports. So we're actually helping our customers at a high level understand the threat, right? So that they can actually create policies on their end to be able to respond to this right hard in their own security. I deal with things like inside of threats for their, you know, networks. These air all suggestions that we give them based off of our experience. You know, we issue our quarterly threat landscape report as an example, >> come into cubes. Some of your people come in the Cuban >> talk about absolutely so That's one product of that hundred billion events that were processing every day. But like I said, it's a multi pronged approach. We're doing a lot with that data, which, which is a great story. I think >> it is. I wish we had more time. Derek, Thank you so much for coming by. And never a dull moment. Never a dull interview when you're here. We appreciate your time. I can't wait to see what that one hundred billion number is. Next year. A forty nine twenty twenty. >> It will be more. I can get you. >> I sound like a well, Derek. Thank you so much. We appreciate it for Peter Burress. I'm Lisa Martin. You're watching the Cube?
SUMMARY :
Brought to you by important It's great to have you back on the program, so it's always a pleasure to be here. of the threat landscape and where we are today. So these are not only like we saw in the two thousand's threats that could So a lot of those old threats were depending upon the action of a human being, right? And and look, the endgame to this is that the attacks were happening much, And this is, you know, I think of health care alone and literally life and death situations. We've created intelligence sharing platforms so that we can share what we call indicators of compromise. have the right set of resources able to be engaged in the So because of the criticality of this nature way have to be on the process of discovery and forensics to figure out everything. There's a lot of intelligence that the world's becoming data centric right now, You know, the opportunity for Fortinet to help customers So that's that's going to continue to happen. But it sounds like, you know, really the potential there to enable customers. So that they can actually create policies on their end to be able to respond to this right hard in their own Some of your people come in the Cuban talk about absolutely so That's one product of that hundred billion events that were processing Derek, Thank you so much for coming by. I can get you. Thank you so much.
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
Peter | PERSON | 0.99+ |
Ford | ORGANIZATION | 0.99+ |
Lisa Martin | PERSON | 0.99+ |
Peter Births | PERSON | 0.99+ |
Anna Kournikova | PERSON | 0.99+ |
Ken Kennedy | PERSON | 0.99+ |
Derek | PERSON | 0.99+ |
Ken | PERSON | 0.99+ |
Peter Burress | PERSON | 0.99+ |
Orlando, Florida | LOCATION | 0.99+ |
Interpol | ORGANIZATION | 0.99+ |
twenty percent | QUANTITY | 0.99+ |
Next year | DATE | 0.99+ |
fifteen years | QUANTITY | 0.99+ |
World Cyberthreat Alliance | ORGANIZATION | 0.99+ |
twenty billion | QUANTITY | 0.99+ |
Derek Manky | PERSON | 0.99+ |
Seventy percent | QUANTITY | 0.99+ |
millions dollars | QUANTITY | 0.99+ |
one hundred billion | QUANTITY | 0.99+ |
four hundred thousand customers | QUANTITY | 0.99+ |
House on Threat Intelligence | ORGANIZATION | 0.99+ |
three | QUANTITY | 0.99+ |
Phyllis | PERSON | 0.99+ |
Askew Mons | PERSON | 0.99+ |
two hundred thirty five experts | QUANTITY | 0.99+ |
today | DATE | 0.99+ |
Fortinet | ORGANIZATION | 0.99+ |
about five hundred thousand events | QUANTITY | 0.99+ |
two hundred thirty five people | QUANTITY | 0.99+ |
World Economic Forum | EVENT | 0.99+ |
over fifty seven partners | QUANTITY | 0.98+ |
forty girl | QUANTITY | 0.98+ |
two thousands | QUANTITY | 0.98+ |
one hundred billion | QUANTITY | 0.98+ |
Mickey | PERSON | 0.98+ |
a year ago | DATE | 0.98+ |
one | QUANTITY | 0.98+ |
four million people | QUANTITY | 0.98+ |
eighty billion | QUANTITY | 0.97+ |
two thousand | QUANTITY | 0.97+ |
2019 | DATE | 0.97+ |
about seventy five | QUANTITY | 0.97+ |
over two hundred thirty five people | QUANTITY | 0.97+ |
about eighty percent | QUANTITY | 0.97+ |
over six years | QUANTITY | 0.97+ |
One | QUANTITY | 0.97+ |
Cyber Threat Alliance | ORGANIZATION | 0.96+ |
hundred billion events | QUANTITY | 0.96+ |
One hundred billion security events | QUANTITY | 0.95+ |
forty | QUANTITY | 0.94+ |
a year | QUANTITY | 0.93+ |
one hundred billion threat events | QUANTITY | 0.93+ |
over ten years | QUANTITY | 0.91+ |
forty guards | QUANTITY | 0.91+ |
two hundred and thirty people | QUANTITY | 0.91+ |
Davos | LOCATION | 0.89+ |
over | QUANTITY | 0.89+ |
two thousand four | QUANTITY | 0.88+ |
almost twenty years | QUANTITY | 0.86+ |
forty six two | QUANTITY | 0.85+ |
this morning | DATE | 0.83+ |
guard labs | ORGANIZATION | 0.82+ |
nineteen | QUANTITY | 0.81+ |
guard lab | ORGANIZATION | 0.79+ |
last five years | DATE | 0.79+ |
one product | QUANTITY | 0.77+ |
Forty | QUANTITY | 0.76+ |
Teo | PERSON | 0.71+ |
lab | ORGANIZATION | 0.67+ |
Cube | ORGANIZATION | 0.66+ |
Forty guard | QUANTITY | 0.66+ |
nineteen eighty | DATE | 0.65+ |
forty nine | DATE | 0.64+ |
first | QUANTITY | 0.64+ |
Conficker | TITLE | 0.63+ |
Guard | ORGANIZATION | 0.63+ |
Mauer | PERSON | 0.62+ |
forty nine twenty twenty | DATE | 0.61+ |
Miter | ORGANIZATION | 0.61+ |
second | QUANTITY | 0.6+ |
Guy Churchward, Datera | CUBEConversation, March 2019
>> From our studios in the heart of Silicon Valley. Holloway Alto, California. It is a cube conversation. >> He will come back and ready Geoffrey here with the Cuban Interpol about those details for acute conversation. We've got a really great guess. He's been on many, many times. We're always excited. Have them on to a bunch of different companies a lot of years and really a great perspective. So we're excited. Guy. Church word. The CEO of Da Terra. Back >> in the politest. EEO guy. Great to see you. >> Thank you, Jeff. Appreciate it. >> Absolutely. So I think last time you were here, I was looking it up. Actually, Was November of twenty eighteen. You were >> kind of just getting started on your day. Terror of the adventure. Give us kind of the update. >> Yeah, I was gonna say last time we had Mark in whose CEO when found a cofounder of Data and I was edging in. So I was executive chairman at the time, you know? And obviously I found the technology. I was looking for an organization that had some forward thinking on storage. Andi, we started to get very close with a large strategic and actually We re announced it on the go to market, I think in February with HP, and I thought that myself and Mark kind of sat down, did a pinky swear and said, OK, maybe it's time for me to step in and take the CEO role just to make sure that we had that sort of marriage of innovation and then some of the operations stuff they could bring inside the business. >> So you've been at this for a >> while, but in the industry for a long time. What was it that you saw? Um, that really wanted you to get deeper in with date. Eriks. Obviously, I'm sure you have tons of opportunities coming your way. You know, to kind of move from the board seat into the CEO position. >> Yeah. Yeah, a bad bet. Maybe stupidity or being drunk. It, to be honest, it was. You know, the first thing is, I was looking for this technology that basically spanned forward, and I had this gut hunch that organizations were looking for data freedom. There's why did the Data Analytics job before that? I did security analytics, and, you know, we were looking at that when we were you know, back when we talk to things like I'm seeing Del and so from appear technology standpoint, I wanted to be in that space, but in the last few months, because you know, jobs are all about learning and then adjusting and learning and adjusting and learning. Adjusting on what I saw is a great bunch of guys, good technology. But we were sort of flapping around on DH had an idea that we were an Advanced data services platform. It's to do with multi, you know, multi cloud. And in essence, I've kind of come to this fundamental kind of understanding because I've been on both sides, which is date era is a bunch of cloud people trying to solve storage needs for what the cloud needs. But they have the experience. They walked that mile. You know, when people say you've gotta learn by walking in their shoes, right? Right on DH there, Done that versus where? Bean. In the past, where we were a ray specialists pushing towards the future that we didn't quite understand, you know, and and there is a fundamental philosopher philosophical difference between the two. Andi weirdly, my analogy or my R har moment came with the Tessler piece. And I know that, you know, you've pinned me a few times on Twitter over this, right? I'm not a tesler. Bigger to the extent of, you know, and probably am now, I should have a test a T shirt on, But I always thought it was an electric car and all they've done is electrified a car and there was on DH, You know, I've resisted it for years and bean know exactly an advocate, but I ended up buying one because I just I felt from a technology standpoint, their platform that they were the right thing. And once I started to really understand what they were about, I saw these severe differences. And, you know, we've chatted a little bit about this Onda again. It's part of the analogy of what's happening in the storage industry, but what's happening in the industry in in a global position. But if you compare contrast something like Tesler, too, maybe Volkswagon and it might be a bad example. But you know, Audi there first trance into electric vehicles was the Audi A three, and I could imagine that they were traditional car people pushing their car forward sort is a combustion engine will if I change that and put some salt powertrain in place, which is the equivalent of a you know, a system to basically drive the wheels and then a bunch of batteries Job done or good, right? Right. And I assume the test it was the same. But I had a weird experience, which is, once you get it into autopilot, you can actually set the navigation direction, and then it will indicate it'll it'Ll hint to you went to change lanes. And so, for instance, I'm driving to the office and I'm going along eight eighty and I want to go toe Wanna one? It says, You know you need to pull across. They hit the indicator will change lanes and they'LL do some of the stuff and that's all well and good. But I was up going to a board meeting on two eighty, going off for the Rosewood. You know, Sandra El Santo and I was listening to a book one of these, you know, audiobooks, and I wasn't really paying much attention. I'm in the outside lane, obviously hitting the speed limit gnome or but I wasn't paying attention. And all of a sudden the car basically indicates form A changes lanes, slows down, change lane again and then takes a junction, slows down, comes up to a junction, and you start to realize that actually Tesla's know about electrified vehicles. It's actually about the telemetry and the analytics and then feeding that back into the system. And I always thought Tesler might be collecting how faster cars going when they break. You know the usual thing. Everybody has this conversation. It's always over worked. But if you've sort of look at it and he said no, maybe they collect everything and then maybe what they're doing is they're collecting, hitting the indicator stalk. So when I'm coming out to a junction and I indicate, How long do I stay? Indicating before I break? And then I changed lanes and then I basically slow down and I go into the junction. And then what they do is they take that live information and crowdsource it, pull it back into the system, and then when they're absolutely bulletproof, that junction, then is exactly as a human would normally do this. They then let the car take over So the difference between the two junctions is one they totally understood, the other one there still learning from right when you look at it and you go done. So they're basically an edge telemetry at a micro level organization, you know, And that is a massive difference between what Tesla's doing and a lot of the other car manufacturers are doing. They're catching up, which is really why I believe that they're going to be a head for a long time. >> It's really interesting. I was >> Elektronik wholesale for ten years before come back to school. Can't got in the tech industry. And so really distribution was king from the manufacturer point of view. Always. They just like ship their products for ages, right? These distribution to break bulk thes distribution, educate the customer these distribution just to get this stuff out. But they never knew how people actually operate their products. Whether that be a car, a washing machine. Ah, cassette player, whatever. So what? What What fascinates me about thes connected devices is what, what a fundamentally different set of data. Now manufacturers have people have in how people actually use the product. But even more importantly, that as you said, they could take that data and make adjustments on the fly because since so much of its software now, we talked again before we turned on some of your software upgrades that you've gotten in the Tesla over the last six months, which we're all driven by customers. But they had a platform in place that enabled them to update functionality and to basically repurpose hardware elements for a new function, which is which is, you know, so in sync with Dev ops and kind of this dev up culture in this continuous this continuous upgrade, this continuous innovation with actual data from real people operating the products that they should come to the market. >> Andi, think once you step back. And that was really why was keen to sit down and talk. And it's not specifically around software defined storage, which is the data. A piece in our example is yes, I am the Tessler because we can do all of the analytics and all of the telemetry versus of standard array. If you scratch that away and you say let's have a look at our whole lives are macro lives. Another example was my wife and I. We've got friends of ours always banging on about these sleep by number beds and and so we went past the store wandered in, and the sales rep got us lying on a bed and he was doing there, you know, pumping the bed up to a size. It's just Well, you are sixty five, a US seventy or seventy five, and I kind of got bored of that. And I went here, Okay, I'm that and he goes, Okay, your wife's of fifty and you're a seventy five, Andi said. But let's kind of daft. And he goes, Well, here's and he shows them a map and it shows a thermal image of me lying on the bed. I'm a side sleeper back sleeper, and then what they do is they feed the information so that comes back off their edge, which is now Abed. And then what they do is they then analyzing continuously prove it to try and increase my bed sleeping patterns. So you look at it and you say what they're not doing is just manufacturing of mattress and throwing it out. What they've done is they said, we're going to treat each individual that lies on the mattress differently on, we're going to take feedback and we're going to make that experience even better. So that the same thing, which is this asset telemetry my crisis telemetry happens to be on the edge is identical to what they have, you know. And then I look at it and I go, Why don't I like the array systems? Will, because the majority of stuff is I'm a far system. My brain is inherently looking at the Dr types underneath and saying, As long as that works fine, everything that sits inside that OK, it'LL do its thing right, and that was built around the whole process and premise of an application has a single function. But now applications create data. That data has multiple functions, and as people start to use it in different ways, you need to feed that data on the way in which is processed differently. And so it all has the intelligence houses in home automation. I'm a junkie on anything that has a plug on it, and I've now got to a point where I have light switches or light fittings would have multiple bulbs on every bulb now is actually Khun B has telemetry around it, which I can adjust it dynamically based on the environment. Right? Right. And I wish it got wine. You know, I got the wine. Fridge is that's my biggest beef right now is you gotta wine, fridge. You can have Jules, you know, you have jewels climates, which means that you don't fan to one side of it and they overheat the bottom right. But it'LL break the grapes down. Would it be really cool if the cork actually had some way of figuring out what it needs to be fed? And then each of them could be individual, right? But our entire being, you know, if you think about it's not just technology or technologies driving it, but it's not the IT industry, but our entire lives. And now driven around exactly what you just described, which is manufacturers dropping something out into the wild to the edge and then having enough telemetry to be able to enhance that experience and then provide over the air, you know, enhancements, >> right? And the other thing, I think it's fascinating as it's looking up. We interviewed Derek Curtain >> from the architect council on. That's a group locally that just try work, too, along with municipalities and car manufacturers, tech companies. But >> he made a really interesting >> comment because there's the individual adjustment to you to know that you want to get off it at Page Milan or sandhill on DH. You've got a counter on your point of this is meeting the Rosewood. But >> then the other thing is, when you aggregate >> that now back up. You know, not that you're going to be sharing other people's data, but when he start to get usage patterns from a large population that you can again incorporate best practices into upgrades of the product and used a really good example of this was right after the one pedestrian got killed by the test of the lady with the bike that ran across the front of the street and it it it literally happened a week before. I think the conference so very hot topic at an autonomous vehicle conference and >> what he said, which is really important. You know, if if I get >> in an automobile accident and I'm going to learn something, the person I hits pride gonna learn something. The insurance adjusters going to take some notes and we're going to learn it's a bad intersection. I made a mistake, whatever, but when an autonomous vehicle gets in a Brack when it's connected, all that telemetry goes back up into the system to feed the system, to make improvements for the whole system. So every car learns every time one car has a problem every time one car gets into a sticky situation. So again, kind of this crowd sourced. Learning an optimization opportunity is fundamentally different than I'm just shipping stuff out, and I don't know what's going to happen to it, and maybe a couple pieces come back. So I think people that are not into this into the direct connection are so missing out on those you said this whole different level of data, this whole different level of engagement, a whole different level of product improvement and road map that's not a PR D. It's not an M R G. It's all about Get it out there, you know, get feedback from the usage and make those improvements on this >> guy finish improvements and micro analytics. I mean, even, you know, we talk back when you were adjusting how you deliver content for the Cube, you know, rather than a big blob, You really want to say, Well, I need more value for that. My clients need more value for that. So you've almost done that Mike segmentation by taking the information and then met attacking every single word in every single interview right to enrich the customer's experience, you know, And it kind of Then you Matt back and you say, We've got to the age now where the staff, the execs that we talked to over the other side, the table there, us they're living our lives. They've got the same kids as we've got the same ages we've got. They do the same person's we've got. They understand the same things and they get frustrated when things naturally don't work the way they should. Like I've got a home theater system and I've still got three remote controls. I can't get down. I've got a universal remote control, but it won't work because the components don't think so. What's happened is we've got to a world where everything's kind of interconnected and everything kind of learns and everything gets enriched when something doesn't it now stands out like a sore thumb and goes, That doesn't That is not the right way to do business on DH. Then you look that you say, translate that then into it and then into data centers. And there's these natural big red flag that says That's an old way of doing things. That's the old economy that doesn't enable me to go forward. I need to go forward. I need more agility. You know, I've got to get data freedom and then how do I solve that issue? And then what? Cos they're going to take me there because they're thinking the same ways as we are. This is why Tesler screamingly successful. This is why something like these beds are there. This is why things like Philips Hue systems are good and the list just goes on. And right now we're naturally inclined to work with products that enable us to enrich our lives and actually give feedback and then benefit us over the air. We don't like things that are too static now, and actually, there is this whole philosophy of cloud, which I think from an economic standpoint, is superb, you know? I mean, our product is Tier one enterprise storage in an SD s fashion for public private hybrid clouds. But we're seeing a lot of people doing bring backs. You know, out of the cloud is a whole thread of it right now, but I would actually say maybe it's not because the cloud philosophy is right, but it's the business model of the cloud guise of God. Because a lot of people have looked at cloud as they're setting. Forget, dump my stuff in the cloud. I get good economics. But what we're talking about now is data gets poked and prodded and moved and adjusted constantly. But the movement of the data is such that if you put in, the cloud is going to impinge you based on the business model. So that whole thing is going to mature as well, right? >> You're such a good position to because >> the, you know the growth of date is going. Bananas were just at at Arcee a couple weeks ago. In one of the conversation was about smart smart buildings, another zip zip devices on shades that tie back to the HBC, and if anybody's in the room or not, should be open should be closed. Where's the sun? But >> there was really interesting comment about >> you know, if you look at things from a software to find way you take what was an independent system that ran the elevator and independent system that ran the HBC and independent system that ran the locks? One that ran the fire alarm. But guess what? If the fire alarm goes off, baby, it would be convenient to unlock all the doors and baby. It would convenient automatically throw the elevator control system into fire mode, which is don't move. Maybe, you know so in reconnecting these things in new and imaginative ways, and then you tie it back to the I T side of the house. You know, it's it's it's it's getting a one plus one makes three effect. With all these previously silent systems that now can be, you know, connected. They can be software defined, you know, they can kind of take the operation till I would have never thought of that one hundred years. I thought that just again this fascinating twist of the Linz and how to get more value out of the existing systems by adding some intelligence and adding this back and forth telemetry. >> Yeah, and and and again, part of May is being the CEO of date era. I want advocates the right platform for people to use. But part of this is my visceral obsession of this market is moving through this software defined pattern. So it's going from being hardware resilient to software resilient to allow youto have flexibility across it. But things have to kind of interconnecting work, as you just described on SDF software to find storage as an example comes in different forms. HD is an example of it and clouds an example. I mean, everything is utterly software defined in Amazon. It so is the term gets misused, could be suffered to find you could say data centric data to find or you could say software resilient. But the whole point is what you've just described, which is open it up, allow data freedom, allow access to it and then make sure that your business is agile and whatever you do, Khun, take the feedback in a continuous loop on at lashing. Move forward as opposed to I've just got this sentence forget or lock mentality that allows me just to sort of look down the stack and say, I've got the silo. I'm owning that customer of owning the data and by the way, that's the job. It's going to doe, right? So this is just the whole concept of kind of people opening their eyes on DH. My encouragement on DI we can encourage anybody, whether customers or basically vendors, is to look around your life and figure out what enriches it from a technology standpoint. On odds on it will be something in the arena that we've just described, right? >> Do you think it's It's because I think software defined, maybe in its early days was >> just kind of an alternative thought to somebody doing it to flipping switches. But as you said in the early example, with the car, propulsion wasn't kind of a fundamentally different way to attack the problem. It was just applying a different way to execute action. What we're talking about now is a is a totally higher order of magnitude because now you've got analytics. You actually want to enable action based on the analytics based on the data for your card. Actually take action, not just a guy. Maybe you should you know, give given alert and notice that pops up on your phone. So, you know, >> maybe we need something different because it's not just redoing >> what we did a different way. It's actually elevating the whole interaction on a whole different kind of love. >> And this is this is kind of thank you for that. It was the profound kind of high got wasn't joining data and watching it. It was I got a demo off the cloud. You I the callback piece of what cloud? What data has. And I was watching a dashboard off a live data stream. You know of information that we were getting back from multiple customers and in each of the customers, it would make recommendations of, you know, how many gets on, how many times it would hear cash on DH. So it was actually coming back dynamically and recommending moving workloads across onto or flash systems. You, Khun, do things where once you've got this freedom on application, a data set isn't unknown. It's now basically in a template, and you say this is what priority has. And so you say it's got high priority. So whatever the best legacy you could give me. Give me right, You drop it onto a disk. And at the moment I've got hybrid. That's all I've got, but I decide to addle flash. So I put some all flash into the into the system. Now it becomes part of this fabric and its spots it and goes well on our second. That will disservice me better and then migrates the workload across onto it without you touching it, right? So, in other words, complete lights out so that the whole thing of this is what Mark and the team have done is looked at and said the only way forward is running this massively agile data center based on a swarm of servers that will basically be plugged together into something that would look like a fabric array. But but you can't. Then you've got to assume that you can now handle application life cycles across onto it. It'LL make recommendations like the bed thing. You know what I was saying? I was lying there and what I liked about it. So So I set my thing to fifty nine, and then it realizes I'm not sleeping very well. It's not suggested. Sixty sixty one sixty. Sleeping well, OK, that's it. And then that's good. We'LL do the same thing where an application will actually say, Here's my template. This is what it looks like. The top priority, by the way. I need the most expensive drives you've got, drops it onto it, and then it look at it and go. Actually, we could do just as good a job if there's on hybrid and then migrated across and optimize the workload, right? And so it's not again. Part of it is not. Data is the best STDs, and it is for Tier one for enterprise storage. It's the fact that the entire industry, no matter where you look at it, not just our industry but everybody is providing tech is doing is exactly the same thing, which is, and you kind of look it and you go. It's kind of edge asset micro telemetry, and then that feedback loop and then continuous adjustment allows you to be successful. That's what products are basically getting underpants. >> Just, you know, it's when he's traveling. Just No, we're almost out of time, but I just can't help it but >> say it, you know, because we used to make decisions >> based on samples of old data with samples. And it was old. And now, because of where we are on the technology lifecycle of drives and networks and CPS and GPS, we can now make decisions based on all the data now. And what a fundamentally different, different decision that's going to drive this too. And then to your point, it's like, What do you optimizing for? And you don't necessarily optimize for the same thing all the time that maybe low priority work, load optimized for cost and maybe a super high value workload optimized for speeding late in sea. And that might change >> over time when Anu workload comes in. So it's such a different way to look at the world >> and it is temporal, right? I mean, again, I know you're going kick me off now, but think about it right the old days and writing a car building a car is you thought, well, what's going to need to be in the car in three years time, put it in now, build manufacture, coming out and then with a Tesler i by the current December. Since December, I've now got pinned based authentication I've got century mode. I've got Dash Cam, They've got all free. I've got a pet mode into it now. My car's got more range. It's got high performance. This guy highest top speed, and I haven't even taken the current or it's all over the air And this is all about, continues optimization. They've done around the platform and you just go. That's the way this linked in. Recently, someone posted something said, You know, keep the eyes are dead. Well, the reason there saying that isn't because there's a stupid thing to do Q. B. Ours is because if you're not measuring your business and adjusting on a continuous basis, you're gonna be dead anyway. So our whole economy is moving this way. So you need an infrastructure architecture to support that. But where everybody's the same, we're all thinking the same. And it doesn't matter what industry or, you know, proclivity have this. This adjustment and this speed of adjustment is what you need. And like I said, I'm That's why I wanted to get to date era. That's what I'm excited about it and that is the are hard I had I kinda looked. It went Oh my God, I'm now working with cloud people who understand what they've walked in the shoes And I kind of got this way of sense of can Imagine what it had been like if you were ill on the first time You saw a hundred thousand cars worth of life data spilling in of what power you have right to adjust and to basically help your client base. And you can't do that if you are in fixed things, right? And so that's That's the world moving forward >> just in time for twenty twenty one will all have great insight in a few short months. We'LL all know >> everything Well, guy great Teo Great to >> sit down Love to keep keeping tabs on you on Twitter and social And thanks for stopping by. I >> appreciate it. All >> right. He's guy. I'm Jeff. You're watching the cube within a cube conversation Or Paulo? What? The studio's thanks for watching >> we'LL see you next time
SUMMARY :
From our studios in the heart of Silicon Valley. Have them on to a bunch of different in the politest. Actually, Was November of twenty Terror of the adventure. the go to market, I think in February with HP, and I thought that myself and Mark that really wanted you to get deeper in with date. in the last few months, because you know, jobs are all about learning and then adjusting and learning and adjusting I was the products that they should come to the market. But our entire being, you know, if you think about it's not just technology or technologies And the other thing, I think it's fascinating as it's looking up. from the architect council on. comment because there's the individual adjustment to you to know that you want to get off it at Page Milan from a large population that you can again incorporate best practices into upgrades of the product what he said, which is really important. It's not an M R G. It's all about Get it out there, you know, And it kind of Then you Matt back and you say, We've got to the age now In one of the conversation was about smart smart buildings, another zip zip and then you tie it back to the I T side of the house. could be suffered to find you could say data centric data to find or you could say software resilient. But as you said in the early example, with the car, propulsion wasn't kind of a fundamentally different It's actually elevating the whole interaction on a whole doing is exactly the same thing, which is, and you kind of look it and you go. Just, you know, it's when he's traveling. And you don't necessarily optimize for the same thing So it's such a different way to look at the world And it doesn't matter what industry or, you know, just in time for twenty twenty one will all have great insight in a few short months. sit down Love to keep keeping tabs on you on Twitter and social And thanks for stopping by. appreciate it. The studio's thanks for watching
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
Jeff | PERSON | 0.99+ |
Sandra El Santo | PERSON | 0.99+ |
Mark | PERSON | 0.99+ |
Geoffrey | PERSON | 0.99+ |
February | DATE | 0.99+ |
March 2019 | DATE | 0.99+ |
Tesla | ORGANIZATION | 0.99+ |
Mike | PERSON | 0.99+ |
Derek Curtain | PERSON | 0.99+ |
Silicon Valley | LOCATION | 0.99+ |
HP | ORGANIZATION | 0.99+ |
Amazon | ORGANIZATION | 0.99+ |
fifty | QUANTITY | 0.99+ |
Eriks | PERSON | 0.99+ |
two | QUANTITY | 0.99+ |
Audi | ORGANIZATION | 0.99+ |
both sides | QUANTITY | 0.99+ |
each | QUANTITY | 0.99+ |
one car | QUANTITY | 0.99+ |
Andi | PERSON | 0.99+ |
one hundred years | QUANTITY | 0.99+ |
November | DATE | 0.98+ |
Holloway Alto, California | LOCATION | 0.98+ |
Da Terra | ORGANIZATION | 0.98+ |
December | DATE | 0.98+ |
ten years | QUANTITY | 0.98+ |
first thing | QUANTITY | 0.98+ |
Matt | PERSON | 0.98+ |
Paulo | PERSON | 0.98+ |
two junctions | QUANTITY | 0.98+ |
Tesler | ORGANIZATION | 0.97+ |
Tessler | ORGANIZATION | 0.97+ |
three years | QUANTITY | 0.96+ |
a week before | DATE | 0.96+ |
twenty twenty one | QUANTITY | 0.96+ |
A three | COMMERCIAL_ITEM | 0.96+ |
first time | QUANTITY | 0.96+ |
single function | QUANTITY | 0.95+ |
fifty nine | QUANTITY | 0.95+ |
first trance | QUANTITY | 0.95+ |
Teo | PERSON | 0.95+ |
one | QUANTITY | 0.94+ |
second | QUANTITY | 0.94+ |
one side | QUANTITY | 0.93+ |
sandhill | ORGANIZATION | 0.92+ |
Philips Hue | ORGANIZATION | 0.92+ |
Data | ORGANIZATION | 0.91+ |
last six months | DATE | 0.91+ |
Tesler i | COMMERCIAL_ITEM | 0.9+ |
each individual | QUANTITY | 0.9+ |
Guy Churchward | PERSON | 0.89+ |
Sixty | QUANTITY | 0.89+ |
Khun | PERSON | 0.88+ |
couple weeks ago | DATE | 0.88+ |
Arcee | ORGANIZATION | 0.87+ |
hundred thousand cars | QUANTITY | 0.85+ |
Page Milan | ORGANIZATION | 0.84+ |
Tier one | QUANTITY | 0.83+ |
couple pieces | QUANTITY | 0.83+ |
One | QUANTITY | 0.82+ |
Onda | ORGANIZATION | 0.81+ |
three remote controls | QUANTITY | 0.81+ |
Jules | PERSON | 0.8+ |
Volkswagon | ORGANIZATION | 0.8+ |
Tessler | PERSON | 0.79+ |
last | DATE | 0.78+ |
seventy five | QUANTITY | 0.77+ |
Cuban | OTHER | 0.76+ |
ORGANIZATION | 0.76+ | |
DH | ORGANIZATION | 0.76+ |
sixty | QUANTITY | 0.75+ |
SDF | TITLE | 0.74+ |
Del | ORGANIZATION | 0.74+ |
US seventy | QUANTITY | 0.71+ |
sixty five | QUANTITY | 0.71+ |
single interview | QUANTITY | 0.69+ |
single word | QUANTITY | 0.69+ |
Final Show Analysis | IBM Think 2019
>> Live from San Francisco, it's theCUBE, covering IBM Think 2019. Brought to you by IBM. >> Hey, welcome back everyone this is theCUBE's live coverage in San Francisco, California Moscone Center for IBM Think 2019. It's the wrap up of our four days of wall-to-wall live coverage. All the publishing on Siliconangle.com. I've got the journalism team cranking it out. Dave Vellante just put up a post on Forbes, check that out. And Stu's got the team cranking on the videos. Stu and Dave, four days, team's done a great job. Tons of video, tons of content, tons of data coming through theCUBE. We're sharing that live, we're sharing it on Twitter, we're sharing it everywhere on LinkedIn. What's going on with the data? Let's synthesize, let's extract the signal from the noise, let's assess IBM's prospects in this chapter two, as Ginni says. A lot of A.I., lot of data, I mean IBM is an old company that has so much business, so many moving parts and they've been working years to kind of pivot themselves into a position to run the table on the Modern Era of computing and software. So, what do you think, Dave? >> Well, I mean, this has been a long time coming and we're here, you pointed out John, to me privately that IBM's taking a playbook similar to Microsoft in that they're cloudifying everything. But there's differences, right? There's a bigger emphasis on A.I. than when, not that Microsoft's not in A.I. they of course are, but when Microsoft cloudified itself there wasn't as much of an emphasis on A.I. Ginni Rometty said, "Well, the first chapter was only about 20%, the remaining 80% is going to be chapter two. We're going hard after that." I wrote in that post today that, in 2013, IBM had a wake-up call. They lost that deal to Amazon at the C.I.A. They had to go out and buy Softlayer because their product was deficient, their cloud product was deficient. >> And by the way it looks like they're going to lose the JEDI Contract by the D.O.D., another agency that's a 10 billion dollar contract. >> So we can talk about they're going to lose that one too. >> We can talk about is Amazon's lead extending in Cloud? And so, IBM cannot take on Amazon head-to-head in infrastructures of service period, the end. It doesn't have the volume, >> And they know that, I think. >> It doesn't have the margins, and they know that. They got to rely on it's, as a service business it's SaaS, it's data, it's data platforms, obviously A.I. and now Red Hat. The fact that IBM had to spend, or spent, 34 billion dollars on Red Hat, to me underscores the fact that it's Cloud and it's 10-year attempt to commercialize Watson, isn't enough. It needs more to be a leader in hybrid. >> And let's talk about the Red Hat acquisition because Ray Wang on theCUBE yesterday and said, "Oh, P.E., private equity prices are driving up 34 billion dollars, pretty much market in today's world." He thinks they overpaid and could have used those services. You debated that, you've heard me say that, hey I could have used that 34 billion dollars of cobbled-together stuff, but you made a comment around speed. They don't have the gestation period there to do it. So, if you take market price for Red Hat, Stu, with open shifts accelerated success since Kubernetes really accelerated its adoption. You got IBM now with a mechanism to address the legacy on premise into Cloud Modern, and you got with this Cloud Private, Stu, this really is a secret weapon for IBM and to me, what I'm pulling out of all the data is that Rob Thomas at Interpol, the CDO have a great data A.I. strategy as a group. They have a team that's one team and this Cloud Private is a secret weapon for them. I think it's going to be a very key product and not a lot of people are talking about it. >> Well John, it shouldn't be a secret weapon for IBM because of course IBM has a strong legacy in the data center. We've talked about Z this week, you talk about power, talk about all the various pieces. Red Hat absolutely can help that a lot. What we noticed is there wasn't a lot of talk about Red Hat here just because it's going through the final pieces. We expect later this year to come out, but it's about the developers. That is where Red Hat is going to be successful, where they are successful and where they should be able to help IBM leverage that going forward. The concern we have is culture. IBM says that Red Hat will be separate. There will be no layoffs, they'll keep that alone but when I wrote about the acquisition I said, we should be able to see, for this to really be a successful acquisition, we should be able to see the Red Hat culture actually influence what's happening at IBM. And to be honest when I talk to people around this show, they're like, "That's never going to happen, Stu." >> I just want to make a point about the price. Ray was saying how they overpaid and made the private equity thing. IBM's paying a hundred and ninety dollars a share. If you dial back to June of '18, Stu you and I talked about this in our offices, Red Hat was trading at one seventy five a share. So they're paying an 8 1/2% premium over that price. Yes, when they made the deal in the fall you're talking about a 60% premium. So, the premium is really single digits over what it was just a few months earlier. >> And Cisco, Google, >> It was competitive, right. >> Microsoft all could have gone after that. I think it's a great buy for IBM. >> That's what they had to pay to get it. >> And definitely it helped there. So from my stand-point, looking at the show this week, first of all I was impressed to see really that data strategy and how that's pervasive through the company and A.I. is something that everyone's talking about how it fits in. John you commented a bunch of times Ginni mentioned Kubernetes two times in her Keynote. So, they're in these communities, they're working on all these environments. The concern I have is if this is chapter two and if A.I. is one of the battlefields, Amazon's all deep into A.I. I think heavily about Google when I talk about that. When I talk to Microsoft people they're like, "Satya Nadella is Mr. A.I.", that's all they care about. >> I don't think Microsoft has a lot of meat on the A.I. bone either. >> Really? >> No look it, here's the bottom line. A.I. is a moonshot it is an aspirational marketplace. It's about machine learning and using data. A.I.'s been around for a while and whoever can take advantage of that is going to be about this low-hanging use cases of deterministic processes that you throw machine learning at no problem. Doing cognition and reasoning a whole 'nother ballgame. You got state, this is where the Cloud Native piece is important as a lynch-pin to future growth because that wave is coming. And I think it's not going to impact IBM so much now, as it is in the future, because you got developers with Red Hat and you got the enablement for Cloud growth, Modern Cloud, stuff in any Cloud. But IBM has a zillion customers Dave, they have a business, they have mission critical workloads. And you pointed out in the Forbes post that we posted and on the Silicon Angle, that I.T. Economics are changing. And that the cloud services market is growing, so IBM has pre existing, big mission critical companies that they're serving. So, you can't just throw Kubernetes at that and say lift and shift. Z's there, you got other things happening. So, to me, that is IBM's focus, they nail their bread and butter, they bring multi-cloud from the table. Throw hybrid at it with Private Cloud and they're stable. Everything else I think is window dressing in my mind, because I think you're going to see that adoption more downstream. >> Well, the other thing you gave me for the piece actually, you helped me understand that IBM with Red Hat can use Cloud Native techniques and apply them to its customer base and to really create a new breed of business developers, right? Probably not the hoodie crowd necessarily, but business developers that are driving value apps based on mission critical apps and using Cloud Native techniques. Your thoughts on that? >> The difference between Oracle and IBM is the following, Oracle has no traction in developers in Cloud Native, IBM now with Red Hat can take the Cloud Native growth and use containers and Kubernetes and these new technologies to essentially containerize legacy workloads and make them compatible with modern technologies. Which means, if you're in business or in I.T. or running a lot of big shops, you don't have to kill the old to bring in the new. That's one factor. The other factor is the model's flipped. Applications are dictating architecture. It used to be infrastructure dictates what applications can do, it's completely reversed. We've heard this time and time again from the leading platforms, the ones that are looking at the applications with data as a fabric in there will dictate resource, Whether it's one Cloud or multiple Clouds or whatever architecture that's the fundamental shift. The people who get that will win and the people who don't won't. >> And the other thing I've pointed out in that article is that Ginny kept saying it's not backend loaded, The Red Hat deal, it's not back end loaded. IBM has about a 20 billion dollar business, captive business, in outsourcing, application management, application modernization and they can just point Red Hat right at that base, bring it's services business, Stu you've made this point, it's about scaling Red Hat. Red Hat's what, about a three and a half billion dollar company? >> Yeah >> And so that really is, she was explaining the business case for the acquisition. >> Yeah absolutely, I mean we've watched IBM for years, Bluemix had a little bit of traction but really faltered after a while, that application modernization. You hear from IBM, similar to what we've heard from Cisco a few weeks ago, meet customers where they are and help them move forward. We did a nice interview this week with a UK financial services company talking about how they've modernized what they're doing. Things like I.T. ops, new ops, these environments that are helping people with that app development. 'Cause IBM does have a good application work flow. There's lots of the infrastructure companies don't have apps and that's a big strength. >> When was the last, I got a direct message from the crowd, I want to get to Stu, but I want to ask you guys a question. When was the last time you saw a real innovation and disruption in a positive way around business applications. We're talking about business applications, not a software app, that's in a created category. We're talking about blocking and tackling business applications. When have you seen any kind of large scale transition innovation. Transition and innovation at the business application level? >> Google Docs? I mean >> I mean think about it. >> Right? >> So I think this is where IBM has an opportunity. I think the data science piece is going to transform into a business app marketplace and I think that's where their value is. >> Workday? >> Service Now. >> It's a sass ification of everything. >> Salesforce? >> Service Now, features become products. Products become companies. I mean this a big debate. I mean you can win on >> But that's not, Service Now really not a business, I mean it is a business app but it's more of an I.T. app. Alright Workday I'd say is an example. Salesforce I guess. >> And look here's one of the flaws in that multi-cloud picture, is it's I'm going to take all this heterogeneous environment and I'm going to give you a multi-Cloud manager. We've seen that single pane of glass discussion my entire career and it never works. So I'm a little concerned about that. >> So Andy Jassy makes the case that multi-cloud is less secure, more complex, more expensive. It's a strong case that he makes. Now of course my argument is that it's multi-vendor. It's not really multi-cloud. >> Well here's the Silicon Valley >> So he didn't have any control over that. It's not a procurement thing, it's just the way that people go by. >> The world has changed with cloud and I'll give you a Silicon Valley example anecdote. It used to be an expression in Silicon Valley, in venture capital community if you were a start-up or entrepreneur you'd build a platform. And there was an old expression, that's a feature, not a company. Kind of a joke within the VC community and that's how they would vet deals. Oh, that's a good feature" >> "Oh it's a feature company." >> "That's a great idea." Now with Cloud as a platform and now with all the stuff that's coming to bear, horizontally scalable, all the things that IBM's rolling out, sets the table for a feature to be a company. Where you have an innovation at the business model level, you don't really need tech anymore other than to scale up build it out and that's all done for you by other people. So people who are innovating on say an idea, well let's change this little feature in HR app or, that could meet up to Workday. Or let's change this feature. Features can become companies now so I think that's my observation. >> I think it's really interesting >> It could live in the cloud marketplaces too. It's so easy to get that scale if I could plug into all those marketplaces. IBM for years has had thousands of partners in their ecosystem. Of course Amazon's Marketplace, growing like gangbusters. >> But this is what Jerry Chen said when we were at Reinvent last year and we were asking him about Amazon, will it go up the stack, will it develop applications? He said, well, look but then what we got to do is give people a platform for application developers to build those features to disrupt, to your point, the core enterprise apps. Now, can IBM get there before Amazon, who knows? I mean its. >> Alright guys let's look at the big picture, zoom out. Your thoughts on Think 2019 IBM Think, Stu what's your final thoughts? >> Yeah, final thoughts is, I think IBM first of all is coming together. Just as this show was six shows and last year it was in two locations, there's cohesion. I heard the four days of interviews, we saw a lot of different pieces. Everything from talking about augmented reality through storage and we talked about the Z, and those pervasive themes of data, A.I., Dave what do you call it, It's the innovation cocktail now in Cloud. Data A.I. in cloud, put those three together. >> Innovation sandwich, innovation cocktail. Got to have a cocktail with a sandwich. That's your big take away? Okay, my take away Dave is that the, you nailed it in your post I thought, you should go to Forbes and check out, search on IBM Think you'll find the post by me and Dave Vellante but it's really written by Dave. I think to me IBM can change the game on two fronts. I learned and I walked away with a learning this week about these business apps. To me, my walk away is there's going to be innovation at a new genre of developers. I think you're going to see IBM target, they should target these business app ties as well as with the Could Native in Red Hat. I really think highly of that acquisition. From a speed stand point, I think the culture of Red Hat, although different, will be a nice check against IBM's naturally ability to blue-wash it. Which means you don't want to lose the innovation. I think Ginni saying Kubernetes twice on stage, is a sign that she sees this path, I think the Cloud Private opportunity could be a nice lever to bring open shifts and Kubernetes into that growth. And I think A.I. is going to be one of those things where they're either going to go big or go home. I think it's going to be one of those things. >> My take, love the venue, way better than last year in terms of the logistics. I like the new Moscone, easy to get around. May next year, May 2020 is going to be better than February here. I would've liked to see Ginni sell harder. She laid out a vision, she talked about a lot of sort of of high level things. I would have liked to seen her sell the new IBM and Red Hat harder. I guess they couldn't do that because they're worried about compliance. >> Quiet Period? >> Yeah right, you know monopolistic behavior I guess. But that I'm really excited to hear that story and a harder sell on the new IBM. >> I think if they can take the Microsoft playbook of cloudifying everything going with the open source with Red Hat and then just getting the great Sass if app revenue up, they're going to, can do well. >> Alright guys, great job. Thanks for hosting this week. Lisa Martin's not here today. Want to thank Lisa Martin if you're out there watching, great time. Guys, thanks to the crew. Thanks to IBM. Thanks to all of our sponsors that make theCUBE do what we do and thanks for all of your support to the community. I'm John Furrier along with Stu Miniman. Thanks for watching. See you next time. (pulsing electronic music)
SUMMARY :
Brought to you by IBM. And Stu's got the team cranking on the videos. They lost that deal to Amazon at the C.I.A. And by the way it looks like they're going to lose in infrastructures of service period, the end. The fact that IBM had to spend, or spent, They don't have the gestation period there to do it. And to be honest when I talk to people around this show, So, the premium is really single digits over I think it's a great buy for IBM. So from my stand-point, looking at the show this week, of meat on the A.I. bone either. And I think it's not going to impact IBM so much now, Well, the other thing you gave me for the piece actually, The difference between Oracle and IBM is the following, And the other thing I've pointed out in that article And so that really is, she was explaining There's lots of the infrastructure companies Transition and innovation at the business application level? I think the data science piece is going to transform into I mean you can win on I mean it is a business app but it's more of an I.T. app. I'm going to give you a multi-Cloud manager. So Andy Jassy makes the case that the way that people go by. in venture capital community if you were a start-up that IBM's rolling out, sets the table It's so easy to get that scale if I could plug into to build those features to disrupt, to your point, Alright guys let's look at the big picture, zoom out. I heard the four days of interviews, we saw a lot And I think A.I. is going to be one of those things I like the new Moscone, easy to get around. But that I'm really excited to hear that story I think if they can take the Microsoft playbook Thanks to all of our sponsors that make theCUBE
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
John | PERSON | 0.99+ |
Lisa Martin | PERSON | 0.99+ |
Dave | PERSON | 0.99+ |
Cisco | ORGANIZATION | 0.99+ |
IBM | ORGANIZATION | 0.99+ |
Ginni | PERSON | 0.99+ |
Jerry Chen | PERSON | 0.99+ |
Dave Vellante | PERSON | 0.99+ |
Amazon | ORGANIZATION | 0.99+ |
Andy Jassy | PERSON | 0.99+ |
February | DATE | 0.99+ |
Stu | PERSON | 0.99+ |
2013 | DATE | 0.99+ |
Oracle | ORGANIZATION | 0.99+ |
John Furrier | PERSON | 0.99+ |
Microsoft | ORGANIZATION | 0.99+ |
May 2020 | DATE | 0.99+ |
Stu Miniman | PERSON | 0.99+ |
ORGANIZATION | 0.99+ | |
Ray | PERSON | 0.99+ |
June of '18 | DATE | 0.99+ |
10-year | QUANTITY | 0.99+ |
Red Hat | ORGANIZATION | 0.99+ |
Rob Thomas | PERSON | 0.99+ |
six shows | QUANTITY | 0.99+ |
Satya Nadella | PERSON | 0.99+ |
Interpol | ORGANIZATION | 0.99+ |
8 1/2% | QUANTITY | 0.99+ |
Silicon Valley | LOCATION | 0.99+ |
34 billion dollars | QUANTITY | 0.99+ |
last year | DATE | 0.99+ |
Ginny | PERSON | 0.99+ |
first chapter | QUANTITY | 0.99+ |
80% | QUANTITY | 0.99+ |
two locations | QUANTITY | 0.99+ |
Bluemix | ORGANIZATION | 0.99+ |
10 billion dollar | QUANTITY | 0.99+ |
four days | QUANTITY | 0.99+ |
Derek Manky, Fortinet | CUBEConversation, November 2018
[Music] hi I'm Peter Burris and welcome to another Cube conversation from the cube studios here in beautiful Palo Alto California today we're going to talk about some new things that are happening in the security world obviously this is one of the most important domains within the technology industry and increasingly because of digital business in business overall now to do that we've asked Eric manki to come back Derick is the chief of security insights and global threat alliances at Fort Net Derek welcome back to the cube absolutely the same feel the same way Derek okay so we're going to get into some some predictions about what the bad guys are doing and some predictions about what the defenses are doing how we're going to see them defense opportunities improve but let's set the stage because predictions always are made on some platforms some understanding of where we are and that has also changed pretty dramatically so what's the current state in the overall security world Derek yeah so what we saw this year in 2019 a lot is a big increase on automation and I'm talking from an attackers point of view I think we talked about this a little bit earlier in the year so what we've been seeing is the use of frameworks to enhance sort of the day-to-day cycles that cyber criminals and attackers are using to make their you know criminal operations is that much more efficient sort of a well-oiled machine so we're seeing toolkits that are taking you know things within the attack cycle and attack change such as reconnaissance penetration you know exploitation getting into systems and just making that that much quicker so that that window to attack the time to breach has been shrinking thanks to a lot of these crime kits and services that are offered out there now one other comment on this or another question that I might have on this is that so speed is becoming an issue but also the risk as digital business takes on a larger four portion of overall business activities that ultimately the risks and costs of doing things wrong is also going up if I got the right yeah absolutely for sure and you know it's one of those things that it's the longer that a cybercriminal has a foothold in your system or has the opportunity to move laterally and gain access to other systems maybe it's your I o T or you know other other platforms the higher the risk right like the deeper down they are within an attack cycle the higher the risk and because of these automated toolkits are allowing allowing them to facilitate that it's a catalyst really right they can get into the system they can actually get out that much quicker the risk is a much higher and we're talking about risk we're talking about things like intellectual property exfiltration client information this sort of stuff that can be quite damaging to organizations so with the new foundation of speed is becoming an increasingly important feature probably think about security and the risks are becoming greater because digital assets are being recognized as more valuable why do you take us through some of the four Donets predictions on some of the new threats or the threat landscape how's the threat landscape changing yeah so as I said we've already seen this shift in automation so what I would call the basics I mean knowing the target trying to break into that target right when it comes to breaking into the target cyber criminals right now they're following the path of least resistance right they're finding easy ways that they can get into IOT devices I into other systems in our world when we talk about penetration or breaking into systems it's through zero days right so the idea of a zero day is essentially a cyber weapon there's movies and Hollywood that have been made off of this you look at attacks like Stuxnet in the past they all use zero day vulnerabilities to get into systems all right so the idea of one of the predictions we're seeing is that cyber criminals are gonna start to use artificial intelligence right so we talk about machine learning models and artificial intelligence to actually find these zero days for them so in the world of an attacker to find a zero day they have to do a practice called fuzzing and fuzzing is basically trying to trick up computer code right so you're throwing unverified parameters out at your turn T of throwing and unanticipated sequences into code parameters and and input validation and so forth to the point that the code crashes and that's from an attackers point of view that's when you take control of that code this how you know finding weapons into system cyber weapons in this systems work it typically takes a lot of a lot of resource it takes a lot of cycles it takes a lot of intelligence that takes a lot of time to discovery we can be talking on month for longer it's one of the predictions that we're hitting on is that you know cyber criminals are gonna start to use artificial intelligence fuzzing or AI F as I call it to be able to use AI to do all of that you know intelligent work for them so you know basically having a system that will find these gateways if you will these these you know new vulnerabilities into systems so sustained use of AI F to corrupt models so that they can find vulnerabilities that can then be exploited yeah absolutely and you know when it comes to the world of hacking and fuzzing it's one of the toughest things to do it is the reason that zero days are worth so much money you know they can suffer hundreds of thousands of dollars on darknet and in the cyber criminal you know economy so it's because they're talk talk to finally take a lot of resources a lot of intelligence and a lot of effort to be able to not only find the vulnerability but then actively attack it and exploit it right there's two phases to that yeah so the idea is by using part of the power of artificial intelligence that cyber criminals will start to leverage that and harness it in a bad way to be able to not only discover you know these vulnerabilities but also create that weapon right create the exploit so that they can find more you know more holes if you will or more angles to be able to get into systems now another one is that virtualization is happening in you know what the good guys as we virtualized resources but is it also being exploited or does it have the potential be exploited by the bad guys as well especially in a swarming approach yeah virtualization for sure absolutely so the thing about virtualization too is you often have a lot of virtualization being centralizes especially when we talk about cloud right so you have a lot of potential digital assets you know valuable digital assets that could be physically located in one area so when it comes to using things like artificial intelligence fuzzing not only can it be used to find different vulnerabilities or ways into systems it can also be combined with something like I know we've talked about the const that's warm before so using you know multiple intelligence infected pieces of code that can actually try to break into other virtual resources as well so virtualization asked definitely it because of in some cases close proximity if you will between hypervisors and things like this it's also something of concern for sure now there is a difference between AI fai fuzzing and machine learning talk to us a little bit about some of the trends or some of the predictions that pertain to the advancement of machine learning and how bad guys are going to exploit that sure so machine learning is a core element that is used by artificial intelligence right if you think of artificial intelligence it's a larger term it can be used to do intelligent things but it can only make those decisions based off of a knowledge base right and that's where machine learning comes into place machine learning is it's data it's processing and it's time right so there's various machine learning learning models that are put in place it can be used from everything from autonomous vehicles to speech recognition to certainly cybersecurity and defense that we can talk about but you know the other part that we're talking about in terms of reductions is that it can be used like any tool by the bad guys so the idea is that machine learning can be used to actually study code you know from from a black hat attacker point of view to studying weaknesses in code and that's the idea of artificial intelligence fuzzing is that machine learning is used to find software flaws it finds the weak spots in code and then it actually takes those sweet spots and it starts probing starts trying to attack a crisis you know to make the code crash and then when it actually finds that it can crash the code and that it can try to take advantage of that that's where the artificial intelligence comes in right so the AI engine says hey I learned that this piece of software or this attack target has these weak pieces of code in it that's for the AI model so the I fuzzy comes into place to say how can I actually take advantage how can i exploit this right so that's where the AI trussing comes into play so we've got some predictions about how black hats and bad guys are going to use AI and related technologies to find new vulnerabilities new ways of exploiting things and interacting new types of value out of a business what are the white hats got going for them what are their some of the predictions on some of the new classes of defense that we're going to be able to put to counter some of these new classes of attacks yeah so that's that's you know that's honestly some of the good news I believe you know it's always been an armor an arms race between the bad guys and the good guys that's been going on for decades in terms of cybersecurity often you know the the bad guys are in a favorable position because they can do a million things wrong and they don't care right from the good guys standpoint we can do a million things right one thing wrong and that's an issue so we have to be extra diligent and careful with what we do but with that said you know as an example of 49 we've deployed our forty guard AI right so this is six years in the making six years using machine learning using you know precise models to get higher accuracy low false positives to deploy this at reduction so you know when it comes to the defensive mechanism I really think that we're in the drivers position quite frankly we have better technology than the Wild West that they have out on the bad guys side you know from an organization point of view how do you start combating this sort of onslaught of automation in AI from from the bad guys side well you gotta fight fire with fire right and what I mean by that is you have to have an intelligent security system you know perimeter based firewalls and gateways they don't cut it anymore right you need threat intelligence you need systems that are able to orchestrate and automate together so in different security products and in your security stack or a security fabric that can talk to each other you know share intelligence and then actually automate that so I'm talking about things like creating automated security policies based off of you know threat intelligence finding that a potential threat is trying to get into your network that sort of speed through that integration on the defensive side that intelligence speed is is is the key for it I mean without that any organization is gonna be losing the arms race and I think one of the things that is also happening is we're seeing a greater willingness perhaps not to share data but to share information about the bad things that are happening and I know that fort and it's been something at the vanguard of ensuring that there's even better clearing for this information and then driving that back into code that actually further automates how customers respond to things if I got that right yeah you hit a dead-on absolutely you know that is one of the key things that were focused on is that we realized we can't win this war alone right nobody can on a single point of view so we're doing things like interoperating with security partners we have a fabric ready program as an example we're doing a lot of work in the industry working with as an example Interpol and law enforcement to try to do attribution but though the whole endgame what we're trying to do is to the strategy is to try to make it more expensive for cyber criminals to operate so we obviously do that as a vendor you know through good technology our security fabric I integrated holistic security fabric and approach to be able to make it tougher you know for attackers to get into systems but at the same time you know we're working with law enforcement to find out who these guys are to go after attribution prosecution cut off the head of the snake as I call it right to try to hit cyber criminal organizations where it hurts we're also doing things across vendor in the industry like cyber threat Alliance so you know forty knots a founding member of the cyber threat Alliance we're working with other security vendors to actually share real time information is that speed you know message that we're talking about earlier to share real time information so that each member can take that information and put it into you something actionable right in our case when we get intelligence from other vendors in the cyber threat Alliance as an example we're putting that into our security fabric to protect our customers in new real-time so in sum we're talking about a greater value from being attacked being met with a greater and more cooperative use of technology and process to counter those attacks all right yeah absolutely so open collaboration unified collaboration is is definitely key when it comes to that as well you know the other thing like I said is is it's the is the technology piece you know having integration another thing from the defensive side too which is becoming more of a topic recently is deception deception techniques this is a fascinating area to me right because the idea of deception is the way it sounds instead of to deceive criminals when they're coming knocking on your door into your network so it's really what I call like the the house of a thousand mirrors right so they get into your network and they think they're going to your data store but is it really your data store right it's like it's there's one right target and a thousand wrong targets it's it's a it's a defensive strategy that organizations can play to try to trip up cyber criminals right it makes them slower it makes them more inaccurate it makes them go on the defensive and back to the drawing board which is something absolutely I think we have to do so it's very interesting promising you know technology moving forward in 2019 to essentially fight back against the cyber criminals and to make it more expensive to get access to whatever it is that they want Derek max Lilly yeah Derrick McKey chief of security insights and global threat Alliance this is for net thanks once again for being on the cube it's a pleasure anytime look forward to the next chat and from Peter Burroughs and all of us here at the cube in Palo Alto thank you very much for watching this cube conversation until next time you
**Summary and Sentiment Analysis are not been shown because of improper transcript**
ENTITIES
Entity | Category | Confidence |
---|---|---|
Peter Burris | PERSON | 0.99+ |
Derrick McKey | PERSON | 0.99+ |
Derek Manky | PERSON | 0.99+ |
2019 | DATE | 0.99+ |
Derick | PERSON | 0.99+ |
six years | QUANTITY | 0.99+ |
Peter Burroughs | PERSON | 0.99+ |
Palo Alto | LOCATION | 0.99+ |
Eric manki | PERSON | 0.99+ |
November 2018 | DATE | 0.99+ |
each member | QUANTITY | 0.99+ |
Derek max Lilly | PERSON | 0.99+ |
hundreds of thousands of dollars | QUANTITY | 0.99+ |
cyber threat Alliance | ORGANIZATION | 0.98+ |
today | DATE | 0.97+ |
two phases | QUANTITY | 0.97+ |
Palo Alto California | LOCATION | 0.97+ |
cyber threat Alliance | ORGANIZATION | 0.97+ |
zero days | QUANTITY | 0.97+ |
one right target | QUANTITY | 0.97+ |
forty knots | QUANTITY | 0.97+ |
zero days | QUANTITY | 0.97+ |
Hollywood | ORGANIZATION | 0.97+ |
one | QUANTITY | 0.97+ |
Derek | PERSON | 0.97+ |
decades | QUANTITY | 0.96+ |
zero day | QUANTITY | 0.96+ |
zero days | QUANTITY | 0.95+ |
a thousand wrong targets | QUANTITY | 0.95+ |
zero day | QUANTITY | 0.95+ |
a thousand mirrors | QUANTITY | 0.93+ |
single point | QUANTITY | 0.93+ |
Fortinet | ORGANIZATION | 0.9+ |
one area | QUANTITY | 0.88+ |
one thing | QUANTITY | 0.88+ |
one of the key things | QUANTITY | 0.88+ |
a million | QUANTITY | 0.87+ |
one of the predictions | QUANTITY | 0.78+ |
four | QUANTITY | 0.78+ |
49 | QUANTITY | 0.77+ |
Fort Net Derek | ORGANIZATION | 0.76+ |
lot | QUANTITY | 0.75+ |
West | LOCATION | 0.75+ |
forty guard | QUANTITY | 0.73+ |
this year | DATE | 0.72+ |
one of the predictions | QUANTITY | 0.7+ |
million | QUANTITY | 0.7+ |
global threat Alliance | ORGANIZATION | 0.7+ |
one other | QUANTITY | 0.69+ |
one of those | QUANTITY | 0.68+ |
a lot of resource | QUANTITY | 0.68+ |
Donets | ORGANIZATION | 0.59+ |
earlier in the | DATE | 0.59+ |
most important domains | QUANTITY | 0.54+ |
things | QUANTITY | 0.49+ |
resources | QUANTITY | 0.49+ |
Wild | ORGANIZATION | 0.46+ |
Stuxnet | PERSON | 0.45+ |
Interpol | TITLE | 0.45+ |
insights | ORGANIZATION | 0.43+ |
Cube | ORGANIZATION | 0.42+ |
Caitlin Halferty & Sonia Mezzetta, IBM | IBM CDO Fall Summit 2018
>> Live from Boston, it's the CUBE. Covering IBM Chief Data Officer Summit. Brought to you by IBM. >> Welcome to the CUBE's live coverage of IBM Chief Data Officer Summit here in Boston, Massachusetts. I'm your host, Rebecca Knight along with my co host, Paul Gillin. We're starting our coverage today. This is the very first day of the summit. We have two guests, Caitlin Halferty, she is the AI accelerator lead at IBM, and Sonia Mezzetta, the data governance technical product leader. Thank you both so much for coming on the CUBE >> Thanks for having us. >> So this is the ninth summit. Which really seems hard to belief. But we're talking about the growth of the event and just the kinds of people who come here. Just set the scene for our viewers a little bit, Caitlin. >> Sure, so when we started this event back in 2014, we really were focused on building the role of the chief data officer, and at that time, we know that there were just a handful across industries. Few in finance banking, few in health care, few in retail, that was about it. And now, you know, Gartner and Forrester, some industry analysts say there are thousands across industries. So it's not so much about demonstrating the value or the importance, now, it's about how are our Chief Data Officers going to have the most impact. The most business impact. And we're finding that they're really the decision-makers responsible for investment decisions, bringing cognition, AI to their organizations. And the role has grown and evolved. When we started the first event, we had about 20, 30 attendees. And now, we get 140, that join us in the Spring in San Francisco and 140 here today in Boston. So we've really been excited to see the growth of the community over the last four years now. >> How does that affect the relationship, IBM's relationship with the customer? Traditionally, your constituent has been the CIO perhaps the COO, but you've got this new C level executive. Now, what role do they play in the buying decision? >> There was really a lot of, I think back to, I co-authored a paper with some colleagues in 2014 on the rise of Chief Data Officer. And at that time, we interviewed 22 individuals and it was qualitative because there just weren't many to interview, I couldn't do a quantitative study. You know, I didn't have sample size. And so, it's been really exciting to see that grow and then it's not just the numbers grow, it's the impact they're having. So to you questions of what role are they playing, we are seeing that more and more their scope is increasing, their armed and equipped with teams that lead data science, machine learning, deep learning capabilities so they're differentiated from a technology perspective. And then they're really armed with the investment and budget decisions. How should we invest in technology. Use data as a strategic corporate asset to drive our progress forward in transformation. And so we've really seen a significant scope increase in terms of roles and responsibilities. And I will say though, there's still that blocking and tackling around data strategy, what makes a compelling data strategy. Is is the latest, greatest? Is it going to have an impact? So we're still working through those key items as well. >> So speaking of what makes this compelling strategy, I want to bring you into the conversation Sonia, because I now you're on the automated metadata generation initiative, which is a big push for IBM. Can you talk a little bit about what you're doing at IBM? >> Sure. So I am in charge of the data governance products internally within the company and specifically, we are talking today about the automated metadata generation tool. What we've tried to do with that particular product is to try to basically leverage automation and artificial intelligence to address metadata issues or challenges that we're facing as part of any traditional process that takes place today and trying to do curation for metadata. So specifically, what I would like to also point out is the fact that the metadata curation process in the traditional sense is something that's extremely time-consuming, very manual and actually tedious. So, one of the things that we wanted to do is to address those challenges with this solution. And to really focus in and hone in on leveraging the power of AI. And so one of the things that we did there was to basically take our traditional process, understand what were the major challenges and then focusing on how AI can address those challenges. And today at 4 p.m. I'll be giving a demo on that, so hopefully, everybody can understand the power of leveraging that. >> This may sound like a simple question, but I imagine for a lot of people outside of the CIO of the IT organization, their eyes glaze over when they hear terms like data governance. But it's really important. >> It is. >> So can you describe why it's important? >> Absolutely. >> And why metadata is important too. >> Absolutely. Well, I mean, metadata in itself is extremely critical for any data monetization position strategy, right. The other importance is in order to derive critical business insights that can lead to monetary value within a company. And the other aspect to that is data quality which Interpol talked about, right? So, in order for you to have the right data governance, you need to have right metadata in order for you to have high level of data quality can, if you don't and you're spending a lot of time cleaning dirty data and dealing with inefficiencies or perhaps making wrong business decisions based on bad data quality, it's all connected back to having the right level of data governance. >> So, I mean, I'm going to also go back to something you were talking about earlier and that's just the sheer number of CDOs that we have. We have statistic here, 90% of large global companies will have the CDO by 2019. That's really astonishing. Can you talk a little bit about what you see as sort of the top threats and opportunities that CDOs as grappling with right now. >> And let me make this tangible. I'll just describe my last two weeks, for example. I was with the CDO in person in Denver of a beer company, organization, and they were looking at some MNA opportunities and figuring out what their strategy was. I was at a bank in Chicago with the head of enterprise data government there, looking at it from a regular (mumbles) perspective. And then I was with a large multinational retail organization with their CDO and team figuring out how did they work at a sort of global scale and what did they centralize at enterprise data level. And what did they let markets and teams customize out in the field, out in the GOs. And so, that's just an example of, regardless of industry, regardless of these challenges, I'm seeing these individuals are increasingly responsible for those strategic decisions. And oftentimes, we start with the data strategy and have a good discussion about what is that organization's monetization strategy. What's the corporate business case? How are they going to make money in the future and how can we architect the data strategy that will accelerate their progress there? And again, regardless of product we're selling or retail, excuse me, our industry, those are the same types of challenges and opportunities we're grappling with. >> In the early days there was a lot of questions about the definition of the role and those CDOs set in different departments and reported to different people, are you seeing some commonality emerge now about how this role, where it sits in the organization, and what its responsibilities are? >> It's a great question, I get that all the time. And especially for organizations that recognize the need for enterprise data management. They want to invest in a senior level decision-maker. And then it's a question of where should they sit organizationally? For us internally, within IBM, we report to our Chief Financial Officer. And so, we find that to be quite a compelling fit in terms of budget. And visibility into some of those spend decisions. And we're on par in peers with our CIO, so I see that quite a bit where a Chief Data Officer is now on par and appear to the CIO. We tend to find that when it's potentially buried in the CIO's organization, you lose a little of that autonomy in terms of decision-making, so if you're able to position as partners and drive that transformation for your organization forward together, that can often work quite well. >> So that partnership, is it, I mean ideally, it is collaborative and collegial, but is it ever, are there ever tensions there and how do you recommend the companies get over, overcome those obstacles? >> Absolutely, in the fight for resources that we all have, especially talent and retaining some of our top talent, should that individual or those teams sit within a CIO's organization or a CDO's organization? How do we figure that out? I think there's always going to be the challenge of who owns what. We joke, sometimes, it feels like you own everything when you're in the data space, because you own all of the data that flows through, all your business processes, both CDO-owned and corporate HR's supply chain finance. Sometimes it feels you don't own anything. And so we joke that it's, you have to really carve that out. I think the important part is to really articulate what the data strategy is, what the CDO or enterprise data management office owns from a data perspective and then building up that platform and do it in partnership with your CIO team. And then you really start to be able to build and deploy those AI applications off that platform. That's what we've been able to see, so. >> I want to go back to something Sonia said this morning during the keynote, you talked about IBM's master metadata list catalog unifying your organization around a certain set of terms. There's 6,000 terms in that catalog. Now, how did you arrive at 6,000? And what are some rules for an organization trying to do something like that? How defined, how small should that sub-terms be? >> Sure. Well, we started off with a traditional approach which is probably something that most companies are familiar with these days. The traditional process was really just based on basically reaching out to a large number of subject matter experts across the enterprise that represent in many different data domains such as customer, offering, financial, etc. And essentially having them label this data, specifically with the business metadata that's used internally across a company. Now, another example to that is that there are different organizations across the company. We are a worldwide company. And so, what one business might call a particular piece of data, which is customer, another might call it client. Which really ended up being this very large list of 6,000 business terms which is what we're using internally. But one thing that we're trying to do to be able to kind to basically connect the different business terms is leverage knowledge management and specifically ontological relationships to be able to link the data together and make it more reasonable and provide better quality with that. >> What are the things that you were talking about, Interpol was talking about on the main stage too during the keynote, was making sure that the data is telling a story because getting by in is one of the biggest challenges. How do you recommend companies think about this and approach this very big daunting task? >> I'll start and then I'm sure you have a perspective as well. One of the things that we've seen internally and I work with my client on, is every project we initiate, we really want strong sponsorship from the business in terms of funding, making sure that the right decision-makers are involved. We've identified some projects for example, that we've been able to deploy around supply chains. So identifying the risk on our supply chain processes. Some of the risks in sites, we're going to demo a little bit later today. The AMG work that Sonia's leading. And all of those efforts are underway in partnership with the business. One of my favorite ones is around enabling our sellers to better understand information about, and data, about the customers. So like most organizations, customer data is housed in silo systems that don't necessarily talk well with each other, and so it's an effort to really pull that data together in partnership with our digital sellers and enable them to then pull up user interface, user-friendly, an app where they can identify and drill down to the types of information they need about their customers. And so our thought and recommendation based on our experience and then what I'm seeing is really having that strong partnership with the business. And the contribution funding, stakeholder involvement, engagement, and then you start to prioritize where you'll have the most impact. >> You did a program called the AI accelerator. What is that? >> We did, so when we stood up our first chief data office, it was three years ago now, we wanted to be quite transparent about the journey of driving cognition through our enterprise. And we were really targeting those CDO and processes around client master product data and then all of our enterprise processes. So that first six months was about writing the data strategy and implementing that, next we spent a year on all of our processes, really mapping out, we call it journey mapping, I think a lot of folks do that, by process. So HR, supply chain, identifying ways. How it's done today, how it will be done in a cognitive AI like future state. And then also, as we're driving out those efficiencies in automation, those reinvestment opportunities to free up that money for future initiatives. And so that was the first year, year and a half. And now, we're at the point where we've evolved far enough along that we think we're learned some lessons on the way and there's been some hurdles and stumbling blocks and obstacles. And so a year ago, we really start a cognitive enterprise blueprint and that was really intended to reflect all of our experiences, driving that transformation. A lot of customer engagements, lot of industry analysts feedback as well. And now we formalized that initiative. So now I have a really fantastic team of folks working with me. Subject matter domain expertise, really deep in different processes, solutions, folks, architects. And what we can do is pull together the right breadth and depth of IBM resources. Deploy it, customize it to customer need and really, hopefully, accelerate and apply a lot of what we've learned, lot of what the clients have learned, to accelerate their own AI transformation journey. >> But AI, IBM is the guinea pig and it showcase. And so you're learning as you go and helping customers do that too. >> Exactly and we've now built our platform, deployed that, as we mentioned, we've got about 30,000 active users, active users, using our platform. Plan to grow to 100,000. We're seeing about 600 million in business benefit internally from the work we've done. And so we want to really share that and do some good, best practice sharing and accelerate some of that process. >> IBM used the term cognitive rather than AI. What is the difference or is there one? >> I think we're starting actually to shift from cognitive to AI because of that exact perspective. AI, I think is better understood in the industry, in the market and that's what's resonating more so with clients and I think it's more reflective of what we're doing. And our particular approach is human in the loop. So we've always said rather than the black box sort of AI algorithms running behind the scenes, we want to make sure that we do that with trust and transparency, so there's a real transparency aspect to what we're doing. And the other thing I would notice, we talk about sort of your data is your data. Insights derive from that data is your insights. So we've worked quite closely with our legal teams to really articulate how your data is used. If you engage and partner with us to drive AI in your enterprise, making sure we have that trust and transparency (mumbles) clearly articulated is another important aspect for us. >> Getting right back to data governance. >> Right, right, exactly. Which is our we've come full circle. >> Well Caitlin and Sonia, thank you so much for coming on the CUBE, it was great. Great to kick off this summit together. >> Great to see you again, as always. >> I'm Rebecca Knight for Paul Gillin, stay tuned for more of the CUBE's live coverage of IBM CDO Summit here in Boston. (techno music)
SUMMARY :
Live from Boston, it's the CUBE. and Sonia Mezzetta, the data governance and just the kinds of people who come here. And the role has grown and evolved. How does that affect the relationship, And at that time, we interviewed 22 individuals I want to bring you into the conversation Sonia, And so one of the things that we did there but I imagine for a lot of people outside of the CIO And the other aspect to that is data quality the sheer number of CDOs that we have. And oftentimes, we start with the data strategy And especially for organizations that recognize the need And so we joke that it's, you have to really carve that out. during the keynote, you talked about IBM's master metadata the data together and make it more reasonable What are the things that you were talking about, And the contribution funding, stakeholder involvement, You did a program called the AI accelerator. And so that was the first year, year and a half. But AI, IBM is the guinea pig and it showcase. And so we want to really share that and do some good, What is the difference or is there one? And our particular approach is human in the loop. Which is our for coming on the CUBE, it was great. for more of the CUBE's live coverage
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
Rebecca Knight | PERSON | 0.99+ |
Sonia Mezzetta | PERSON | 0.99+ |
Paul Gillin | PERSON | 0.99+ |
2014 | DATE | 0.99+ |
IBM | ORGANIZATION | 0.99+ |
Caitlin Halferty | PERSON | 0.99+ |
Sonia | PERSON | 0.99+ |
Caitlin | PERSON | 0.99+ |
Chicago | LOCATION | 0.99+ |
Boston | LOCATION | 0.99+ |
Gartner | ORGANIZATION | 0.99+ |
2019 | DATE | 0.99+ |
22 individuals | QUANTITY | 0.99+ |
6,000 terms | QUANTITY | 0.99+ |
two guests | QUANTITY | 0.99+ |
Denver | LOCATION | 0.99+ |
thousands | QUANTITY | 0.99+ |
today | DATE | 0.99+ |
one | QUANTITY | 0.99+ |
San Francisco | LOCATION | 0.99+ |
6,000 business | QUANTITY | 0.99+ |
first event | QUANTITY | 0.99+ |
100,000 | QUANTITY | 0.99+ |
90% | QUANTITY | 0.99+ |
Boston, Massachusetts | LOCATION | 0.99+ |
6,000 | QUANTITY | 0.99+ |
a year | QUANTITY | 0.99+ |
Interpol | ORGANIZATION | 0.99+ |
AMG | ORGANIZATION | 0.99+ |
140 | QUANTITY | 0.99+ |
a year ago | DATE | 0.99+ |
first day | QUANTITY | 0.99+ |
One | QUANTITY | 0.99+ |
both | QUANTITY | 0.98+ |
4 p.m. | DATE | 0.98+ |
three years ago | DATE | 0.98+ |
one business | QUANTITY | 0.98+ |
about 600 million | QUANTITY | 0.98+ |
Forrester | ORGANIZATION | 0.98+ |
first six months | QUANTITY | 0.96+ |
ninth summit | QUANTITY | 0.96+ |
about 30,000 active users | QUANTITY | 0.96+ |
about 20 | QUANTITY | 0.96+ |
IBM Chief Data Officer Summit | EVENT | 0.94+ |
IBM Chief Data Officer Summit | EVENT | 0.94+ |
MNA | ORGANIZATION | 0.93+ |
IBM CDO Summit | EVENT | 0.93+ |
last four years | DATE | 0.92+ |
IBM CDO Fall Summit 2018 | EVENT | 0.89+ |
30 attendees | QUANTITY | 0.87+ |
first chief data office | QUANTITY | 0.85+ |
year and a half | QUANTITY | 0.82+ |
CUBE | ORGANIZATION | 0.81+ |
first year | QUANTITY | 0.81+ |
this morning | DATE | 0.78+ |
last two weeks | DATE | 0.72+ |
things | QUANTITY | 0.65+ |
CUBE | EVENT | 0.45+ |
John Thomas, IBM | IBM CDO Fall Summit
live from Boston it's the cube covering IBM chief data officer summit brought to you by IBM welcome back everyone to the cubes live coverage of the IBM CDO summit here in Boston Massachusetts I'm your host Rebecca Knight and I'm joined by co-host Paul Gillan we have a guest today John Thomas he is the distinguished engineer and director at IBM thank you so much for coming returning to the cube you're a cube veteran so tell our viewers a little bit about your distinguished engineer there are only 672 in all of IBM what do you do what is your role that's a good question distinguished engineer is kind of a technical execute a role which is a combination of applying the technology skills as well as helping shape by the inscriber gene in a technical way working with clients etcetera right so it is it is a bit of a jack-of-all-trades but also deep skills in some specific areas and I love what I do so you get to work with some very talented people brilliant people in terms of shaping IBM technology and strategy products for energy that is part of it we also work very closely with clients in terms of how do you apply that technology in the context of the clients use cases we've heard a lot today about soft skills the importance of organizational people skills to being a successful chief data officer but there's still a technical component how important is the technical side what is what are the technical skills that the cdos need oh this is a very good question Paul so absolutely so navigating the organizational structure is important it's a soft skill you're absolutely right and being able to understand the business strategy for the company and then aligning your data strategy to the business strategy is important right but the underlying technical pieces need to be solid so for example how do you deal with large volumes of different types of data spread across the company how do you manage the data how do you understand the data how do you govern that data how do you then mast are leveraging the value of the data in the context of your business right so and understand deep understanding of the technology of collecting organizing and analyzing that data is needed for you to be a success for CBL so in terms of in terms of those skill sets that you're looking for and one of the things that Interpol said earlier in his keynote is that they're just it's a rare individual who truly understands the idea of how to collect store analyze curate eyes monetize the data and then also has the the soft skills of being able to navigate the organization being able to be a change agent is inspiring yeah inspiring the rank-and-file yeah how do you recruit and retain talent it seems to be a major tech expertise is not getting the right expertise in place and Interpol talked about it in his keynote which was the very first thing he did was bring in Terrence sometimes it is from outside of your company maybe you have a kind of talent that has grown up in your company maybe you have to go outside buddy God bring in the right skills together form the team that understands the technology and the business side of things and build esteem and that is essential for you to be a successful CTO and to some extent that's what Interpol has done that's what the analytic CEOs office has done a set up in my boss is the analytics EDF and he and the analytic CDO team actually engineering skills data science skills visualization skills and then put this team together which understands the how to collect govern curate and analyze the data and then apply them in specific situations a lot of talk about AI at this conference what seems to be finally happening what do you see in the field or perhaps projects that you've worked on examples of AI that are really having a meaningful business impact yeah Paul it's a very good question because you know the term AI is overused a lot as you can imagine a lot of hype around it but I think we are past that hype cycle and people are looking at how do i implement successful use cases and I stressed the word use case right in my experience these how I'm going to transform my business in one big boil the ocean exercise does not work but if you have a very specific bounded use case that you can identify the business tells you this is relevant the business tells you what the metrics for success are and then you focus your your attention your your efforts on that specific use case with the skills need for that use case then it's successful so you know examples of use cases from across the industries right I mean everything that you can think of customer-facing examples like how do I read the customers mind so when when if I'm a business and I interact with my customers can I anticipate what the customer is looking for maybe for a cross-sell opportunity or maybe to reduce the call handling time and a customer calls in to my call center or trying to segment my customer so I can do a proper promotion or a campaign for that customer all of these are specific customer facing examples there are also examples of applying this internally to improve processes capacity planning for your infrastructure can I predict when a system is likely to have an outage and or can I predict the traffic coming into my systems into my infrastructure and provision capacity that on-demand so all these are interesting applications of AI in the enterprise so when you're trying I mean one of the things we keep hearing is that we need data to tell a story the data needs to the data needs to be compelling enough so that the people the data scientists get it but then also that the other kinds of business decision makers get it - so what are sort of the best practices that have emerged from your experience in terms of being able to for your data to tell the story that you wanted to tell yeah well I mean if the pattern doesn't exist in the data then no amount of fancy algorithms can help you know so and sometimes it's like searching for a needle in a haystack but assuming I guess the first step is like I said what is the a use case once you have a clear understanding of your use case and success metrics for the use case do you have the data to support that use case so for example if it's fraud detection do you actually have the historical data to support the fraud use case sometimes you may have transactional data from your your transaction data from your current or PI systems but that may not be enough you may need to augment it with external data third party data may be unstructured data that goes along with the transaction data so question is can you identify the data that is needed to support the use case and if so can I do is that data clean is that is that data do you understand the lineage of the data who has touched and modified the data who owns the data so that I can then start building predictive models and machine learning be planning models with that data so use case do you have the data to support the use case do you understand how the data reached you then comes the process of applying machine learning algorithms and deep learning algorithms against that data one of the risks of machine learning and particularly deep learning I think is it becomes kind of a black box and people can fall into the trap of just believing what comes back regardless of whether the algorithms are really sound or the data is somewhat what is the responsibility of data scientists to sort of show their work yeah Paul this is a fascinating and not completely solved area right so bias detection can I explain how my model behaved can I ensure that the models are fair in their predictions so there's a lot of research lot of innovation happening in the space iBM is investing a lot in the space we call trust and transparency being able to explain a model it's got multiple levels to it you need some level of AI governments itself so just like we talked about data governance there is the notion of AI governance which is what version of the model was used to make a prediction what were the inputs that went into that model what were the decisions that are that what were the features that were used to make a certain prediction what was the prediction and how did that match up with ground truth you need to be able to capture all that information but beyond that we have got actual mechanisms in place that IBM Research is developing to look at bias detection so pre-processing during execution post-processing can I look for bias in how my models behave and do I have mechanisms to mitigate that so one example is the open source Python library called AI F 360 that comes from IBM's research on its contributor to the open source community you can look at there are mechanisms to look at bias and and and provide some level of bias mitigation as part of your model building exercises and is the bias mitigation does it have to do with and I'm gonna use an IBM term of art here at the human in the loop I mean is how much are you actually looking at the humans that are part of this process humans are at least at this point in time humans are very much in the loop this this notion of P or AI where humans are completely outside the loop is we're not there yet so very much something that the system can it provide a set of recommendations can it provide a set of explanations in can someone who understands the business look at it and make corrective take corrective action as needed there has been however to Rebecca's point some prominent people including Bill Gates who have have speculated that AI could ultimately be a negative for humans are what is the responsibility of companies like IBM to ensure that humans are kept in the loop I think at least at this point IBM's V was humans are an essential part of AI in fact we don't even use the term artificial intelligence that much we call it augmented intelligence where the system is presenting a set of recommendations expert advice to the human who can then make a decision so for example you know my team worked with a prominent healthcare provider on you know models for predicting patient death death in in the case of sepsis sepsis onset this is we're talking literally life and death decisions being made and this is not something that you can just automate and throw it into a magic black box and have a decision be made right so this is absolutely a place where people with deep domain knowledge are supported are augmented with with AI to make better decisions that's where that's where I think we are today as to what will happen five years from now I can't predict that yet the role so you are helping doctors make these decisions not just this is what the computer program says about this patients symptoms here but this is really you're helping the doctor make better decisions what about the doctors gut and the ease into his or her intuition too I mean what is what is the role of that in the future I think it goes away I mean I think the intuition really will be trumped by data in the long term because you can't argue with the facts much as some some people do these days the perspective on that is there will there all should there always be a human on the front lines who is being supported by the backend or would would you see a scenario where an AI is making decisions customer-facing decisions that are really are life and death so I think in the consumer industry I can definitely see AI making decisions on its own right so you know if let's say a recommender system which says you know I think you know John Thomas bought these last five things online he's likely to buy this other thing let's make an offer team you know I don't even in the loop for no harm it's it's it's it's pretty straightforward it's already happening in a big way but when it comes to some of these mortgage yeah about that one even that I think can be can be automated can be automated if the thresholds are said to be what the business is comfortable with where it says okay about this probability level I don't really need a human to look at this but and if it is below this level I do want someone to look at this that's you know that is relatively straightforward right but if it is a decision about you know life-or-death situations or something that affects the the very fabric of the business that you are in then you probably want to domain expert to look at it and most enterprises enterprise use cases will for lean towards that category these are big questions they're hard questions are questions yes well John thank you so much oh absolutely thank you we've really had a great time with you yeah thank you for having me I'm Rebecca night for Paul Gillen we will have more from the cubes live coverage of IBM CDO here in Boston just after this
**Summary and Sentiment Analysis are not been shown because of improper transcript**
ENTITIES
Entity | Category | Confidence |
---|---|---|
Rebecca Knight | PERSON | 0.99+ |
Paul Gillan | PERSON | 0.99+ |
John Thomas | PERSON | 0.99+ |
John | PERSON | 0.99+ |
Bill Gates | PERSON | 0.99+ |
Rebecca | PERSON | 0.99+ |
IBM | ORGANIZATION | 0.99+ |
Paul Gillen | PERSON | 0.99+ |
John Thomas | PERSON | 0.99+ |
Boston | LOCATION | 0.99+ |
Paul | PERSON | 0.99+ |
IBM Research | ORGANIZATION | 0.99+ |
Python | TITLE | 0.99+ |
first step | QUANTITY | 0.98+ |
today | DATE | 0.97+ |
Interpol | ORGANIZATION | 0.97+ |
first thing | QUANTITY | 0.97+ |
one | QUANTITY | 0.95+ |
Boston Massachusetts | LOCATION | 0.94+ |
one example | QUANTITY | 0.94+ |
672 | QUANTITY | 0.93+ |
five things | QUANTITY | 0.92+ |
Interpol | PERSON | 0.92+ |
CBL | ORGANIZATION | 0.83+ |
IBM CDO summit | EVENT | 0.83+ |
EDF | ORGANIZATION | 0.82+ |
sepsis | OTHER | 0.81+ |
AI F 360 | TITLE | 0.78+ |
Terrence | LOCATION | 0.78+ |
iBM | ORGANIZATION | 0.77+ |
chief data officer | EVENT | 0.74+ |
lot of | QUANTITY | 0.7+ |
CDO Fall Summit | EVENT | 0.66+ |
five years | DATE | 0.58+ |
CDO | TITLE | 0.24+ |
Red Hat Summit 2018 | Day 2 | AM Keynote
[Music] [Music] [Music] [Music] [Music] [Music] that will be successful in the 21st century [Music] being open is really important because it comes with a lot of trust the open-source community now has matured so much and that contribution from the community is really driving innovation [Music] but what's really exciting is the change that we've seen in our teams not only the way they collaborate but the way they operate in the way they work [Music] I think idea is everything ideas can change the way you see things open-source is more than a license it's actually a way of operating [Music] ladies and gentlemen please welcome Red Hat president and chief executive officer Jim Whitehurst [Music] all right well welcome to day two at the Red Hat summit I'm amazed to see this many people here at 8:30 in the morning given the number of people I saw pretty late last night out and about so thank you for being here and have to give a shout out speaking of power participation that DJ is was Mike Walker who is our global director of open innovation labs so really enjoyed that this morning was great to have him doing that so hey so day one yesterday we had some phenomenal announcements both around Red Hat products and things that we're doing as well as some great partner announcements which we found exciting I hope they were interesting to you and I hope you had a chance to learn a little more about that and enjoy the breakout sessions that we had yesterday so yesterday was a lot about the what with these announcements and partnerships today I wanted to spin this morning talking a little bit more about the how right how do we actually survive and thrive in this digitally transformed world and to some extent the easy parts identifying the problem we all know that we have to be able to move more quickly we all know that we have to be able to react to change faster and we all know that we need to innovate more effectively all right so the problem is easy but how do you actually go about solving that right the problem is that's not a product that you can buy off the shelf right it is a capability that you have to build and certainly it's technology enabled but it's also depends on process culture a whole bunch of things to figure out how we actually do that and the answer is likely to be different in different organizations with different objective functions and different starting points right so this is a challenge that we all need to feel our way to an answer on and so I want to spend some time today talking about what we've seen in the market and how people are working to address that and it's one of the reasons that the summit this year the theme is ideas worth it lorring to take us back on a little history lesson so two years ago here at Moscone the theme of the summit was the power of participation and then I talked a lot about the power of groups of people working together and participating are able to solve problems much more quickly and much more effectively than individuals or even individual organizations working by themselves and some of the largest problems that we face in technology but more broadly in the world will ultimately only be solved if we effectively participate and work together then last year the theme of the summit was the impact of the individual and we took this concept of participation a bit further and we talked about how participation has to be active right it's a this isn't something where you can be passive that you can sit back you have to be involved because the problem in a more participative type community is that there is no road map right you can't sit back and wait for an edict on high or some central planning or some central authority to tell you what to do you have to take initiative you have to get involved right this is a active participation sport now one of the things that I talked about as part of that was that planning was dead and it was kind of a key my I think my keynote was actually titled planning is dead and the concept was that in a world that's less knowable when we're solving problems in a more organic bottom-up way our ability to effectively plan into the future it's much less than it was in the past and this idea that you're gonna be able to plan for success and then build to it it really is being replaced by a more bottom-up participative approach now aside from my whole strategic planning team kind of being up in arms saying what are you saying planning is dead I have multiple times had people say to me well I get that point but I still need to prepare for the future how do I prepare my organization for the future isn't that planning and so I wanted to spend a couple minutes talk a little more detail about what I meant by that but importantly taking our own advice we spent a lot of time this past year looking around at what our customers are doing because what a better place to learn then from large companies and small companies around the world information technology organizations having to work to solve these problems for their organizations and so our ability to learn from each other take the power of participation an individual initiative that people and organizations have taken there are just so many great learnings this year that I want to get a chance to share I also thought rather than listening to me do that that we could actually highlight some of the people who are doing this and so I do want to spend about five minutes kind of contextualizing what we're going to go through over the next hour or so and some of the lessons learned but then we want to share some real-world stories of how organizations are attacking some of these problems under this how do we be successful in a world of constant change in uncertainty so just going back a little bit more to last year talking about planning was dead when I said planning it's kind of a planning writ large and so that's if you think about the way traditional organizations work to solve problems and ultimately execute you start off planning so what's a position you want to get to in X years and whether that's a competitive strategy in a position of competitive advantage or a certain position you want an organizational function to reach you kind of lay out a plan to get there you then typically a senior leaders or a planning team prescribes the sets of activities and the organization structure and the other components required to get there and then ultimately execution is about driving compliance against that plan and you look at you say well that's all logical right we plan for something we then figure out how we're gonna get there we go execute to get there and you know in a traditional world that was easy and still some of this makes sense I don't say throw out all of this but you have to recognize in a more uncertain volatile world where you can be blindsided by orthogonal competitors coming in and you the term uber eyes you have to recognize that you can't always plan or know what the future is and so if you don't well then what replaces the traditional model or certainly how do you augment the traditional model to be successful in a world that you knows ambiguous well what we've heard from customers and what you'll see examples of this through the course of this morning planning is can be replaced by configuring so you can configure for a constant rate of change without necessarily having to know what that change is this idea of prescription of here's the activities people need to perform and let's lay these out very very crisply job descriptions what organizations are going to do can be replaced by a greater degree of enablement right so this idea of how do you enable people with the knowledge and things that they need to be able to make the right decisions and then ultimately this idea of execution as compliance can be replaced by a greater level of engagement of people across the organization to ultimately be able to react at a faster speed to the changes that happen so just double clicking in each of those for a couple minutes so what I mean by configure for constant change so again we don't know exactly what the change is going to be but we know it's going to happen and last year I talked a little bit about a process solution to that problem I called it that you have to try learn modify and what that model try learn modify was for anybody in the app dev space it was basically taking the principles of agile and DevOps and applying those more broadly to business processes in technology organizations and ultimately organizations broadly this idea of you don't have to know what your ultimate destination is but you can try and experiment you can learn from those things and you can move forward and so that I do think in technology organizations we've seen tremendous progress even over the last year as organizations are adopting agile endeavor and so that still continues to be I think a great way for people to to configure their processes for change but this year we've seen some great examples of organizations taking a different tack to that problem and that's literally building modularity into their structures themselves right actually building the idea that change is going to happen into how you're laying out your technology architectures right we've all seen the reverse of that when you build these optimized systems for you know kind of one environment you kind of flip over two years later what was the optimized system it's now called a legacy system that needs to be migrated that's an optimized system that now has to be moved to a new environment because the world has changed so again you'll see a great example of that in a few minutes here on stage next this concept of enabled double-clicking on that a little bit so much of what we've done in technology over the past few years has been around automation how do we actually replace things that people were doing with technology or augmenting what people are doing with technology and that's incredibly important and that's work that can continue to go forward it needs to happen it's not really what I'm talking about here though enablement in this case it's much more around how do you make sure individuals are getting the context they need how are you making sure that they're getting the information they need how are you making sure they're getting the tools they need to make decisions on the spot so it's less about automating what people are doing and more about how can you better enable people with tools and technology now from a leadership perspective that's around making sure people understand the strategy of the company the context in which they're working in making sure you've set the appropriate values etc etc from a technology perspective that's ensuring that you're building the right systems that allow the right information the right tools at the right time to the right people now to some extent even that might not be hard but when the world is constantly changing that gets to be even harder and I think that's one of the reasons we see a lot of traction and open source to solve these problems to use flexible systems to help enterprises be able to enable their people not just in it today but to be flexible going forward and again we'll see some great examples of that and finally engagement so again if execution can't be around driving compliance to a plan because you no longer have this kind of Cris plan well what do leaders do how do organizations operate and so you know I'll broadly use the term engagement several of our customers have used this term and this is really saying well how do you engage your people in real-time to make the right decisions how do you accelerate a pace of cadence how do you operate at a different speed so you can react to change and take advantage of opportunities as they arise and everywhere we look IT is a key enabler of this right in the past IT was often seen as an inhibitor to this because the IT systems move slower than the business might want to move but we are seeing with some of these new technologies that literally IT is becoming the enabler and driving the pace of change back on to the business and you'll again see some great examples of that as well so again rather than listen to me sit here and theoretically talk about these things or refer to what we've seen others doing I thought it'd be much more interesting to bring some of our partners and our customers up here to specifically talk about what they're doing so I'm really excited to have a great group of customers who have agreed to stand in front of 7,500 people or however many here this morning and talk a little bit more about what they're doing so really excited to have them here and really appreciate all them agreeing to be a part of this and so to start I want to start with tee systems we have the CEO of tee systems here and I think this is a great story because they're really two parts to it right because he has two perspectives one is as the CEO of a global company itself having to navigate its way through digital disruption and as a global cloud service provider obviously helping its customers through this same type of change so I'm really thrilled to have a del hasta li join me on stage to talk a little bit about T systems and what they're doing and what we're doing jointly together so Adelle [Music] Jim took to see you Adele thank you for being here you for having me please join me I love to DJ when that fantastic we may have to hire him no more events for events where's well employed he's well employed though here that team do not give him mics activation it's great to have you here really do appreciate it well you're the CEO of a large organization that's going through this disruption in the same way we are I'd love to hear a little bit how for your company you're thinking about you know navigating this change that we're going through great well you know key systems as an ICT service provider we've been around for decades I'm not different to many of our clients we had to change the whole disruption of the cloud and digitization and new skills and new capability and agility it's something we had to face as well so over the last five years and especially in the last three years we invested heavily invested over a billion euros in building new capabilities building new offerings new infrastructures to support our clients so to be very disruptive for us as well and so and then with your customers themselves they're going through this set of change and you're working to help them how are you working to help enable your your customers as they're going through this change well you know all of them you know in this journey of changing the way they run their business leveraging IT much more to drive business results digitization and they're all looking for new skills new ideas they're looking for platforms that take them away from traditional waterfall development that takes a year or a year and a half before they see any results to processes and ways of bringing applications in a week in a month etcetera so it's it's we are part of that journey with them helping them for that and speaking of that I know we're working together and to help our joint customers with that can you talk a little bit more about what we're doing together sure well you know our relationship goes back years and years with with the Enterprise Linux but over the last few years we've invested heavily in OpenShift and OpenStack to build peope as layers to build you know flexible infrastructure for our clients and we've been working with you we tested many different technology in the marketplace and been more successful with Red Hat and the stack there and I'll give you an applique an example several large European car manufacturers who have connected cars now as a given have been accelerating the applications that needed to be in the car and in the past it took them years if not you know scores to get an application into the car and today we're using open shift as the past layer to develop to enable these DevOps for these companies and they bring applications in less than a month and it's a huge change in the dynamics of the competitiveness in the marketplace and we rely on your team and in helping us drive that capability to our clients yeah do you find it fascinating so many of the stories that you hear and that we've talked about with with our customers is this need for speed and this ability to accelerate and enable a greater degree of innovation by simply accelerating what what we're seeing with our customers absolutely with that plus you know the speed is important agility is really critical but doing it securely doing it doing it in a way that is not gonna destabilize the you know the broader ecosystem is really critical and things like GDP are which is a new security standard in Europe is something that a lot of our customers worry about they need help with and we're one of the partners that know what that really is all about and how to navigate within that and use not prevent them from using the new technologies yeah I will say it isn't just the speed of the external but the security and the regulation especially GDR we have spent an hour on that with our board this week there you go he said well thank you so much for being here really to appreciate the work that we're doing together and look forward to continued same here thank you thank you [Applause] we've had a great partnership with tea systems over the years and we've really taken it to the next level and what's really exciting about that is you know we've moved beyond just helping kind of host systems for our customers we really are jointly enabling their success and it's really exciting and we're really excited about what we're able to to jointly accomplish so next i'm really excited that we have our innovation award winners here and we'll have on stage with us our innovation award winners this year our BBVA dnm IAG lasat Lufthansa Technik and UPS and yet they're all working in one for specific technology initiatives that they're doing that really really stand out and are really really exciting you'll have a chance to learn a lot more about those through the course of the event over the next couple of days but in this context what I found fascinating is they were each addressing a different point of this configure enable engage and I thought it would be really great for you all to hear about how they're experimenting and working to solve these problems you know real-time large organizations you know happening now let's start with the video to see what they think about when they think about innovation I define innovation is something that's changing the model changing the way of thinking not just a step change improvement not just making something better but actually taking a look at what already exists and then putting them together in new and exciting lives innovation is about to build something nobody has done before historically we had a statement that business drives technology we flip that equation around an IT is now demonstrating to the business at power of technology innovation desde el punto de vista de la tecnologÃa supone salir de plataform as proprietary as ADA Madero cloud basado an open source it's a possibility the open source que no parameter no sir Kamala and I think way that for me open-source stands for flexibility speed security the community and that contribution from the community is really driving innovation innovation at a pace that I don't think our one individual organization could actually do ourselves right so first I'd like to talk with BBVA I love this story because as you know Financial Services is going through a massive set of transformations and BBVA really is at the leading edge of thinking about how to deploy a hybrid cloud strategy and kind of modular layered architecture to be successful regardless of what happens in the future so with that I'd like to welcome on stage Jose Maria Rosetta from BBVA [Music] thank you for being here and congratulations on your innovation award it's been a pleasure to be here with you it's great to have you hi everybody so Josemaria for those who might not be familiar with BBVA can you give us a little bit of background on your company yeah a brief description BBVA is is a bank as a financial institution with diversified business model and that provides well financial services to more than 73 million of customers in more than 20 countries great and I know we've worked with you for a long time so we appreciate that the partnership with you so I thought I'd start with a really easy question for you how will blockchain you know impact financial services in the next five years I've gotten no idea but if someone knows the answer I've got a job for him for him up a pretty good job indeed you know oh all right well let me go a little easier then so how will the global payments industry change in the next you know four or five years five years well I think you need a a Weezer well I tried to make my best prediction means that in five years just probably will be five years older good answer I like that I always abstract up I hope so I hope so yah-yah-yah hope so good point so you know immediately that's the obvious question you have a massive technology infrastructure is a global bank how do you prepare yourself to enable the organization to be successful when you really don't know what the future is gonna be well global banks and wealth BBBS a global gam Bank a certain component foundations you know today I would like to talk about risk and efficiency so World Bank's deal with risk with the market great the operational reputational risk and so on so risk control is part of all or DNA you know and when you've got millions of customers you know efficiency efficiency is a must so I think there's no problem with all these foundations they problem the problem analyze the problems appears when when banks translate these foundations is valued into technology so risk control or risk management avoid risk usually means by the most expensive proprietary technology in the market you know from one of the biggest software companies in the world you know so probably all of you there are so those people in the room were glad to hear you say that yeah probably my guess the name of those companies around San Francisco most of them and efficiency usually means a savory business unit as every department or country has his own specific needs by a specific solution for them so imagine yourself working in a data center full of silos with many different Hardware operating systems different languages and complex interfaces to communicate among them you know not always documented what really never documented so your life your life in is not easy you know in this scenario are well there's no room for innovation so what's been or or strategy be BES ready to move forward in this new digital world well we've chosen a different approach which is quite simple is to replace all local proprietary system by a global platform based on on open source with three main goals you know the first one is reduce the average transaction cost to one-third the second one is increase or developers productivity five times you know and the third is enable or delete the business be able to deliver solutions of three times faster so you're not quite easy Wow and everything with the same reliability as on security standards as we've got today Wow that is an extraordinary set of objectives and I will say their world on the path of making that successful which is just amazing yeah okay this is a long journey sometimes a tough journey you know to be honest so we decided to partnership with the with the best companies in there in the world and world record we think rate cut is one of these companies so we think or your values and your knowledge is critical for BBVA and well as I mentioned before our collaboration started some time ago you know and just an example in today in BBVA a Spain being one of the biggest banks in in the country you know and using red hat technology of course our firm and fronting architecture you know for mobile and internet channels runs the ninety five percent of our customers request this is approximately 3,000 requests per second and our back in architecture execute 70 millions of business transactions a day this is almost a 50% of total online transactions executed in the country so it's all running yes running I hope so you check for you came on stage it's I'll be flying you know okay good there's no wood up here to knock on it's been a really great partnership it's been a pleasure yeah thank you so much for being here thank you thank you [Applause] I do love that story because again so much of what we talk about when we when we talk about preparing for digital is a processed solution and again things like agile and DevOps and modular izing components of work but this idea of thinking about platforms broadly and how they can run anywhere and actually delivering it delivering at a scale it's just a phenomenal project and experience and in the progress they've made it's a great team so next up we have two organizations that have done an exceptional job of enabling their people with the right information and the tools they need to be successful you know in both of these cases these are organizations who are under constant change and so leveraging the power of open-source to help them build these tools to enable and you'll see it the size and the scale of these in two very very different contexts it's great to see and so I'd like to welcome on stage Oh smart alza' with dnm and David Abraham's with IAG [Music] Oh smart welcome thank you so much for being here Dave great to see you thank you appreciate you being here and congratulations to you both on winning the Innovation Awards thank you so Omar I really found your story fascinating and how you're able to enable your people with data which is just significantly accelerated the pace with which they can make decisions and accelerate your ability to to act could you tell us a little more about the project and then what you're doing Jim and Tina when the muchisimas gracias por ever say interesado pono true projecto [Music] encargado registry controller las entradas a leda's persona por la Frontera argentina yo sé de dos siento treinta siete puestos de contrôle tienen lo largo de la Frontera tanto area the restreamer it EEMA e if looool in dilute ammonia shame or cinta me Jonas the tránsito sacra he trod on in another Fronteras dingus idea idea de la Magneto la cual estamos hablando la Frontera cantina tienen extension the kin same in kilo metros esto es el gada mint a maje or allege Estancia kaeun a poor carretera a la co de mexico con el akka a direction emulation s tambien o torgul premios de de residencia control a la permanencia de los rancheros en argentina pero básicamente nuestra área es prevenir que persona que estén in curie end o en delito transnational tipo pero remo trata de personas tráfico de armas sunday muy gravis SI yo que nosotros a Samos es para venir aquà es uno para que nadie meso and he saw some vetoes pueden entrada al Argentine establecer see not replaceable Terry Antone see koalas jenner are Yap liquor make animo para que - no Korra NL Angelo Millie see sighs a partir de la o doc mil DC says turmoil affirm a decision de cambiar de un sistema reactive Oh foreign c'est un sistema predict TiVo say Previn TiVo yes I don't empezamos s target area con el con las Judah in appreciable de la gente del canto la tarea el desafÃo era integra todo es desconocido vasa de datos propias estructura Radha's no instruct Radha's propias del organ is mo y de otros Organa Mo's del estado y tambien integral akan el mundo si si si como cinta yo el lo controls the Interpol o empezamos @n información anticipable pasajeros a travell CT ma p tambien intent ahmo's controller latrans Sybilla de en los happiness a través de en er de todo esto fue possible otra vez de la generation dune irreparable econo penchev y la virtualization de datos si esto fue fundamental por que entra moseyin una schema se en un modelo de intelligent a artificial eden machine learning KD o por resultado jimmy esto que todas esas de datos integral as tanto Nacional como Internacional A's le provision a nuestros nuestras an Aleta que antes del don't build Isis ice tenÃan que buscar say información integral Adel diferentes sistema z-- c yatin de Chivo manuals tarde Ando auras odious en algunos casos a tener toda la información consolidate a integra dope or poor pasajero en tiempo real esto que hizo mejor Oh el tiempo y la calidad de la toma de decisiones de nuestros durante la gente / dueño and affinity regime de lo que se trata esto es simplemente mejor our la calidad de vida de atras de mettre personas SI y meet our que el delito perform a trois Natura from Dana's Argentine sigue siendo en favor de esto SI temes uno de los paÃses mess Alberto's Allah immigration en Latin America yah hora con una plataforma mas segunda first of all I want to thank you for the interest is played for our project the National migration administration or diem records the entry and exit of people on the Argentine territory it grants residents permits to foreigners who wish to live in our country through 237 entry points land air border sea and river ways Jim dnm registered over 80 million transits throughout last year Argentine borders cover about 15,000 kilometers just our just to give you an idea of the magnitude of our borders this is greater than the distance on a highway between Mexico City and Alaska our department applies the mechanisms that prevent the entry and residents of people involved in crimes like terrorism trafficking of persons weapons drugs and others in 2016 we shifted to a more preventive and predictive paradigm that is how Sam's the system for migration analysis was created with red hats great assistance and support this allowed us to tackle the challenge of integrating multiple and varied issues legal issues police databases national and international security organizations like Interpol API advanced passenger information and PNR passenger name record this involved starting private cloud with OpenShift Rev data virtualization cloud forms and fuse that were the basis to develop Sam and implementing machine learning models and artificial intelligence our analysts consulted a number of systems and other manual files before 2016 4 days for each person entering or leaving the country so this has allowed us to optimize our decisions making them in real time each time Sam is consulted it processes patterns of over two billion data entries Sam's aim is to improve the quality of life of our citizens and visitors making sure that crime doesn't pierce our borders in an environment of analytic evolution and constant improvement in essence Sam contributes toward Argentina being one of the leaders in Latin America in terms of immigration with our new system great thank you and and so Dave tell us a little more about the insurance industry and the challenges in the EU face yeah sure so you know in the insurance industry it's a it's been a bit sort of insulated from a lot of major change in disruption just purely from the fact that it's highly regulated and the cost of so that the barrier to entry is quite high in fact if you think about insurance you know you have to have capital reserves to protect against those major events like floods bush fires and so on but the whole thing is a lot of change there's come in a really rapid pace I'm also in the areas of customer expectations you know customers and now looking and expecting for the same levels of flexibility and convenience that they would experience with more modern and new startups they're expecting out of the older institutions like banks and insurance companies like us so definitely expecting the industry to to be a lot more adaptable and to better meet their needs I think the other aspect of it really is in the data the data area where I think that the donor is now creating a much more significant connection between organizations in a car summers especially when you think about the level of devices that are now enabled and the sheer growth of data that's that that's growing at exponential rates so so that the impact then is that the systems that we used to rely on are the technology we used to rely on to be able to handle that kind of growth no longer keeps up and is able to to you know build for the future so we need to sort of change that so what I G's really doing is transform transforming the organization to become a lot more efficient focus more on customers and and really set ourselves up to be agile and adaptive and so ya know as part of your Innovation Award that the specific set of projects you tied a huge amount of different disparate systems together and with M&A and other you have a lot to do there to you tell us a little more about kind of how you're able to better respond to customer needs by being able to do that yeah no you're right so we've we've we're nearly a hundred year old company that's grown from lots of merger and acquisition and just as a result of that that means that data's been sort of spread out and fragmented across multiple brands and multiple products and so the number one sort of issue and problem that we were hearing was that it was too hard to get access to data and it's highly complicated which is not great from a company from our perspective really because because we are a data company right that's what we do we we collect data about people what they what's important to them what they value and the environment in which they live so that we can understand that risk and better manage and protect those people so what we're doing is we're trying to make and what we have been doing is making data more open and accessible and and by that I mean making data more of easily available for people to use it to make decisions in their day-to-day activity and to do that what we've done is built a single data platform across the group that unifies the data into a single source of truth that we can then build on top of that single views of customers for example that puts the right information into the into the hands of the people that need it the most and so now why does open source play such a big part in doing that I know there are a lot of different solutions that could get you there sure well firstly I think I've been sauce has been k2 these and really it's been key because we've basically started started from scratch to build this this new next-generation data platform based on entirely open-source you know using great components like Kafka and Postgres and airflow and and and and and then fundamentally building on top of red Red Hat OpenStack right to power all that and they give us the flexibility that we need to be able to make things happen much faster for example we were just talking to the pivotal guys earlier this week here and some of the stuff that we're doing they're they're things quite interesting innovative writes even sort of maybe first in the world where we've taken the older sort of appliance and dedicated sort of massive parallel processing unit and ported that over onto red Red Hat OpenStack right which is now giving us a lot more flexibility for scale in a much more efficient way but you're right though that we've come from in the past a more traditional approach to to using vendor based technology right which was good back then when you know technology solutions could last for around 10 years or so on and and that was fine but now that we need to move much faster we've had to rethink that and and so our focus has been on using you know more commoditized open source technology built by communities to give us that adaptability and sort of remove the locking in there any entrenchment of technology so that's really helped us but but I think that the last point that's been really critical to us is is answering that that concern and question about ongoing support and maintenance right so you know in a regular environment the regulator is really concerned about anything that could fundamentally impact business operation and and so the question is always about what happens when something goes wrong who's going to be there to support you which is where the value of the the partnership we have with Red Hat has really come into its own right and what what it's done is is it's actually giving us the best of both worlds a means that we can we can leverage and use and and and you know take some of the technology that's being developed by great communities in the open source way but also partner with a trusted partner in red had to say you know they're going to stand behind that community and provide that support when we needed the most so that's been the kind of the real value out of that partnership okay well I appreciate I love the story it's how do you move quickly leverage the power community but do it in a safe secure way and I love the idea of your literally empowering people with machine learning and AI at the moment when they need it it's just an incredible story so thank you so much for being here appreciate it thank you [Applause] you know again you see in these the the importance of enabling people with data and in an old-world was so much data was created with a system in mind versus data is a separate asset that needs to be available real time to anyone is a theme we hear over and over and over again and so you know really looking at open source solutions that allow that flexibility and keep data from getting locked into proprietary silos you know is a theme that we've I've heard over and over over the past year with many of our customers so I love logistics I'm a geek that way I come from that background in the past and I know that running large complex operations requires flawless execution and that requires great data and we have two great examples today around how to engage own organizations in new and more effective ways in the case of lufthansa technik literally IT became the business so it wasn't enabling the business it became the business offering and importantly went from idea to delivery to customers in a hundred days and so this theme of speed and the importance of speed it's a it's a great story you'll hear more about and then also at UPS UPS again I talked a little earlier about IT used to be kind of the long pole in the tent the thing that was slow moving because of the technology but UPS is showing that IT can actually drive the business and the cadence of business even faster by demonstrating the power and potential of technology to engage in this case hundreds of thousands of people to make decisions real-time in the face of obviously constant change around weather mechanicals and all the different things that can happen in a large logistics operation like that so I'd like to welcome on stage to be us more from Lufthansa Technik and Nick Castillo from ups to be us welcome thank you for being here Nick thank you thank you Jim and congratulations on your Innovation Awards oh thank you it's a great honor so to be us let's start with you can you tell us a little bit more about what a viet are is yeah avatars are a digital platform offering features like aircraft condition analytics reliability management and predictive maintenance and it helps airlines worldwide to digitize and improve their operations so all of the features work and can be used separately or generate even more where you burn combined and finally we decided to set up a viet as an open platform that means that we avoid the whole aviation industry to join the community and develop ideas on our platform and to be as one of things i found really fascinating about this is that you had a mandate to do this at a hundred days and you ultimately delivered on it you tell us a little bit about that i mean nothing in aviation moves that fast yeah that's been a big challenge so in the beginning of our story the Lufthansa bot asked us to develop somehow digital to win of an aircraft within just hundred days and to deliver something of value within 100 days means you cannot spend much time and producing specifications in terms of paper etc so for us it was pretty clear that we should go for an angel approach and immediately start and developing ideas so we put the best experts we know just in one room and let them start to work and on day 2 I think we already had the first scribbles for the UI on day 5 we wrote the first lines of code and we were able to do that because it has been a major advantage for us to already have four technologies taken place it's based on open source and especially rated solutions because we did not have to waste any time setting up the infrastructure and since we wanted to get feedback very fast we were certainly visited an airline from the Lufthansa group already on day 30 and showed them the first results and got a lot of feedback and because from the very beginning customer centricity has been an important aspect for us and changing the direction based on customer feedback has become quite normal for us over time yeah it's an interesting story not only engaging the people internally but be able to engage with a with that with a launch customer like that and get feedback along the way as it's great thing how is it going overall since launch yeah since the launch last year in April we generated much interest in the industry as well from Airlines as from competitors and in the following month we focused on a few Airlines which had been open minded and already advanced in digital activities and we've got a lot of feedback by working with them and we're able to improve our products by developing new features for example we learned that data integration can become quite complex in the industry and therefore we developed a new feature called quick boarding allowing Airlines to integrate into the via table platform within one day using a self-service so and currently we're heading for the next steps beyond predictive maintenance working on process automation and prescriptive prescriptive maintenance because we believe prediction without fulfillment still isn't enough it really is a great example of even once you're out there quickly continuing to innovate change react it's great to see so Nick I mean we all know ups I'm still always blown away by the size and scale of the company and the logistics operations that you run you tell us a little more about the project and what we're doing together yeah sure Jim and you know first of all I think I didn't get the sportcoat memo I think I'm the first one up here today with a sport coat but you know first on you know on behalf of the 430,000 ups was around the world and our just world-class talented team of 5,000 IT professionals I have to tell you we're humbled to be one of this year's red hat Innovation Award recipients so we really appreciate that you know as a global logistics provider we deliver about 20 million packages each day and we've got a portfolio of technologies both operational and customer tech and another customer facing side the power what we call the UPS smart logistics network and I gotta tell you innovations in our DNA technology is at the core of everything we do you know from the ever familiar first and industry mobile platform that a lot of you see when you get delivered a package which we call the diad which believe it or not we delivered in 1992 my choice a data-driven solution that drives over 40 million of our my choice customers I'm whatever you know what this is great he loves logistics he's a my choice customer you could be one too by the way there's a free app in the App Store but it provides unmatched visibility and really controls that last mile delivery experience so now today we're gonna talk about the solution that we're recognized for which is called site which is part of a much greater platform that we call edge which is transforming how our package delivery teams operate providing them real-time insights into our operations you know this allows them to make decisions based on data from 32 disparate data sources and these insights help us to optimize our operations but more importantly they help us improve the delivery experience for our customers just like you Jim you know on the on the back end is Big Data and it's on a large scale our systems are crunching billions of events to render those insights on an easy-to-use mobile platform in real time I got to tell you placing that information in our operators hands makes ups agile and being agile being able to react to changing conditions as you know is the name of the game in logistics now we built edge in our private cloud where Red Hat technologies play a very important role as part of our overage overarching cloud strategy and our migration to agile and DevOps so it's it's amazing it's amazing the size and scale so so you have this technology vision around engaging people in a more effect way those are my word not yours but but I'd be at that's how it certainly feels and so tell us a little more about how that enables the hundreds of thousands people to make better decisions every day yep so you know we're a people company and the edge platform is really the latest in a series of solutions to really empower our people and really power that smart logistics network you know we've been deploying technology believe it or not since we founded the company in 1907 we'll be a hundred and eleven years old this August it's just a phenomenal story now prior to edge and specifically the syphon ishutin firm ation from a number of disparate systems and reports they then need to manually look across these various data sources and and frankly it was inefficient and prone to inaccuracy and it wasn't really real-time at all now edge consumes data as I mentioned earlier from 32 disparate systems it allows our operators to make decisions on staffing equipment the flow of packages through the buildings in real time the ability to give our people on the ground the most up-to-date data allows them to make informed decisions now that's incredibly empowering because not only are they influencing their local operations but frankly they're influencing the entire global network it's truly extraordinary and so why open source and open shift in particular as part of that solution yeah you know so as I mentioned Red Hat and Red Hat technology you know specifically open shift there's really core to our cloud strategy and to our DevOps strategy the tools and environments that we've partnered with Red Hat to put in place truly are foundational and they've fundamentally changed the way we develop and deploy our systems you know I heard Jose talk earlier you know we had complex solutions that used to take 12 to 18 months to develop and deliver to market today we deliver those same solutions same level of complexity in months and even weeks now openshift enables us to container raise our workloads that run in our private cloud during normal operating periods but as we scale our business during our holiday peak season which is a very sure window about five weeks during the year last year as a matter of fact we delivered seven hundred and sixty-two million packages in that small window and our transactions our systems they just spiked dramatically during that period we think that having open shift will allow us in those peak periods to seamlessly move workloads to the public cloud so we can take advantage of burst capacity economically when needed and I have to tell you having this flexibility I think is key because you know ultimately it's going to allow us to react quickly to customer demands when needed dial back capacity when we don't need that capacity and I have to say it's a really great story of UPS and red hat working you together it really is a great story is just amazing again the size and scope but both stories here a lot speed speed speed getting to market quickly being able to try things it's great lessons learned for all of us the importance of being able to operate at a fundamentally different clock speed so thank you all for being here very much appreciated congratulate thank you [Applause] [Music] alright so while it's great to hear from our Innovation Award winners and it should be no surprise that they're leading and experimenting in some really interesting areas its scale so I hope that you got a chance to learn something from these interviews you'll have an opportunity to learn more about them you'll also have an opportunity to vote on the innovator of the year you can do that on the Red Hat summit mobile app or on the Red Hat Innovation Awards homepage you can learn even more about their stories and you'll have a chance to vote and I'll be back tomorrow to announce the the summit winner so next I like to spend a few minutes on talking about how Red Hat is working to catalyze our customers efforts Marko bill Peter our senior vice president of customer experience and engagement and John Alessio our vice president of global services will both describe areas in how we are working to configure our own organization to effectively engage with our customers to use open source to help drive their success so with that I'd like to welcome marquel on stage [Music] good morning good morning thank you Jim so I want to spend a few minutes to talk about how we are configured how we are configured towards your success how we enable internally as well to work towards your success and actually engage as well you know Paul yesterday talked about the open source culture and our open source development net model you know there's a lot of attributes that we have like transparency meritocracy collaboration those are the key of our culture they made RedHat what it is today and what it will be in the future but we also added our passion for customer success to that let me tell you this is kind of the configuration from a cultural perspective let me tell you a little bit on what that means so if you heard the name my organization is customer experience and engagement right in the past we talked a lot about support it's an important part of the Red Hat right and how we are configured we are configured probably very uniquely in the industry we put support together we have product security in there we add a documentation we add a quality engineering into an organization you think there's like wow why are they doing it we're also running actually the IT team for actually the product teams why are we doing that now you can imagine right we want to go through what you see as well right and I'll give you a few examples on how what's coming out of this configuration we invest more and more in testing integration and use cases which you are applying so you can see it between the support team experiencing a lot what you do and actually changing our test structure that makes a lot of sense we are investing more and more testing outside the boundaries so not exactly how things must fall by product management or engineering but also how does it really run in an environment that you operate we run complex setups internally right taking openshift putting in OpenStack using software-defined storage underneath managing it with cloud forms managing it if inside we do that we want to see how that works right we are reshaping documentation console to kind of help you better instead of just documenting features and knobs as in how can how do you want to achieve things now part of this is the configuration that are the big part of the configuration is the voice of the customer to listen to what you say I've been here at Red Hat a few years and one of my passion has always been really hearing from customers how they do it I travel constantly in the world and meet with customers because I want to know what is really going on we use channels like support we use channels like getting from salespeople the interaction from customers we do surveys we do you know we interact with our people to really hear what you do what we also do what maybe not many know and it's also very unique in the industry we have a webpage called you asked reacted we show very transparently you told us this is an area for improvement and it's not just in support it's across the company right build us a better web store build us this we're very transparent about Hades improvements we want to do with you now if you want to be part of the process today go to the feedback zone on the next floor down and talk to my team I might be there as well hit me up we want to hear the feedback this is how we talk about configuration of the organization how we are configured let me go to let me go to another part which is innovation innovation every day and that in my opinion the enable section right we gotta constantly innovate ourselves how do we work with you how do we actually provide better value how do we provide faster responses in support this is what we would I say is is our you know commitment to innovation which is the enabling that Jim talked about and I give you a few examples which I'm really happy and it kind of shows the open source culture at Red Hat our commitment is for innovation I'll give you good example right if you have a few thousand engineers and you empower them you kind of set the business framework as hey this is an area we got to do something you get a lot of good IDs you get a lot of IDs and you got a shape an inter an area that hey this is really something that brings now a few years ago we kind of said or I say is like based on a lot of feedback is we got to get more and more proactive if you customers and so I shaped my team and and I shaped it around how can we be more proactive it started very simple as in like from kbase articles or knowledgebase articles in getting started guys then we started a a tool that we put out called labs you've probably seen them if you're on the technical side really taking small applications out for you to kind of validate is this configured correctly stat configure there was the start then out of that the ideas came and they took different turns and one of the turns that we came out was right at insights that we launched a few years ago and did you see the demo yesterday that in Paul's keynote that they showed how something was broken with one the data centers how it was applied to fix and how has changed this is how innovation really came from the ground up from the support side and turned into something really a being a cornerstone of our strategy and we're keeping it married from the day to day work right you don't want to separate this you want to actually keep that the data that's coming from the support goes in that because that's the power that we saw yesterday in the demo now innovation doesn't stop when you set the challenge so we did the labs we did the insights we just launched a solution engine called solution engine another thing that came out of that challenge is in how do we break complex issues down that it's easier for you to find a solution quicker it's one example but we're also experimenting with AI so insights uses AI as you probably heard yesterday we also use it internally to actually drive faster resolution we did in one case with a a our I bought basically that we get to 25% faster resolution on challenges that you have the beauty for you obviously it's well this is much faster 10% of all our support cases today are supported and assisted by an AI now I'll give you another example of just trying to tell you the innovation that comes out if you configure and enable the team correctly kbase articles are knowledgebase articles we q8 thousands and thousands every year and then I get feedback as and while they're good but they're in English as you can tell my English is perfect so it's not no issue for that but for many of you is maybe like even here even I read it in Japanese so we actually did machine translation because it's too many that we can do manually the using machine translation I can tell it's a funny example two weeks ago I tried it I tried something from English to German I looked at it the German looked really bad I went back but the English was bad so it really translates one to one actually what it does but it's really cool this is innovation that you can apply and the team actually worked on this and really proud on that now the real innovation there is not these tools the real innovation is that you can actually shape it in a way that the innovation comes that you empower the people that's the configure and enable and what I think is all it's important this don't reinvent the plumbing don't start from scratch use systems like containers on open shift to actually build the innovation in a smaller way without reinventing the plumbing you save a lot of issues on security a lot of issues on reinventing the wheel focus on that that's what we do as well if you want to hear more details again go in the second floor now let's talk about the engage that Jim mentioned before what I translate that engage is actually engaging you as a customer towards your success now what does commitment to success really mean and I want to reflect on that on a traditional IT company shows up with you talk the salesperson solution architect works with you consulting implements solution it comes over to support and trust me in a very traditional way the support guy has no clue what actually was sold early on it's what happens right and this is actually I think that red had better that we're not so silent we don't show our internal silos or internal organization that much today we engage in a way it doesn't matter from which team it comes we have a better flow than that you deserve how the sausage is made but we can never forget what was your business objective early on now how is Red Hat different in this and we are very strong in my opinion you might disagree but we are very strong in a virtual accounting right really putting you in the middle and actually having a solution architect work directly with support or consulting involved and driving that together you can also help us in actually really embracing that model if that's also other partners or system integrators integrate put yourself in the middle be around that's how we want to make sure that we don't lose sight of the original business problem trust me reducing the hierarchy or getting rid of hierarchy and bureaucracy goes a long way now this is how we configured this is how we engage and this is how we are committed to your success with that I'm going to introduce you to John Alessio that talks more about some of the innovation done with customers thank you [Music] good morning I'm John Alessio I'm the vice president of Global Services and I'm delighted to be with you here today I'd like to talk to you about a couple of things as it relates to what we've been doing since the last summit in the services organization at the core of everything we did it's very similar to what Marco talked to you about our number one priority is driving our customer success with red hat technology and as you see here on the screen we have a number of different offerings and capabilities all the way from training certification open innovation labs consulting really pairing those capabilities together with what you just heard from Marco in the support or cee organization really that's the journey you all go through from the beginning of discovering what your business challenge is all the way through designing those solutions and deploying them with red hat now the highlight like to highlight a few things of what we've been up to over the last year so if I start with the training and certification team they've been very busy over the last year really updating enhancing our curriculum if you haven't stopped by the booth there's a preview for new capability around our learning community which is a new way of learning and really driving that enable meant in the community because 70% of what you need to know you learned from your peers and so it's a very key part of our learning strategy and in fact we take customer satisfaction with our training and certification business very seriously we survey all of our students coming out of training 93% of our students tell us they're better prepared because of red hat training and certification after Weeds they've completed the course we've updated the courses and we've trained well over a hundred and fifty thousand people over the last two years so it's a very very key part of our strategy and that combined with innovation labs and the consulting operation really drive that overall journey now we've been equally busy in enhancing the system of enablement and support for our business partners another very very key initiative is building out the ecosystem we've enhanced our open platform which is online partner enablement network we've added new capability and in fact much of the training and enablement that we do for our internal consultants our deal is delivered through the open platform now what I'm really impressed with and thankful for our partners is how they are consuming and leveraging this material we train and enable for sales for pre-sales and for delivery and we're up over 70% year in year in our partners that are enabled on RedHat technology let's give our business partners a round of applause now one of our offerings Red Hat open innovation labs I'd like to talk a bit more about and take you through a case study open innovation labs was created two years ago it's really there to help you on your journey in adopting open source technology it's an immersive experience where your team will work side-by-side with Red Hatters to really propel your journey forward in adopting open source technology and in fact we've been very busy since the summit in Boston as you'll see coming up on the screen we've completed dozens of engagements leveraging our methods tools and processes for open innovation labs as you can see we've worked with large and small accounts in fact if you remember summit last year we had a European customer easier AG on stage which was a startup and we worked with them at the very beginning of their business to create capabilities in a very short four-week engagement but over the last year we've also worked with very large customers such as Optim and Delta Airlines here in North America as well as Motability operations in the European arena one of the accounts I want to spend a little bit more time on is Heritage Bank heritage Bank is a community owned bank in Toowoomba Australia their challenge was not just on creating new innovative technology but their challenge was also around cultural transformation how to get people to work together across the silos within their organization we worked with them at all levels of the organization to create a new capability the first engagement went so well that they asked us to come in into a second engagement so I'd like to do now is run a video with Peter lock the chief executive officer of Heritage Bank so he can take you through their experience Heritage Bank is one of the country's oldest financial institutions we have to be smarter we have to be more innovative we have to be more agile we had to change we had to find people to help us make that change the Red Hat lab is the only one that truly helps drive that change with a business problem the change within the team is very visible from the start to now we've gone from being separated to very single goal minded seeing people that I only ever seen before in their cubicles in the room made me smile programmers in their thinking I'm now understanding how the whole process fits together the productivity of IT will change and that is good for our business that's really the value that were looking for the Red Hat innovation labs for us were a really great experience I'm not interested in running an organization I'm interested in making a great organization to say I was pleasantly surprised by it is an understatement I was delighted I love the quote I was delighted makes my heart warm every time I see that video you know since we were at summit for those of you who are with us in Boston some of you went on our hardhat tours we've opened three physical facilities here at Red Hat where we can conduct red head open Innovation Lab engagements Singapore London and Boston were all opened within the last physical year and in fact our site in Boston is paired with our world-class executive briefing center as well so if you haven't been there please do check it out I'd like to now talk to you a bit about a very special engagement that we just recently completed we just recently completed an engagement with UNICEF the United Nations Children's Fund and the the purpose behind this engagement was really to help UNICEF create an open-source platform that marries big data with social good the idea is UNICEF needs to be better prepared to respond to emergency situations and as you can imagine emergency situations are by nature unpredictable you can't really plan for them they can happen anytime anywhere and so we worked with them on a project that we called school mapping and the idea was to provide more insights so that when emergency situations arise UNICEF could do a much better job in helping the children in the region and so we leveraged our Red Hat open innovation lab methods tools processes that you've heard about just like we did at Heritage Bank and the other accounts I mentioned but then we also leveraged Red Hat software technologies so we leveraged OpenShift container platform we leveraged ansible automation we helped the client with a more agile development approach so they could have releases much more frequently and continue to update this over time we created a continuous integration continuous deployment pipeline we worked on containers and container in the application etc with that we've been able to provide a platform that is going to allow for their growth to better respond to these emergency situations let's watch a short video on UNICEF mission of UNICEF innovation is to apply technology to the world's most pressing problems facing children data is changing the landscape of what we do at UNICEF this means that we can figure out what's happening now on the ground who it's happening to and actually respond to it in much more of a real-time manner than we used to be able to do we love working with open source communities because of their commitment that we should be doing good for the world we're actually with red hat building a sandbox where universities or other researchers or data scientists can connect and help us with our work if you want to use data for social good there's so many groups out there that really need your help and there's so many ways to get involved [Music] so let's give a very very warm red hat summit welcome to Erica kochi co-founder of unicef innovation well Erica first of all welcome to Red Hat summit thanks for having me here it's our pleasure and thank you for joining us so Erica I've just talked a bit about kind of what we've been up to and Red Hat services over the last year we talked a bit about our open innovation labs and we did this project the school mapping project together our two teams and I thought the audience might find it interesting from your point of view on why the approach we use in innovation labs was such a good fit for the school mapping project yeah it was a great fit for for two reasons the first is values everything that we do at UNICEF innovation we use open source technology and that's for a couple of reasons because we can take it from one place and very easily move it to other countries around the world we work in 190 countries so that's really important for us not to be able to scale things also because it makes sense we can get we can get more communities involved in this and look not just try to do everything by ourselves but look much open much more openly towards the open source communities out there to help us with our work we can't do it alone yeah and then the second thing is methodology you know the labs are really looking at taking this agile approach to prototyping things trying things failing trying again and that's really necessary when you're developing something new and trying to do something new like mapping every school in the world yeah very challenging work think about it 190 countries Wow and so the open source platform really works well and then the the rapid prototyping was really a good fit so I think the audience might find it interesting on how this application and this platform will help children in Latin America so in a lot of countries in Latin America and many countries throughout the world that UNICEF works in are coming out of either decades of conflict or are are subject to natural disasters and not great infrastructure so it's really important to a for us to know where schools are where communities are well where help is needed what's connected what's not and using a overlay of various sources of data from poverty mapping to satellite imagery to other sources we can really figure out what's happening where resources are where they aren't and so we can plan better to respond to emergencies and to and to really invest in areas that are needed that need that investment excellent excellent it's quite powerful what we were able to do in a relatively short eight or nine week engagement that our two teams did together now many of your colleagues in the audience are using open source today looking to expand their use of open source and I thought you might have some recommendations for them on how they kind of go through that journey and expanding their use of open source since your experience at that yeah for us it was it was very much based on what's this gonna cost we have limited resources and what's how is this gonna spread as quickly as possible mm-hmm and so we really asked ourselves those two questions you know about 10 years ago and what we realized is if we are going to be recommending technologies that governments are going to be using it really needs to be open source they need to have control over it yeah and they need to be working with communities not developing it themselves yeah excellent excellent so I got really inspired with what we were doing here in this project it's one of those you know every customer project is really interesting to me this one kind of pulls a little bit at your heartstrings on what the real impact could be here and so I know some of our colleagues here in the audience may want to get involved how can they get involved well there's many ways to get involved with the other UNICEF or other groups out there you can search for our work on github and there are tasks that you can do right now if and if you're looking for to do she's got work for you and if you want sort of a more a longer engagement or a bigger engagement you can check out our website UNICEF stories org and you can look at the areas you might be interested in and contact us we're always open to collaboration excellent well Erica thank you for being with us here today thank you for the great project we worked on together and have a great summer thank you for being give her a round of applause all right well I hope that's been helpful to you to give you a bit of an update on what we've been focused on in global services the message I'll leave with you is our top priority is customer success as you heard through the story from UNICEF from Heritage Bank and others we can help you innovate where you are today I hope you have a great summit and I'll call out Jim Whitehurst thank you John and thank you Erica that's really an inspiring story we have so many great examples of how individuals and organizations are stepping up to transform in the face of digital disruption I'd like to spend my last few minutes with one real-world example that brings a lot of this together and truly with life-saving impact how many times do you think you can solve a problem which is going to allow a clinician to now save the life I think the challenge all of his physicians are dealing with is data overload I probably look at over 100,000 images in a day and that's just gonna get worse what if it was possible for some computer program to look at these images with them and automatically flag images that might deserve better attention Chris on the surface seems pretty simple but underneath Chris has a lot going on in the past year I've seen Chris Foreman community and a space usually dominated by proprietary software I think Chris can change medicine as we know it today [Music] all right with that I'd like to invite on stage dr. Ellen grant from Boston Children's Hospital dr. grant welcome thank you for being here so dr. grant tell me who is Chris Chris does a lot of work for us and I think Chris is making me or has definitely the potential to make me a better doctor Chris helps us take data from our archives in the hospital and port it to wrap the fastback ends like the mass up and cloud to do rapid data processing and provide it back to me in any format on a desktop an iPad or an iPhone so it it basically brings high-end data analysis right to me at the bedside and that's been a barrier that I struggled with years ago to try to break down so that's where we started with Chris is to to break that barrier between research that occurred on a timeline of days to weeks to months to clinical practice which occurs in the timeline of seconds to minutes well one of things I found really fascinating about this story RedHat in case you can't tell we're really passionate about user driven innovation is this is an example of user driven innovation not directly at a technology company but in medicine excuse me can you tell us just a little bit about the genesis of Chris and how I got started yeah Chris got started when I was running a clinical division and I was very frustrated with not having the latest image analysis tools at my fingertips while I was on clinical practice and I would have to on the research so I could go over and you know do line code and do the data analysis but if I'm always over in clinical I kept forgetting how to do those things and I wanted to have all those innovations that my fingertips and not have to remember all the computer science because I'm a physician not like a better scientist so I wanted to build a platform that gave me easy access to that back-end without having to remember all the details and so that's what Chris does for us is brings allowed me to go into the PAC's grab a dataset send it to a computer and back in to do the analysis and bring it back to me without having to worry about where it was or how it got there that's all involved in the in the platform Chris and why not just go to a vendor and ask them to write a piece of software for you to do that yeah we thought about that and we do a lot of technical innovations and we always work with the experts so we wanted to work with if I'm going to be able to say an optical device I'm going to work with the optical engineers or an EM our system I'm going to work with em our engineers so we wanted to work with people who really knew or the plumbers so to speak of the software in industry so we ended up working with the massive point cloud for the platform and the distributed systems in Red Hat as the infrastructure that's starting to support Chris and that's been actually a really incredible journey for us because medical ready medical softwares not typically been a community process and that's something that working with dan from Red Hat we learned a lot about how to participate in an open community and I think our team has grown a lot as a result of that collaboration and I know you we've talked about in the past that getting this data locked into a proprietary system you may not be able to get out there's a real issue can you talk about the importance of open and how that's worked in the process yeah and I think for the medical community and I find this resonates with other physicians as well too is that it's medical data we want to continue to own and we feel very awkward about giving it to industry so we would rather have our data sitting in an open cloud like the mass open cloud where we can have a data consortium that oversees the data governance so that we're not giving our data way to somebody else but have a platform that we can still keep a control of our own data and I think it's going to be the future because we're running of a space in the hospital we generate so much data and it's just going to get worse as I was mentioning and all the systems run faster we get new devices so the amount of data that we have to filter through is just astronomically increasing so we need to have resources to store and compute on such large databases and so thinking about where this could go I mean this is a classic feels like an open-source project it started really really small with a originally modest set of goals and it's just kind of continue to grow and grow and grow it's a lot like if yes leanest torval Linux would be in 1995 you probably wouldn't think it would be where it is now so if you dream with me a little bit where do you think this could possibly go in the next five years ten years what I hope it'll do is allow us to break down the silos within the hospital because to do the best job at what we physicians do not only do we have to talk and collaborate together as individuals we have to take the data each each community develops and be able to bring it together so in other words I need to be able to bring in information from vital monitors from mr scans from optical devices from genetic tests electronic health record and be able to analyze on all that data combined so ideally this would be a platform that breaks down those information barriers in a hospital and also allows us to collaborate across multiple institutions because many disorders you only see a few in each hospital so we really have to work as teams in the medical community to combine our data together and also I'm hoping that and we even have discussions with people in the developing world because they have systems to generate or to got to create data or say for example an M R system they can't create data but they don't have the resources to analyze on it so this would be a portable for them to participate in this growing data analysis world without having to have the infrastructure there and be a portal into our back-end and we could provide the infrastructure to do the data analysis it really is truly amazing to see how it's just continued to grow and grow and expand it really is it's a phenomenal story thank you so much for being here appreciate it thank you [Applause] I really do love that story it's a great example of user driven innovation you know in a different industry than in technology and you know recognizing that a clinicians need for real-time information is very different than a researchers need you know in projects that can last weeks and months and so rather than trying to get an industry to pivot and change it's a great opportunity to use a user driven approach to directly meet those needs so we still have a long way to go we have two more days of the summit and as I said yesterday you know we're not here to give you all the answers we're here to convene the conversation so I hope you will have an opportunity today and tomorrow to meet some new people to share some ideas we're really really excited about what we can all do when we work together so I hope you found today valuable we still have a lot more happening on the main stage as well this afternoon please join us back for the general session it's a really amazing lineup you'll hear from the women and opensource Award winners you'll also hear more about our collab program which is really cool it's getting middle school girls interested in open sourcing coding and so you'll have an opportunity to see some people involved in that you'll also hear from the open source Story speakers and you'll including in that you will see a demo done by a technologist who happens to be 11 years old so really cool you don't want to miss that so I look forward to seeing you then this afternoon thank you [Applause]
SUMMARY :
from the day to day work right you don't
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
John Alessio | PERSON | 0.99+ |
Mike Walker | PERSON | 0.99+ |
Boston | LOCATION | 0.99+ |
Chris | PERSON | 0.99+ |
UNICEF | ORGANIZATION | 0.99+ |
2016 | DATE | 0.99+ |
BBVA | ORGANIZATION | 0.99+ |
John Alessio | PERSON | 0.99+ |
Jim | PERSON | 0.99+ |
Jim Whitehurst | PERSON | 0.99+ |
John | PERSON | 0.99+ |
Lufthansa | ORGANIZATION | 0.99+ |
Dave | PERSON | 0.99+ |
Sam | PERSON | 0.99+ |
Erica | PERSON | 0.99+ |
Europe | LOCATION | 0.99+ |
Peter lock | PERSON | 0.99+ |
Lufthansa Technik | ORGANIZATION | 0.99+ |
12 | QUANTITY | 0.99+ |
1992 | DATE | 0.99+ |
Delta Airlines | ORGANIZATION | 0.99+ |
1995 | DATE | 0.99+ |
Josemaria | PERSON | 0.99+ |
San Francisco | LOCATION | 0.99+ |
25% | QUANTITY | 0.99+ |
Adele | PERSON | 0.99+ |
70% | QUANTITY | 0.99+ |
1907 | DATE | 0.99+ |
Heritage Bank | ORGANIZATION | 0.99+ |
Paul | PERSON | 0.99+ |
Lufthansa Technik | ORGANIZATION | 0.99+ |
Nick Castillo | PERSON | 0.99+ |
Jim Whitehurst | PERSON | 0.99+ |
Heritage Bank | ORGANIZATION | 0.99+ |
Adelle | PERSON | 0.99+ |
two teams | QUANTITY | 0.99+ |
UPS | ORGANIZATION | 0.99+ |
English | OTHER | 0.99+ |
Red Hat | ORGANIZATION | 0.99+ |
North America | LOCATION | 0.99+ |
Alaska | LOCATION | 0.99+ |
hundred days | QUANTITY | 0.99+ |
ninety five percent | QUANTITY | 0.99+ |
Latin America | LOCATION | 0.99+ |
Heritage Bank | ORGANIZATION | 0.99+ |
10% | QUANTITY | 0.99+ |
iPhone | COMMERCIAL_ITEM | 0.99+ |
yesterday | DATE | 0.99+ |
Jose Maria Rosetta | PERSON | 0.99+ |
Omar | PERSON | 0.99+ |
two questions | QUANTITY | 0.99+ |
4 days | QUANTITY | 0.99+ |
Mexico City | LOCATION | 0.99+ |
Marco | PERSON | 0.99+ |
Optim | ORGANIZATION | 0.99+ |
five years | QUANTITY | 0.99+ |
Red Hat | ORGANIZATION | 0.99+ |
two teams | QUANTITY | 0.99+ |
Samos | LOCATION | 0.99+ |
iPad | COMMERCIAL_ITEM | 0.99+ |
last year | DATE | 0.99+ |
Nick | PERSON | 0.99+ |
today | DATE | 0.99+ |
David Abraham | PERSON | 0.99+ |
German | OTHER | 0.99+ |
five years | QUANTITY | 0.99+ |
Caryn Woodruff, IBM & Ritesh Arora, HCL Technologies | IBM CDO Summit Spring 2018
>> Announcer: Live from downtown San Francisco, it's the Cube, covering IBM Chief Data Officer Strategy Summit 2018. Brought to you by IBM. >> Welcome back to San Francisco everybody. We're at the Parc 55 in Union Square and this is the Cube, the leader in live tech coverage and we're covering exclusive coverage of the IBM CDO strategy summit. IBM has these things, they book in on both coasts, one in San Francisco one in Boston, spring and fall. Great event, intimate event. 130, 150 chief data officers, learning, transferring knowledge, sharing ideas. Cayn Woodruff is here as the principle data scientist at IBM and she's joined by Ritesh Ororo, who is the director of digital analytics at HCL Technologies. Folks welcome to the Cube, thanks for coming on. >> Thank you >> Thanks for having us. >> You're welcome. So we're going to talk about data management, data engineering, we're going to talk about digital, as I said Ritesh because digital is in your title. It's a hot topic today. But Caryn let's start off with you. Principle Data Scientist, so you're the one that is in short supply. So a lot of demand, you're getting pulled in a lot of different directions. But talk about your role and how you manage all those demands on your time. >> Well, you know a lot of, a lot of our work is driven by business needs, so it's really understanding what is critical to the business, what's going to support our businesses strategy and you know, picking the projects that we work on based on those items. So it's you really do have to cultivate the things that you spend your time on and make sure you're spending your time on the things that matter and as Ritesh and I were talking about earlier, you know, a lot of that means building good relationships with the people who manage the systems and the people who manage the data so that you can get access to what you need to get the critical insights that the business needs, >> So Ritesh, data management I mean this means a lot of things to a lot of people. It's evolved over the years. Help us frame what data management is in this day and age. >> Sure, so there are two aspects of data in my opinion. One is the data management, another the data engineering, right? And over the period as the data has grown significantly. Whether it's unstructured data, whether it's structured data, or the transactional data. We need to have some kind of governance in the policies to secure data to make data as an asset for a company so the business can rely on your data. What you are delivering to them. Now, the another part comes is the data engineering. Data engineering is more about an IT function, which is data acquisition, data preparation and delivering the data to the end-user, right? It can be business, it can be third-party but it all comes under the governance, under the policies, which are designed to secure the data, how the data should be accessed to different parts of the company or the external parties. >> And how those two worlds come together? The business piece and the IT piece, is that where you come in? >> That is where data science definitely comes into the picture. So if you go online, you can find Venn diagrams that describe data science as a combination of computer science math and statistics and business acumen. And so where it comes in the middle is data science. So it's really being able to put those things together. But, you know, what's what's so critical is you know, Interpol, actually, shared at the beginning here and I think a few years ago here, talked about the five pillars to building a data strategy. And, you know, one of those things is use cases, like getting out, picking a need, solving it and then going from there and along the way you realize what systems are critical, what data you need, who the business users are. You know, what would it take to scale that? So these, like, Proof-point projects that, you know, eventually turn into these bigger things, and for them to turn into bigger things you've got to have that partnership. You've got to know where your trusted data is, you've got to know that, how it got there, who can touch it, how frequently it is updated. Just being able to really understand that and work with partners that manage the infrastructure so that you can leverage it and make it available to other people and transparent. >> I remember when I first interviewed Hilary Mason way back when and I was asking her about that Venn diagram and she threw in another one, which was data hacking. >> Caryn: Uh-huh, yeah. >> Well, talk about that. You've got to be curious about data. You need to, you know, take a bath in data. >> (laughs) Yes, yes. I mean yeah, you really.. Sometimes you have to be a detective and you have to really want to know more. And, I mean, understanding the data is like the majority of the battle. >> So Ritesh, we were talking off-camera about it's not how titles change, things evolve, data, digital. They're kind of interchangeable these days. I mean we always say the difference between a business and a digital business is how they have used data. And so digital being part of your role, everybody's trying to get digital transformation, right? As an SI, you guys are at the heart of it. Certainly, IBM as well. What kinds of questions are our clients asking you about digital? >> So I ultimately see data, whatever we drive from data, it is used by the business side. So we are trying to always solve a business problem, which is to optimize the issues the company is facing, or try to generate more revenues, right? Now, the digital as well as the data has been married together, right? Earlier there are, you can say we are trying to analyze the data to get more insights, what is happening in that company. And then we came up with a predictive modeling that based on the data that will statically collect, how can we predict different scenarios, right? Now digital, we, over the period of the last 10 20 years, as the data has grown, there are different sources of data has come in picture, we are talking about social media and so on, right? And nobody is looking for just reports out of the Excel, right? It is more about how you are presenting the data to the senior management, to the entire world and how easily they can understand it. That's where the digital from the data digitization, as well as the application digitization comes in picture. So the tools are developed over the period to have a better visualization, better understanding. How can we integrate annotation within the data? So these are all different aspects of digitization on the data and we try to integrate the digital concepts within our data and analytics, right? So I used to be more, I mean, I grew up as a data engineer, analytics engineer but now I'm looking more beyond just the data or the data preparation. It's more about presenting the data to the end-user and the business. How it is easy for them to understand it. >> Okay I got to ask you, so you guys are data wonks. I am too, kind of, but I'm not as skilled as you are, but, and I say that with all due respect. I mean you love data. >> Caryn: Yes. >> As data science becomes a more critical skill within organizations, we always talk about the amount of data, data growth, the stats are mind-boggling. But as a data scientist, do you feel like you have access to the right data and how much of a challenge is that with clients? >> So we do have access to the data but the challenge is, the company has so many systems, right? It's not just one or two applications. There are companies we have 50 or 60 or even hundreds of application built over last 20 years. And there are some applications, which are basically duplicate, which replicates the data. Now, the challenge is to integrate the data from different systems because they maintain different metadata. They have the quality of data is a concern. And sometimes with the international companies, the rules, for example, might be in US or India or China, the data acquisitions are different, right? And you are, as you become more global, you try to integrate the data beyond boundaries, which becomes a more compliance issue sometimes, also, beyond the technical issues of data integration. >> Any thoughts on that? >> Yeah, I think, you know one of the other issues too, you have, as you've heard of shadow IT, where people have, like, servers squirreled away under their desks. There's your shadow data, where people have spreadsheets and databases that, you know, they're storing on, like a small server or that they share within their department. And so you know, you were discussing, we were talking earlier about the different systems. And you might have a name in one system that's one way and a name in another system that's slightly different, and then a third system, where it's it's different and there's extra granularity to it or some extra twist. And so you really have to work with all of the people that own these processes and figure out what's the trusted source? What can we all agree on? So there's a lot of... It's funny, a lot of the data problems are people problems. So it's getting people to talk and getting people to agree on, well this is why I need it this way, and this is why I need it this way, and figuring out how you come to a common solution so you can even create those single trusted sources that then everybody can go to and everybody knows that they're working with the the right thing and the same thing that they all agree on. >> The politics of it and, I mean, politics is kind of a pejorative word but let's say dissonance, where you have maybe of a back-end syst6em, financial system and the CFO, he or she is looking at the data saying oh, this is what the data says and then... I remember I was talking to a, recently, a chef in a restaurant said that the CFO saw this but I know that's not the case, I don't have the data to prove it. So I'm going to go get the data. And so, and then as they collect that data they bring together. So I guess in some ways you guys are mediators. >> [Caryn And Ritesh] Yes, yes. Absolutely. >> 'Cause the data doesn't lie you just got to understand it. >> You have to ask the right question. Yes. And yeah. >> And sometimes when you see the data, you start, that you don't even know what questions you want to ask until you see the data. Is that is that a challenge for your clients? >> Caryn: Yes, all the time. Yeah >> So okay, what else do we want to we want to talk about? The state of collaboration, let's say, between the data scientists, the data engineer, the quality engineer, maybe even the application developers. Somebody, John Fourier often says, my co-host and business partner, data is the new development kit. Give me the data and I'll, you know, write some code and create an application. So how about collaboration amongst those roles, is that something... I know IBM's gone on about some products there but your point Caryn, it's a lot of times it's the people. >> It is. >> And the culture. What are you seeing in terms of evolution and maturity of that challenge? >> You know I have a very good friend who likes to say that data science is a team sport and so, you know, these should not be, like, solo projects where just one person is wading up to their elbows in data. This should be something where you've got engineers and scientists and business, people coming together to really work through it as a team because everybody brings really different strengths to the table and it takes a lot of smart brains to figure out some of these really complicated things. >> I completely agree. Because we see the challenges, we always are trying to solve a business problem. It's important to marry IT as well as the business side. We have the technical expert but we don't have domain experts, subject matter experts who knows the business in IT, right? So it's very very important to collaborate closely with the business, right? And data scientist a intermediate layer between the IT as well as business I will say, right? Because a data scientist as they, over the years, as they try to analyze the information, they understand business better, right? And they need to collaborate with IT to either improve the quality, right? That kind of challenges they are facing and I need you to, the data engineer has to work very hard to make sure the data delivered to the data scientist or the business is accurate as much as possible because wrong data will lead to wrong predictions, right? And ultimately we need to make sure that we integrate the data in the right way. >> What's a different cultural dynamic that was, say ten years ago, where you'd go to a statistician, she'd fire up the SPSS.. >> Caryn: We still use that. >> I'm sure you still do but run some kind of squares give me some, you know, probabilities and you know maybe run some Monte Carlo simulation. But one person kind of doing all that it's your point, Caryn. >> Well you know, it's it's interesting. There are there are some students I mentor at a local university and you know we've been talking about the projects that they get and that you know, more often than not they get a nice clean dataset to go practice learning their modeling on, you know? And they don't have to get in there and clean it all up and normalize the fields and look for some crazy skew or no values or, you know, where you've just got so much noise that needs to be reduced into something more manageable. And so it's, you know, you made the point earlier about understanding the data. It's just, it really is important to be very curious and ask those tough questions and understand what you're dealing with. Before you really start jumping in and building a bunch of models. >> Let me add another point. That the way we have changed over the last ten years, especially from the technical point of view. Ten years back nobody talks about the real-time data analysis. There was no streaming application as such. Now nobody talks about the batch analysis, right? Everybody wants data on real-time basis. But not if not real-time might be near real-time basis. That has become a challenge. And it's not just that prediction, which are happening in their ERP environment or on the cloud, they want the real-time integration with the social media for the marketing and the sales and how they can immediately do the campaign, right? So, for example, if I go to Google and I search for for any product, right, for example, a pressure cooker, right? And I go to Facebook, immediately I see the ad within two minutes. >> Yeah, they're retargeting. >> So that's a real-time analytics is happening under different application, including the third-party data, which is coming from social media. So that has become a good source of data but it has become a challenge for the data analyst and the data scientist. How quickly we can turn around is called data analysis. >> Because it used to be you would get ads for a pressure cooker for months, even after you bought the pressure cooker and now it's only a few days, right? >> Ritesh: It's a minute. You close this application, you log into Facebook... >> Oh, no doubt. >> Ritesh: An ad is there. >> Caryn: There it is. >> Ritesh: Because everything is linked either your phone number or email ID you're done. >> It's interesting. We talked about disruption a lot. I wonder if that whole model is going to get disrupted in a new way because everybody started using the same ad. >> So that's a big change of our last 10 years. >> Do you think..oh go ahead. >> oh no, I was just going to say, you know, another thing is just there's so much that is available to everybody now, you know. There's not this small little set of tools that's restricted to people that are in these very specific jobs. But with open source and with so many software-as-a-service products that are out there, anybody can go out and get an account and just start, you know, practicing or playing or joining a cackle competition or, you know, start getting their hands on.. There's data sets that are out there that you can just download to practice and learn on and use. So, you know, it's much more open, I think, than it used to be. >> Yeah, community additions of software, open data. The number of open day sources just keeps growing. Do you think that machine intelligence can, or how can machine intelligence help with this data quality challenge? >> I think that it's it's always going to require people, you know? There's always going to be a need for people to train the machines on how to interpret the data. How to classify it, how to tag it. There's actually a really good article in Popular Science this month about a woman who was training a machine on fake news and, you know, it did a really nice job of finding some of the the same claims that she did. But she found a few more. So, you know, I think it's, on one hand we have machines that we can augment with data and they can help us make better decisions or sift through large volumes of data but then when we're teaching the machines to classify the data or to help us with metadata classification, for example, or, you know, to help us clean it. I think that it's going to be a while before we get to the point where that's the inverse. >> Right, so in that example you gave, the human actually did a better job from the machine. Now, this amazing to me how.. What, what machines couldn't do that humans could, you know last year and all of a sudden, you know, they can. It wasn't long ago that robots couldn't climb stairs. >> And now they can. >> And now they can. >> It's really creepy. >> I think the difference now is, earlier you know, you knew that there is an issue in the data. But you don't know that how much data is corrupt or wrong, right? Now, there are tools available and they're very sophisticated tools. They can pinpoint and provide you the percentage of accuracy, right? On different categories of data that that you come across, right? Even forget about the structure data. Even when you talk about unstructured data, the data which comes from social media or the comments and the remarks that you log or are logged by the customer service representative, there are very sophisticated text analytics tools available, which can talk very accurately about the data as well as the personality of the person who is who's giving that information. >> Tough problems but it seems like we're making progress. All you got to do is look at fraud detection as an example. Folks, thanks very much.. >> Thank you. >> Thank you very much. >> ...for sharing your insight. You're very welcome. Alright, keep it right there everybody. We're live from the IBM CTO conference in San Francisco. Be right back, you're watching the Cube. (electronic music)
SUMMARY :
Brought to you by IBM. of the IBM CDO strategy summit. and how you manage all those demands on your time. and you know, picking the projects that we work on I mean this means a lot of things to a lot of people. and delivering the data to the end-user, right? so that you can leverage it and make it available about that Venn diagram and she threw in another one, You need to, you know, take a bath in data. and you have to really want to know more. As an SI, you guys are at the heart of it. the data to get more insights, I mean you love data. and how much of a challenge is that with clients? Now, the challenge is to integrate the data And so you know, you were discussing, I don't have the data to prove it. [Caryn And Ritesh] Yes, yes. You have to ask the right question. And sometimes when you see the data, Caryn: Yes, all the time. Give me the data and I'll, you know, And the culture. and so, you know, these should not be, like, and I need you to, the data engineer that was, say ten years ago, and you know maybe run some Monte Carlo simulation. and that you know, more often than not And I go to Facebook, immediately I see the ad and the data scientist. You close this application, you log into Facebook... Ritesh: Because everything is linked I wonder if that whole model is going to get disrupted that is available to everybody now, you know. Do you think that machine intelligence going to require people, you know? Right, so in that example you gave, and the remarks that you log All you got to do is look at fraud detection as an example. We're live from the IBM CTO conference
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
Ritesh Ororo | PERSON | 0.99+ |
Caryn | PERSON | 0.99+ |
John Fourier | PERSON | 0.99+ |
Ritesh | PERSON | 0.99+ |
IBM | ORGANIZATION | 0.99+ |
US | LOCATION | 0.99+ |
50 | QUANTITY | 0.99+ |
Cayn Woodruff | PERSON | 0.99+ |
Boston | LOCATION | 0.99+ |
San Francisco | LOCATION | 0.99+ |
China | LOCATION | 0.99+ |
India | LOCATION | 0.99+ |
last year | DATE | 0.99+ |
Excel | TITLE | 0.99+ |
one | QUANTITY | 0.99+ |
Caryn Woodruff | PERSON | 0.99+ |
Ritesh Arora | PERSON | 0.99+ |
Hilary Mason | PERSON | 0.99+ |
60 | QUANTITY | 0.99+ |
130 | QUANTITY | 0.99+ |
One | QUANTITY | 0.99+ |
Monte Carlo | TITLE | 0.99+ |
HCL Technologies | ORGANIZATION | 0.99+ |
ORGANIZATION | 0.99+ | |
third system | QUANTITY | 0.98+ |
today | DATE | 0.98+ |
Interpol | ORGANIZATION | 0.98+ |
ten years ago | DATE | 0.98+ |
two applications | QUANTITY | 0.98+ |
first | QUANTITY | 0.98+ |
Parc 55 | LOCATION | 0.98+ |
five pillars | QUANTITY | 0.98+ |
one system | QUANTITY | 0.98+ |
ORGANIZATION | 0.97+ | |
two aspects | QUANTITY | 0.97+ |
both coasts | QUANTITY | 0.97+ |
one person | QUANTITY | 0.96+ |
Ten years back | DATE | 0.96+ |
two minutes | QUANTITY | 0.95+ |
this month | DATE | 0.95+ |
Union Square | LOCATION | 0.95+ |
two worlds | QUANTITY | 0.94+ |
Spring 2018 | DATE | 0.94+ |
Popular Science | TITLE | 0.9+ |
CTO | EVENT | 0.88+ |
days | QUANTITY | 0.88+ |
one way | QUANTITY | 0.87+ |
SPSS | TITLE | 0.86+ |
single trusted sources | QUANTITY | 0.85+ |
Venn | ORGANIZATION | 0.84+ |
few years ago | DATE | 0.84+ |
150 chief data officers | QUANTITY | 0.83+ |
last 10 20 years | DATE | 0.83+ |
Officer Strategy Summit 2018 | EVENT | 0.82+ |
hundreds of application | QUANTITY | 0.8+ |
last 10 years | DATE | 0.8+ |
Cube | COMMERCIAL_ITEM | 0.79+ |
IBM Chief | EVENT | 0.79+ |
IBM CDO strategy summit | EVENT | 0.72+ |
last ten years | DATE | 0.7+ |
IBM CDO Summit | EVENT | 0.7+ |
fall | DATE | 0.68+ |
Cube | TITLE | 0.66+ |
spring | DATE | 0.65+ |
last 20 years | DATE | 0.63+ |
minute | QUANTITY | 0.49+ |