Jonathan Nguyen-Duy, Fortinet | RSAC USA 2020
>>Fly from San Francisco. It's the cube covering RSA conference, 2020 San Francisco brought to you by Silicon angle media. >>Welcome back everybody. Jeffrey here with the cube. We're at RSA 2020, downtown San Francisco and Moscone center, 40,000 professionals in the security industries, the biggest security event in the world. I'm pretty sure, certainly the biggest one in the U S we're excited to have somebody who's been running around taking care of these problems and talking to customers for a very long time. It's got a great longterm perspective. We're happy to have him. Jonathan, new wind, the VP global field say-so team for fortunate. Jonathan, great to see you. So you said you've been coming to this show for a long, long time. Love to get kind of your impressions that the human element is the theme. Yeah, well, sheer, you know, I, I think, uh, it's changing. It's uh, the attendance is broken out by very senior people who've been here for, you know, multiple events and then a whole new slew of people are coming into the industry, right. >>And there's a lot of excitement. It's, um, there's a little bit less of a buzz. It just seems it's a little bit less people here this year because of the virus scare. Um, but overall I think that the themes are pretty consistent, which is kind of tragic that the themes are consistent year after year because this suggests that not a lot has changed despite the $130 billion and it works with purity span. You know, absolutely complexity. Uh, everyone is telling me about how to solve complexity, how to do more with less, uh, how to do more with less and fewer people and how to get their arms around this vast volume of data that's being generated. And there's a lot of talk about automation and AI, uh, but much more practical, less buzzwords and more practical solutions. And yet still tons of new vendors, right? Tons of new opportunities. >>You know, I don't know what the final count is on the vendor side, but it's a really large number and you go off into the corners to the EDBD little, little, a little mini boost is still a time of innovation. So I think that people trying to move the ball. So I think when the first show first started, there were less than a less than 500 vendors, I think in the industry back in 2007 I think today we're North of of 5,000 and it's probably 8,000 or about 5,000 vendors in the immediate vicinity here. But just go around the corner and there are dozens of others having their own events and the neighboring hotels and restaurants. It's astounding the number of different point products are still coming into the industry and, and, and that really suggests that we haven't gotten our arms around integrating all of this technology. >>And it's just another level of complexity. So what do you tell your friends on the buy side, right? Who know you and say, say Jonathan, I'm going, I'm going to RSA. How in the heck am I supposed to navigate not only the show specifically, but kind of this vendor landscape and then make sense of it all? I'm telling him to look for vendors that are partners that have a longterm perspective and that do the integration for you. You know, one of the things coming from an operational background, as I talked to other CSOs, like our job is to operate technology. It really isn't about integrating technology. It really isn't about OAA and product. I want to focus my budget and my resources on operating technologies and manage risk. So I look for partners and mentors like, like Fordanet that has a fabric with 258 plus different products and vendors that are already integrated out of the box. >>I'm looking for someone that solves complexity rather than a specific problem or specific threat vector. And I'm really looking for some of that helps me understand and manage risk because that's the object of the exercise in cybersecurity today. It's not about compliance, it's about compliance, it's about security, it's about resilience, but a reasonable level of care in managing risk. Right. And yeah, it's, it's a great topic cause I was thinking that kind of in terms of insurance. Yeah. In terms of, you know, how much do you spend and you can't insure everything to 100% right. So it's going to be some number less than that. Everybody else needs a piece of the pie. But how do you make those kinds of trade offs, investment versus risk? Because you can't absolutely protect everything. It makes no sense. So I think that value of it comes back to the CSO and his or her team. >>It's a very human decision. Uh, there is no prescriptive definition of what reasonable care is. You know, outside of one statement by Kamala Harrison, she was the state's attorney in California here, which is the CIS 20 is the minimum level of reasonable care. And so now we have to understand how do we define what is reasonable, what is the risk appetite or tolerance for a company? And once you identify those things, what are the controls and mitigation measures that you're gonna have in place to mitigate those risks? And then what's left is residual risk. And that's a hard decision. How much will you absorb? How much will you transfer, uh, and how much will you just tolerate? Um, but it's really no longer just about compliance, uh, and it's no longer just about having a security or continuity or resilience about all of those things. At a reasonable level. >>Right. It's interesting as pulling up Winnie Naylor from, from Cisco gave one of the early ketos and she talked about, you know, really this security profession, embracing those pesky people that keep clicking on links because really they're the people that can, that have the data around the specific, um, applications and specific assets that the company has to kinda have that informed decision as to what is it worth to protect and do we need to protect it? Do we need to protect them more? Can we let this thing go a little bit? Yeah. I think the human element is the hardest part, you know, in mind at this conference and its theme, that human element. The hardest part about this job is that it's not just mechanical issues on routing issues and networking issues, but it's about dealing with all types of humans, innocent humans that do strange and bad things unknowingly. >>And then malicious people who do very bad things that by design. And so the research suggests that no matter what we do in security awareness training, some 4% of our employee base will continually fail security awareness tests. Well, we fished actively. And so one of the things that we need to do is use automation and intelligence so that you could comb through all of that data and make a better informed decision about what risks you're going to mitigate, right? And for this 4% that are habitually abusing the system and can't be retrained while you can isolate them, right, and make sure that they're, they're separated and they're not able to, uh, to do things that may harm the organization. Right. The other human element is the people on the security teams, right. And it's a tough resource. There aren't enough of them. And, and, and historically, they'd been the ones that, that integration point between all these different systems and it's a highly stressful job. >>You know, there was a Forbes article that said 17% of all CSOs are functional alcoholics. I mean, I mean, and they met as a 17 for 17%. One of every six CSOs medicates himself or herself with alcohol. And medicate is a very specific term of art. It doesn't mean recreational drinking means you are a functional alcoholic and that tells you about the level of stress and complexity. You know, in this job, our research suggests that the average CSO lifespan is somewhere on the low end of about 12 months on the high end, somewhere about 24. You know, in their role or in their profession, their role and their current job, their current gig, they're not lasting more than than two years. Uh, the sheer complexity and stress of the job and you know, and, and those, of course, 24 months, three of those months are just orientation cause that gives you an idea. >>It's a level of stress and complexity that the average CSO is going to face here. Right. So really begs for a lot more automation, a lot more automation on the defense side. It does, it, it makes for a lot more automation. And how do you help those teams cope with a massive levels of complexity and data that's coming out of these digitized and digitally transformed enterprises, right? And when you think about each person's going to generate three to five terabytes of data per person per day, uh, and that computing is going to change in the next three to five years. Right now 85% of computing and data generated comes from traditional it functions as you move into 5g and edge based computing, the vast majority of data generating computing will be done on the edge. So the level of complexity, the number of technologies and devices that we're going to have to monitor is only going to expand, right? >>Right, right. And the speed of those transactions and the speed of the potential harm. So marry that against the research data says that 99% of the attacks could have been mitigated through simple intermediate controls and that the patches, the signatures were readily available. And so the thing to contemplate as we go into this heightened level of complexity and expansion of our computing environment is we're missing the basics today, right? Right. If 99% of the successful attacks are based upon exploits that are known that the signatures are available in the patches available for then a year, what are we going to do when everything else becomes even more complex, more sophisticated. Yeah. That's funny. That was part of, of of raw heats keynote, uh, to kick off the whole thing is he said, you know, we as security professionals like to focus on the complex, we like to focus on the, the ornate and the, and the super sophisticated attacks on the reality is the vast majority and we're just coming right in the normal side door that they've been coming in all along. >>And one thing I decided during my time at the Verizon data breach investigations report was a 77% of all the breaches were not identified by the security team. They were identified by law enforcement. And so 77, 77% of the case. So let's, so let's say you've got a CIS admin that that goes out and accesses financial information before the earnings call and does insider trading. And it's the sec that calls the FBI. And then it's the FBI that calls you and said, by the way, your CIS admin is going to be charged with insider trading. And that's how they know that there's been a compromise out. And in many cases, what does that tell you? Despite $130 billion of network security spend this year alone, that's seven out of 10 data breaches will be identified by law enforcement and not the security team. Yeah. So that tells you that not the security law enforcement team, either it's the FBI or the sec hires the cl service and it just says that security is so complex that until we find ways like the FORNAS security fabric to automate and to manage complexity in an integrated way, you know, that's the, that's the leading edge indicator that I look for is that at what point do security teams identify more data breaches then law enforcement and the victims and they're way behind at this point? >>I think so, unfortunately. Yes. That's crazy. So, um, but there's a lot more AI now that you guys can use to write on the good guys side. But how does that really square the circle when you're saying so many of it just comes through the simple approaches because of lack of visibility. Uh, SOC teams are overwhelmed by the volume of data. And so the way to address the volume and variety and velocity of data is to use artificial intelligence to use a machine to make human decisions and behavior at machine speed. And so when we launched our 40 AI product offering and the virtual security analysts, you know, the research that we did suggest that is he pivoted a five SOC analysts. And so that's one way of helping SOC teams that are overwhelmed by the volume of data that are understaffed, to use artificial intelligence to distill out from all of that, that data, that useful patterns, and to marry that with our Florida guard intelligence, say, okay, this is the techniques, tactics and procedures most likely associated with this threat vector right now, escalate that to a human to make a decision on whether you want to mitigate that. >>And once you decide to mitigate that, use the automated and integrated capabilities of the fabric to make an efficient and effective, uh, mitigation, uh, of that incident. Right? Yeah. Yeah. That's interesting. You bring up the sec case. We had a conversation earlier today where we were talking about deep fakes. Yeah. If somebody had the use case that, you know, what, if you just had a pretty straight forward, deep fake of some executive from some companies saying something to move the market and you drop that into the, uh, into the social stream three minutes before the close on a Friday, you get a play off the off the margin leverage. Nobody gets to really investigate the thing until the four minutes are over. Markets are closed, right? You get a significant financials damage in a situation like that, not even really directly impacting the company system. Right. >>So you're, you're hitting on the fact that we are more interconnected than ever and that the traditional compensating controls that we would have used to mitigate that type of risk is not, not as effective. And so, you know, that's going to be a challenge moving forward. Everything is going to be more interconnected, accelerated and decisions will be driven by data. So it's all of those things will drive complexity. So maybe next year when we talk again, we'll see it and see that. But I'm a little, one of the reasons I'm, you know, I have a credit freeze personally is that I'm aware of things like, like deep fakes, uh, impersonations moving my identities. So having a credit freeze allows, allows me to know that no one can leverage my credit even if they have my data. Right. Interesting. So thanks. Question. We sit down here a year from now, uh, without the benefit of 20, 20 hindsight. >>Yeah. You know, what do you think the themes are going to be? What, what do you see as kind of this kind of short term move in the market based on some of these factors that you've identified? I think, uh, more automation, more uh, artificial intelligence ways of automating the traditional process was insecurity. The secondarily, I think there's going to be the rising awareness of edge based computing and smart systems, autonomous level five vehicles that are networked and rather than a sensory based awareness, smart homes, smart industrial applications, uh, that computing will be done on the edge increasingly and those industrial applications, that 85% of the data computer will be done there. And that increasingly the cloud will become a repository for, for, uh, for storage and correlation. But the actual computing and actuation will be done on the edge. And so as 5g takes hold, you're going to see tremendous transformations in our society and our economy and how we conduct commerce, how we communicate. >>Uh, and that leads some more complexity. That's why, that's why I'm so focused on helping organizations getting security right now before that next onslaught of complexity hits us. It's coming. It is the five G IOT thing is, is just around the corner. The look at the telcos, there is a very specific reason why they're investing literally hundreds of billions of dollars into five G and the tremendous societal and economic changes that that will bring in infrastructure, communications and security will have to stay pace with that. One of the things that we're going to see moving forward is that the digital infrastructure is only successful only as successful as a security is. And I think we'll, we should see a breakdown in the traditional operational silos in network operations and security operations as Michelle Dennett. He said earlier on the air, if you cannot protect, you should not connect. But unfortunately people are still connecting before they're ready to. Absolutely. Well, hopefully there'll be a little bit more circumspect going forward. We'll try Jonathan, thanks for, uh, for taking a few minutes and sharing your perspective. Really appreciate it. Always a fun time. Alright, Jonathan, I'm Jeff. You're watching the cube where at RSA 2020 from downtown San Francisco. Thanks for watching. We'll see you next time.
SUMMARY :
RSA conference, 2020 San Francisco brought to you by Silicon the attendance is broken out by very senior people who've been here for, you know, multiple events and then because of the virus scare. off into the corners to the EDBD little, little, a little mini boost is still a time of innovation. You know, one of the things coming from an operational background, as I talked to other of the exercise in cybersecurity today. And once you identify those things, what are the controls and mitigation measures that you're gonna have in place I think the human element is the hardest part, you know, And so one of the things that of the job and you know, and, and those, of course, 24 months, three of those months It's a level of stress and complexity that the average CSO is going to face here. And so the thing to contemplate as we go into this heightened And it's the sec that calls the FBI. And so the way to address the volume and variety and velocity of data is to use artificial intelligence If somebody had the use case that, you know, what, if you just had a pretty straight forward, But I'm a little, one of the reasons I'm, you know, I have a credit freeze personally is And that increasingly the cloud He said earlier on the air, if you cannot protect, you should not connect.
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
Michelle Dennett | PERSON | 0.99+ |
Jeff | PERSON | 0.99+ |
FBI | ORGANIZATION | 0.99+ |
Kamala Harrison | PERSON | 0.99+ |
California | LOCATION | 0.99+ |
Jonathan | PERSON | 0.99+ |
$130 billion | QUANTITY | 0.99+ |
Cisco | ORGANIZATION | 0.99+ |
100% | QUANTITY | 0.99+ |
Verizon | ORGANIZATION | 0.99+ |
2007 | DATE | 0.99+ |
85% | QUANTITY | 0.99+ |
San Francisco | LOCATION | 0.99+ |
99% | QUANTITY | 0.99+ |
Jeffrey | PERSON | 0.99+ |
seven | QUANTITY | 0.99+ |
three | QUANTITY | 0.99+ |
4% | QUANTITY | 0.99+ |
Jonathan Nguyen-Duy | PERSON | 0.99+ |
17% | QUANTITY | 0.99+ |
77, 77% | QUANTITY | 0.99+ |
24 months | QUANTITY | 0.99+ |
20 | QUANTITY | 0.99+ |
17 | QUANTITY | 0.99+ |
8,000 | QUANTITY | 0.99+ |
five terabytes | QUANTITY | 0.99+ |
77% | QUANTITY | 0.99+ |
next year | DATE | 0.99+ |
40,000 professionals | QUANTITY | 0.99+ |
one | QUANTITY | 0.99+ |
One | QUANTITY | 0.99+ |
Fordanet | ORGANIZATION | 0.98+ |
four minutes | QUANTITY | 0.98+ |
today | DATE | 0.98+ |
RSA | EVENT | 0.98+ |
10 data breaches | QUANTITY | 0.98+ |
FORNAS | ORGANIZATION | 0.98+ |
Moscone | LOCATION | 0.98+ |
dozens | QUANTITY | 0.97+ |
each person | QUANTITY | 0.97+ |
about 5,000 vendors | QUANTITY | 0.97+ |
about 12 months | QUANTITY | 0.97+ |
Fortinet | ORGANIZATION | 0.97+ |
more than than two years | QUANTITY | 0.96+ |
first | QUANTITY | 0.96+ |
five SOC | QUANTITY | 0.96+ |
40 AI | QUANTITY | 0.96+ |
one statement | QUANTITY | 0.96+ |
this year | DATE | 0.95+ |
hundreds of billions of dollars | QUANTITY | 0.95+ |
Friday | DATE | 0.95+ |
RSAC | ORGANIZATION | 0.95+ |
one way | QUANTITY | 0.95+ |
one thing | QUANTITY | 0.94+ |
Winnie Naylor | PERSON | 0.94+ |
level five vehicles | QUANTITY | 0.93+ |
Florida | LOCATION | 0.92+ |
Tons of new opportunities | QUANTITY | 0.91+ |
less than 500 vendors | QUANTITY | 0.91+ |
about 24 | QUANTITY | 0.9+ |
a year | QUANTITY | 0.9+ |
earlier today | DATE | 0.9+ |
258 plus | QUANTITY | 0.9+ |
less than a | QUANTITY | 0.9+ |
RSA 2020 | EVENT | 0.9+ |
first show | QUANTITY | 0.9+ |
five years | QUANTITY | 0.88+ |
EDBD | ORGANIZATION | 0.87+ |
RSA | ORGANIZATION | 0.86+ |
Silicon angle | ORGANIZATION | 0.83+ |
5,000 | QUANTITY | 0.82+ |
Forbes | ORGANIZATION | 0.8+ |
USA | LOCATION | 0.79+ |
three minutes | QUANTITY | 0.79+ |
U S | LOCATION | 0.77+ |
2020 | EVENT | 0.74+ |
CIS | ORGANIZATION | 0.72+ |
Jonathan Nguyen-Duy, Fortinet | CUBE Conversations Jan 2018
(bright orchestral music) >> John: Hello there and welcome to this special cube conversation, I'm John Furrier, here in theCUBE's Palo Alto studio. We're here with Jonathan Nguyen, who's with, formerly Verizon, now with Fortinet. What's your title? >> Jonathan: Vice President of Strategy. >> John: Vice President of Strategy, but you're really, more of a security guru. You, notably, were the author of the Verizon data breach investigative report. Great report >> Jonathan: Thank you. >> John: It really has been the industry standard. Congratulations, great to have you here. >> Jonathan: Thanks, it was a great 16 years at Verizon in the security business, ran that data breach investigations team. So yeah, that was a great honor in my career. >> John: So you call it "strategy" because they don't want you to word cyber security in your title on LinkedIn in case they spearfish you. Is that right? (laughs) >> Jonathan: Yeah, having started my career as a US Foreign Service Officer, as a victim of the OPM data breach, everything about me is out there. I love in the perfect universe about how do you defend your identity when everything about you has been compromised to begin with. >> John: So many stories I had a Cube guest talk about LinkedIn and the tactics involved in spearfishing and the efforts that people go in to attack that critical resource that's inside a perimeter. This is a big problem. This is the problem with cyber warfare and security and crime. >> Jonathan: Yes. >> John: Talk about that dynamic, because this is, I mean, we always talk about the cloud changes, the perimeter, but of course, more than ever this is really critical. >> Jonathan: So, fundamentally as we begin going into digital transformation and notions about where data is today and the nature of computing, so everything has changed and the notion of a traditional perimeter has changed as well. So I'm going to borrow a great analogy from my friend Ed Amoroso and he said Look, let's pretend that this is your traditional enterprise network and all of your assets are in there, and we all agreed that that perimeter firewall is being probed every day by nation-state actors, organized criminal syndicates, hacktivists, anybody. Everyone's probing that environment. It's also dissolving because you've got staffers inside there using shadow IT, so they're opening up that firewall as well. Then, you've got applications and portals that need to be accessed by your stakeholders, your vendors, your customers. And so that traditional wall is gradually eroding, but yet that's where all of our data is, right? And against this environment you've got this group, this unstoppable force, as Ed calls it, these nation-state actors, these organize crime, these hacktivist groups, all highly sophisticated, and we all agree, that with time and effort, they can all penetrate that traditional perimeter. We know that because that's why we hire pin testers and red-teamers to demonstrate how to get into that network and how to protect that. So, if that's the case that we have this force, and they're going to break in eventually, why are we still spending all of our time and effort to defend this traditional perimeter that's highly vulnerable? Well the answer is, of course, that we need to distribute these work loads, into multiple clouds and into multi-hybrid cloud solutions. The challenge has been, well how do you do that with enough control and visibility and detection as you would have in a traditional perimeter, because a lot of folks just simply don't trust that type of deployment. >> John: That's the state of the art, that's the state of the art problem. How to deal with the complexity of IT as with digital transformation as it becomes so complicated and so important at the same time, yet cloud is also on the horizon and it's here. We see the results with Amazon Web Services. We see what Azur's doing and Google, etc., etc. And some companies are building their own cloud, so you have this new model, with cloud computing, data-driven applications, and it's complex, but does that change the security paradigm? How does the complexity play into it? >> Jonathan: Absolutely, so complexity has always been the enemy of security and at Fortinet, what we essentially do is that we help companies understand and manage complexities to manage risk. So complexity is only going to increase, so digital transformation, the widespread adoption of digital technologies to enable exponential and explosive productivity growth, right? Societal-level changes, right? >> John: Right. >> Jonathan: Also massive expand the inter connective nature of our society. More and more introductions. Accelerated cycles across the board. Greater levels of complexity. The challenge is going to be, not about whether you're moving into the cloud. Everyone is going to move into the cloud, that is the basis of computing moving next. So in the Australian government, the US government, all the agencies have a cloud-first migration initiative. It's not about whether. It's not about, it's really about when, so how do you move forward with moving your computing, your workload into the cloud? In many ways, it goes back to fundamentals about risk management. It's about understanding your users and your systems, the criticality, the applications you're associated with, and understanding what can you move into the cloud and what do you keep on prim in a private cloud as it were. >> John: I want to ask you more about global, more about cyber security, but first let's take a step back and set the table. What is the wholistic and the general trend in cyber security today. I mean, what is the, what's going on in the landscape and what are the core problems people are optimizing for? >> Jonathan: Sure. So, across my 20-odd years in cyber, what we've seen consistently has been the acceleration of the volume, the complexity, and the variety of cyber threats. 10 years ago, 2007 or so, there were about 500 threat factors. Today we're north of 5,000. Back in that point, there were maybe 200 vendors, today we're north of 5,000 vendors. There was less than $1 billion of cyber security spent. Today we're north of $80 billion of spend and yet the same challenges pervade. And what's happening now, they're only becoming more accelerated, so in the threat environment, the criminal environment, the nation-state threat actors, they're all becoming more sophisticated. They're all sharing information. They're sharing TTP and they're sharing in a very highly effective marketplace. The dark web cyber crime marketplace is an effective mechanism on sharing information, on matching threat actors to targets. So the frequency, the variety, the intelligence of attacks, automated ransomware attacks, is only going to grow. Across the board, all of us on this side of the fence, our challenge is going to be, how do we effectively address security at speed and scale. And that's the key because you can effect security very well in very discrete systems, networks, facilities, but how do you do it from the IoT Edge, from the home area network, the vehicle area network, the personal area network, to the enterprise network, then to a hybrid cloud. A highly distributed ecosystem and how do you have visibility and scale across that when the interval of detection between the detonation of malware to the point of irrecoverable damage, is in seconds. >> John: So tons of attack vectors, but also I would add to complicate the situation further is the surface area. You mentioned IoT. >> Jonathan: Yeah. >> John: We've seen examples of IoT increasing, more avenues in. >> Jonathan: Yeah. >> John: Okay, so you've got more surface area, more attack vectors with technology. Malware is one. We've seen that and ransomware certainly number one. But it's not just financial gain, it's also, there's terrorism involved. >> Jonathan: Absolutely. >> John: So, it's not just financial services, get the cash and embarrass a company. It's, I want to take down that power plant. >> Jonathan: Sure. >> John: So, is there a common thread, because you can, I mean, every vertical is going to have their own rendering issues, have their own kind of situation contextually. But is there a common thread across the industry that cyber security is run, is there a baseline that you guys are attacking and that problems are being solved on? Can you talk about that? >> Jonathan: Sure. So, at the heart of that is a convergence of operational technologies and information technology. Operational technologies were never designed to be IP enabled. They were air-gapped. Never designed to be integrated and interconnected with information technology systems. The challenge has been, as you said, is that as you go through digital transformation, become more interconnected, how do you understand when a thermostat has gone offline, or a conveyor belt has gone offline, or a furnace is going out of control, how do you understand that the HVAC system for the operating theater, the surgery theater, is operating properly? Now we have this notion of functional safety and you have to marry that with cyber security and so, in many ways, the traditional approaches are still relevant today. Understanding what systems you have, the users that use them, and what's happening in that and to detect those anomalies and mitigate that in a timely fashion. Those themes are still relevant, it's just that they're much, much larger now. >> John: Let's get back to the perimeter erosion issue because... >> Jonathan: Yeah. >> John: One of the things we're seeing on The Cube is digital transformation, it's out there, to kick around the buzzword, it's out there, but it's certainly, it's relevant. People are transforming to a digital business. Peter Burrows had (unintelligible) they talk about this all the time and it's a lot, a lot involves IT, business process, putting data to work, all that good stuff, transforming the business, drive revenue, but security is more coarse. And sometimes it's, we're seeing it being unbundled from IT and reporting directly up to either the board level or C level. So, that being said, how do you solve this? I'm a digital transformation candidate. I'm doing it. I got, my mind's full of security all the time. How do I solve the security problems, cyber security problem? Just prevention, other things? What's the formula? >> Jonathan: Okay, so at the heart of cyber security is risk management. So digital transformation is the use of digital technology to drive exponential productivity gains across the board and it's about data-driven decision making versus intuitive-led human decision making. So, the heart of digital transformation is making sure that the business leaders have the timely information to make decisions in a much more timely fashion. So that you have better business outcomes and better quality of life, safety, if you will. And so the challenge is about how do you actually enable digital transformation and it comes down to trust. And so, again across the pillars of digital transformation and they are first, IoT, these devices that are connected to collect and share information, to make decisions, the sheer volume of data, zetabytes of data that will be generated in a process of these transactions. Then you have ubiquitous access and you're going to have 5G. You have this notion of centralized and distributed computing. How will you enable those decisions to be made across the board? And then, how do you secure all of that? And so, at the heart of this is the ability to have automated, and that's key, automated deep visibility and control across an ecosystem. So you've got to be able to understand, at machine speed, what is happening. >> John: How do I do that? What do I do? Do I buy a box? Do I, is it a mindset? Is it everything? What's the, how do I stop those cyber attacks? >> Jonathan: So, you need a framework of automated devices that are integrated. So a couple of things you're going to need. You're going to need to have the points across this ecosystem where you can detect. So, whether that is a firewall on that IoT Edge or in the Home or there's an internally segmented firewall, across the enterprise network into the hybrid cloud. You're also going to need to have intelligence and by intelligence, I mean you're going to need a partner who has a global infrastructure of telemetry to understand what's happening in real time, in the wild. And once you collect that data, you're going to need to have intelligence analysts, researchers, that can put into context what that data means, because data doesn't become information on its own. You actively have to have someone analyze that. So you have to have a team. At Fortinet, we have hundreds of people who do just that. And once you have the intelligence, you've got to have a way of utilizing it, right? And so, then you've got a way of orchestrating that intelligence into that large framework of integrated devices so you can act. And in order to do that effectively, you have to do that at machine speed and that's what I mean by speed and scale. The big challenge about security is the ability to have deep visibility and control at speed, at machine speed, and at scale from that IoT Edge way across into the cloud. >> John: Scale's interesting, so I want to ask you about the Fortinet. How are you guys at Fortinet solving this problem for customers because you have to, is it, the totality of the offering? Is it some here, technology here and again, you've got 5,000 attack vectors, you mentioned that earlier and you did the defense report at Verizon, your former job. So you kind of know the landscape. What does Fortinet do? What do you guys, how do you solve that problem? >> Jonathan: So, from day one, every CISO has been trying to build the fabric. We didn't call it that, but from my first packet-filtering firewall to my first stateful firewall, then I deployed intrusion-detection systems and when all that generated far more lists than I can manage, I deployed an SEM. And then I went to intrusion prevention and I had to look at logs, and so I went to an SIEM. And when that didn't work, I deployed Sandbox, which was called dynamic malware inspection back in the day. And then when that didn't work, I had to go to analytics. And then I had to bring in third-party technology, third-party intelligence feeds and all along, I hoped I was able to make those firewalls, those defense sensors, that platform integrated with intelligence, work somehow to detect the attack and mitigate that in real time. Now, what we essentially do in the Fortinet security fabric is we reduce that complexity. We bring that level of automa-... >> John: And by the way, your ad hoc, you're reacting in that mode. You're just, ya know, I got to do this. I got to add that to it. So it's almost like sprawling, software sprawl. You're just throwing solutions at the wall. >> Jonathan: Right, and a lot of that time, no one knows if the devices are properly configured. No one has actually done the third party technology integration. No one has actually met the requirements that we'd employ three years ago through requirements today and the requirements three years from now. And so, that's a huge level of complexity and I think at the heart of that complexity, that's reflected in the fact that we're missing the basic elements in security across today. The reason the large data attacks and the data breaches didn't come because of advanced malware. They didn't happen of nation-state threats. These were known vulnerabilities. The patches existed. They weren't patched. In my experience, 80% of all the attacks could be mitigated through simple to intermediate controls. >> John: Deploying the patches. Doing the job. >> Jonathan: Complexity. Patch management sounds easy. It's hard. Some applications, there is no patch available. You can't take things offline. You have to have virtual patches or unintended consequences. And there are a lot of things that don't happen. There's the handoff between the IT team and the security team and it adds complexity. And if you think about this, if our current teams are so overwhelmed that they cannot mitigate known attacks, exploits against known vulnerabilities, how are they going to be able to grapple with the complexity of managing zetabytes of data with an ecosystem that spans around the world, that operates in milliseconds, where now it's not just digital issues. It's health, safety, physical security. How can we trust that a connected vehicle is secure or not. >> John: Talk about the dynamic between machines and humans because you mentioned patches, and this is, you can argue that it's a human mistake, but also you mentioned automation earlier. The balance between automation, using machines and humans, because prevention and risk management seem to be the axis of the practice. It used to be all prevention, now it's a lot more risk management. There's still a human component in here. >> Jonathan: Yeah. >> John: How are you guys talking about that and how is that rendering itself as a value proposition for customers? >> Jonathan: So, humans are the essence, both the challenge, in so many cases we have faulty passwords, we have bad hygiene. That's why security's awareness training is so critical, right? Because humans are part of the problem, on one end. On the other end, within the sock, humans are grappling with huge amounts of data and trying to understand what is malicious, what needs to be mitigated, and then prioritizing that. For us, it's about helping, the complexity, reducing the complexity of that challenge and helping automate those areas that should be automated so the humans can act better and faster, as it were. >> John: We're here with Jonathan Nguyen with Fortinet. I want to ask you about the ecosystem you mentioned that early and also the role of CISO, the Chief Information Security Officer and CIO, essentially the executives in charge of security. Say you have executives in charge of the risk management, don't get hacked, don't get breached, and also the ecosystem partners. So, you have a very interesting environment right not where people are sharing information, you mentioned that earlier as well. So you got the ecosystem of sharing and you have executives in charge of running their businesses effectively and not have security breaches happen. What's happening in... What are they working on? What are the key things that chief security officers are working on with CIOs? What specifics are on their plate and what's the ecosystem doing around that too? >> Jonathan: Sure. So digital transformation dominates all discussions today. And every CISO has two masters. They have a productivity master, which is always the business-side of the house and they have a security master, which is ensuring that reasonable level of security is, in the advent, managing risk, right? And that's the challenge, how do you balance that? So, across the board, CISOs are being challenged to make sure that the applications, the digital transformation initiatives are actually occurring and at the same time, in the advent of a data breach, understanding the risk and managing the risk. How do you tell your board of directors, your governments that you're not only compliant, but that you have handled risk to a reasonable level of assurance? And that means, in my opinion, across my experience, you've got to be able to demonstrate a couple of things: one, you have identified and adopted, with third-party implementation and attestation, a recommended best practices and controls. Second, you've implemented and used best-in-class products and technologies like Fortinet. Products that have gone through clearances, gone through common criteria, where things are properly certified and that's how you demonstrate a reasonable level. It's really about risk management, understanding what level of risk you will tolerate, what level of risk you will mitigate, and what level of risk you're going to transfer. And I think that's the discussion at the board level today. >> John: So more, make people feel comfortable, but also have a partner that can actually do the heavy lifting on new things. 'Cause there's always going to be a new attack vector out there. >> Jonathan: Absolutely. So I think the key to it is understanding what you're really good at and so then one of the questions I ask ever CISO is that when you look at technology, what is it that your organization is really good at? Is it using technology? Is it operationalizing that experience? Or is it really about ensuring that the firewall is integrated with your sim and that the sim works and trying to create your own threat intelligence. And I think that one of the things we do better than anybody else is that we reduce the level of complexity of that, allowing our clients to really focus on providing security, using the best-in-class technologies to do that. >> John: Jonathan, a final question. In 2018, what's your outlook for the year for CISOs and companies with cyber right now? >> Jonathan: I think it's going to be an exciting time. I think, is there going to be a focus back on basics? Because before we take this next evolutionary leap, in terms of cyber and computing and the digital nature of our society, we've got to get the basics done right. And I think the way Fortinet's going, our ability to use the fabric, to help manage risk, and reduce risk, is going to be the path forward. >> John: This is The Cube, bringing you commentary and coverage of cyber security of course, here in our Palo Alto studio. I'm John Furrier, thanks for watching. (orchestral music) The Cube.
SUMMARY :
John: Hello there and welcome to this special of the Verizon data breach investigative report. John: It really has been the industry standard. in the security business, John: So you call it "strategy" because they don't I love in the perfect universe about how do you and the efforts that people go in to attack the perimeter, but of course, more than ever and portals that need to be accessed by your stakeholders, does that change the security paradigm? the enemy of security and at Fortinet, So in the Australian government, the US government, What is the wholistic and the general And that's the key because you can effect security to complicate the situation further is the surface area. John: We've seen examples of IoT increasing, John: Okay, so you've got more surface area, John: So, it's not just financial services, get the cash John: So, is there a common thread, because you can, So, at the heart of that is a convergence of operational John: Let's get back to the perimeter erosion issue John: One of the things we're seeing on The Cube is have the timely information to make decisions The big challenge about security is the ability to have John: Scale's interesting, so I want to ask you about the attack and mitigate that in real time. John: And by the way, your ad hoc, you're reacting at the heart of that complexity, that's reflected in the John: Deploying the patches. There's the handoff between the IT team and the John: Talk about the dynamic between Jonathan: So, humans are the essence, both the challenge, that early and also the role of CISO, the Chief And that's the challenge, how do you balance that? also have a partner that can actually do the heavy Or is it really about ensuring that the firewall outlook for the year for CISOs and companies with cyber in terms of cyber and computing and the digital John: This is The Cube, bringing you commentary
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
Raj | PERSON | 0.99+ |
David | PERSON | 0.99+ |
Dave Vellante | PERSON | 0.99+ |
Caitlyn | PERSON | 0.99+ |
Pierluca Chiodelli | PERSON | 0.99+ |
Jonathan | PERSON | 0.99+ |
John | PERSON | 0.99+ |
Jim | PERSON | 0.99+ |
Adam | PERSON | 0.99+ |
Lisa Martin | PERSON | 0.99+ |
Lynn Lucas | PERSON | 0.99+ |
Caitlyn Halferty | PERSON | 0.99+ |
$3 | QUANTITY | 0.99+ |
Jonathan Ebinger | PERSON | 0.99+ |
Munyeb Minhazuddin | PERSON | 0.99+ |
Michael Dell | PERSON | 0.99+ |
Christy Parrish | PERSON | 0.99+ |
Microsoft | ORGANIZATION | 0.99+ |
Ed Amoroso | PERSON | 0.99+ |
Adam Schmitt | PERSON | 0.99+ |
SoftBank | ORGANIZATION | 0.99+ |
Sanjay Ghemawat | PERSON | 0.99+ |
Dell | ORGANIZATION | 0.99+ |
Verizon | ORGANIZATION | 0.99+ |
Ashley | PERSON | 0.99+ |
Amazon | ORGANIZATION | 0.99+ |
Greg Sands | PERSON | 0.99+ |
Craig Sanderson | PERSON | 0.99+ |
Lisa | PERSON | 0.99+ |
Cockroach Labs | ORGANIZATION | 0.99+ |
Jim Walker | PERSON | 0.99+ |
ORGANIZATION | 0.99+ | |
Blue Run Ventures | ORGANIZATION | 0.99+ |
Ashley Gaare | PERSON | 0.99+ |
Dave | PERSON | 0.99+ |
2014 | DATE | 0.99+ |
IBM | ORGANIZATION | 0.99+ |
Rob Emsley | PERSON | 0.99+ |
California | LOCATION | 0.99+ |
Lynn | PERSON | 0.99+ |
AWS | ORGANIZATION | 0.99+ |
Allen Crane | PERSON | 0.99+ |
DO NOT MAKE PUBLIC Jonathan Nguyen-Duy, Fortinet | CUBE Conversations
(bright music) >> Hello everybody, welcome to this special CUBE Conversation. I'm John Furrier here in theCUBE's Palo Alto studio. We're here with Jonathan Nguyen, who's with, formally Verizon, now with Fortinet. What's your title? >> Vice President of Strategy. >> Vice President of Strategy, but you're really, I would say, more of a security guru. You had, notably, with the author of the Verizon Data Breach Investigative Report. Great report, it really has been interesting. Congratulations, it's great to have you here. >> Thanks, it was great, 16 years at Verizon, in the security business. ran the data breach investigations team, so that was a great honor in my career, yeah. >> John: So, you called strategy, 'cause they didn't want you to use the word cyber security on your title on LinkedIn in case they spearfish you, is that right, no? (laughs) >> Jonathan: You know, having started my career as a US foreign service officer, as a victim of the OPM data breach, everything about me is out there. >> Yeah. (laughs) >> I live in a perfect universe about how do you defend your identity when everything about you's been compromised to begin with? >> Some of these stories, I had a CUBE guest talk about LinkedIn, and attackers involved in spearfishing, and the efforts that people go into to attack that critical resources inside the parameter. This is a big problem. This is the problem with cyber warfare and security, and crime. >> Yes. Talk about that dynamic, 'cause this is, we always talk about the cloud change, the perimeter, of course. >> Sure. >> More than ever, this is really critical. >> Jonathan: Fundamentally, as we begin going into digital transformation and notions about where data is today and the nature of computing, everything has changed, and the notion of a traditional perimeter has changed as well. I'm going to borrow a great analogy from my friend, Ed Amoroso, and he said, "Look, let's pretend "this is your traditional enterprise network, "and all your assets are in there. "And we all agree that that perimeter firewall "is being probed everyday by nation state actors, "organized criminal syndicates, hacktivists, anybody. "Everyone's probing that environment." It's also dissolving because we've got staffers inside there using shadow IT, so they're opening up that firewall as well. Then you've got applications and portals that need to be accessed by your stakeholders, your vendors, your customers. And so that traditional wall is gradually eroding, yet, that's where all of our data is, right? And against this environment, you've got this group, this unstoppable force, as Ed calls it. These nation-state actors, these organized crime, these hacktivist groups, all highly sophisticated. And we all agree, that with time and effort, they can all penetrate that traditional perimeter. We know that because that's why we hire pin testers, and red teamers, to demonstrate how to get into that network and how to protect that. So if that's the case, that we have this force, and they're going to break in eventually, why are we still spending all of our time and effort to defend this traditional perimeter that's highly vulnerable? Well, the answer is, of course, that we need to distribute these workloads, into multiple clouds, into multi hybrid cloud solutions. The challenge has been, well, how do you do that with enough control and visibility and detection as you have with a traditional perimeter, because a lot of folks just simply don't trust that type of deployment. >> That's the state of the, I mean, that's the state of our problem. How to deal with the complexity of IT, with digital transformation, as it becomes so complicated, and so important, at the same time. Yet, cloud is also on the horizon, it's here. We see the results of Amazon Web Services, see what Azure is doing, Google, et cetera, et cetera. And some companies are doing their own cloud. So, you have this new model, cloud computing. Data driven applications. And it's complex, but does that change the security paradigm? How does the complexity play into it? >> Jonathan: Absolutely, so, complexity has always been the enemy of security. And at Fortinet, what we essentially do is that we help companies understand and manage complexity to manage risk. So complexity is only going to increase. So digital transformation, the widespread adoption of digital technology is to enable exponential explosive productivity growth. Societal level changes, right? Also, massively expand the inter-connective nature of our society. More and more connections, accelerated cycles across the board, greater levels of complexity. The challenge is going to be not about whether we're moving to the cloud, everyone is going to move into the cloud, that is the basis of computing moving next. So in the Australian government, the US government, all of the agencies have a cloud-first migration initiative. It's not about whether, it's not about, it's really about when. So how you move forward with moving your computing, your workloads into the cloud? In many ways it goes back to fundamentals about risk management. It's about understanding your users and your systems, the criticality, the applications you're associated with. And understanding what can you move into the cloud, and what do you keep on-prem, in a private cloud, as it were? >> I want to ask you more about global, more about cybersecurity, but first, take a step back and set the table. What is the holistic and the general trend, in cybersecurity today? What's going on in the landscape, and what are the core problems people are optimizing for? >> Sure. >> So, across my 20-odd years in cyber, what we've seen consistently has been the acceleration of the volume, the complexity, and the variety of cyber threats. So, 10 years ago, 2007 or so, there were about 500 threat factors; today, we're north of 5000. Back at that point, there were maybe 200 vendors; today, we're north of 5000 vendors. There was less than a billion dollars of cybersecurity spent; today, we're north of 80 billion dollars spent. And yet, the same challenges pervade. And what's happening now, they're only becoming more accelerated. So in the threat environment, the criminal environment, the nation-state threat actors, they're all becoming more sophisticated. They're all sharing information! (laughs) They're sharing TTP, and they're sharing it on a highly effective marketplace: the dark web cyber crime marketplace is an effective mechanism of sharing information, of matching threat actors to targets. So the frequency, the variety, the intelligence of attacks, automated ransomware attacks, is only going to grow. Across the board, all of us on this side of the fence, our challenge is going to be, how do we effectively address security at speed and scale? And that's the key. Because you can affect security very well, in very discreet systems, networks, facilities. But how do you do it from the IOT edge? From the home area network, the vehicle area network, the personal area network? To the enterprise network, to then, to a hybrid cloud. A highly distributed ecosystem. And how do you have visibility and scale across that, when the interval of detection, between the detonation of malware, to the point of irrecoverable damage, is in seconds. >> So, tons of attack vectors, but, also, I would add, to complicate the situation further is, the service area, you mentioned IOT. We've seen examples of IOT increasing more avenues in. Okay, so you've got more surface area, more attack vectors with technology. Malware, we see that in ransomware, certainly, number one. But it's not just financial gain, there's also this terrorism involved. >> Absolutely. It's not just financial services get the cash, and embarrass the company, it's, I want to take down that power plant. So, is there a common thread? I mean, every vertical is going to have their own, kind of situation, contextually. But is there a common thread across the industries, that cybersecurity, is there a baseline, that you guys are attacking, that problems are being solved? Can you talk about that? >> Sure. >> So, at the heart of that is a convergence of operational technologies and information technology. Operational technologies were never designed to be IP enabled, they were air gapped. Never designed to be integrated and interconnected, with information technology systems. The challenge has been, as you said, is that as you go through digital transformation, become more interconnected, how do you understand when a thermostat has gone offline, or a conveyor belt has gone offline, or a furnace is going out of control? How do you understand that the HVAC system for the operating theater, the surgery theater, is operating properly? Now we have this notion of functional safety, and you have to marry that with cybersecurity. So, in many ways, the traditional approaches are still relevant today. Understanding what systems you have, the users that use them, and what's happening, in that. And detect those anomalies and to mitigate that, in a timely fashion? Those same themes are still relevant. It's just that they're much, much larger now. >> John: Let's get back to the perimeter erosion issue because one of the things that we're seeing on theCUBE is digital transformations out there. And that's, I kicked a lot of buzzwords out there, but certainly, it's relevant. >> Yeah. People are transforming to digital business. Peter Burroughs had research, we keep on top of those all of the time. And it's, a lot involves IT. Business process, putting data to work, all that good stuff, transforming the business, drive revenue. But security is more coarse. And sometimes we're seeing it unbundled from IT, and we're reporting directly to the board level, or CEO level. That being said, how do you solve this? I'm a digital transformation candidate, I'm doing it, and I'm mindful of security all the time. How do I solve the security problem, cyber security problem? Just prevention, other things? What's the formula? >> Okay, so at the heart of cybersecurity is risk management. So digital transformation is the use of digital technologies to drive exponential productivity gains across the board. And it's about data driven decision making, versus intuitive led human decision making. So at the heart of digital transformation is making sure that the business leaders have their timely information to make decisions, in a much more timely fashion, so they have better business outcomes and better quality of life. Safety, if you will. And so the challenge is about, how do you actually enable digital transformation, it comes down to trust. And so, again, across the pillars of digital transformation. And they are, first, IOT. These devices that are connected collect, share information, to make decisions. The sheer volume of data, zettabytes of data, that will be generated in the process of these transactions. Then you have ubiquitous access. And you're going to have five G, you have this notion of centralized and distributed computing. How will you enable those decisions to be made, across the board? And then how do you secure all of that? And so, at the heart of this is the ability to have, automated, that's key, automated deep visibility and control across an ecosystem. So you've got to be able to understand, at machine speed, what is happening. >> John: How do I do that, what do I do? Do I buy a box, is it mindset, is it everything? How do I solve, how do I stop cyber attacks? >> You need a framework of automated devices that are integrated. So, a couple of things you're going to need: you're going to need to have the points, across this ecosystem, where you can detect. And so, whether that is a firewall on that IOT edge, or in the home, or that's an internally segmented firewall, across the enterprise network into the hybrid cloud. You're also going to need to have intelligence, and by intelligence, that means, you're going to need a partner who has a global infrastructure of telemetry, to understand what's happening in real time, in the wild. And once you collect that data, you're going to need to have intelligence analysts, researchers, that can put into context what that data means, because data doesn't come into information on its own, you actively have to have someone to analyze that. So you have to have a team, at Fortinet, we have hundreds of people who do just that. And once you have the intelligence, you've got to have a way of utilizing it, right? And so, then you've got to have a way of orchestrating that intelligence into that large framework of integrated devices, so you can act. And in order to do that, effectively, you have to do that at machine speed. And that's what I mean by speed and scale. The big challenge about security is the ability to have deep visibility, and control, at speed, at machine speed. And at scale, from that IOT edge, way across, into the cloud. >> Scale is interesting, so what I want to ask you about Fortinet, how are you guys, at Fortinet, solving this problem for customers? Because you have to, is it, the totality of the offering, is it, some technology here, and again, you have 5000 attack vectors, you mentioned that earlier, and you did the defense report at Verizon, in your former jobs. You kind of know the landscape. What does Fortinet do, what are you guys, how do you solve that problem? >> So, from day one, every CSO has been trying to build a fabric, we didn't call it that. But from my first packet-filtering firewall, to my first stateful firewall, then I employed intrusion detection systems, and all of that generated far more lists I can manage, and I deployed an SEM. And then I went to intrusion prevention. And I had to look at logs, so I went to an SIEM. And when that didn't work, I deployed sandboxing, which was called dynamic malware inspection, back in the day, and then when that didn't work, I had to go to analytics. And then, I had to bring in third party technology, third party intelligence feats, and all along, I hoped I was able to make those firewalls, and defense sensors, that platform, integrated with intelligence, work somehow to detect the attack, and mitigate that in real time. Now, what we essentially do, in the Fortinet security fabric is, we reduce that complexity. We bring that level of-- >> And by the way. >> John: You're Ed Hoff, you're reacting in that mode, you're just, I got to do this, I got to add that to it. So it's almost like sprawling, software sprawl. You're just throwing solutions at the wall. >> Right, and a lot of that time, no one knows if their vices are properly configured, no one has actually done the third party technology integration. No one has actually met the requirements that were deployed three years ago, there are requirements today, there are requirements three years from now. And so, that's a huge level of complexity, and I think, at the heart of that complexity. That's reflected in the fact that, we're missing the basic elements in security today. The reason, the large data attacks, and the data breaches, didn't come because of advanced malware, they didn't happen off nation-state threats. These were known vulnerabilities, the patches existed, they weren't patched! In my experience, 80% of all the attacks could be mitigated through simple to intermediate controls. >> Deploying the patches, doing the job. >> Complexity. Patch management sounds easy, it's hard. Some applications, there is no patch available. You can't take things offline, you have to have virtual patches, there are unintended consequences. And there are a lot of things that don't happen. There's the handoff between the IT team and the security team, and it adds complexity. And if you think about this, if our current teams are so overwhelmed that they cannot mitigate known attacks, exploits against known vulnerabilities. How are they going to be able to grapple with the complexity of managing zettabytes of data, with an ecosystem that spans around the world, and operates in milliseconds, where, now, it's not just digital issues, it's health, safety, physical security. How can we trust a connected vehicle, is it secure or not? >> Jon, talk about the digital transformation for industries. As we talked earlier about the commonalities of the industries, they all have their own unique use cases, contextually, I mean, oil and gas, financial services, healthcare, EDU, they all have different things. What is the digital transformation objective and agenda and challenges and opportunities for financial services, healthcare, education, and the public sector? >> So, digital transformation has some similar themes, across industry verticals. For financial services, it's about omnichannel customer engagement, it's about owning that customer experience, how will a financial service company be able to reach each connected consumer? Highly personalized way, highly customized services, suited for that customer so that they can interact, at any time, that they desire, on any device, any media they desire, across the entire experience? For when that person first becomes employed, and has a first checking account, to the point that they retire, the notion around digital transformation for financial services. How do we go about, as an FS company, to reach that customer, in an omnidirectional, omnichannel way, and maximize that experience? How do we do that with highly personalized, highly customized service, self-service, if you will, all with security, across massive amounts of data? How do you ensure that that's the challenge? And then you have to do that in a very distributed ecosystem, from the ATM, home, from the vehicle, and as we move into digitally enabled societies, from the connected car, all of those places will have transactions, all of that will have to be the purveyance of financial services companies. So the level of complexity that they're going to have to grapple with is going to be immense. >> John: And the app, too, is basically the teller, 'cause the app is driving everything, too. It brings up, essentially, the argument, not argument, our thesis, your thesis, on the obvious, which is, the perimeter is eroding. It's the app on the phone. (laughs) Okay, healthcare. Healthcare is one of those things that is near and dear to my heart because, I remember back in the days, when I was younger, HIPAA compliance, it created all of these databases. Creating complexity, but also, structured things. So, healthcare is being disrupted, and security is obviously concerned. More ransomware in hospitals, you see, everywhere these days, big, big issue. >> Yeah, so, challenges in healthcare are twofold. On the one hand, their targets are ransomware because that's where money is. They have compliance challenges, but in a very interesting way, based off of the research we've seen, is that healthcare is a lot more kin to the intelligence community than any other. Because it has insider threats. Large amounts, 7 out of 10 healthcare data breaches are the result of insider threat. So, like financial services, and the other verticals in digital transformation, again, it comes to the notion of the connected consumer and the connected citizen. How do you make sure that that person can be touched and served, irrespective of whether they're in the home, or in another healthcare facility, and all of their devices that are IP-enabled are safe and secure, and to monitor that. And to keep that secure, across a large distributed ecosystem, and for a long period of time, as well. >> Education, talk about insider threats probably there, too. Education is a huge vertical with a lot of, sure, students, but also the general EDU market is hot too. >> Jon: And it's incredibly challenging, because the environment ranges from kindergarten, preschool, to high school, to higher levels of education, that are government funded, with classified intelligence, and materials, and research labs. And the educational environment, how do you provide security, confidentiality, and availability, in an ecosystem that was designed for the free flow and access of information, and how do you do that across a highly distributed ecosystem? Again, constant themes of complexity, volumes of data, and personalized and customized services. >> John: And you got to be able to turn those services on fast, and turn them off and on. Okay, finally, my favorite area is the federal, or public sector market, of course, that also includes higher ed, whatnot. But really government and federal. Public sector, seeing govcloud booming. What are some of the challenges with digital transformation in federal? >> So the hard part of federal government is the notion of service to the connected citizen. And that connected citizen now wants to be able to access city hall, their members of Congress, the White House, in a digital way, at any time, on any device, so that they can log their opinion. It is a cacophony of demand from across the board. From state, local, to federal, that every citizen now demands access to services, on any digital media, and, at the same time, for everything from potholes, and snow removal, and trash removal, those are the types of services that are needed. So, government, now, needs to provide services in the digital way, and provide security across that. >> John: In respect to those verticals, especially public sector and education, transparency is critical. You can't hide, the government can't hide. They provide citizens connectivity, and services. There's no more excuses, they have to go faster. This is a big dynamic. >> I think that we all have expectations of what it is to grow up in a digital world. My children have only grown up in a digital world. They expect things to happen at digital speed, at machine speed, they expect a high level of customized services, so that when they go, and interact with a government agency or a vendor, that vendor, that service provider, needs to know his or her preference. And will automate that and deliver those services in an incredible fashion. As I said earlier, when my kids talk about, when they learned about Moses, and heard about Moses coming down from the mountain with tablets, they thought that he was an Apple user. You know, there was no notion of other types of tablets. The connected citizen is a digital citizen, with digital demands and expectations. And our job in cyber is to enable the digital transformation so that all of those things can be delivered, and expectations met. >> Talk about the dynamic between machines and humans, because you mentioned patches, this is, you could argue it's a human mistake. But also, you mentioned automation earlier. Balance between automation, and using machines and humans. Because prevention and risk management seem to be the axis of the practice. It used to be all prevention, now it's a lot more risk management. There's still a human component in here. How are you guys talking about that, and how is that rendering itself, as a value proposition for customers? >> Sure, so it's just, humans are the essence. Both the challenge, in so many cases, we have faulty passwords, we have bad hygiene. That's why security awareness training is so critical, right, because humans are part of the problem, on one end. On the other end, within the sock, humans are grappling with huge amounts of data, and trying to understand what is malicious, what needs to be mitigated, and then prioritizing that. For us, it's about helping reduce the complexity of that challenge, and helping automate those areas that should be automated, so that humans can act better and faster, as it were. >> We have Jonathan Nguyen with Fortinet. I wanted to ask you about the ecosystem, you mentioned that earlier, and also the role of CSOs, chief information security officers, and CIOs, essentially, they're the executives in charge of security. So, you have the executives in charge of the risk management, don't get hacked, don't get breached. And also, the ecosystem partners. So you have a very interesting environment right now where people are sharing information, you mentioned that earlier, as well. So you got the ecosystem of sharing, and you have executives in charge of running their businesses effectively, and not have security breaches happen. What's happening, what are they working on, what are they key things that chief security officers are working on with CIOs, what specifics are on their plate? And what's the ecosystem doing around that, too? >> So digital transformation dominates all discussions today. And every CSO has two masters. They have a productivity master, which is always the business side of the house, and they have a security master. Which is ensuring that reasonable level of security, in the advent, and managing risk, right? And that's the challenge, how do you balance that? So, across the board, CSOs are being challenged to make sure that the applications, those digital transformation initiatives are actually occurring. At the same time, in the advent of a data breach, understanding the risk and managing the risk. How do you tell your board of directors, your governments, that you're not only compliant, but that you have handled risk to a reasonable level of assurance? And that means, in my opinion, across my experience, you've got to be able to demonstrate a couple of things. One, you have identified and adopted, with third party implementation, and attestation, of recommended best practices and controls. Second, you have implemented and used best-in-class products and technology, like Fortinet. Products that have gone through clearances, gone through common criteria, where things are properly certified. And that's how you demonstrate a reasonable level, it's really about risk management. Understanding what level of risk you will tolerate, what level of risk you will mitigate, and what level of risk you're going to transfer. And I think that's the discussion at the board level today. >> So, make people feel comfortable. But also have a partner that can actually do the heavy lifting on new things. 'Cause there's always going to be a new attack vector out there. >> Absolutely, so, I think the key to it is understanding what you're really good at. And so one of the questions that I ask every CSO is that, when you look at technology, what is it that your organization is really good at? Is it using technology, operationalizing that experience? Or is it really about ensuring that that firewall is integrated with your sim, that the sim works in trying to create your own threat intelligence. And I think one of the things that we do better than anybody else is that we reduce the level of complexity, of that allowing our clients to really focus on providing security, using best-in-class technologies to do that. >> John: That's awesome. I want to just kind of go off the board, on a question that's a little bit more societal oriented, but it's mostly here in the US. You're seeing cryptocurrencies booming, blockchain, whatnot, and it is really kind of two vectors there, that conversation, it's attacks and regulation. So the regulatory environment in DC, on the hill, looks at tech companies these days, oh my god, the big bad, Google, Apple, Facebook. And that's kind of today's narrative. But in general, technology can be an innovation opportunity. So around cyber, it's a little bit more relevant. As govcloud becomes much more ingrained in public sector, what is the regulatory environment out there? Is it helping, is it hurting? What's your thoughts? >> Jonathan: I think, on the most part, it's helping, because regulatory and compliance environments typically lag behind technology. And that's been consistent across not just cyber, but just every field of human endeavor. And I think in cryptocurrency we're beginning to see the effects as governments around the world begin to grapple with, what does this mean, if they have no visibility, insight, or control, over a currency, and we're seeing that in East Asia today. We're seeing that in China, we're seeing that in South Korea. It will have implications, I mean, the question you have to ask, with regards to cryptocurrencies is, will governments allow a non-controlled currency to operate in their marketplace? And given that we are a more integrated and digital marketplace, unless it's adopted on a global basis, is it really compelling? Now, blockchain technology is compelling; what is going to be powering that is a different question. I think that regu-- >> And also. >> The profiteering mode of hackers, which, we talked before we came on camera, is a central part of the dynamic. So if you have a flourishing ecosystem of cryptocurrency, aka Bitcoin, you have, now, a clearinghouse for payments. And that's where ransomware is mostly paid off, in Bitcoin. >> Absolutely. So this is an interesting dynamic, I'm just trying to get a read from how that plays into some of these cybersecurity dynamics. >> I think cybersecurity is highly dynamic, as you said. It is move and countermove, active threat adversaries, active marketplaces coming up with new challenges. I think, for us, on this side of the fence, it's really about making sure, getting the fundamentals right first. I often tell people, first, do you really have all of the security controls in place? Do you really know what's operating in your system? Do you understand your users? Have you done the vulnerability scans? Where are you in those basic things, first? I mean, if you do the basics, you'll mitigate, eight, nine, out of 10 attacks. >> John: Well the costs are going up, obviously, we talked about it, global, earlier. The global impact is interesting, and that's not to say cloud is global, but you now have different regional aspects of cryptocurrencies as one example. But yeah, data breach is another, look at GEPR, the penalties involved. (laughs) And certain countries in Europe, it's going to be astronomical. So there seems to be a tax involved here. So the motivations are multifold. >> So, the motivations in cyber crime. Always consistent, whether they're monetary gain, social media gain, or some sort of political gain. And I think the way you address that is that you cannot take down the marketplace, you cannot take down the physical criminals themselves. You're going to have to take away the ability to monetize, or make gains from cyber attacks. And the way I look at it is that, if you make it so complex to actually launch a successful attack, and then, to go beyond that, and monetize what you've gained, or compromised, you effectively take away the root motivation for cyber crime. And that's, it's an interesting thought, because no one talks about that, because at an industry level, do you really have the ability to, what I call, affect the trajectory of cyber crime? That's a very different way to look at it. >> John: And it's interesting, in Jeff's position, he's basically saying, make it more complex, that'll be more effective against cybersecurity, yet, digital transformation is supposed to make it easier. With building blocks in cloud, you can almost argue that if you can make it easy to deploy in cloud, it's inherently complex. So, creating a very easy to use, complex environment, or complex system, seems to be the architecture. >> The essence of cyber, I think, moving forward, is managing complexity. If you can manage complexity then you have taken complexity and made it your advantage. Because now the cyber criminal has to figure out, where is the data? Is it in the traditional data center, that enterprise environment? Is it a multi-cloud environment, if so, which node, and if I'm successful at compromising one node, I can't get to the next node, because the security fabric separated it. >> John: Jon, the final question, 2018, what's your outlook for the year, for CSOs, and companies with cyber, right now? >> I think it's going to be an exciting time. I think, is there going to be a focus back on basics? Because before we take this next evolutionary leap, in terms of cyber, and computing, and the digital nature of our society, we've got to get the basics done right. And I think the way Fortinet is going, our ability to use the fabric, to help manage risk, and reduce risk, is going to be the path forward. >> Jonathan Nguyen, with Fortinet, former author of the Data Breach Investigation Report, which I've been a big fan of, been reading it for years. Super document, congratulations, it must have been fun working on that. >> It was the high point of my career, at this point. >> It really was a great doc, it was the Bible of state of the art, state of the union, for cyber security. This is theCUBE, bringing you commentary and coverage of cybersecurity, of course, here, in our Palo Alto studio. I'm John Furrier, thanks for watching. (bright music)
SUMMARY :
I'm John Furrier here in theCUBE's Palo Alto studio. Congratulations, it's great to have you here. ran the data breach investigations team, Jonathan: You know, having started my career This is the problem with cyber warfare the perimeter, of course. So if that's the case, that we have this force, that change the security paradigm? So in the Australian government, the US government, What is the holistic and the To the enterprise network, to then, to a hybrid cloud. the service area, you mentioned IOT. and embarrass the company, it's, So, at the heart of that is a convergence because one of the things that we're seeing I'm doing it, and I'm mindful of security all the time. And so, at the heart of this is the ability to have, is the ability to have deep visibility, You kind of know the landscape. back in the day, and then when that didn't work, So it's almost like sprawling, software sprawl. In my experience, 80% of all the attacks and the security team, and it adds complexity. of the industries, they all have their own unique So the level of complexity that they're going to I remember back in the days, when I was younger, So, like financial services, and the other verticals sure, students, but also the general EDU market is hot too. And the educational environment, What are some of the challenges is the notion of service to the connected citizen. You can't hide, the government can't hide. And our job in cyber is to enable the digital transformation and how is that rendering itself, Sure, so it's just, humans are the essence. And also, the ecosystem partners. And that's the challenge, how do you balance that? do the heavy lifting on new things. And so one of the questions that I ask every CSO is that, but it's mostly here in the US. the question you have to ask, is a central part of the dynamic. So this is an interesting dynamic, all of the security controls in place? And certain countries in Europe, it's going to be astronomical. the ability to monetize, or make gains from cyber attacks. or complex system, seems to be the architecture. Because now the cyber criminal has to figure out, and the digital nature of our society, former author of the Data Breach Investigation Report, of state of the art, state of the union,
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
Jonathan | PERSON | 0.99+ |
Jeff | PERSON | 0.99+ |
Ed Amoroso | PERSON | 0.99+ |
John | PERSON | 0.99+ |
Jonathan Nguyen | PERSON | 0.99+ |
Verizon | ORGANIZATION | 0.99+ |
ORGANIZATION | 0.99+ | |
Apple | ORGANIZATION | 0.99+ |
John Furrier | PERSON | 0.99+ |
Ed Hoff | PERSON | 0.99+ |
Europe | LOCATION | 0.99+ |
Moses | PERSON | 0.99+ |
Jon | PERSON | 0.99+ |
Jonathan Nguyen-Duy | PERSON | 0.99+ |
ORGANIZATION | 0.99+ | |
Peter Burroughs | PERSON | 0.99+ |
80% | QUANTITY | 0.99+ |
2018 | DATE | 0.99+ |
Amazon Web Services | ORGANIZATION | 0.99+ |
16 years | QUANTITY | 0.99+ |
China | LOCATION | 0.99+ |
Fortinet | ORGANIZATION | 0.99+ |
East Asia | LOCATION | 0.99+ |
US | LOCATION | 0.99+ |
hundreds | QUANTITY | 0.99+ |
South Korea | LOCATION | 0.99+ |
ORGANIZATION | 0.99+ | |
first | QUANTITY | 0.99+ |
5000 attack vectors | QUANTITY | 0.99+ |
Data Breach Investigation Report | TITLE | 0.99+ |
Palo Alto | LOCATION | 0.99+ |
Second | QUANTITY | 0.99+ |
eight | QUANTITY | 0.99+ |
two masters | QUANTITY | 0.99+ |
Congress | ORGANIZATION | 0.99+ |
2007 | DATE | 0.99+ |
200 vendors | QUANTITY | 0.99+ |
7 | QUANTITY | 0.99+ |
20-odd years | QUANTITY | 0.99+ |
less than a billion dollars | QUANTITY | 0.99+ |
White House | ORGANIZATION | 0.99+ |
10 attacks | QUANTITY | 0.99+ |
today | DATE | 0.99+ |
one example | QUANTITY | 0.99+ |
nine | QUANTITY | 0.99+ |
10 years ago | DATE | 0.99+ |
One | QUANTITY | 0.98+ |
Both | QUANTITY | 0.98+ |
one | QUANTITY | 0.98+ |
Bible | TITLE | 0.98+ |
three years ago | DATE | 0.98+ |
US government | ORGANIZATION | 0.98+ |
each | QUANTITY | 0.98+ |
DC | LOCATION | 0.97+ |
first packet | QUANTITY | 0.96+ |