Nick Barcet, Red Hat & Greg Forrest, Lockheed Martin | KubeCon + CloudNativeCon NA 2022
(lighthearted music) >> Hey all. Welcome back to theCube's coverage of Kubecon North America '22 CloudNativeCon. We're in Detroit. We've been here all day covering day one of the event from our perspective. Three days of coverage coming at you. Lisa Martin here with John Furrier. John, a lot of buzz today. A lot of talk about the maturation of Kubernetes with different services that vendors are offering. We talked a little bit about security earlier today. One of the things that is a hot topic is national security. >> Yeah, this is a huge segment we got coming up. It really takes that all that nerd talk about Kubernetes and puts it into action. We actually see demonstrable results. This is about advanced artificial intelligence for tactical decision making at the edge to support our military operations because a lot of the deaths are because of bad technology. And this has been talked about. We've been covering Silicon Angle, we wrote a story there now on this topic. This should be a really exciting segment so I'm really looking forward to it. >> Excellent, so am I. Please welcome back one of our alumni, Nick Barcet senior director, customer led open innovation at Red Hat. Great to have you back. Greg Forrest joins us as well from Lockheed Martin Director of AI Foundations. Guys, great to have you on the program. Nick, what's been your perception before we dig into the news and break that open of KubeCon 2022? >> So, KubeCon is always a wonderful event because we can see people working with us in the community developing new stuff, people that we see virtually all year. But it's the time at which we can really establish human contact and that's wonderful. And it's also the moments where we can make big topic move forward and the topics have been plenty at this KubeCon from MicroShift to KCP, to AI, to all domains have been covered. >> Greg, you're the director of AI foundations at Lockheed Martin. Obviously well known, contractors to the military lot of intellectual property, storied history. >> Greg: Sure. >> Talk about this announcement with Red Hat 'cause I think this is really indicative of what's happening at the edge. Data, compute, industrial equipment, and people, in this case lives are in danger or to preserve peace. This is a killer story in terms of understanding what this all means. What's your take on this relationship with Red Hat? What's the secret sauce? >> Yeah, it's really important for us. So part of our 21st century security strategy as a company is to partner with companies like Red Hat and Big Tech and bring the best of the commercial world into the Department of Defense for our soldiers on the ground. And that's exactly what we announced today or Tuesday in our partnership. And so the ability to take commercial products and utilize them in theater is really important for saving lives on the ground. And so we can go through exactly what we did as part of this demonstration, but we took MicroShift at the edge and we were able to run our AI payloads on that. That provided us with the ability to do things like AI based RF sensing, so radio frequency sensing. And we were also able to do computer vision based technologies at the edge. So we went out, we had a small UAV that went out and searched for a target on the ground. It found a target using its radio frequency capabilities, the RF capabilities. Then once we're able to hone in on that target, what Red Hat device edge and MicroShift enables us to do is actually then switch sensing modalities. And then we're able to look at this target via the camera and use computer vision-based technologies to actually more accurately locate the target and then track that target in real time. So that's one of the keys to be able to actually switch modalities in real time on one platform is really important for our joint all domain operations construct. The idea of how do you actually connect all of these assets in the environment, in the battle space. >> Talk about the challenge and how hard it is to do this. The back haul, you'll go back to the central server, bring data back, connecting things. What if there's insecurity around connectivity? I mean there's a lot of things going, can you just scope the magnitude of how hard it's to actually deploy something at a tactical edge? >> It is. There's a lot of data that comes from all of these sensors, whether they're RF sensors or EO or IR. We're working across multiple domains, right? And so we want to take that data back and train on that and then redeploy to the edge. And so with MicroShift, we're able to do that in a way that's robust, that's repeatable, and that's automated. And that really instills trust in us and our customers that when we deploy new software capabilities to the edge over the air, like we did in this demonstration that they're going to run right on the target hardware. And so that's a huge advantage to what we're doing here that when we push software to the edge in real time we know it's going to run. >> And in realtime is absolutely critical. We talk about it in so many different industries. Oh, it's customers expect realtime access whether it's your banking app or whatnot. But here we're talking about literally life and death situations on the battlefield. So that realtime data access is literally life and death. >> It's paramount to what we're doing. In this case, the aircraft started with one role which was to go find a radio frequency admitter and then switch roles to then go get cameras and eyes on that. So where is that coming from? Are there people on the ground? Are there dangerous people on the ground? And it gives the end user on the ground complete situational awareness of what is actually happening. And that is key for enhanced decision making. Enhanced decision making is critical to what we're doing. And so that's really where we're advancing this technology and where we can save lives. >> I read a report from General Mattis when he was in service that a lot of the deaths are due to not having enough information really at the edge. >> Greg: Friendly fire. >> Friendly fire, a lot of stuff that goes on there. So this is really, really important. Nick, you're sitting there saying this is great. My customer's talking about the product. This is your innovation, Red Hat device edge in action. This is real. This is industrial- >> So it's more than real. Actually this type of use case is what convinced us to transform a technology we had been working on which is a small form factor of Kubernetes to transform it into a product. Because sometimes, US engineers have a tendency to invent stuff that are great on paper, but it's a solution trying to find a problem. And we need customers to work with us to make sure that do solution do solve a real problem. And Lockheed was great. Worked with us upstream on that project. Helped us prove out that the concept was actually worth it and we waited until Lockheed had tested the concept in the air. >> Okay, so Red Hat device edge and MicroShift, explain that, how that works real quick for the folks that don't know. So one of the thing we learned is that Kubernetes is great but it's only part of the journey. In order to get those workloads on those aircraft or in order to get those workloads in a factory, you also need to consider the full life cycle of the device itself. And you don't handle a device that is inside of a UAV or inside of a factory the same way you handle a server. You have to deal with those devices in a way that is much more akin to a setup box. So we had to modify how the OS was behaving to deal with devices and we reduced what we had built in real for each edge aspect and combined it with MicroShift and that's what became with that Red Hat device edge. >> We're in a low SWAP environment, space, weight and power, right? Or very limited, We're on a small UAS in this demonstration. So the ability to spool up and spool down containers and to save computing power and to do that on demand and orchestrate that with MicroShift is paramount to what we're doing. We wouldn't be able to do it without that capability. >> John: That's awesome. >> I want to get both of your opinions. Nick, we'll start with you and then Greg we'll go to you. In terms of MicroShift , what is its superpower? What differentiates it from other competing solutions in the market? >> So MicroShift is Kubernetes but reduced to the strict minimum of a runtime version of Kubernetes so that it takes a minimal footprint so that we maximize the space available for the workload in those very constraints environments. On a board where you have eight or 16 gig of RAM, if you use only two gig of that to run the infrastructure component, you leave the rest for the AI workload that you need on the drone. And that's what is really important. >> And these AI payloads, the inference that we're doing at the edge is very compute intensive. So again, the ability to manage that and orchestrate that is paramount to running on these very small board computers. These are small drones that don't have a lot of weight that don't allow a lot of space. >> John: Got to be efficient >> And be efficient with it. >> How were you guys involved? Talk about the relationship. So you guys were tightly involved. Talk about the roles you guys played together. Was it co-development? Was it customer/partner? Talk about the relationship. >> Yeah, so we started actually with satellite. So you can think of small cube sets in a very similar environment to a low powered UAV. And it started there. And then in the last, I would say year or so, Nick we have worked together to develop MicroShift. We work closely on Slack channels together like we're part of the same team. >> John: That's great. >> And hey Red Hat, this is what we need, this is what we're looking for. These are the constraints that we have. And this team has been amazing and just delivered on everything that we've asked for. >> I mean this is really an example of the innovation at the edge, industrial edge specifically. You got an operating system, you got form factor challenges, you got operating parameters. And just to having that flex, you can't just take this and put it over there. >> But it's what really is a community applied to an industrial context. So what happened there is we worked as part of the MicroShift community together with a real time communication channel, the same slack that anybody developing Kubernetes uses we've been using to identify where the problems were, how to solve them, bring new ideas and that's how we tackle these problems. >> Yeah, a true open source model I mean the Red Hat and the Lockheed teams were in it together on a daily basis communicating like we were part of the same company. And and that's really how you move these things forward. >> Yeah, and of course open source is great but also you got to lock down the security. How did you guys handle that? What's going on with the security? 'Cause you got to make sure no take over the devices. >> So the funny thing is that even though what we produce is highly inclusive of security concern, our development model is completely open. So it's not security biopurification, it's security because we apply the best practices. >> John: You see everything. >> Absolutely. >> Yes. >> And then you harden it in the joint development, there it is. >> Yeah, but what we support, what we offer as a product is the same for Lockheed or for any other customer because there is no domain where security is not important. When you control the recognition on a drone or where you control the behavior of a robot in a factory, security is paramount because you can't immobilize a country by infecting a robot the same way you could immobilize a military operation- >> Greg: That's right. >> By infecting a UAV. >> Not to change the subject, but I got to go on a tangent here cause it pops in my head. You mentioned cube set, not related to theCUBE of course. Where theCube for the video. Cube sets are very powerful. People can launch space right now very inexpensively. So it's a highly contested and congested environment. Any space activity going on around the corner with you guys? 'Cause remember the world's not around, it's edge is now in space. Mars is the edge. >> That's right. >> Our first prototype for MicroShift was actually a cube set. >> Greg: That's where it started. >> And IBM project, the project called Endurance. That's the first time we actually put MicroShift into use. And that was a very interesting project, very early version of MicroShift . And now we have talks with many other people on reproducing that at more industrial level this was more like a cool high school project. >> But to your point, the scalability across different platforms is there. If we're running on top of MicroShift on this common OS, it just eases the development. Behind the scenes, we have a whole AI factory at Lockheed Martin where we have a common ecosystem for how we actually develop and deploy these algorithms to the edge. And now we've got a common ecosystem at the edge. And so it helps that whole process to be able to do that in automated ways, repeatable ways so we can instill trust in our DRD customer that the validation of verification of this is a really important aspect. >> John: Must be a fun place to work. >> It is, it's exciting. There's endless opportunities. >> You must get a lot of young kids applying for those jobs. They're barely into the whole. I mean, AI's a hot feel and people want to get their hands on real applications. I was serious about space. Is there space activity going on with you guys or is it just now military edge, not yet military space? Or is that classified? >> Yeah, so we're working across multiple fronts, absolutely. >> That's awesome. >> What excite, oh, sorry John. What excites you most, never a dull moment with what you're doing, but just the potential to enable a safer, a more secure world, what excites you most about this partnership and the direction and the we'll say the trajectory it's going on? >> Yeah, I think, for me, the safer insecure world is paramount to what we're doing. We're here for national defense and for our allies and that's really critical to what we're doing. That's what motivates me. That's what gets me up in the morning to know that there is a soldier on the ground who will be using this technology and we will give be giving that person the situational awareness to make the right decisions at the right time. So we can go from small UAVs to larger aircraft or we can do it in a small confined edge device like a stalker UAV. We can scale this up to different products different platforms and they don't even have to be Lockheed Martin >> John: And more devices that are going to be imagined. >> More devices that we haven't even imagined yet. >> Right, that aren't even on the frontier yet. Nick, what's next from your perspective? >> In the domain we are in, next is always plenty of things. Sustainability is a huge domain right now on which we're working. We have lots of things going on in the AI space, stuff going on with Lockheed Martin. We have things going on in the radio network domain. We've been very heavily involved in telecommunication and this is constantly evolving. There is not one domain that, in terms of infrastructure Red Hat is not touching >> Well, this is the first of multiple demonstrations. The scenarios will get more complex with multiple aircraft and in the future, we're also looking at bringing a lot of the 5G work. Lockheed has put a large focus on 5G.mil for military applications and running some of those workloads on top of MicroShift as well is things to come in the future that we are already planning and looking at. >> Yeah, and it's needed in theater to have connectivity. Got to have your own connectivity. >> It's paramount, absolutely. >> Absolutely, it's paramount. It's game-changing. Guys, thank you so much for joining John and me on theCube talking about how Red Hat and Lockheed Martin are working together to leverage AI to really improve decision making and save more lives. It was a wonderful conversation. We're going to have to have you back 'cause we got to follow this. >> Yeah, of course. >> This was great, thank you so much. >> Thank you very much for having us. >> Lisa: Our pleasure, thank you. >> Greg: Really appreciate it. >> Excellent. For our guests and John Furrier, I'm Lisa Martin. You're watching theCUBE Live from KubeCon CloudNativeCon '22 from Detroit. Stick around. Next guest is going to join John and Savannah in just a minute. (lighthearted music)
SUMMARY :
A lot of talk about the of the deaths are because Guys, great to have you on the program. And it's also the contractors to the military What's the secret sauce? And so the ability to and how hard it is to do this. and then redeploy to the edge. on the battlefield. And it gives the end user on the ground that a lot of the deaths My customer's talking about the product. of Kubernetes to transform it So one of the thing we So the ability to spool up in the market? for the AI workload that So again, the ability to manage Talk about the roles you to a low powered UAV. These are the constraints that we have. of the innovation at the edge, as part of the MicroShift And and that's really how you no take over the devices. So the funny thing is that even though in the joint development, the same way you could around the corner with you guys? MicroShift was actually That's the first time we Behind the scenes, we It is, it's exciting. They're barely into the whole. Yeah, so we're working across just the potential to enable the morning to know that that are going to be imagined. More devices that we even on the frontier yet. In the domain we are in, and in the future, we're Got to have your own connectivity. We're going to have to have you back Next guest is going to join John
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
John | PERSON | 0.99+ |
Lockheed | ORGANIZATION | 0.99+ |
Savannah | PERSON | 0.99+ |
Greg Forrest | PERSON | 0.99+ |
Lisa Martin | PERSON | 0.99+ |
Nick Barcet | PERSON | 0.99+ |
John Furrier | PERSON | 0.99+ |
Lisa | PERSON | 0.99+ |
Detroit | LOCATION | 0.99+ |
Greg | PERSON | 0.99+ |
Lockheed Martin | ORGANIZATION | 0.99+ |
John Furrier | PERSON | 0.99+ |
Nick | PERSON | 0.99+ |
Red Hat | ORGANIZATION | 0.99+ |
21st century | DATE | 0.99+ |
eight | QUANTITY | 0.99+ |
Big Tech | ORGANIZATION | 0.99+ |
16 gig | QUANTITY | 0.99+ |
KubeCon | EVENT | 0.99+ |
IBM | ORGANIZATION | 0.99+ |
Three days | QUANTITY | 0.99+ |
Tuesday | DATE | 0.99+ |
both | QUANTITY | 0.99+ |
two gig | QUANTITY | 0.99+ |
Department of Defense | ORGANIZATION | 0.99+ |
first | QUANTITY | 0.99+ |
first time | QUANTITY | 0.99+ |
one | QUANTITY | 0.98+ |
today | DATE | 0.98+ |
one platform | QUANTITY | 0.98+ |
one role | QUANTITY | 0.97+ |
MicroShift | TITLE | 0.97+ |
CloudNativeCon | EVENT | 0.96+ |
first prototype | QUANTITY | 0.96+ |
one domain | QUANTITY | 0.96+ |
KubeCon 2022 | EVENT | 0.95+ |
each edge | QUANTITY | 0.95+ |
Red Hat | ORGANIZATION | 0.95+ |
day one | QUANTITY | 0.95+ |
US | LOCATION | 0.95+ |
Mattis | PERSON | 0.91+ |
General | PERSON | 0.91+ |
Kubernetes | TITLE | 0.9+ |
Slack | ORGANIZATION | 0.88+ |
theCube | ORGANIZATION | 0.84+ |
Michael Kuzma, Lockheed Martin
>> Announcer: From around the globe. It's theCUBE covering Data Citizens '21 brought to you by Collibra. >> Everybody, John Walls here on theCUBE, continuing our coverage of Data Citizens '21 with Michael Kuzma, who is a Senior Data Engineer at Lockheed Martin but he has just not any Senior Data Engineer. He is the Collibra Ranger of the Year, an outstanding award that certainly honors Michael's dedication to training and evaluation, and development. He is the top dog. And so it is our real pleasure to welcome Michael in this morning. Michael, first off congratulations on the recognition. I know it is well deserved, but, I'm certainly it's been a long time in the making for you. So congratulations on that. >> Thanks, John, thanks so much. >> Yeah, let's talk about the award a little bit here because you're the top Collibra Ranger. The fact that you've undergone this intensive training and evaluation process, what has that or what is that doing for you in terms of your professional development and what you're able to provide Lockheed Martin? >> Well, I think the ranger program definitely has helped with my understanding of the tool. First of all, we're standing up Collibra as sort of the key pillar of data governance within Lockheed Martin. So it's important to have people who are subject-matter experts on the tool that can help the different business areas to be able to stand up and just extract as much value as they can from it. >> Yeah, why did this matter to you? I mean, a lot of work, I mean, a lot of work that went into this and to reach the pinnacle required I know sacrifice and commitment on your part and on your team's part for that matter. But why was this of paramount importance to you? >> Well, I think it was partially because I was early on in my Collibra journey when I took the ranger certification and went through it. So it definitely helped to solidify my understanding of the tool and get more into it. That way I can just provide that value to the customers. We also wanted to see what would it look like for other people at Lockheed Martin to become rangers and get proficient in the tool. So I was kind of the Guinea pig for Lockheed and we were evaluating just how it would help us with standing it up. >> Yeah, I mean, talk about the process, if you will a little bit and share with us just what you went through in terms of how many hours this required, what kind of work you had to do, what kind of training and the evaluation process. So kind of take us through there from A to Z if you will, on your journey. >> Yeah, well, it started off, we had to get a virtual environment stood up just so that we could do some of the exercises that the ranger certification requires. So that was an intensive process of just making sure we had all the infrastructure in place to run the sandbox environment. And then once we got that up, it was mainly doing the exercises of, you're provided with the data landscape. How are you going to represent it in the tool? That way your users both business and technical users could go in and see the data that's in there and be able to get value, be able to get insights from it. And I think it was challenging for sure, to just figure out what all is required for standing up the Collibra environment 'cause that was a piece of the ranger not only how to work the tool, but how to stand it up, how to administrate it and in an effective way and get the metamodel set up in an effective way that way you have that longterm sustainability. So it was good seeing all of those different pieces come together. And then after you put it all together, I had the interviews with the Collibra team where you go over everything you did. So it definitely helps when you have to explain it to somebody they're asking questions. It sort of provides you with that dry run for when people in your business area and your company are going to be trying to use the tool and they might not understand about it or what value it can provide. So having that interview almost like a dry run that you can then help customers when they have questions and come to you. >> Yeah, how helpful was that? I mean, you raised a point, interesting point and really thought about that. You're basically going before the board, if you will, and answering a lot of how's and why's about your process, your thinking process, and what you put into place and how you implemented the tools, what have you. What did you find interesting about that? Or what did you find out about yourself perhaps in your knowledge base through that process? >> I definitely think it stretched my knowledge base for it. It was definitely nerve wracking having to go in and explain your rationale to people but it turned out well. And I feel like if you can explain something, like if you do your prep work and you're able to explain it to somebody else, it sort of proves that you have the true understanding on your side of it. So it was definitely a lot of prep work to just anticipate all the different questions, figure it out on my side first and then be able to answer it effectively. >> Yeah, we all like softballs, but what about curve balls? Were there any curve balls that perhaps that came up in that evaluation process? They're like, "Oh, no, I hadn't thought of that. Or I didn't anticipate that." You know sometimes it's those curve balls that really keep us on our toes. >> Yeah, I can't remember any specific questions. I do remember getting thrown some of those curve balls where you give the answer you think it's sufficient and then there's the build on follow on questions to that where you're like, "Okay, well, I didn't of that." And so you're trying to think through it on the spot. So I definitely got some of those I don't remember the exact questions but it definitely helps to be prepared. >> Yeah, it keeps you on your toes for sure. You mentioned that the value of this, perhaps within Lockheed Martin and being par, I think a great example for others within your organization. What about just kind of in the data community at large or your colleagues at other enterprises. What would you say to them in terms of the value in pursuing this kind of honor, this kind of recognition and how it could be put into good use in their work on the day-to-day side of operations? >> Well, I think for people who are early on and trying to stand it up, the video curriculum definitely helped me out for sure. Learning about both the administrative side, as well as how to use the tool as an end user. If you can put your mind yourself in the mindset of an end user, that's where you can really figure out where the most value is going to be coming from. And it was also good just getting that hands-on experience in a sandbox environment, that you could build it out and not have to worry about it breaking anything for your organization, but also figuring out how are you going to set up the metamodel and get it working before people populate the tool? 'Cause it's a lot harder to make updates when people are using it. It's good to try to get that as well established upfront as possible. So it's definitely good to get that hands-on experience with standing that up. And I think it helps you sort of think through all the different intricacies and nuances for standing up your own environment and getting the most value for your company. >> You know, let's talk about Lockheed Martin a little bit and obviously I'm going to take, everybody's pretty well familiar obviously with your work. I mean 110,000 employees worldwide footprint and obviously security and data security is a critical importance. What does Collibra do for you in that respect in terms of whatever peace of mind you might get in terms of data privacy and data security and reliability all these things that really factor, I would assume in the Lockheed Martin's operations. >> Yeah, it does and we're still thinking through all of the things especially with classified information, but it being metadata helps a lot. People are a lot less apprehensive knowing that it's just metadata in the tool. You're not actually keeping the data itself in the tool. So that way we can still have our security pieces on the underlying data. It's more for that discovery piece for us and we're able to see what shared reports are out there to be able to get lineage for different systems and help people's just business understanding of the things that are out there and the technical users as well, getting value from the lineage and system setups. So I think being able to lock down the view permissions that helps too, you know, puts people's minds at ease if you're able to say, "Okay, well, we can make sure only certain people are able to see this." You know, we have some of those built-in as well. >> Yeah, I mean, that's something I know you've done a lot at Lockheed in terms of working on the tech side and the non-tech side. And trying to explain policies, governance, and determining accessibility and putting the right governance controls in place. From a data perspective, again, sharing your insights what you have learned in that regard at Lockheed Martin what would you say to your fellow data colleagues if you will, again, at other enterprises in terms of getting that kind of collaboration and feedback and input from just not the, just the tech side but also the non-tech side of your house? >> Yeah, it's definitely important to get that business side as well because the technical users that while they work with it so much they might not understand that business users are not going to know what all of these things mean and that they're going to need some sort of human readable version of it. So we have people from the different business areas both business representatives and technical representatives who we work with on a consistent basis to get that continual feedback. And that way we're getting what are the priorities from both sides and seeing sort of where the synergies are across the different business areas as well. That way we're not duplicating effort, but we're trying to make it a comprehensive tool that everybody can use. >> Now I know that your relationship at Lockheed Martin with Clipper goes back some four years now. So you have a maturing relationship for sure. And the value there seems to be pretty well-documented. What would you say to others in your space, again not only about, just about Collibra, but about the data, evolution of data in general in terms of giving advice to somebody who's looking at this as a career, or maybe somebody who is just now getting into a more sophisticated look at their data footprint? >> Yeah it's definitely a large field. There's always new things to learn. It's always evolving too. So I think that that first step for an individual is to be willing to to learn those new things, to learn those new systems, processes, ways of thinking and take on tasks that sort of stretch you in your career. Things that you might not have said yes to before but saying yes could give you more of a comprehensive view of the business or give you a better data view as well. And from the company, it's just trying to figure out where the most value lies. Trying to get everybody sort of on the same page when it's the wild west it becomes a lot harder to extract value and move towards value. So trying to get everybody standardized but also give them the flexibility for their individual program or business needs but try to keep people to where there's a common understanding of the data. >> Now, spoken by someone who's been there and is doing that, Michael, we appreciate the insights. And once again, congratulations on the honor. It is a well-deserved. >> Thank you. Thank you. >> You bet Michael Kuzma joining us from Lockheed Martin as the Collibra Ranger of the Year. We continue our discussion here, Data Citizens '21 on theCUBE. (upbeat music)
SUMMARY :
brought to you by Collibra. He is the Collibra Ranger of the Year, is that doing for you that can help the different business areas and on your team's part for that matter. and get proficient in the tool. and the evaluation process. and see the data that's in there the board, if you will, it sort of proves that you that came up in that evaluation process? but it definitely helps to be prepared. You mentioned that the value of this, and getting the most and obviously I'm going to take, and the technical users as well, what would you say to your that they're going to need And the value there seems to of the business or give you congratulations on the honor. Thank you. as the Collibra Ranger of the Year.
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
Michael | PERSON | 0.99+ |
John | PERSON | 0.99+ |
Michael Kuzma | PERSON | 0.99+ |
Lockheed | ORGANIZATION | 0.99+ |
Lockheed Martin | ORGANIZATION | 0.99+ |
Lockheed Martin | ORGANIZATION | 0.99+ |
John Walls | PERSON | 0.99+ |
110,000 employees | QUANTITY | 0.99+ |
Collibra | ORGANIZATION | 0.99+ |
both sides | QUANTITY | 0.98+ |
four years | QUANTITY | 0.97+ |
both | QUANTITY | 0.97+ |
Clipper | ORGANIZATION | 0.97+ |
First | QUANTITY | 0.96+ |
first | QUANTITY | 0.96+ |
first step | QUANTITY | 0.95+ |
Data Citizens '21 | TITLE | 0.95+ |
this morning | DATE | 0.82+ |
both business | QUANTITY | 0.71+ |
Collibra | LOCATION | 0.67+ |
Data | TITLE | 0.62+ |
'21 | TITLE | 0.57+ |
Citizens | ORGANIZATION | 0.54+ |
theCUBE | ORGANIZATION | 0.48+ |
'21 | DATE | 0.42+ |
Collibra | TITLE | 0.39+ |
Maria Demaree, Lockheed Martin Space | AWS re:Invent 2018
live from Las Vegas it's the cube covering AWS reinvents 2018 brought to you by Amazon Web Services Intel and their ecosystem partners okay welcome back everyone live here at Amazon Web Services reinvent 2018 floor to cubes here wall-to-wall coverage - second day of three days I'm John for a table on that Dave six years and we got Maria d'marie here vice president general manager Lockheed Martin space news yesterday was the announcement of a new satellite ground station you guys are partnering with AWS this is an outside-the-box pioneering like move for amazon covered it yesterday on our blog we were giving commentary this is gonna power the iot edge and so essentially it kills the notion of an edge because if there's connectivity everywhere there is no edge the world is round and it's good space that's exactly right that's what you're doing is truly disruptive my team in lockheed martin we provide ground for satellite systems and it's generally usually a physical place that exists where you know where it is there's a large parabolic antenna this completely disrupts that whole concept it becomes a network node of antennas low-cost antennas for our customers and it's truly disruptive exactly to your point let's talk about how it works you have this thing called verge right what you're doing for the cube stats you did for orbit not related to our cube different cube different cubes overages part talk about how it works at amazon explain the system what was what's gonna how it's gonna work okay wasn't sure so amazon with we together had this collaboration which we rolled out yesterday andrew jesse from amazon AWS rolled out AWS brown station which is 12 parabolic antennas it'll be at amazon locations at there they're global regions thank you and so that allows for download of downlink of satellite data to those our system is complementary to that and separate in its low cost antennas across other areas which allows for more frequent connectivity for the satellites more frequent opportunities to downlink data and all of this is available to customers as a service so you were only paying for it when you're using it yeah it's really key when you think about the cost of entry to have access to space it's very expensive if you have to build these large parabolics this allows startups it makes provisioning a jada Center look like a picnic satellites how did it come about where'd the idea come from how would that collaboration start I'm glad you asked so we had Andrew Jesse and our executive vice president Rick Ambrose you know know each other and they had a conversation one day and they said we should do something together and we actually Teresa Carlson and I work for both of them got together got our teams together out in Denver Colorado for a two-day shark tank type activity and we just brought some of our best and brightest from both teams across all of Amazon not even just AWS but other activities and Amazon young people that just graduated from college some of our senior fellows everybody and we just put them in a room and said what are some things that what do we have that we're working on that we might be able to bring three big things the reinvent exactly I like to think it's like we call it peanut butter and chocolate because they're great separately but when you bring them together they're even better and these systems are really complementary to each other and it's just it's been really neat and the teams have had a lot of fun learning from each other it's certainly chink his connectivity to places that don't have connectivity so edge computing had a limitation between power and connectivity power you get battery low cut low you know low battery power batteries they last a long time too now satellite coverage so there's no excuse to trip the first back all the data so backhaul is huge here great huge advantage right so factory in remote areas as you guys did the announcement yesterday were there developers involved how do you see developers playing with this so let's just say I'm into space and I want to visit some satellites what do I do it so I go to the console and say you know move the satellite like a video game and like start mostly what you do is make sure that you can down link whatever type of data you work with can get to you the point of both these systems it gets data into the cloud and that's where the real magic happens because when you can get that downlink down and start using artificial intelligence machine learning the services that are available on that data now you can take action which is really what our customers missions are about it's not necessarily about the satellites or down-looking data from satellites it's about getting data that you can add and turning into the insights family so talk about space history that you guys have had and big legacy with Lockheed Martin I was seeing you know Theresa Carlson and I love to talk about space force that was announced and just the notion of having a space force it's kind of people love you know seeing you know Blue Origin and SpaceX Rockets landing back on the pads so huge interest in the culture back to space there is I have two kids I'm sorry three kids at home too that are actually interested in space I should say but yeah my kids talk about it you know we just had the Mars Lander the insight Lander Monday and we were at dinner Monday night and my kids are like mom that you know yeah we landed something on Mars like that was us yeah so it's it's really an exciting time do we have hardest space a lot of it's because so much technology has advanced recently to the point where we can do a lot more things than we've been able to do and the cost keep coming down coming down so you know NIT I we can easily envision the the heavy lifting and the before and the after can you describe what a customer's going to go through now and how it's different yes if you were gonna build a parabolic antenna it might cost a million dollars you have to have land you might need to have a fence line you have to maintain it operate it this is available as a service so you could imagine if this exists for our customers that might want to you know maybe there's a fire situation and someone needs rapid access to get imagery down to see where something's happen as a service they can connect we can get them on quickly and have their owns all kinds of other moving vehicles mobility kind of feature well I mean mostly right now we're dealing with satellites but that's a good idea that will take back I was like drone deliveries by John to your next meeting talking about video car the whole thing okay so where's this go next how do you envision it evolving after the parts of the Amazon solid connected to the cloud analytics are in the cloud a lot of horsepower absolutely you know we just went to Mars there's a lot of things they're going to be happening in deep space there's a lot of excitement about what's going on and Mars in the moon etc so I will tell you there were more ideas that came out of the shark tank I think that you know this is the start I think of a really great longer-term relationship I hope and that you know we do have some other ideas that we can't really necessarily everyone knows Jeff Bezos loves space yes joke we always say is maybe they put the data centers in space in Mars be a lot cooler Maria thanks for coming on explaining the relationship as Amazon announcement love it I think it's a super groundbreaking pioneering different but it shows where it's going great it's powering a lot of things just the beginning day one actly congratulation thank you okay live cube coverage here day two wrapping up I'm John Faraday Volante thanks for watching we'll see you tomorrow [Music]
**Summary and Sentiment Analysis are not been shown because of improper transcript**
ENTITIES
Entity | Category | Confidence |
---|---|---|
Andrew Jesse | PERSON | 0.99+ |
Maria Demaree | PERSON | 0.99+ |
John | PERSON | 0.99+ |
AWS | ORGANIZATION | 0.99+ |
Amazon Web Services | ORGANIZATION | 0.99+ |
Jeff Bezos | PERSON | 0.99+ |
two kids | QUANTITY | 0.99+ |
Maria d'marie | PERSON | 0.99+ |
Teresa Carlson | PERSON | 0.99+ |
amazon | ORGANIZATION | 0.99+ |
Dave | PERSON | 0.99+ |
Mars | LOCATION | 0.99+ |
Denver Colorado | LOCATION | 0.99+ |
Amazon | ORGANIZATION | 0.99+ |
three kids | QUANTITY | 0.99+ |
Theresa Carlson | PERSON | 0.99+ |
Lockheed Martin | ORGANIZATION | 0.99+ |
Las Vegas | LOCATION | 0.99+ |
Monday night | DATE | 0.99+ |
Maria | PERSON | 0.99+ |
yesterday | DATE | 0.99+ |
Rick Ambrose | PERSON | 0.99+ |
both teams | QUANTITY | 0.99+ |
tomorrow | DATE | 0.98+ |
John Faraday Volante | PERSON | 0.98+ |
six years | QUANTITY | 0.98+ |
both | QUANTITY | 0.98+ |
two-day | QUANTITY | 0.98+ |
three days | QUANTITY | 0.98+ |
second day | QUANTITY | 0.97+ |
Intel | ORGANIZATION | 0.97+ |
Amazon Web Services | ORGANIZATION | 0.96+ |
one day | QUANTITY | 0.95+ |
12 parabolic antennas | QUANTITY | 0.95+ |
Monday | DATE | 0.95+ |
first | QUANTITY | 0.94+ |
andrew jesse | PERSON | 0.94+ |
Lockheed Martin | ORGANIZATION | 0.89+ |
iot | COMMERCIAL_ITEM | 0.89+ |
Mars Lander | COMMERCIAL_ITEM | 0.88+ |
vice president | PERSON | 0.87+ |
three big things | QUANTITY | 0.85+ |
a million dollars | QUANTITY | 0.83+ |
station | COMMERCIAL_ITEM | 0.78+ |
executive vice president | PERSON | 0.78+ |
lockheed martin | ORGANIZATION | 0.77+ |
day one | QUANTITY | 0.76+ |
general manager | PERSON | 0.74+ |
Lockheed Martin | ORGANIZATION | 0.69+ |
day two | QUANTITY | 0.69+ |
lot of horsepower | QUANTITY | 0.68+ |
Origin | ORGANIZATION | 0.66+ |
2018 | DATE | 0.61+ |
Invent 2018 | EVENT | 0.6+ |
lot more things | QUANTITY | 0.57+ |
SpaceX Rockets | COMMERCIAL_ITEM | 0.57+ |
Lander | COMMERCIAL_ITEM | 0.54+ |
insight | COMMERCIAL_ITEM | 0.47+ |
Blue | COMMERCIAL_ITEM | 0.47+ |
John Kreisa, Couchbase | MWC Barcelona 2023
>> Narrator: TheCUBE's live coverage is made possible by funding from Dell Technologies, creating technologies that drive human progress. (upbeat music intro) (logo background tingles) >> Hi everybody, welcome back to day three of MWC23, my name is Dave Vellante and we're here live at the Theater of Barcelona, Lisa Martin, David Nicholson, John Furrier's in our studio in Palo Alto. Lot of buzz at the show, the Mobile World Daily Today, front page, Netflix chief hits back in fair share row, Greg Peters, the co-CEO of Netflix, talking about how, "Hey, you guys want to tax us, the telcos want to tax us, well, maybe you should help us pay for some of the content. Your margins are higher, you have a monopoly, you know, we're delivering all this value, you're bundling Netflix in, from a lot of ISPs so hold on, you know, pump the brakes on that tax," so that's the big news. Lockheed Martin, FOSS issues, AI guidelines, says, "AI's not going to take over your job anytime soon." Although I would say, your job's going to be AI-powered for the next five years. We're going to talk about data, we've been talking about the disaggregation of the telco stack, part of that stack is a data layer. John Kreisa is here, the CMO of Couchbase, John, you know, we've talked about all week, the disaggregation of the telco stacks, they got, you know, Silicon and operating systems that are, you know, real time OS, highly reliable, you know, compute infrastructure all the way up through a telemetry stack, et cetera. And that's a proprietary block that's really exploding, it's like the big bang, like we saw in the enterprise 20 years ago and we haven't had much discussion about that data layer, sort of that horizontal data layer, that's the market you play in. You know, Couchbase obviously has a lot of telco customers- >> John: That's right. >> We've seen, you know, Snowflake and others launch telco businesses. What are you seeing when you talk to customers at the show? What are they doing with that data layer? >> Yeah, so they're building applications to drive and power unique experiences for their users, but of course, it all starts with where the data is. So they're building mobile applications where they're stretching it out to the edge and you have to move the data to the edge, you have to have that capability to deliver that highly interactive experience to their customers or for their own internal use cases out to that edge, so seeing a lot of that with Couchbase and with our customers in telco. >> So what do the telcos want to do with data? I mean, they've got the telemetry data- >> John: Yeah. >> Now they frequently complain about the over-the-top providers that have used that data, again like Netflix, to identify customer demand for content and they're mopping that up in a big way, you know, certainly Amazon and shopping Google and ads, you know, they're all using that network. But what do the telcos do today and what do they want to do in the future? They're all talking about monetization, how do they monetize that data? >> Yeah, well, by taking that data, there's insight to be had, right? So by usage patterns and what's happening, just as you said, so they can deliver a better experience. It's all about getting that edge, if you will, on their competition and so taking that data, using it in a smart way, gives them that edge to deliver a better service and then grow their business. >> We're seeing a lot of action at the edge and, you know, the edge can be a Home Depot or a Lowe's store, but it also could be the far edge, could be a, you know, an oil drilling, an oil rig, it could be a racetrack, you know, certainly hospitals and certain, you know, situations. So let's think about that edge, where there's maybe not a lot of connectivity, there might be private networks going in, in the future- >> John: That's right. >> Private 5G networks. What's the data flow look like there? Do you guys have any customers doing those types of use cases? >> Yeah, absolutely. >> And what are they doing with the data? >> Yeah, absolutely, we've got customers all across, so telco and transportation, all kinds of service delivery and healthcare, for example, we've got customers who are delivering healthcare out at the edge where they have a remote location, they're able to deliver healthcare, but as you said, there's not always connectivity, so they need to have the applications, need to continue to run and then sync back once they have that connectivity. So it's really having the ability to deliver a service, reliably and then know that that will be synced back to some central server when they have connectivity- >> So the processing might occur where the data- >> Compute at the edge. >> How do you sync back? What is that technology? >> Yeah, so there's, so within, so Couchbase and Couchbase's case, we have an autonomous sync capability that brings it back to the cloud once they get back to whether it's a private network that they want to run over, or if they're doing it over a public, you know, wifi network, once it determines that there's connectivity and, it can be peer-to-peer sync, so different edge apps communicating with each other and then ultimately communicating back to a central server. >> I mean, the other theme here, of course, I call it the software-defined telco, right? But you got to have, you got to run on something, got to have hardware. So you see companies like AWS putting Outposts, out to the edge, Outposts, you know, doesn't really run a lot of database to mind, I mean, it runs RDS, you know, maybe they're going to eventually work with companies like... I mean, you're a partner of AWS- >> John: We are. >> Right? So do you see that kind of cloud infrastructure that's moving to the edge? Do you see that as an opportunity for companies like Couchbase? >> Yeah, we do. We see customers wanting to push more and more of that compute out to the edge and so partnering with AWS gives us that opportunity and we are certified on Outpost and- >> Oh, you are? >> We are, yeah. >> Okay. >> Absolutely. >> When did that, go down? >> That was last year, but probably early last year- >> So I can run Couchbase at the edge, on Outpost? >> Yeah, that's right. >> I mean, you know, Outpost adoption has been slow, we've reported on that, but are you seeing any traction there? Are you seeing any nibbles? >> Starting to see some interest, yeah, absolutely. And again, it has to be for the right use case, but again, for service delivery, things like healthcare and in transportation, you know, they're starting to see where they want to have that compute, be very close to where the actions happen. >> And you can run on, in the data center, right? >> That's right. >> You can run in the cloud, you know, you see HPE with GreenLake, you see Dell with Apex, that's essentially their Outposts. >> Yeah. >> They're saying, "Hey, we're going to take our whole infrastructure and make it as a service." >> Yeah, yeah. >> Right? And so you can participate in those environments- >> We do. >> And then so you've got now, you know, we call it supercloud, you've got the on-prem, you've got the, you can run in the public cloud, you can run at the edge and you want that consistent experience- >> That's right. >> You know, from a data layer- >> That's right. >> So is that really the strategy for a data company is taking or should be taking, that horizontal layer across all those use cases? >> You do need to think holistically about it, because you need to be able to deliver as a, you know, as a provider, wherever the customer wants to be able to consume that application. So you do have to think about any of the public clouds or private networks and all the way to the edge. >> What's different John, about the telco business versus the traditional enterprise? >> Well, I mean, there's scale, I mean, one thing they're dealing with, particularly for end user-facing apps, you're dealing at a very very high scale and the expectation that you're going to deliver a very interactive experience. So I'd say one thing in particular that we are focusing on, is making sure we deliver that highly interactive experience but it's the scale of the number of users and customers that they have, and the expectation that your application's always going to work. >> Speaking of applications, I mean, it seems like that's where the innovation is going to come from. We saw yesterday, GSMA announced, I think eight APIs telco APIs, you know, we were talking on theCUBE, one of the analysts was like, "Eight, that's nothing," you know, "What do these guys know about developers?" But you know, as Daniel Royston said, "Eight's better than zero." >> Right? >> So okay, so we're starting there, but the point being, it's all about the apps, that's where the innovation's going to come from- >> That's right. >> So what are you seeing there, in terms of building on top of the data app? >> Right, well you have to provide, I mean, have to provide the APIs and the access because it is really, the rubber meets the road, with the developers and giving them the ability to create those really rich applications where they want and create the experiences and innovate and change the way that they're giving those experiences. >> Yeah, so what's your relationship with developers at Couchbase? >> John: Yeah. >> I mean, talk about that a little bit- >> Yeah, yeah, so we have a great relationship with developers, something we've been investing more and more in, in terms of things like developer relations teams and community, Couchbase started in open source, continue to be based on open source projects and of course, those are very developer centric. So we provide all the consistent APIs for developers to create those applications, whether it's something on Couchbase Lite, which is our kind of edge-based database, or how they can sync that data back and we actually automate a lot of that syncing which is a very difficult developer task which lends them to one of the developer- >> What I'm trying to figure out is, what's the telco developer look like? Is that a developer that comes from the enterprise and somebody comes from the blockchain world, or AI or, you know, there really doesn't seem to be a lot of developer talk here, but there's a huge opportunity. >> Yeah, yeah. >> And, you know, I feel like, the telcos kind of remind me of, you know, a traditional legacy company trying to get into the developer world, you know, even Oracle, okay, they bought Sun, they got Java, so I guess they have developers, but you know, IBM for years tried with Bluemix, they had to end up buying Red Hat, really, and that gave them the developer community. >> Yep. >> EMC used to have a thing called EMC Code, which was a, you know, good effort, but eh. And then, you know, VMware always trying to do that, but, so as you move up the stack obviously, you have greater developer affinity. Where do you think the telco developer's going to come from? How's that going to evolve? >> Yeah, it's interesting, and I think they're... To kind of get to your first question, I think they're fairly traditional enterprise developers and when we break that down, we look at it in terms of what the developer persona is, are they a front-end developer? Like they're writing that front-end app, they don't care so much about the infrastructure behind or are they a full stack developer and they're really involved in the entire application development lifecycle? Or are they living at the backend and they're really wanting to just focus in on that data layer? So we lend towards all of those different personas and we think about them in terms of the APIs that we create, so that's really what the developers are for telcos is, there's a combination of those front-end and full stack developers and so for them to continue to innovate they need to appeal to those developers and that's technology, like Couchbase, is what helps them do that. >> Yeah and you think about the Apples, you know, the app store model or Apple sort of says, "Okay, here's a developer kit, go create." >> John: Yeah. >> "And then if it's successful, you're going to be successful and we're going to take a vig," okay, good model. >> John: Yeah. >> I think I'm hearing, and maybe I misunderstood this, but I think it was the CEO or chairman of Ericsson on the day one keynotes, was saying, "We are going to monetize the, essentially the telemetry data, you know, through APIs, we're going to charge for that," you know, maybe that's not the best approach, I don't know, I think there's got to be some innovation on top. >> John: Yeah. >> Now maybe some of these greenfield telcos are going to do like, you take like a dish networks, what they're doing, they're really trying to drive development layers. So I think it's like this wild west open, you know, community that's got to be formed and right now it's very unclear to me, do you have any insights there? >> I think it is more, like you said, Wild West, I think there's no emerging standard per se for across those different company types and sort of different pieces of the industry. So consequently, it does need to form some more standards in order to really help it grow and I think you're right, you have to have the right APIs and the right access in order to properly monetize, you have to attract those developers or you're not going to be able to monetize properly. >> Do you think that if, in thinking about your business and you know, you've always sold to telcos, but now it's like there's this transformation going on in telcos, will that become an increasingly larger piece of your business or maybe even a more important piece of your business? Or it's kind of be steady state because it's such a slow moving industry? >> No, it is a big and increasing piece of our business, I think telcos like other enterprises, want to continue to innovate and so they look to, you know, technologies like, Couchbase document database that allows them to have more flexibility and deliver the speed that they need to deliver those kinds of applications. So we see a lot of migration off of traditional legacy infrastructure in order to build that new age interface and new age experience that they want to deliver. >> A lot of buzz in Silicon Valley about open AI and Chat GPT- >> Yeah. >> You know, what's your take on all that? >> Yeah, we're looking at it, I think it's exciting technology, I think there's a lot of applications that are kind of, a little, sort of innovate traditional interfaces, so for example, you can train Chat GPT to create code, sample code for Couchbase, right? You can go and get it to give you that sample app which gets you a headstart or you can actually get it to do a better job of, you know, sorting through your documentation, like Chat GPT can do a better job of helping you get access. So it improves the experience overall for developers, so we're excited about, you know, what the prospect of that is. >> So you're playing around with it, like everybody is- >> Yeah. >> And potentially- >> Looking at use cases- >> Ways tO integrate, yeah. >> Hundred percent. >> So are we. John, thanks for coming on theCUBE. Always great to see you, my friend. >> Great, thanks very much. >> All right, you're welcome. All right, keep it right there, theCUBE will be back live from Barcelona at the theater. SiliconANGLE's continuous coverage of MWC23. Go to siliconangle.com for all the news, theCUBE.net is where all the videos are, keep it right there. (cheerful upbeat music outro)
SUMMARY :
that drive human progress. that's the market you play in. We've seen, you know, and you have to move the data to the edge, you know, certainly Amazon that edge, if you will, it could be a racetrack, you know, Do you guys have any customers the applications, need to over a public, you know, out to the edge, Outposts, you know, of that compute out to the edge in transportation, you know, You can run in the cloud, you know, and make it as a service." to deliver as a, you know, and the expectation that But you know, as Daniel Royston said, and change the way that they're continue to be based on open or AI or, you know, there developer world, you know, And then, you know, VMware and so for them to continue to innovate about the Apples, you know, and we're going to take data, you know, through APIs, are going to do like, you and the right access in and so they look to, you know, so we're excited about, you know, yeah. Always great to see you, Go to siliconangle.com for all the news,
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
Dave Vellante | PERSON | 0.99+ |
John | PERSON | 0.99+ |
Greg Peters | PERSON | 0.99+ |
Daniel Royston | PERSON | 0.99+ |
Lisa Martin | PERSON | 0.99+ |
AWS | ORGANIZATION | 0.99+ |
Ericsson | ORGANIZATION | 0.99+ |
David Nicholson | PERSON | 0.99+ |
Palo Alto | LOCATION | 0.99+ |
John Kreisa | PERSON | 0.99+ |
IBM | ORGANIZATION | 0.99+ |
Amazon | ORGANIZATION | 0.99+ |
Netflix | ORGANIZATION | 0.99+ |
last year | DATE | 0.99+ |
Silicon Valley | LOCATION | 0.99+ |
GSMA | ORGANIZATION | 0.99+ |
Java | TITLE | 0.99+ |
Lowe | ORGANIZATION | 0.99+ |
first question | QUANTITY | 0.99+ |
Lockheed Martin | ORGANIZATION | 0.99+ |
ORGANIZATION | 0.99+ | |
Oracle | ORGANIZATION | 0.99+ |
telcos | ORGANIZATION | 0.99+ |
Dell Technologies | ORGANIZATION | 0.99+ |
Dell | ORGANIZATION | 0.99+ |
yesterday | DATE | 0.99+ |
Eight | QUANTITY | 0.99+ |
one | QUANTITY | 0.99+ |
Chat GPT | TITLE | 0.99+ |
Hundred percent | QUANTITY | 0.99+ |
Apple | ORGANIZATION | 0.99+ |
telco | ORGANIZATION | 0.98+ |
Couchbase | ORGANIZATION | 0.98+ |
John Furrier | PERSON | 0.98+ |
siliconangle.com | OTHER | 0.98+ |
Apex | ORGANIZATION | 0.98+ |
Home Depot | ORGANIZATION | 0.98+ |
early last year | DATE | 0.98+ |
Barcelona | LOCATION | 0.98+ |
20 years ago | DATE | 0.98+ |
MWC23 | EVENT | 0.97+ |
Bluemix | ORGANIZATION | 0.96+ |
Sun | ORGANIZATION | 0.96+ |
SiliconANGLE | ORGANIZATION | 0.96+ |
theCUBE | ORGANIZATION | 0.95+ |
GreenLake | ORGANIZATION | 0.94+ |
Apples | ORGANIZATION | 0.94+ |
Snowflake | ORGANIZATION | 0.93+ |
Outpost | ORGANIZATION | 0.93+ |
VMware | ORGANIZATION | 0.93+ |
zero | QUANTITY | 0.93+ |
EMC | ORGANIZATION | 0.91+ |
day three | QUANTITY | 0.9+ |
today | DATE | 0.89+ |
Mobile World Daily Today | TITLE | 0.88+ |
Wild West | ORGANIZATION | 0.88+ |
theCUBE.net | OTHER | 0.87+ |
app store | TITLE | 0.86+ |
one thing | QUANTITY | 0.86+ |
EMC Code | TITLE | 0.86+ |
Couchbase | TITLE | 0.85+ |
Day 1 Wrap | KubeCon + CloudNativeCon NA 2022
>>Hello and welcome back to the live coverage of the Cube here. Live in Detroit, Michigan for Cub Con, our seventh year covering all seven years. The cube has been here. M John Fur, host of the Cube, co-founder of the Cube. I'm here with Lisa Mart, my co-host, and our new host, Savannah Peterson. Great to see you guys. We're wrapping up day one of three days of coverage, and our guest analyst is Sario Wall, who's the cube analyst who's gonna give us his report. He's been out all day, ear to the ground in the sessions, peeking in, sneaking in, crashing him, getting all the data. Great to see you, Sarvi. Lisa Savannah, let's wrap this puppy up. >>I am so excited to be here. My first coupon with the cube and being here with you and Lisa has just been a treat. I can't wait to hear what you have to say in on the report side. And I mean, I have just been reflecting, it was last year's coupon that brought me to you, so I feel so lucky. So much can change in a year, folks. You never know where you're be. Wherever you're sitting today, you could be living your dreams in just a few >>Months. Lisa, so much has changed. I mean, just look at the past this year. Events we're back in person. Yeah. Yep. This is a big team here. They're still wearing masks, although we can take 'em off with a cube. But mask requirement. Tech has changed. Conversations are upleveling, skill gaps still there. So much has changed. >>So much has changed. There's so much evolution and so much innovation that we've also seen. You know, we started out the keynote this morning, standing room. Only thousands of people are here. Even though there's a mass requirement, the community that is CNCF Co Con is stronger than I, stronger than I saw it last year. This is only my second co con. But the collaboration, what they've done, their devotion to the maintainers, their devotion to really finding mentors for mentees was really a strong message this morning. And we heard a >>Lot of that today. And it's going beyond Kubernetes, even though it's called co con. I also call it cloud native con, which I think we'll probably end up being the name because at the end of day, the cloud native scaling, you're starting to see the pressure points. You're start to see where things are breaking, where automation's coming in, breaking in a good way. And we're gonna break it all down Again. So much going on again, I've overs gonna be in charge. Digital is transformation. If you take it to its conclusion, then you will see that the developers are running the business. It isn't a department, it's not serving the business, it is the business. If that's the case, everything has to change. And we're, we're happy to have Sarib here with us Cube analysts on the badge. I saw that with the press pass. Well, >>Thank you. Thanks for getting me that badge. So I'm here with you guys and >>Well, you got a rapport. Let's get into it. You, I >>Know. Let's hear what you gotta say. I'm excited. >>Yeah. Went around, actually attend some sessions and, and with the analysts were sitting in, in the media slash press, and I spoke to some people at their booth and the, there are a few, few patterns, you know, which are, some are the exaggeration of existing patterns or some are kind of new patterns emerging. So things are getting complex in open source. The lawn more projects, right. They have, the CNCF has graduated some projects even after graduation, they're, they're exploring, right? Kubernetes is one of those projects which has graduated. And on that front, just a side note, the new projects where, which are entering the cncf, they're the, we, we gotta see that process and the three stages and all that stuff. I tweeted all day long, if you wanna know what it is, you can look at my tweets. But when I will look, actually write right on that actually after, after the show ends, what, what I saw there, these new projects need to be curated properly. >>I think they need to be weed. There's a lot of noise in these projects. There's a lot of overlap. So the, the work is cut out for CNCF folks, by the way. They're sort of managerial committee or whatever you call that. The, the people who are leading it, they're try, I think they're doing their best and they're doing a good job of that. And another thing actually, I really liked in the morning's keynote was that lot of women on the stage and minorities represented. I loved it, to be honest with you. So believe me, I'm a minority even though I'm Indian, but from India, I'm a minority. So people who have Punjab either know that I'm a minority, so I, I understand their pain and how hard it is to, to break through the ceiling and all that. So I love that part as well. Yeah, the >>Activity is clear. Yeah. From day one. It's in the, it's in the dna. I mean, they'll reject anything that the opposite >>Representation too. I mean, it's not just that everyone's invited, it's they're celebrated and that's a very big difference. Yeah. It's, you see conferences offer discounts for women for tickets or minorities, but you don't necessarily see them put them running where their mouth is actually recruit the right women to be on stage. Right. Something you know a little bit about John >>Diversity brings better outcomes, better product perspectives. The product is better with all the perspectives involved. Percent, it might go a little slower, maybe a little debates, but it's all good. I mean, it's, to me, the better product comes when everyone's in. >>I hope you didn't just imply that women would make society. So >>I think John men, like slower means a slower, >>More diversity, more debate, >>The worst. Bringing the diversity into picture >>Wine. That's, that's how good groups, which is, which is >>Great. I mean, yeah, yeah, >>Yeah, yeah. I, I take that mulligan back and say, hey, you knows >>That's >>Just, it's gonna go so much faster and better and cheaper, but that not diversity. Absolutely. >>Yes. Well, you make better products faster because you have a variety >>Of perspectives. The bigger the group, there's more debate. More debate is key. But the key to success is aligning and committing. Absolutely. Once you have that, and that's what open sources has been about for. Oh God, yeah. Generations >>Has been a huge theme in the >>Show generations. All right, so, so, >>So you have to add another, like another important, so observation if you will, is that the security is, is paramount right. Requirement, especially for open source. There was a stat which was presented in the morning that 60% of the projects in under CNCF have more vulnerabilities today than they had last year. So that was, That's shocking actually. It's a big jump. It's a big jump. Like big jump means jump, jump means like it can be from from 40 to 60 or or 50 or 60. But still that percentage is high. What, what that means is that lot more people are contributing. It's very sort of di carmic or ironic that we say like, Oh this project has 10,000 contributors. Is that a good thing? Right. We do. Do we know the quality of that, where they're coming from? Are there any back doors being, you know, open there? How stringent is the process of rolling those things, which are being checked in, into production? You know, who is doing that? I've >>Wondered about that. Yeah. The quantity, quality, efficacy game. Yes. And what a balance that must be for someone like CNCF putting in the structure to try and >>That's >>Hard. Curate and regulate and, and you know, provide some bumpers on the bowling lane, so to speak, of, of all of these projects. Yeah. >>Yeah. We thought if anybody thought that the innovation coming from, or the number of services coming from AWS or Google Cloud or likes of them is overwhelming, look at open source, it's even more >>Overwhelming. What's your take on the supply chain discussion? More code more happening. What are you hearing there? >>The supply chain from the software? Yeah. >>Supply chain software, supply chain security pays. Are people talking about that? What are you >>Seeing? Yeah, actually people are talking about that. The creation, the curation, not creation. Curation of suppliers of software I think is best done in the cloud. Marketplaces Ive call biased or what, you know, but curation of open source is hard. It's hard to know which project to pick. It's hard to know which project will pan out. Many of the good projects don't see the day light of the day, but some decent ones like it becomes >>A marketing problem. Exactly. The more you have out there. Exactly. The more you gotta get above the noise. Exactly. And the noise echo that. And you got, you got GitHub stars, you got contributors, you have vanity metrics now coming in to this that are influencing what's real. But sometimes the best project could have smaller groups. >>Yeah, exactly. And another controversial thing a little bit I will say that is that there's a economics of the practitioner, right? I usually talk about that and economics of the, the enterprise, right? So practitioners in our world, in software world especially right in systems world, practitioners are changing jobs every two to three years. And number of developers doubles every three years. That's the stat I've seen from Uncle Bob. He's authority on that software side of things. Wow. So that means there's a lot more new entrance that means a lot of churn. So who is watching out for the enterprise enterprises economics, You know, like are we creating stable enterprises? How stable are our operations? On a side note to that, most of us see the software as like one band, which is not true. When we talk about all these roles and personas, somebody's writing software for, for core layer, which is the infrastructure part. Somebody's writing business applications, somebody's writing, you know, systems of bracket, some somebody's writing systems of differentiation. We talk about those things. We need to distinguish between those and have principle based technology consumption, which I usually write about in our Oh, >>So bottom line in Europe about it, in your opinion. Yeah. What's the top story here at coupon? >>Top story is >>Headline. Yeah, >>The, the headline. Okay. The open source cannot be ignored. That's a headline. >>And what should people be paying attention to if there's a trend coming out? See any kind of trends coming out or any kind of signal, What, what do you see that people should pay attention to here? The put top >>Two, three things. The signal is that, that if you are a big shop, like you'd need to assess your like capacity to absorb open source. You need to be certain size to absorb the open source. If you are below that threshold, I mean we can talk about that at some other time. Like what is that threshold? I will suggest you to go with the managed services from somebody, whoever is providing those managed services around open source. So manage es, right? So from, take it from aws, Google Cloud or Azure or IBM or anybody, right? So use open source as managed offering rather than doing it yourself. Because doing it yourself is a lot more heavy lifting. >>I I, >>There's so many thoughts coming, right? >>Mind it's, >>So I gotta ask you, what's your rapport? You have some swag, What's the swag look >>Like to you? I do. Just as serious of a report as you do on the to floor, but I do, so you know, I come from a marketing background and as I, I know that Lisa does as well. And one of the things that I think about that we touched on in this is, is you know, canceling the noise or standing out from the noise and, and on a show floor, that's actually a huge challenge for these startups, especially when you're up against a rancher or companies or a Cisco with a very large budget. And let's say you've only got a couple grand for an activation here. Like most of my clients, that's how I ended up in the CU County ecosystem, was here with the A client before. So there actually was a booth over there and I, they didn't quite catch me enough, but they had noise canceling headphones. >>So if you just wanted to take a minute on the show floor and just not hear anything, which I thought was a little bit clever, but gonna take you through some of my favorite swag from today and to all the vendors, you know, this is why you should really put some thought into your swag. You never know when you're gonna end up on the cube. So since most swag is injection molded plastic that's gonna end up in the landfill, I really appreciate that garden has given all of us a potable plant. And even the packaging is plantable, which is very exciting. So most sustainable swag goes to garden. Well done >>Rep replicated, I believe is their name. They do a really good job every year. They had some very funny pins that say a word that, I'm not gonna say live on television, but they have created, they brought two things for us, yet it's replicated little etch sketch for your inner child, which is very nice. And given that we are in Detroit, we are in Motor City, we are in the home of Ford. We had Ford on the show. I love that they have done the custom K eight s key chains in the blue oval logo. Like >>Fords right behind us by the way, and are on you >>Interviewed, we had 'em on earlier GitLab taking it one level more personal and actually giving out digital portraits today. Nice. Cool. Which is quite fun. Get lap house multiple booths here. They actually IPOed while they were on the show floor at CubeCon 2021, which is fun to see that whole gang again. And then last but not least, really embracing the ship wheel logo of a Kubernetes is the robusta accrue that is giving out bucket hats. And if you check out my Twitter at sabba Savvy, you can see me holding the ship wheel that they're letting everyone pose with. So we are all in on Kubernetes. That cove gone 2022, that's for sure. Yeah. >>And this is something, day one guys, we've got three. >>I wanna get one of those >>Hats. We we need to, we need a group photo >>By the end of Friday we will have a beverage and hats on to sign off. That's, that's my word. If I can convince John, >>Don, what's your takeaway? You guys did a great kind of kickoff about last week or so about what you were excited about, what your thoughts were going to be. We're only on day one, There's been thousands of people here, we've had great conversations with contributors, the community. What's your take on day one? What's your, what's your tagline? >>Well, Savannah and I had at we up, we, we were talking about what we might see and I think we, we were right. I think we had it right. There's gonna be a lot more people than there were last year. Okay, check. That's definitely true. We're in >>Person, which >>Is refreshing. I was very surprised about the mask mandate that kind of caught me up guard. I was major. Yeah. Cause I've been comfortable without the mask. I'm not a mask person, but I had to wear it and I was like, ah, mask. But I understand I support that. But whatever. It's >>Corporate travel policy. So you know, that's what it is. >>And then, you know, they, I thought that they did an okay job with the gates, but they wasn't slow like last time. But on the content side, definitely Kubernetes security, top line headline, Kubernetes at scale security, that's, that's to me the bumper sticker top things to pay attention to the supply chain and the role of docker and the web assembly was a surprise. You're starting to see containers ecosystem coming back to, I won't say tension growth in the functionality of containers cuz they have to solve the security problem in the container images. Okay, you got scanning technology so it's a little bit in the weeds, but there's a huge movement going on to fix that problem to scale it so it's not a problem area contain. And then Dr sent a great job with productivity interviews. Scott Johnston over a hundred million in revenue so far. That's my number. They have not publicly said that. That's what I'm reporting from sources extremely well financially. And they, and they love their business model. They make productivity for developers. That's a scoop. That's new >>Information. That's a nice scoop we just dropped there on the co casually. >>You're watching that. Pay attention to that. But that, that's proof. But guess what, Red Hat's got developers too. Yes. Other people have to, So developers gonna go where it's the best. Yeah. Developers are voting with their code, they're voting with their feet. You will see the winners with the developers and that's what we've talked about. >>Well and the companies are catering to the developers. Savannah and I had a great conversation with Ford. Yeah. You saw, you showed their fantastic swag was an E for Ev right behind us. They were talking about the, all the cultural changes that they've really focused on to cater towards the developers. The developers becoming the influencers as you say. But to see a company that is as, as historied as Ford Motor Company and what they're doing to attract and retain developer talent was impressive. And honestly that surprised me. Yeah. >>And their head of deb relations has been working for, for, for 29 years. Which I mean first of all, most companies on the show floor haven't been around for 29 years. Right. But what I love is when you put community first, you get employees to stick around. And I think community is one of the biggest themes here at Cuco. >>Great. My, my favorite story that surprised me and was cool was the Red Hat Lockheed Martin interview where they had edge deployments with micro edge, >>Micro shift, >>Micro >>Shift, new projects under, there's, there are three new projects under, >>Under that was so, so cool because it was an edge story in deployment for the military where lives are on the line, they actually had it working. That is a real world example of Kubernetes and tech orchestrating to deploy the industrial edge. And I think that's proof in my mind that Kubernetes and this ecosystem is gonna move faster through this next wave of growth. Because once things start clicking, you get hybrid on premise to super cloud and edge. That was, that was my favorite cause it was real. That was real >>Story that it can make is literally life and death on the battlefield. Yeah, that was amazing. With what they're doing and what >>They're talking check out the Lockheed Martin Red Hat edge story on Silicon Angle and then a press release all pillar. >>Yeah. Another actually it's impressive, which we knew this which is happening, but I didn't know that it was happening at this scale is the finops. The finops is, I saw your is a discipline which most companies are adopting bigger companies, which are spending like hundreds of millions dollars in cloud average. Si a team size of finops for finops is seven people. And average number of tools is I think 3.5 or around 3.7 or something like that. Average number of tools they use to control the cost. So finops is a very generic term for years. It's not financial operations, it's the financial operations for the cloud cost, you know, containing the cloud costs. So that's a finops that is a very emerging sort of discipline >>To keep an eye on. And well, not only is that important, I talked to, well one of the principles over there, it's growing and they have real big players in that foundation. Their, their events are highly attended. It's super important. It's just, it's the cost side of cloud. And, and of course, you know, everyone wants to know what's going on. No one wants to leave there. Their Amazon on Yeah, you wanna leave the lights on the cloud, as we always say, you never know what the bill's gonna look like. >>The cloud is gonna reach $3 billion in next few years. So we might as well control the cost there. Yeah, >>It was, it was funny to get the reaction I found, I don't know if I was, how I react, I dunno how I felt. But we, we did introduce Super Cloud to a couple of guests and a, there were a couple reactions, a couple drawn. There was a couple, right. There was a couple, couple reactions. And what I love about the super cloud is that some people are like, oh, cringing. And some people are like, yeah, go. So it's a, it's a solid debate. It is solid. I saw more in the segments that I did with you together. People leaning in. Yeah. Super fun. We had a couple sum up, we had a couple, we had a couple cringes, I'll say their names, but I'll go back and make sure I, >>I think people >>Get 'em later. I think people, >>I think people cringe on the, on the term not on the idea. Yeah. You know, so the whole idea is that we are building top of the cloud >>And then so I mean you're gonna like this, I did successfully introduce here on the cube, a new term called architectural list. He did? That's right. Okay. And I wanna thank Charles Fitzgerald for that cuz he called super cloud architectural list. And that's exactly the point of super cloud. If you have a great coding environment, you shouldn't have to do an architecture to do. You should code and let the architecture of the Super cloud make it happen. And of course Brian Gracely, who will be on tomorrow at his cloud cast said Super Cloud enables super services. Super Cloud enables what Super services, super service. The microservices underneath the covers have to be different. High performing, automated. So again, the debate and Susan, the goal is to keep it open. And that's our, that's our goal. But we had a lot of fun with that. It was fun to poke the bear a little bit. So >>What is interesting to see just how people respond to it too, with you throwing it out there so consistently, >>You wanna poke the bear, get a conversation going, you know, let let it go. We'll see, it's been positive so far. >>There, there I had a discussion outside somebody who is from Ford but not attending this conference and they have been there for a while. I, I just some moment hit like me, like I said, people, okay, technologists are horizontal, the codes are horizontal. They will go from four to GM to Chrysler to Bank of America to, you know, GE whatever, you know, like cross vertical within vertical different vendors. So, but the culture of a company is local, right? Right. Ford has been building cars for forever. They sort of democratize it. They commercialize it, right? But they have some intense culture. It's hard to change those cultures. And how do we bring in the new thinking? What is, what approach that should be? Is it a sandbox approach for like putting new sensors on the car? They have to compete with te likes our Tesla, right? Yeah. But they cannot, if they are afraid of deluding their existing market or they're afraid of failure there, right? So it's very >>Tricky. Great stuff. Sorry. Great to have you on as our cube analyst breaking down the stories. We'll document that, that we'll roll out a post on it. Lisa Savannah, let's wrap up the show for day one. We got day two and three. We'll start with you. What's your summary? Quick bumper sticker. What's today's show all about? >>I'm a community first gal and this entire experience is about community and it's really nice to see the community come together, celebrate that, share ideas, and to have our community together on stage. >>Yeah. To me, to me it was all real. It's happening. Kubernetes cloud native at scale, it's happening, it's real. And we see proof points and we're gonna have faster time to value. It's gonna accelerate faster from here. >>The proof points, the impact is real. And we saw that in some amazing stories. And this is just a one of the cubes >>Coverage. Ib final word on this segment was well >>Said Lisa. Yeah, I, I think I, I would repeat what I said. I got eight, nine years back at a rack space conference. Open source is amazing for one biggest reason. It gives the ability to the developing nations to be at somewhat at par where the dev develop nations and, and those people to lift up their masses through the automation. Cuz when automation happens, the corruption goes down and the economy blossoms. And I think it's great and, and we need to do more in it, but we have to be careful about the supply chains around the software so that, so our systems are secure and they are robust. Yeah, >>That's it. Okay. To me for SAR B and my two great co-host, Lisa Martin, Savannah Peterson. I'm John Furry. You're watching the Cube Day one in, in the Books. We'll see you tomorrow, day two Cuban Cloud Native live in Detroit. Thanks for watching.
SUMMARY :
Great to see you guys. I can't wait to hear what you have to say in on the report side. I mean, just look at the past this year. But the collaboration, what they've done, their devotion If that's the case, everything has to change. So I'm here with you guys and Well, you got a rapport. I'm excited. in the media slash press, and I spoke to some people at their I loved it, to be honest with you. that the opposite I mean, it's not just that everyone's invited, it's they're celebrated and I mean, it's, to me, the better product comes when everyone's in. I hope you didn't just imply that women would make society. Bringing the diversity into picture I mean, yeah, yeah, I, I take that mulligan back and say, hey, you knows Just, it's gonna go so much faster and better and cheaper, but that not diversity. But the key to success is aligning So you have to add another, like another important, so observation And what a balance that must be for someone like CNCF putting in the structure to try and of all of these projects. from, or the number of services coming from AWS or Google Cloud or likes of them is What are you hearing there? The supply chain from the software? What are you Many of the And you got, you got GitHub stars, you got the software as like one band, which is not true. What's the top story here Yeah, The, the headline. I will suggest you to And one of the things that I think about that we touched on in this is, to all the vendors, you know, this is why you should really put some thought into your swag. And given that we are in Detroit, we are in Motor City, And if you check out my Twitter at sabba Savvy, By the end of Friday we will have a beverage and hats on to sign off. last week or so about what you were excited about, what your thoughts were going to be. I think we had it right. I was very surprised about the mask mandate that kind of caught me up guard. So you know, that's what it is. And then, you know, they, I thought that they did an okay job with the gates, but they wasn't slow like last time. That's a nice scoop we just dropped there on the co casually. You will see the winners with the developers and that's what we've The developers becoming the influencers as you say. But what I love is when you put community first, you get employees to stick around. My, my favorite story that surprised me and was cool was the Red Hat Lockheed And I think that's proof in my mind that Kubernetes and this ecosystem is Story that it can make is literally life and death on the battlefield. They're talking check out the Lockheed Martin Red Hat edge story on Silicon Angle and for the cloud cost, you know, containing the cloud costs. And, and of course, you know, everyone wants to know what's going on. So we might as well control the I saw more in the segments that I did with you together. I think people, so the whole idea is that we are building top of the cloud So again, the debate and Susan, the goal is to keep it open. You wanna poke the bear, get a conversation going, you know, let let it go. to Chrysler to Bank of America to, you know, GE whatever, Great to have you on as our cube analyst breaking down the stories. I'm a community first gal and this entire experience is about community and it's really nice to see And we see proof points and we're gonna have faster time to value. The proof points, the impact is real. Ib final word on this segment was well It gives the ability to the developing nations We'll see you tomorrow, day two Cuban Cloud Native live in Detroit.
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
Lisa Martin | PERSON | 0.99+ |
Savannah Peterson | PERSON | 0.99+ |
Brian Gracely | PERSON | 0.99+ |
Sario Wall | PERSON | 0.99+ |
Lisa | PERSON | 0.99+ |
GM | ORGANIZATION | 0.99+ |
Ford | ORGANIZATION | 0.99+ |
Savannah | PERSON | 0.99+ |
Ford Motor Company | ORGANIZATION | 0.99+ |
Europe | LOCATION | 0.99+ |
Lisa Mart | PERSON | 0.99+ |
Detroit | LOCATION | 0.99+ |
John | PERSON | 0.99+ |
Lisa Savannah | PERSON | 0.99+ |
$3 billion | QUANTITY | 0.99+ |
John Furry | PERSON | 0.99+ |
Sarvi | PERSON | 0.99+ |
60% | QUANTITY | 0.99+ |
seventh year | QUANTITY | 0.99+ |
GE | ORGANIZATION | 0.99+ |
Scott Johnston | PERSON | 0.99+ |
Susan | PERSON | 0.99+ |
29 years | QUANTITY | 0.99+ |
Cisco | ORGANIZATION | 0.99+ |
40 | QUANTITY | 0.99+ |
Amazon | ORGANIZATION | 0.99+ |
IBM | ORGANIZATION | 0.99+ |
last year | DATE | 0.99+ |
Charles Fitzgerald | PERSON | 0.99+ |
10,000 contributors | QUANTITY | 0.99+ |
AWS | ORGANIZATION | 0.99+ |
3.5 | QUANTITY | 0.99+ |
60 | QUANTITY | 0.99+ |
Red Hat | ORGANIZATION | 0.99+ |
50 | QUANTITY | 0.99+ |
Chrysler | ORGANIZATION | 0.99+ |
Tesla | ORGANIZATION | 0.99+ |
tomorrow | DATE | 0.99+ |
two things | QUANTITY | 0.99+ |
today | DATE | 0.99+ |
KubeCon | EVENT | 0.99+ |
three years | QUANTITY | 0.99+ |
M John Fur | PERSON | 0.99+ |
last week | DATE | 0.99+ |
three | QUANTITY | 0.99+ |
India | LOCATION | 0.99+ |
three days | QUANTITY | 0.99+ |
Super Cloud | TITLE | 0.99+ |
seven people | QUANTITY | 0.99+ |
Cube | ORGANIZATION | 0.99+ |
one | QUANTITY | 0.98+ |
seven years | QUANTITY | 0.98+ |
Punjab | LOCATION | 0.98+ |
Detroit, Michigan | LOCATION | 0.98+ |
first coupon | QUANTITY | 0.98+ |
hundreds of millions dollars | QUANTITY | 0.98+ |
Cuco | ORGANIZATION | 0.97+ |
over a hundred million | QUANTITY | 0.97+ |
CNCF | ORGANIZATION | 0.97+ |
Kubernetes | PERSON | 0.97+ |
Cub Con | EVENT | 0.97+ |
Day one | QUANTITY | 0.97+ |
day one | QUANTITY | 0.97+ |
aws | ORGANIZATION | 0.96+ |
one band | QUANTITY | 0.96+ |
Two | QUANTITY | 0.96+ |
CloudNativeCon | EVENT | 0.96+ |
day two | QUANTITY | 0.95+ |
three new projects | QUANTITY | 0.95+ |
KubeCon Keynote Analysis | KubeCon + CloudNativeCon NA 2022
(upbeat techno music) >> Hello, everyone. Welcome to theCUBE here live in Detroit for KubeCon + CloudNativeCon 2022. I'm John Furrier, host of theCUBE. This is our seventh consecutive KubeCon + CloudNativeCon. Since inception, theCube's been there every year. And of course, theCUBE continues to grow. So does the community as well as our host roster. I'm here with my co-host, Lisa Martin. Lisa, great to see you. And our new theCube host, Savannah Peterson. Savannah, welcome to theCUBE. >> Thanks, John. >> Welcome. >> Welcome to the team. >> Thanks, team. It's so wonderful to be here. I met you all last KubeCon and to be sitting on this stage in your company is honestly an honor. >> Well, great to have you. Lisa and I have done a lot of shows together and it's great to have more cadence around. You know, more fluid around the content, and also the people. And I would like you to take a minute to tell people your background. You know the community here. What's the roots? You know the Cloud Native world pretty well. >> I know it as well as someone my age can. As we know, the tools and the tech is always changing. So hello, everyone. I'm Savannah Peterson. You can find me on the internet @SavIsSavvy. Would love to hear from you during the show. Big fan of this space and very passionate about DevOps. I've been working in the Silicon Valley and the Silicon Alley for a long time, helping companies scale internationally as a community builder as well as a international public speaker. And honestly, this is just such a fun evolution for my career and I'm grateful to be here with you both. >> We're looking forward to having you on theCUBE. Appreciate it. Lisa? >> Yes. >> KubeCon. Amazing again this year. Just keeps growing bigger and bigger. >> Yes. >> Keynote review, you were in there. >> Yup. >> I had a chance to peek in a little bit, but you were there and got most of the news. What was the action? >> You know, the action was really a big focus around the maintainers, what they're doing, giving them the props and the kudos and the support that they deserve. Not just physically, but mentally as well. That was a really big focus. It was also a big focus on mentoring and really encouraging more people- >> Love that. >> I did, too. I thought that was fantastic to get involved to help others. And then they showed some folks that had great experiences, really kind of growing up within the community. Probably half of the keynote focus this morning was on that. And then looking at some of the other projects that have graduated from CNCF, some of these successful projects, what they're doing, what folks are doing. Cruise, one of the ones that was featured. You've probably seen their driverless cars around San Francisco. So it was great to see that, the successes that they've had and where that's going. >> Yeah. Lisa, we've done how many shows? Hundreds of shows together. When you see a show like this grow and continue to mature, what's your observation? You've seen many shows we've hosted together. What jumps out this year? Is it just that level of maturization? What's your take on this? >> The maturization of the community and the collaboration of the community. I think those two things jumped out at me even more than last year. Last year, obviously a little bit smaller event in North America. It was Los Angeles. This year you got a much stronger sense of the community, the support that they have for each other. There were a lot of standing ovations particularly when the community came out and talked about what they were doing in Ukraine to support fellow community members in Ukraine and also to support other Ukrainians in terms of getting in to tech. Lot of standing ovations. Lot of- >> Savannah: Love that, yeah. >> Real authenticity around the community. >> Yeah, Savannah, we talked on our intro prior to the event about how inclusive this community is. They are really all in on inclusivity. And the Ukraine highlight, this community is together and they're open. They're open to everybody. >> Absolutely. >> And they're also focused on growing the educational knowledge. >> Yeah, I think there's a real celebration of curiosity within this community that we don't find in certain other sectors. And we saw it at dinner last night. I mean, I was struck just like you Lisa walking in today. The energy in that room is palpably different from last year. I saw on Twitter this morning, people are very excited. Many people, their first KubeCon. And I'm sure we're going to be feeding off of that, that kind of energy and that... Just a general enthusiasm and excitement to be here in Detroit all week. It's a treat. >> Yeah, I even saw Stu Miniman earlier, former theCube host. He's at Red Hat. We were talking on the way in and he made an observation I thought was interesting I'll bring up because this show, it's a lot "What is this show? What isn't this show?" And I think this show is about developers. What it isn't is not a business show. It's not about business. It's not about industry kind of posturing or marketing. All the heavy hitters on the dev side are here and you don't see the big execs. I mean, you got the CEOs of startups here but not the CEOs of the big public companies. We see the doers. So, I mean, I think my take is this show's about creating products for builders and creating products that people can consume. And I think that is the Cloud Native lanes that are starting to form. You're either creating something for builders to build stuff with or you're creating stuff that could be consumed. And that seems for applications. So the whole app side and services seem to be huge. >> They also did a great job this morning of showcasing some of the big companies that we all know and love. Spotify. Obviously, I don't think a day goes by where I don't turn on Spotify. And what it's done- >> Me neither. >> What it's done for the community... Same with Intuit, I'm a user of both. Intuit was given an End User Award this morning during the keynote for their contributions, what they're doing. But it was nice to see some just everyday companies, Cloud Native companies that we all know and love, and to understand their contributions to the community and how those contributions are affecting all of us as end users. >> Yeah, and I think those companies like Intuit... Argo's been popular, Arlo now new, seeing those services, and even enterprises are contributing. You know, Lyft is always here, popular with Envoy. The community isn't just vendors and that's the interesting thing. >> I think that's why it works. To me, this event is really about the celebration of developer relations. I mean, every DevRel from every single one of these companies is here. Like you said, in lieu of the executive, that's essentially who we're attracting. And if you look out over the show floor here, I mean, we've probably got, I don't know, three to four extra vendors that we had last year. It totally is a different tone. This community doesn't like to be sold to. This community likes to be collaborative. They like to learn and they like to help. And I think we see that within the ecosystem inside the room today. >> It's not a top down sales pitch. It's really consensus. >> No. >> Do it out in the open transparency. Don't sell me stuff. And I think the other thing I like about this community is that we're starting to see that... And then we've said this in theCube before. We'll say it again. Maybe be more controversial. Digital transformation is about the developer, right? And I think the power is going to shift in every company to the developer because if you take digital transformation to completion, everything happens the way it's happening, the company is the application. It's not IT who serves the organization- >> I love thinking about it like that. That's a great point, John. >> The old phase was IT was a department that served the business. Well, the business is IT now. So that means developer community is going to grow like crazy and they're going to be in the front lines driving all the change. In my opinion, you going to see this developer community grow like crazy and then the business side on industry will match up with that. I think that's what's going to happen. >> So, the developers are becoming the influencers? >> Developers are the power source for all companies. They're in charge. They're going to dictate terms to how businesses will run because that's going to be natural 'cause digital transformation's about the app and the business is the app. So that mean it has to be coded. So I think you're going to see a lot of innovation around app server-like experiences where the the apps are just being developed faster than the infrastructures enabling that completely invisible. And I think you're going to see this kind of architecture-less, I'll put it out there that term architecture-less, environment where you don't need an architecture. It's just you code away. >> Yeah, yeah. We saw GitHub's mentioned in the keynote this morning. And I mean, low code, no code. I think your fingers right on the pulse there. >> Yeah. What did you guys see? Anything else you see? >> I think just the overall... To your point, Savannah, the energy. Definitely higher than last year. When I saw those standing ovations, people really come in together around the sense of community and what they've accomplished especially in the last two plus years of being remote. They did a great job of involving a lot of folks, some of whom are going to be on the program with us this week that did remote parts of the keynote. One of our guests on today from Vitess was talking about the successes and the graduation of their program so that the sense of community, but also not just the sense of it, the actual demonstration of it was also quite palpable this morning, and I think that's something that I'm excited for us to hear about with our guests on the program this week. >> Yeah, and I think the big story coming out so far as the show starts is the developers are in charge. They're going to set the pace for all the ops, data ops, security ops, all operations. And then the co-located events that were held Monday and Tuesday prior to kickoff today. You saw WebAssembly's come out of the woodwork as it got a lot of attention. Two startups got funded heavily on Series A. You're starting to see that project really work well. That's going to be an additional to the container market. So, interesting to see how Docker reacts to that. Red Hat's doing great. ServiceMeshCon was phenomenal. I saw Solo.iOS got massive traction with those guys. So like Service Mesh, WebAssembly, you can start to see the dots connecting. You're starting to see this layer below Kubernetes and then a layer above Kubernetes developing. So I think it's going to be great for applications and great for the infrastructure. I think we'll see how it comes out and all these companies we have on here are all about faster, more integrated, some very, very interesting to see. So far, so good. >> You guys talked about in your highlight session last week or so. Excited to hear about the end users, the customer stories. That's what I'm interested in understanding as well. It's why it resonates with me when I see brands that I recognize. Well, I use it every day. How are they using containers and Kubernetes? How are they actually not just using it to deploy their app, their technologies, that we all expect are going to be up 24/7, but how are they also contributing to the development of it? So I'm really excited to hear those end users. >> We're going to have Lockheed Martin. And we wrote a story on SiliconANGLE, the Red Hat, Lockheed Martin, real innovation on the edge. You're starting to see educate with the edge. It's really the industrial edge coming to be big. It'd be very interesting to see. >> Absolutely, we got Ford Motor Company coming on as well. I always loved stories, Savannah, that are history of companies. Ford's been around since 1903. How is a company that- >> Well, we're in the home of Ford- as well here. >> We are. How they evolved digitally? What are they doing to enable the developers to be those influencers that John says? It's going to be them. >> They're a great example of a company that's always been on the forefront, too. I mean, they had a head of VRs 25 years ago when most people didn't even know what VR was going to stand for. So, I can't wait for that one. You tease the Docker interview coming up very well, John. I'm excited for that one. One last thing I want to bring up that I think is really refreshing and it's reflected right here on this stage is you talked about the inclusion. I think there's a real commitment to diversity here. You can see the diversity stats on CNCF's website. It's right there on KubeCon. At the bottom, there's a link in every email I've gotten highlighting that. We've got two women on this stage all week which is very exciting. And the opening keynote was a woman. So quite frankly, I am happy as a female in this industry to see a bit more representation. And I do appreciate just on the note of being inclusive, it's not just about gender or age, it's also about the way that CNCF thinks about your experience since we're in this kind of pandemic transitional period. They've got little pins. Last year, we had bracelets depending on your level of comfort. Equivocally like a stoplight which is... I just think it's really nice and sensitive and that attention to detail makes people feel comfortable. Which is why we have the community energy that we have. >> Yeah, and being 12 years in the business... With theCUBE, we've been 12 years in the business, seven years with KubeCon and Cloud Native, I really appreciate the Linux Foundation including me as I get older. (Lisa and Savannah laugh) >> Savannah: That's a good point. >> Ageism were, "Hey!" Thank you. >> There was a lot of representation. You talked about females and so often we go to shows and there's very few females. Some companies are excellent at it. But from an optics perspective, to me it stands out. There was great representation across. There was disabled people on stage, people of color, women, men of all ages. It was very well-orchestrated. >> On the demographic- >> And sincere. >> Yeah, yeah. >> And the demographics, too. On the age side, it's lower too. You're starting to see younger... I mean, high school, college representation. I saw a lot of college students last night. I saw on the agenda sessions targeting universities. I mean, I'm telling you this is reaching down. Open source now is so great. It's growing so fast. It's continuing to thunder away. And with success, it's just getting better and better. In fact, we were talking last night about at some point we might not have to write code. Just glue it together. And that's why I think the supply chain and security thing is an issue. But this is why it's so great. Anyone can code and I think there's a lot of learning to have. So, I think we'll continue to do our job to extract the signal from the noise. So, thanks for the kickoff. Good commentary. Thank you. All right. >> Of course. >> Let's get started. Day one of three days of live coverage here at KubeCon + CloudNativeCon. I'm John Furrier with Lisa Martin, and Savannah Peterson. Be back with more coverage starting right now. (gentle upbeat music)
SUMMARY :
And of course, theCUBE continues to grow. and to be sitting on this stage and also the people. to be here with you both. to having you on theCUBE. Amazing again this year. I had a chance to peek in a little bit, and the support that they deserve. Cruise, one of the ones that was featured. grow and continue to mature, and the collaboration of the community. And the Ukraine highlight, on growing the educational knowledge. to be here in Detroit all week. And I think this show is about developers. of showcasing some of the big companies and to understand their and that's the interesting thing. I don't know, three to four extra vendors It's not a top down sales pitch. And I think the power is going to shift I love thinking about it like that. and they're going to be in the front lines and the business is the app. in the keynote this morning. Anything else you see? and the graduation of their program and great for the infrastructure. going to be up 24/7, It's really the industrial I always loved stories, Savannah, as well here. It's going to be them. And the opening keynote was a woman. I really appreciate the Linux Foundation Thank you. to me it stands out. I saw on the agenda sessions Martin, and Savannah Peterson.
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
Savannah | PERSON | 0.99+ |
Lisa Martin | PERSON | 0.99+ |
Savannah Peterson | PERSON | 0.99+ |
John | PERSON | 0.99+ |
Lisa Martin | PERSON | 0.99+ |
Lisa | PERSON | 0.99+ |
San Francisco | LOCATION | 0.99+ |
Ukraine | LOCATION | 0.99+ |
Detroit | LOCATION | 0.99+ |
Ford | ORGANIZATION | 0.99+ |
Los Angeles | LOCATION | 0.99+ |
John Furrier | PERSON | 0.99+ |
North America | LOCATION | 0.99+ |
12 years | QUANTITY | 0.99+ |
Ford Motor Company | ORGANIZATION | 0.99+ |
Last year | DATE | 0.99+ |
12 years | QUANTITY | 0.99+ |
seven years | QUANTITY | 0.99+ |
last year | DATE | 0.99+ |
Red Hat | ORGANIZATION | 0.99+ |
Lockheed Martin | ORGANIZATION | 0.99+ |
Silicon Valley | LOCATION | 0.99+ |
Monday | DATE | 0.99+ |
KubeCon | EVENT | 0.99+ |
CNCF | ORGANIZATION | 0.99+ |
Tuesday | DATE | 0.99+ |
GitHub | ORGANIZATION | 0.99+ |
Linux Foundation | ORGANIZATION | 0.99+ |
Lyft | ORGANIZATION | 0.99+ |
One | QUANTITY | 0.99+ |
today | DATE | 0.99+ |
first | QUANTITY | 0.99+ |
two things | QUANTITY | 0.99+ |
last night | DATE | 0.99+ |
three | QUANTITY | 0.99+ |
last week | DATE | 0.99+ |
Hundreds of shows | QUANTITY | 0.99+ |
CloudNativeCon | EVENT | 0.99+ |
three days | QUANTITY | 0.99+ |
1903 | DATE | 0.99+ |
Arlo | ORGANIZATION | 0.99+ |
both | QUANTITY | 0.98+ |
this week | DATE | 0.98+ |
This year | DATE | 0.98+ |
two women | QUANTITY | 0.98+ |
Spotify | ORGANIZATION | 0.98+ |
Argo | ORGANIZATION | 0.98+ |
Silicon Alley | LOCATION | 0.98+ |
Stu Miniman | PERSON | 0.98+ |
@SavIsSavvy | PERSON | 0.97+ |
Kubernetes | TITLE | 0.96+ |
Solo.iOS | TITLE | 0.96+ |
this year | DATE | 0.96+ |
this morning | DATE | 0.96+ |
25 years ago | DATE | 0.95+ |
one | QUANTITY | 0.95+ |
KubeCon + CloudNativeCon 2022 Preview w/ @Stu
>>Keon Cloud Native Con kicks off in Detroit on October 24th, and we're pleased to have Stewart Miniman, who's the director of Market Insights, hi, at, for hybrid platforms at Red Hat back in the studio to help us understand the key trends to look for at the events. Do welcome back, like old, old, old >>Home. Thank you, David. It's great to, great to see you and always love doing these previews, even though Dave, come on. How many years have I told you Cloud native con, It's a hoodie crowd. They're gonna totally call you out for where in a tie and things like that. I, I know you want to be an ESPN sportscaster, but you know, I I, I, I still don't think even after, you know, this show's been around for so many years that there's gonna be too many ties into Troy. I >>Know I left the hoodie in my off, I'm sorry folks, but hey, we'll just have to go for it. Okay. Containers generally, and Kubernetes specifically continue to show very strong spending momentum in the ETR survey data. So let's bring up this slide that shows the ETR sectors, all the sectors in the tax taxonomy with net score or spending velocity in the vertical axis and pervasiveness on the horizontal axis. Now, that red dotted line that you see, that marks the elevated 40% mark, anything above that is considered highly elevated in terms of momentum. Now, for years, the big four areas of momentum that shine above all the rest have been cloud containers, rpa, and ML slash ai for the first time in 10 quarters, ML and AI and RPA have dropped below the 40% line, leaving only cloud and containers in rarefied air. Now, Stu, I'm sure this data doesn't surprise you, but what do you make of this? >>Yeah, well, well, Dave, I, I did an interview with at Deepak who owns all the container and open source activity at Amazon earlier this year, and his comment was, the default deployment mechanism in Amazon is containers. So when I look at your data and I see containers and cloud going in sync, yeah, that, that's, that's how we see things. We're helping lots of customers in their overall adoption. And this cloud native ecosystem is still, you know, we're still in that Cambridge explosion of new projects, new opportunities, AI's a great workload for these type type of technologies. So it's really becoming pervasive in the marketplace. >>And, and I feel like the cloud and containers go hand in hand, so it's not surprising to see those two above >>The 40%. You know, there, there's nothing to say that, Look, can I run my containers in my data center and not do the public cloud? Sure. But in the public cloud, the default is the container. And one of the hot discussions we've been having in this ecosystem for a number of years is edge computing. And of course, you know, I want something that that's small and lightweight and can do things really fast. A lot of times it's an AI workload out there, and containers is a great fit at the edge too. So wherever it goes, containers is a good fit, which has been keeping my group at Red Hat pretty busy. >>So let's talk about some of those high level stats that we put together and preview for the event. So it's really around the adoption of open source software and Kubernetes. Here's, you know, a few fun facts. So according to the state of enterprise open source report, which was published by Red Hat, although it was based on a blind survey, nobody knew that that Red Hat was, you know, initiating it. 80% of IT execs expect to increase their use of enterprise open source software. Now, the CNCF community has currently more than 120,000 developers. That's insane when you think about that developer resource. 73% of organizations in the most recent CNCF annual survey are using Kubernetes. Now, despite the momentum, according to that same Red Hat survey, adoption barriers remain for some organizations. Stu, I'd love you to talk about this specifically around skill sets, and then we've highlighted some of the other trends that we expect to see at the event around Stu. I'd love to, again, your, get your thoughts on the preview. You've done a number of these events, automation, security, governance, governance at scale, edge deployments, which you just mentioned among others. Now Kubernetes is eight years old, and I always hear people talking about there's something coming beyond Kubernetes, but it looks like we're just getting started. Yeah, >>Dave, It, it is still relatively early days. The CMC F survey, I think said, you know, 96% of companies when they, when CMC F surveyed them last year, were either deploying Kubernetes or had plans to deploy it. But when I talked to enterprises, nobody has said like, Hey, we've got every group on board and all of our applications are on. It is a multi-year journey for most companies and plenty of them. If you, you look at the general adoption of technology, we're still working through kind of that early majority. We, you know, passed the, the chasm a couple of years ago. But to a point, you and I we're talking about this ecosystem, there are plenty of people in this ecosystem that could care less about containers and Kubernetes. Lots of conversations at this show won't even talk about Kubernetes. You've got, you know, big security group that's in there. >>You've got, you know, certain workloads like we talked about, you know, AI and ml and that are in there. And automation absolutely is playing a, a good role in what's going on here. So in some ways, Kubernetes kind of takes a, a backseat because it is table stakes at this point. So lots of people involved in it, lots of activities still going on. I mean, we're still at a cadence of three times a year now. We slowed it down from four times a year as an industry, but there's, there's still lots of innovation happening, lots of adoption, and oh my gosh, Dave, I mean, there's just no shortage of new projects and new people getting involved. And what's phenomenal about it is there's, you know, end user practitioners that aren't just contributing. But many of the projects were spawned out of work by the likes of Intuit and Spotify and, and many others that created some of the projects that sit alongside or above the, the, you know, the container orchestration itself. >>So before we talked about some of that, it's, it's kind of interesting. It's like Kubernetes is the big dog, right? And it's, it's kind of maturing after, you know, eight years, but it's still important. I wanna share another data point that underscores the traction that containers generally are getting in Kubernetes specifically have, So this is data from the latest ETR survey and shows the spending breakdown for Kubernetes in the ETR data set for it's cut for respondents with 50 or more citations in, in by the IT practitioners that lime green is new adoptions, the forest green is spending 6% or more relative to last year. The gray is flat spending year on year, and those little pink bars, that's 6% or down spending, and the bright red is retirements. So they're leaving the platform. And the blue dots are net score, which is derived by subtracting the reds from the greens. And the yellow dots are pervasiveness in the survey relative to the sector. So the big takeaway here is that there is virtually no red, essentially zero churn across all sectors, large companies, public companies, private firms, telcos, finance, insurance, et cetera. So again, sometimes I hear this things beyond Kubernetes, you've mentioned several, but it feels like Kubernetes is still a driving force, but a lot of other projects around Kubernetes, which we're gonna hear about at the show. >>Yeah. So, so, so Dave, right? First of all, there was for a number of years, like, oh wait, you know, don't waste your time on, on containers because serverless is gonna rule the world. Well, serverless is now a little bit of a broader term. Can I do a serverless viewpoint for my developers that they don't need to think about the infrastructure but still have containers underneath it? Absolutely. So our friends at Amazon have a solution called Fargate, their proprietary offering to kind of hide that piece of it. And in the open source world, there's a project called Can Native, I think it's the second or third can Native Con's gonna happen at the cncf. And even if you use this, I can still call things over on Lambda and use some of those functions. So we know Dave, it is additive and nothing ever dominates the entire world and nothing ever dies. >>So we have, we have a long runway of activities still to go on in containers and Kubernetes. We're always looking for what that next thing is. And what's great about this ecosystem is most of it tends to be additive and plug into the pieces there, there's certain tools that, you know, span beyond what can happen in the container world and aren't limited to it. And there's others that are specific for it. And to talk about the industries, Dave, you know, I love, we we have, we have a community event that we run that's gonna happen at Cubans called OpenShift Commons. And when you look at like, who's speaking there? Oh, we've got, you know, for Lockheed Martin, University of Michigan and I g Bank all speaking there. So you look and it's like, okay, cool, I've got automotive, I've got, you know, public sector, I've got, you know, university education and I've got finance. So all of you know, there is not an industry that is not touched by this. And the general wave of software adoption is the reason why, you know, not just adoption, but the creation of new software is one of the differentiators for companies. And that is what, that's the reason why I do containers, isn't because it's some cool technology and Kubernetes is great to put on my resume, but that it can actually accelerate my developers and help me create technology that makes me respond to my business and my ultimate end users. Well, >>And you know, as you know, we've been talking about the Supercloud a lot and the Kubernetes is clearly enabler to, to Supercloud, but I wanted to go back, you and John Furrier have done so many of, you know, the, the cube cons, but but go back to Docker con before Kubernetes was even a thing. And so you sort of saw this, you know, grow. I think there's what, how many projects are in CNCF now? I mean, hundreds. Hundreds, okay. And so you're, Will we hear things in Detroit, things like, you know, new projects like, you know, Argo and capabilities around SI store and things like that? Well, you're gonna hear a lot about that. Or is it just too much to cover? >>So I, I mean the, the good news, Dave, is that the CNCF really is, is a good steward for this community and new things got in get in. So there's so much going on with the existing projects that some of the new ones sometimes have a little bit of a harder time making a little bit of buzz. One of the more interesting ones is a project that's been around for a while that I think back to the first couple of Cube Cuban that John and I did service Mesh and Istio, which was created by Google, but lived under basically a, I guess you would say a Google dominated governance for a number of years is now finally under the CNCF Foundation. So I talked to a number of companies over the years and definitely many of the contributors over the years that didn't love that it was a Google Run thing, and now it is finally part. >>So just like Kubernetes is, we have SEO and also can Native that I mentioned before also came outta Google and those are all in the cncf. So will there be new projects? Yes. The CNCF is sometimes they, they do matchmaking. So in some of the observability space, there were a couple of projects that they said, Hey, maybe you can go merge down the road. And they ended up doing that. So there's still you, you look at all these projects and if I was an end user saying, Oh my God, there is so much change and so many projects, you know, I can't spend the time in the effort to learn about all of these. And that's one of the challenges and something obviously at Red Hat, we spend a lot of time figuring out, you know, not to make winners, but which are the things that customers need, Where can we help make them run in production for our, our customers and, and help bring some stability and a little bit of security for the overall ecosystem. >>Well, speaking of security, security and, and skill sets, we've talked about those two things and they sort of go hand in hand when I go to security events. I mean, we're at reinforced last summer, we were just recently at the CrowdStrike event. A lot of the discussion is sort of best practice because it's so complicated. And, and, and will you, I presume you're gonna hear a lot of that here because security securing containers now, you know, the whole shift left thing and shield right is, is a complicated matter, especially when you saw with the earlier data from the Red Hat survey, the the gaps are around skill sets. People don't have the skill. So should we expect to hear a lot about that, A lot of sort of how to, how to take advantage of some of these new capabilities? >>Yeah, Dave, absolutely. So, you know, one of the conversations going on in the community right now is, you know, has DevOps maybe played out as we expect to see it? There's a newer term called platform engineering, and how much do I need to do there? Something that I, I know your, your team's written a lot about Dave, is how much do you need to know versus what can you shift to just a platform or a service that I can consume? I've talked a number of times with you since I've been at Red Hat about the cloud services that we offer. So you want to use our offering in the public cloud. Our first recommendation is, hey, we've got cloud services, how much Kubernetes do you really want to learn versus you want to do what you can build on top of it, modernize the pieces and have less running the plumbing and electric and more, you know, taking advantage of the, the technologies there. So that's a big thing we've seen, you know, we've got a big SRE team that can manage that for use so that you have to spend less time worrying about what really is un differentiated heavy lifting and spend more time on what's important to your business and your >>Customers. So, and that's, and that's through a managed service. >>Yeah, absolutely. >>That whole space is just taken off. All right, Stu I'll give you the final word. You know, what are you excited about for, for, for this upcoming event and Detroit? Interesting choice of venue? Yeah, >>Look, first of off, easy flight. I've, I've never been to Detroit, so I'm, I'm willing to give it a shot and hopefully, you know, that awesome airport. There's some, some, some good things there to learn. The show itself is really a choose your own adventure because there's so much going on. The main show of QAN and cloud Native Con is Wednesday through Friday, but a lot of a really interesting stuff happens on Monday and Tuesday. So we talked about things like OpenShift Commons in the security space. There's cloud Native Security Day, which is actually two days and a SIG store event. There, there's a get up show, there's, you know, k native day. There's so many things that if you want to go deep on a topic, you can go spend like a workshop in some of those you can get hands on to. And then at the show itself, there's so much, and again, you can learn from your peers. >>So it was good to see we had, during the pandemic, it tilted a little bit more vendor heavy because I think most practitioners were pretty busy focused on what they could work on and less, okay, hey, I'm gonna put together a presentation and maybe I'm restricted at going to a show. Yeah, not, we definitely saw that last year when I went to LA I was disappointed how few customer sessions there were. It, it's back when I go look through the schedule now there's way more end users sharing their stories and it, it's phenomenal to see that. And the hallway track, Dave, I didn't go to Valencia, but I hear it was really hopping felt way more like it was pre pandemic. And while there's a few people that probably won't come because Detroit, we think there's, what we've heard and what I've heard from the CNCF team is they are expecting a sizable group up there. I know a lot of the hotels right near the, where it's being held are all sold out. So it should be, should be a lot of fun. Good thing I'm speaking on an edge panel. First time I get to be a speaker at the show, Dave, it's kind of interesting to be a little bit of a different role at the show. >>So yeah, Detroit's super convenient, as I said. Awesome. Airports too. Good luck at the show. So it's a full week. The cube will be there for three days, Tuesday, Wednesday, Thursday. Thanks for coming. >>Wednesday, Thursday, Friday, sorry, >>Wednesday, Thursday, Friday is the cube, right? So thank you for that. >>And, and no ties from the host, >>No ties, only hoodies. All right Stu, thanks. Appreciate you coming in. Awesome. And thank you for watching this preview of CubeCon plus cloud Native Con with at Stu, which again starts the 24th of October, three days of broadcasting. Go to the cube.net and you can see all the action. We'll see you there.
SUMMARY :
Red Hat back in the studio to help us understand the key trends to look for at the events. I know you want to be an ESPN sportscaster, but you know, I I, I, I still don't think even Now, that red dotted line that you And this cloud native ecosystem is still, you know, we're still in that Cambridge explosion And of course, you know, I want something that that's small and lightweight and Here's, you know, a few fun facts. I think said, you know, 96% of companies when they, when CMC F surveyed them last year, You've got, you know, certain workloads like we talked about, you know, AI and ml and that And it's, it's kind of maturing after, you know, eight years, but it's still important. oh wait, you know, don't waste your time on, on containers because serverless is gonna rule the world. And the general wave of software adoption is the reason why, you know, And you know, as you know, we've been talking about the Supercloud a lot and the Kubernetes is clearly enabler to, to Supercloud, definitely many of the contributors over the years that didn't love that it was a Google Run the observability space, there were a couple of projects that they said, Hey, maybe you can go merge down the road. securing containers now, you know, the whole shift left thing and shield right is, So, you know, one of the conversations going on in the community right now is, So, and that's, and that's through a managed service. All right, Stu I'll give you the final word. There, there's a get up show, there's, you know, k native day. I know a lot of the hotels right near the, where it's being held are all sold out. Good luck at the show. So thank you for that. Go to the cube.net and you can see all the action.
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
Dave | PERSON | 0.99+ |
David | PERSON | 0.99+ |
Lockheed Martin | ORGANIZATION | 0.99+ |
6% | QUANTITY | 0.99+ |
Amazon | ORGANIZATION | 0.99+ |
Detroit | LOCATION | 0.99+ |
50 | QUANTITY | 0.99+ |
CNCF | ORGANIZATION | 0.99+ |
October 24th | DATE | 0.99+ |
40% | QUANTITY | 0.99+ |
Stewart Miniman | PERSON | 0.99+ |
Friday | DATE | 0.99+ |
ORGANIZATION | 0.99+ | |
96% | QUANTITY | 0.99+ |
two days | QUANTITY | 0.99+ |
University of Michigan | ORGANIZATION | 0.99+ |
Stu | PERSON | 0.99+ |
CMC F | ORGANIZATION | 0.99+ |
80% | QUANTITY | 0.99+ |
Tuesday | DATE | 0.99+ |
John | PERSON | 0.99+ |
Wednesday | DATE | 0.99+ |
eight years | QUANTITY | 0.99+ |
Monday | DATE | 0.99+ |
last year | DATE | 0.99+ |
three days | QUANTITY | 0.99+ |
Red Hat | ORGANIZATION | 0.99+ |
second | QUANTITY | 0.99+ |
73% | QUANTITY | 0.99+ |
Thursday | DATE | 0.99+ |
LA | LOCATION | 0.99+ |
more than 120,000 developers | QUANTITY | 0.99+ |
two things | QUANTITY | 0.99+ |
John Furrier | PERSON | 0.99+ |
hundreds | QUANTITY | 0.99+ |
Hundreds | QUANTITY | 0.99+ |
first time | QUANTITY | 0.99+ |
two | QUANTITY | 0.99+ |
24th of October | DATE | 0.99+ |
one | QUANTITY | 0.98+ |
KubeCon | EVENT | 0.98+ |
CubeCon | EVENT | 0.98+ |
CNCF Foundation | ORGANIZATION | 0.98+ |
cube.net | OTHER | 0.98+ |
last summer | DATE | 0.98+ |
Valencia | LOCATION | 0.98+ |
third | QUANTITY | 0.98+ |
Spotify | ORGANIZATION | 0.98+ |
Intuit | ORGANIZATION | 0.98+ |
last year | DATE | 0.98+ |
One | QUANTITY | 0.98+ |
cloud Native Security Day | EVENT | 0.97+ |
Kubernetes | TITLE | 0.97+ |
QAN | EVENT | 0.97+ |
ESPN | ORGANIZATION | 0.97+ |
Horizon3.ai Signal | Horizon3.ai Partner Program Expands Internationally
hello I'm John Furrier with thecube and welcome to this special presentation of the cube and Horizon 3.ai they're announcing a global partner first approach expanding their successful pen testing product Net Zero you're going to hear from leading experts in their staff their CEO positioning themselves for a successful Channel distribution expansion internationally in Europe Middle East Africa and Asia Pacific in this Cube special presentation you'll hear about the expansion the expanse partner program giving Partners a unique opportunity to offer Net Zero to their customers Innovation and Pen testing is going International with Horizon 3.ai enjoy the program [Music] welcome back everyone to the cube and Horizon 3.ai special presentation I'm John Furrier host of thecube we're here with Jennifer Lee head of Channel sales at Horizon 3.ai Jennifer welcome to the cube thanks for coming on great well thank you for having me so big news around Horizon 3.aa driving Channel first commitment you guys are expanding the channel partner program to include all kinds of new rewards incentives training programs help educate you know Partners really drive more recurring Revenue certainly cloud and Cloud scale has done that you got a great product that fits into that kind of Channel model great Services you can wrap around it good stuff so let's get into it what are you guys doing what are what are you guys doing with this news why is this so important yeah for sure so um yeah we like you said we recently expanded our Channel partner program um the driving force behind it was really just um to align our like you said our Channel first commitment um and creating awareness around the importance of our partner ecosystems um so that's it's really how we go to market is is through the channel and a great International Focus I've talked with the CEO so you know about the solution and he broke down all the action on why it's important on the product side but why now on the go to market change what's the what's the why behind this big this news on the channel yeah for sure so um we are doing this now really to align our business strategy which is built on the concept of enabling our partners to create a high value high margin business on top of our platform and so um we offer a solution called node zero it provides autonomous pen testing as a service and it allows organizations to continuously verify their security posture um so we our company vision we have this tagline that states that our pen testing enables organizations to see themselves Through The Eyes of an attacker and um we use the like the attacker's perspective to identify exploitable weaknesses and vulnerabilities so we created this partner program from a perspective of the partner so the partner's perspective and we've built It Through The Eyes of our partner right so we're prioritizing really what the partner is looking for and uh will ensure like Mutual success for us yeah the partners always want to get in front of the customers and bring new stuff to them pen tests have traditionally been really expensive uh and so bringing it down in one to a service level that's one affordable and has flexibility to it allows a lot of capability so I imagine people getting excited by it so I have to ask you about the program What specifically are you guys doing can you share any details around what it means for the partners what they get what's in it for them can you just break down some of the mechanics and mechanisms or or details yeah yep um you know we're really looking to create business alignment um and like I said establish Mutual success with our partners so we've got two um two key elements that we were really focused on um that we bring to the partners so the opportunity the profit margin expansion is one of them and um a way for our partners to really differentiate themselves and stay relevant in the market so um we've restructured our discount model really um you know highlighting profitability and maximizing profitability and uh this includes our deal registration we've we've created deal registration program we've increased discount for partners who take part in our partner certification uh trainings and we've we have some other partner incentives uh that we we've created that that's going to help out there we've we put this all so we've recently Gone live with our partner portal um it's a Consolidated experience for our partners where they can access our our sales tools and we really view our partners as an extension of our sales and Technical teams and so we've extended all of our our training material that we use internally we've made it available to our partners through our partner portal um we've um I'm trying I'm thinking now back what else is in that partner portal here we've got our partner certification information so all the content that's delivered during that training can be found in the portal we've got deal registration uh um co-branded marketing materials pipeline management and so um this this portal gives our partners a One-Stop place to to go to find all that information um and then just really quickly on the second part of that that I mentioned is our technology really is um really disruptive to the market so you know like you said autonomous pen testing it's um it's still it's well it's still still relatively new topic uh for security practitioners and um it's proven to be really disruptive so um that on top of um just well recently we found an article that um that mentioned by markets and markets that reports that the global pen testing markets really expanding and so it's expected to grow to like 2.7 billion um by 2027. so the Market's there right the Market's expanding it's growing and so for our partners it's just really allows them to grow their revenue um across their customer base expand their customer base and offering this High profit margin while you know getting in early to Market on this just disruptive technology big Market a lot of opportunities to make some money people love to put more margin on on those deals especially when you can bring a great solution that everyone knows is hard to do so I think that's going to provide a lot of value is there is there a type of partner that you guys see emerging or you aligning with you mentioned the alignment with the partners I can see how that the training and the incentives are all there sounds like it's all going well is there a type of partner that's resonating the most or is there categories of partners that can take advantage of this yeah absolutely so we work with all different kinds of Partners we work with our traditional resale Partners um we've worked we're working with systems integrators we have a really strong MSP mssp program um we've got Consulting partners and the Consulting Partners especially with the ones that offer pen test services so we they use us as a as we act as a force multiplier just really offering them profit margin expansion um opportunity there we've got some technology partner partners that we really work with for co-cell opportunities and then we've got our Cloud Partners um you'd mentioned that earlier and so we are in AWS Marketplace so our ccpo partners we're part of the ISP accelerate program um so we we're doing a lot there with our Cloud partners and um of course we uh we go to market with uh distribution Partners as well gotta love the opportunity for more margin expansion every kind of partner wants to put more gross profit on their deals is there a certification involved I have to ask is there like do you get do people get certified or is it just you get trained is it self-paced training is it in person how are you guys doing the whole training certification thing because is that is that a requirement yeah absolutely so we do offer a certification program and um it's been very popular this includes a a seller's portion and an operator portion and and so um this is at no cost to our partners and um we operate both virtually it's it's law it's virtually but live it's not self-paced and we also have in person um you know sessions as well and we also can customize these to any partners that have a large group of people and we can just we can do one in person or virtual just specifically for that partner well any kind of incentive opportunities and marketing opportunities everyone loves to get the uh get the deals just kind of rolling in leads from what we can see if our early reporting this looks like a hot product price wise service level wise what incentive do you guys thinking about and and Joint marketing you mentioned co-sell earlier in pipeline so I was kind of kind of honing in on that piece sure and yes and then to follow along with our partner certification program we do incentivize our partners there if they have a certain number certified their discount increases so that's part of it we have our deal registration program that increases discount as well um and then we do have some um some partner incentives that are wrapped around meeting setting and um moving moving opportunities along to uh proof of value gotta love the education driving value I have to ask you so you've been around the industry you've seen the channel relationships out there you're seeing companies old school new school you know uh Horizon 3.ai is kind of like that new school very cloud specific a lot of Leverage with we mentioned AWS and all the clouds um why is the company so hot right now why did you join them and what's why are people attracted to this company what's the what's the attraction what's the vibe what do you what do you see and what what do you use what did you see in in this company well this is just you know like I said it's very disruptive um it's really in high demand right now and um and and just because because it's new to Market and uh a newer technology so we are we can collaborate with a manual pen tester um we can you know we can allow our customers to run their pen test um with with no specialty teams and um and and then so we and like you know like I said we can allow our partners can actually build businesses profitable businesses so we can they can use our product to increase their services revenue and um and build their business model you know around around our services what's interesting about the pen test thing is that it's very expensive and time consuming the people who do them are very talented people that could be working on really bigger things in the in absolutely customers so bringing this into the channel allows them if you look at the price Delta between a pen test and then what you guys are offering I mean that's a huge margin Gap between street price of say today's pen test and what you guys offer when you show people that they follow do they say too good to be true I mean what are some of the things that people say when you kind of show them that are they like scratch their head like come on what's the what's the catch here right so the cost savings is a huge is huge for us um and then also you know like I said working as a force multiplier with a pen testing company that offers the services and so they can they can do their their annual manual pen tests that may be required around compliance regulations and then we can we can act as the continuous verification of their security um um you know that that they can run um weekly and so it's just um you know it's just an addition to to what they're offering already and an expansion so Jennifer thanks for coming on thecube really appreciate you uh coming on sharing the insights on the channel uh what's next what can we expect from the channel group what are you thinking what's going on right so we're really looking to expand our our Channel um footprint and um very strategically uh we've got um we've got some big plans um for for Horizon 3.ai awesome well thanks for coming on really appreciate it you're watching thecube the leader in high tech Enterprise coverage [Music] [Music] hello and welcome to the Cube's special presentation with Horizon 3.ai with Raina Richter vice president of emea Europe Middle East and Africa and Asia Pacific APAC for Horizon 3 today welcome to this special Cube presentation thanks for joining us thank you for the invitation so Horizon 3 a guy driving Global expansion big international news with a partner first approach you guys are expanding internationally let's get into it you guys are driving this new expanse partner program to new heights tell us about it what are you seeing in the momentum why the expansion what's all the news about well I would say uh yeah in in international we have I would say a similar similar situation like in the US um there is a global shortage of well-educated penetration testers on the one hand side on the other side um we have a raising demand of uh network and infrastructure security and with our approach of an uh autonomous penetration testing I I believe we are totally on top of the game um especially as we have also now uh starting with an international instance that means for example if a customer in Europe is using uh our service node zero he will be connected to a node zero instance which is located inside the European Union and therefore he has doesn't have to worry about the conflict between the European the gdpr regulations versus the US Cloud act and I would say there we have a total good package for our partners that they can provide differentiators to their customers you know we've had great conversations here on thecube with the CEO and the founder of the company around the leverage of the cloud and how successful that's been for the company and honestly I can just Connect the Dots here but I'd like you to weigh in more on how that translates into the go to market here because you got great Cloud scale with with the security product you guys are having success with great leverage there I've seen a lot of success there what's the momentum on the channel partner program internationally why is it so important to you is it just the regional segmentation is it the economics why the momentum well there are it's there are multiple issues first of all there is a raising demand in penetration testing um and don't forget that uh in international we have a much higher level in number a number or percentage in SMB and mid-market customers so these customers typically most of them even didn't have a pen test done once a year so for them pen testing was just too expensive now with our offering together with our partners we can provide different uh ways how customers could get an autonomous pen testing done more than once a year with even lower costs than they had with with a traditional manual paint test so and that is because we have our uh Consulting plus package which is for typically pain testers they can go out and can do a much faster much quicker and their pain test at many customers once in after each other so they can do more pain tests on a lower more attractive price on the other side there are others what even the same ones who are providing um node zero as an mssp service so they can go after s p customers saying okay well you only have a couple of hundred uh IP addresses no worries we have the perfect package for you and then you have let's say the mid Market let's say the thousands and more employees then they might even have an annual subscription very traditional but for all of them it's all the same the customer or the service provider doesn't need a piece of Hardware they only need to install a small piece of a Docker container and that's it and that makes it so so smooth to go in and say okay Mr customer we just put in this this virtual attacker into your network and that's it and and all the rest is done and within within three clicks they are they can act like a pen tester with 20 years of experience and that's going to be very Channel friendly and partner friendly I can almost imagine so I have to ask you and thank you for calling the break calling out that breakdown and and segmentation that was good that was very helpful for me to understand but I want to follow up if you don't mind um what type of partners are you seeing the most traction with and why well I would say at the beginning typically you have the the innovators the early adapters typically Boutique size of Partners they start because they they are always looking for Innovation and those are the ones you they start in the beginning so we have a wide range of Partners having mostly even um managed by the owner of the company so uh they immediately understand okay there is the value and they can change their offering they're changing their offering in terms of penetration testing because they can do more pen tests and they can then add other ones or we have those ones who offer 10 tests services but they did not have their own pen testers so they had to go out on the open market and Source paint testing experts um to get the pen test at a particular customer done and now with node zero they're totally independent they can't go out and say okay Mr customer here's the here's the service that's it we turn it on and within an hour you're up and running totally yeah and those pen tests are usually expensive and hard to do now it's right in line with the sales delivery pretty interesting for a partner absolutely but on the other hand side we are not killing the pain testers business we do something we're providing with no tiers I would call something like the foundation work the foundational work of having an an ongoing penetration testing of the infrastructure the operating system and the pen testers by themselves they can concentrate in the future on things like application pen testing for example so those Services which we we're not touching so we're not killing the paint tester Market we're just taking away the ongoing um let's say foundation work call it that way yeah yeah that was one of my questions I was going to ask is there's a lot of interest in this autonomous pen testing one because it's expensive to do because those skills are required are in need and they're expensive so you kind of cover the entry level and the blockers that are in there I've seen people say to me this pen test becomes a blocker for getting things done so there's been a lot of interest in the autonomous pen testing and for organizations to have that posture and it's an overseas issue too because now you have that that ongoing thing so can you explain that particular benefit for an organization to have that continuously verifying an organization's posture yep certainly so I would say um typically you are you you have to do your patches you have to bring in new versions of operating systems of different Services of uh um operating systems of some components and and they are always bringing new vulnerabilities the difference here is that with node zero we are telling the customer or the partner package we're telling them which are the executable vulnerabilities because previously they might have had um a vulnerability scanner so this vulnerability scanner brought up hundreds or even thousands of cves but didn't say anything about which of them are vulnerable really executable and then you need an expert digging in one cve after the other finding out is it is it really executable yes or no and that is where you need highly paid experts which we have a shortage so with notes here now we can say okay we tell you exactly which ones are the ones you should work on because those are the ones which are executable we rank them accordingly to the risk level how easily they can be used and by a sudden and then the good thing is convert it or indifference to the traditional penetration test they don't have to wait for a year for the next pain test to find out if the fixing was effective they weren't just the next scan and say Yes closed vulnerability is gone the time is really valuable and if you're doing any devops Cloud native you're always pushing new things so pen test ongoing pen testing is actually a benefit just in general as a kind of hygiene so really really interesting solution really bring that global scale is going to be a new new coverage area for us for sure I have to ask you if you don't mind answering what particular region are you focused on or plan to Target for this next phase of growth well at this moment we are concentrating on the countries inside the European Union Plus the United Kingdom um but we are and they are of course logically I'm based into Frankfurt area that means we cover more or less the countries just around so it's like the total dark region Germany Switzerland Austria plus the Netherlands but we also already have Partners in the nordics like in Finland or in Sweden um so it's it's it it's rapidly we have Partners already in the UK and it's rapidly growing so I'm for example we are now starting with some activities in Singapore um um and also in the in the Middle East area um very important we uh depending on let's say the the way how to do business currently we try to concentrate on those countries where we can have um let's say um at least English as an accepted business language great is there any particular region you're having the most success with right now is it sounds like European Union's um kind of first wave what's them yes that's the first definitely that's the first wave and now we're also getting the uh the European instance up and running it's clearly our commitment also to the market saying okay we know there are certain dedicated uh requirements and we take care of this and and we're just launching it we're building up this one uh the instance um in the AWS uh service center here in Frankfurt also with some dedicated Hardware internet in a data center in Frankfurt where we have with the date six by the way uh the highest internet interconnection bandwidth on the planet so we have very short latency to wherever you are on on the globe that's a great that's a great call outfit benefit too I was going to ask that what are some of the benefits your partners are seeing in emea and Asia Pacific well I would say um the the benefits is for them it's clearly they can they can uh talk with customers and can offer customers penetration testing which they before and even didn't think about because it penetrates penetration testing in a traditional way was simply too expensive for them too complex the preparation time was too long um they didn't have even have the capacity uh to um to support a pain an external pain tester now with this service you can go in and say even if they Mr customer we can do a test with you in a couple of minutes within we have installed the docker container within 10 minutes we have the pen test started that's it and then we just wait and and I would say that is we'll we are we are seeing so many aha moments then now because on the partner side when they see node zero the first time working it's like this wow that is great and then they work out to customers and and show it to their typically at the beginning mostly the friendly customers like wow that's great I need that and and I would say um the feedback from the partners is that is a service where I do not have to evangelize the customer everybody understands penetration testing I don't have to say describe what it is they understand the customer understanding immediately yes penetration testing good about that I know I should do it but uh too complex too expensive now with the name is for example as an mssp service provided from one of our partners but it's getting easy yeah it's great and it's great great benefit there I mean I gotta say I'm a huge fan of what you guys are doing I like this continuous automation that's a major benefit to anyone doing devops or any kind of modern application development this is just a godsend for them this is really good and like you said the pen testers that are doing it they were kind of coming down from their expertise to kind of do things that should have been automated they get to focus on the bigger ticket items that's a really big point so we free them we free the pain testers for the higher level elements of the penetration testing segment and that is typically the application testing which is currently far away from being automated yeah and that's where the most critical workloads are and I think this is the nice balance congratulations on the international expansion of the program and thanks for coming on this special presentation really I really appreciate it thank you you're welcome okay this is thecube special presentation you know check out pen test automation International expansion Horizon 3 dot AI uh really Innovative solution in our next segment Chris Hill sector head for strategic accounts will discuss the power of Horizon 3.ai and Splunk in action you're watching the cube the leader in high tech Enterprise coverage foreign [Music] [Music] welcome back everyone to the cube and Horizon 3.ai special presentation I'm John Furrier host of thecube we're with Chris Hill sector head for strategic accounts and federal at Horizon 3.ai a great Innovative company Chris great to see you thanks for coming on thecube yeah like I said uh you know great to meet you John long time listener first time caller so excited to be here with you guys yeah we were talking before camera you had Splunk back in 2013 and I think 2012 was our first splunk.com and boy man you know talk about being in the right place at the right time now we're at another inflection point and Splunk continues to be relevant um and continuing to have that data driving Security in that interplay and your CEO former CTO of his plug as well at Horizon who's been on before really Innovative product you guys have but you know yeah don't wait for a breach to find out if you're logging the right data this is the topic of this thread Splunk is very much part of this new international expansion announcement uh with you guys tell us what are some of the challenges that you see where this is relevant for the Splunk and Horizon AI as you guys expand uh node zero out internationally yeah well so across so you know my role uh within Splunk it was uh working with our most strategic accounts and so I looked back to 2013 and I think about the sales process like working with with our small customers you know it was um it was still very siled back then like I was selling to an I.T team that was either using this for it operations um we generally would always even say yeah although we do security we weren't really designed for it we're a log management tool and we I'm sure you remember back then John we were like sort of stepping into the security space and and the public sector domain that I was in you know security was 70 of what we did when I look back to sort of uh the transformation that I was witnessing in that digital transformation um you know when I look at like 2019 to today you look at how uh the IT team and the security teams are being have been forced to break down those barriers that they used to sort of be silent away would not commute communicate one you know the security guys would be like oh this is my box I.T you're not allowed in today you can't get away with that and I think that the value that we bring to you know and of course Splunk has been a huge leader in that space and continues to do Innovation across the board but I think what we've we're seeing in the space and I was talking with Patrick Coughlin the SVP of uh security markets about this is that you know what we've been able to do with Splunk is build a purpose-built solution that allows Splunk to eat more data so Splunk itself is ulk know it's an ingest engine right the great reason people bought it was you could build these really fast dashboards and grab intelligence out of it but without data it doesn't do anything right so how do you drive and how do you bring more data in and most importantly from a customer perspective how do you bring the right data in and so if you think about what node zero and what we're doing in a horizon 3 is that sure we do pen testing but because we're an autonomous pen testing tool we do it continuously so this whole thought I'd be like oh crud like my customers oh yeah we got a pen test coming up it's gonna be six weeks the week oh yeah you know and everyone's gonna sit on their hands call me back in two months Chris we'll talk to you then right not not a real efficient way to test your environment and shoot we saw that with Uber this week right um you know and that's a case where we could have helped oh just right we could explain the Uber thing because it was a contractor just give a quick highlight of what happened so you can connect the doctor yeah no problem so um it was uh I got I think it was yeah one of those uh you know games where they would try and test an environment um and with the uh pen tester did was he kept on calling them MFA guys being like I need to reset my password we need to set my right password and eventually the um the customer service guy said okay I'm resetting it once he had reset and bypassed the multi-factor authentication he then was able to get in and get access to the building area that he was in or I think not the domain but he was able to gain access to a partial part of that Network he then paralleled over to what I would assume is like a VA VMware or some virtual machine that had notes that had all of the credentials for logging into various domains and So within minutes they had access and that's the sort of stuff that we do you know a lot of these tools like um you know you think about the cacophony of tools that are out there in a GTA architect architecture right I'm gonna get like a z-scale or I'm going to have uh octum and I have a Splunk I've been into the solar system I mean I don't mean to name names we have crowdstriker or Sentinel one in there it's just it's a cacophony of things that don't work together they weren't designed work together and so we have seen so many times in our business through our customer support and just working with customers when we do their pen tests that there will be 5 000 servers out there three are misconfigured those three misconfigurations will create the open door because remember the hacker only needs to be right once the defender needs to be right all the time and that's the challenge and so that's what I'm really passionate about what we're doing uh here at Horizon three I see this my digital transformation migration and security going on which uh we're at the tip of the spear it's why I joined sey Hall coming on this journey uh and just super excited about where the path's going and super excited about the relationship with Splunk I get into more details on some of the specifics of that but um you know well you're nailing I mean we've been doing a lot of things on super cloud and this next gen environment we're calling it next gen you're really seeing devops obviously devsecops has already won the it role has moved to the developer shift left is an indicator of that it's one of the many examples higher velocity code software supply chain you hear these things that means that it is now in the developer hands it is replaced by the new Ops data Ops teams and security where there's a lot of horizontal thinking to your point about access there's no more perimeter huge 100 right is really right on things one time you know to get in there once you're in then you can hang out move around move laterally big problem okay so we get that now the challenges for these teams as they are transitioning organizationally how do they figure out what to do okay this is the next step they already have Splunk so now they're kind of in transition while protecting for a hundred percent ratio of success so how would you look at that and describe the challenge is what do they do what is it what are the teams facing with their data and what's next what are they what are they what action do they take so let's use some vernacular that folks will know so if I think about devsecops right we both know what that means that I'm going to build security into the app it normally talks about sec devops right how am I building security around the perimeter of what's going inside my ecosystem and what are they doing and so if you think about what we're able to do with somebody like Splunk is we can pen test the entire environment from Soup To Nuts right so I'm going to test the end points through to its I'm going to look for misconfigurations I'm going to I'm going to look for um uh credential exposed credentials you know I'm going to look for anything I can in the environment again I'm going to do it at light speed and and what what we're doing for that SEC devops space is to you know did you detect that we were in your environment so did we alert Splunk or the Sim that there's someone in the environment laterally moving around did they more importantly did they log us into their environment and when do they detect that log to trigger that log did they alert on us and then finally most importantly for every CSO out there is going to be did they stop us and so that's how we we do this and I think you when speaking with um stay Hall before you know we've come up with this um boils but we call it fine fix verifying so what we do is we go in is we act as the attacker right we act in a production environment so we're not going to be we're a passive attacker but we will go in on credentialed on agents but we have to assume to have an assumed breach model which means we're going to put a Docker container in your environment and then we're going to fingerprint the environment so we're going to go out and do an asset survey now that's something that's not something that Splunk does super well you know so can Splunk see all the assets do the same assets marry up we're going to log all that data and think and then put load that into this long Sim or the smoke logging tools just to have it in Enterprise right that's an immediate future ad that they've got um and then we've got the fix so once we've completed our pen test um we are then going to generate a report and we can talk about these in a little bit later but the reports will show an executive summary the assets that we found which would be your asset Discovery aspect of that a fix report and the fixed report I think is probably the most important one it will go down and identify what we did how we did it and then how to fix that and then from that the pen tester or the organization should fix those then they go back and run another test and then they validate like a change detection environment to see hey did those fixes taste play take place and you know snehaw when he was the CTO of jsoc he shared with me a number of times about it's like man there would be 15 more items on next week's punch sheet that we didn't know about and it's and it has to do with how we you know how they were uh prioritizing the cves and whatnot because they would take all CBDs it was critical or non-critical and it's like we are able to create context in that environment that feeds better information into Splunk and whatnot that brings that brings up the efficiency for Splunk specifically the teams out there by the way the burnout thing is real I mean this whole I just finished my list and I got 15 more or whatever the list just can keeps growing how did node zero specifically help Splunk teams be more efficient like that's the question I want to get at because this seems like a very scale way for Splunk customers and teams service teams to be more so the question is how does node zero help make Splunk specifically their service teams be more efficient so so today in our early interactions we're building customers we've seen are five things um and I'll start with sort of identifying the blind spots right so kind of what I just talked about with you did we detect did we log did we alert did they stop node zero right and so I would I put that you know a more Layman's third grade term and if I was going to beat a fifth grader at this game would be we can be the sparring partner for a Splunk Enterprise customer a Splunk Essentials customer someone using Splunk soar or even just an Enterprise Splunk customer that may be a small shop with three people and just wants to know where am I exposed so by creating and generating these reports and then having um the API that actually generates the dashboard they can take all of these events that we've logged and log them in and then where that then comes in is number two is how do we prioritize those logs right so how do we create visibility to logs that that um are have critical impacts and again as I mentioned earlier not all cves are high impact regard and also not all or low right so if you daisy chain a bunch of low cves together boom I've got a mission critical AP uh CPE that needs to be fixed now such as a credential moving to an NT box that's got a text file with a bunch of passwords on it that would be very bad um and then third would be uh verifying that you have all of the hosts so one of the things that splunk's not particularly great at and they'll literate themselves they don't do asset Discovery so dude what assets do we see and what are they logging from that um and then for from um for every event that they are able to identify one of the cool things that we can do is actually create this low code no code environment so they could let you know Splunk customers can use Splunk sword to actually triage events and prioritize that event so where they're being routed within it to optimize the Sox team time to Market or time to triage any given event obviously reducing MTR and then finally I think one of the neatest things that we'll be seeing us develop is um our ability to build glass cables so behind me you'll see one of our triage events and how we build uh a Lockheed Martin kill chain on that with a glass table which is very familiar to the community we're going to have the ability and not too distant future to allow people to search observe on those iocs and if people aren't familiar with it ioc it's an instant of a compromise so that's a vector that we want to drill into and of course who's better at Drilling in the data and smoke yeah this is a critter this is an awesome Synergy there I mean I can see a Splunk customer going man this just gives me so much more capability action actionability and also real understanding and I think this is what I want to dig into if you don't mind understanding that critical impact okay is kind of where I see this coming got the data data ingest now data's data but the question is what not to log you know where are things misconfigured these are critical questions so can you talk about what it means to understand critical impact yeah so I think you know going back to the things that I just spoke about a lot of those cves where you'll see um uh low low low and then you daisy chain together and they're suddenly like oh this is high now but then your other impact of like if you're if you're a Splunk customer you know and I had it I had several of them I had one customer that you know terabytes of McAfee data being brought in and it was like all right there's a lot of other data that you probably also want to bring but they could only afford wanted to do certain data sets because that's and they didn't know how to prioritize or filter those data sets and so we provide that opportunity to say hey these are the critical ones to bring in but there's also the ones that you don't necessarily need to bring in because low cve in this case really does mean low cve like an ILO server would be one that um that's the print server uh where the uh your admin credentials are on on like a printer and so there will be credentials on that that's something that a hacker might go in to look at so although the cve on it is low is if you daisy chain with somebody that's able to get into that you might say Ah that's high and we would then potentially rank it giving our AI logic to say that's a moderate so put it on the scale and we prioritize those versus uh of all of these scanners just going to give you a bunch of CDs and good luck and translating that if I if I can and tell me if I'm wrong that kind of speaks to that whole lateral movement that's it challenge right print serve a great example looks stupid low end who's going to want to deal with the print server oh but it's connected into a critical system there's a path is that kind of what you're getting at yeah I use Daisy Chain I think that's from the community they came from uh but it's just a lateral movement it's exactly what they're doing in those low level low critical lateral movements is where the hackers are getting in right so that's the beauty thing about the uh the Uber example is that who would have thought you know I've got my monthly Factor authentication going in a human made a mistake we can't we can't not expect humans to make mistakes we're fallible right the reality is is once they were in the environment they could have protected themselves by running enough pen tests to know that they had certain uh exposed credentials that would have stopped the breach and they did not had not done that in their environment and I'm not poking yeah but it's an interesting Trend though I mean it's obvious if sometimes those low end items are also not protected well so it's easy to get at from a hacker standpoint but also the people in charge of them can be fished easily or spearfished because they're not paying attention because they don't have to no one ever told them hey be careful yeah for the community that I came from John that's exactly how they they would uh meet you at a uh an International Event um introduce themselves as a graduate student these are National actor States uh would you mind reviewing my thesis on such and such and I was at Adobe at the time that I was working on this instead of having to get the PDF they opened the PDF and whoever that customer was launches and I don't know if you remember back in like 2008 time frame there was a lot of issues around IP being by a nation state being stolen from the United States and that's exactly how they did it and John that's or LinkedIn hey I want to get a joke we want to hire you double the salary oh I'm gonna click on that for sure you know yeah right exactly yeah the one thing I would say to you is like uh when we look at like sort of you know because I think we did 10 000 pen tests last year is it's probably over that now you know we have these sort of top 10 ways that we think and find people coming into the environment the funniest thing is that only one of them is a cve related vulnerability like uh you know you guys know what they are right so it's it but it's it's like two percent of the attacks are occurring through the cves but yeah there's all that attention spent to that and very little attention spent to this pen testing side which is sort of this continuous threat you know monitoring space and and this vulnerability space where I think we play a such an important role and I'm so excited to be a part of the tip of the spear on this one yeah I'm old enough to know the movie sneakers which I loved as a you know watching that movie you know professional hackers are testing testing always testing the environment I love this I got to ask you as we kind of wrap up here Chris if you don't mind the the benefits to Professional Services from this Alliance big news Splunk and you guys work well together we see that clearly what are what other benefits do Professional Services teams see from the Splunk and Horizon 3.ai Alliance so if you're I think for from our our from both of our uh Partners uh as we bring these guys together and many of them already are the same partner right uh is that uh first off the licensing model is probably one of the key areas that we really excel at so if you're an end user you can buy uh for the Enterprise by the number of IP addresses you're using um but uh if you're a partner working with this there's solution ways that you can go in and we'll license as to msps and what that business model on msps looks like but the unique thing that we do here is this C plus license and so the Consulting plus license allows like a uh somebody a small to mid-sized to some very large uh you know Fortune 100 uh consulting firms use this uh by buying into a license called um Consulting plus where they can have unlimited uh access to as many IPS as they want but you can only run one test at a time and as you can imagine when we're going and hacking passwords and um checking hashes and decrypting hashes that can take a while so but for the right customer it's it's a perfect tool and so I I'm so excited about our ability to go to market with uh our partners so that we understand ourselves understand how not to just sell to or not tell just to sell through but we know how to sell with them as a good vendor partner I think that that's one thing that we've done a really good job building bring it into the market yeah I think also the Splunk has had great success how they've enabled uh partners and Professional Services absolutely you know the services that layer on top of Splunk are multi-fold tons of great benefits so you guys Vector right into that ride that way with friction and and the cool thing is that in you know in one of our reports which could be totally customized uh with someone else's logo we're going to generate you know so I I used to work in another organization it wasn't Splunk but we we did uh you know pen testing as for for customers and my pen testers would come on site they'd do the engagement and they would leave and then another release someone would be oh shoot we got another sector that was breached and they'd call you back you know four weeks later and so by August our entire pen testings teams would be sold out and it would be like well even in March maybe and they're like no no I gotta breach now and and and then when they do go in they go through do the pen test and they hand over a PDF and they pack on the back and say there's where your problems are you need to fix it and the reality is that what we're going to generate completely autonomously with no human interaction is we're going to go and find all the permutations of anything we found and the fix for those permutations and then once you've fixed everything you just go back and run another pen test it's you know for what people pay for one pen test they can have a tool that does that every every Pat patch on Tuesday and that's on Wednesday you know triage throughout the week green yellow red I wanted to see the colors show me green green is good right not red and one CIO doesn't want who doesn't want that dashboard right it's it's exactly it and we can help bring I think that you know I'm really excited about helping drive this with the Splunk team because they get that they understand that it's the green yellow red dashboard and and how do we help them find more green uh so that the other guys are in red yeah and get in the data and do the right thing and be efficient with how you use the data know what to look at so many things to pay attention to you know the combination of both and then go to market strategy real brilliant congratulations Chris thanks for coming on and sharing um this news with the detail around the Splunk in action around the alliance thanks for sharing John my pleasure thanks look forward to seeing you soon all right great we'll follow up and do another segment on devops and I.T and security teams as the new new Ops but and super cloud a bunch of other stuff so thanks for coming on and our next segment the CEO of horizon 3.aa will break down all the new news for us here on thecube you're watching thecube the leader in high tech Enterprise coverage [Music] yeah the partner program for us has been fantastic you know I think prior to that you know as most organizations most uh uh most Farmers most mssps might not necessarily have a a bench at all for penetration testing uh maybe they subcontract this work out or maybe they do it themselves but trying to staff that kind of position can be incredibly difficult for us this was a differentiator a a new a new partner a new partnership that allowed us to uh not only perform services for our customers but be able to provide a product by which that they can do it themselves so we work with our customers in a variety of ways some of them want more routine testing and perform this themselves but we're also a certified service provider of horizon 3 being able to perform uh penetration tests uh help review the the data provide color provide analysis for our customers in a broader sense right not necessarily the the black and white elements of you know what was uh what's critical what's high what's medium what's low what you need to fix but are there systemic issues this has allowed us to onboard new customers this has allowed us to migrate some penetration testing services to us from from competitors in the marketplace But ultimately this is occurring because the the product and the outcome are special they're unique and they're effective our customers like what they're seeing they like the routineness of it many of them you know again like doing this themselves you know being able to kind of pen test themselves parts of their networks um and the the new use cases right I'm a large organization I have eight to ten Acquisitions per year wouldn't it be great to have a tool to be able to perform a penetration test both internal and external of that acquisition before we integrate the two companies and maybe bringing on some risk it's a very effective partnership uh one that really is uh kind of taken our our Engineers our account Executives by storm um you know this this is a a partnership that's been very valuable to us [Music] a key part of the value and business model at Horizon 3 is enabling Partners to leverage node zero to make more revenue for themselves our goal is that for sixty percent of our Revenue this year will be originated by partners and that 95 of our Revenue next year will be originated by partners and so a key to that strategy is making us an integral part of your business models as a partner a key quote from one of our partners is that we enable every one of their business units to generate Revenue so let's talk about that in a little bit more detail first is that if you have a pen test Consulting business take Deloitte as an example what was six weeks of human labor at Deloitte per pen test has been cut down to four days of Labor using node zero to conduct reconnaissance find all the juicy interesting areas of the of the Enterprise that are exploitable and being able to go assess the entire organization and then all of those details get served up to the human to be able to look at understand and determine where to probe deeper so what you see in that pen test Consulting business is that node zero becomes a force multiplier where those Consulting teams were able to cover way more accounts and way more IPS within those accounts with the same or fewer consultants and so that directly leads to profit margin expansion for the Penn testing business itself because node 0 is a force multiplier the second business model here is if you're an mssp as an mssp you're already making money providing defensive cyber security operations for a large volume of customers and so what they do is they'll license node zero and use us as an upsell to their mssb business to start to deliver either continuous red teaming continuous verification or purple teaming as a service and so in that particular business model they've got an additional line of Revenue where they can increase the spend of their existing customers by bolting on node 0 as a purple team as a service offering the third business model or customer type is if you're an I.T services provider so as an I.T services provider you make money installing and configuring security products like Splunk or crowdstrike or hemio you also make money reselling those products and you also make money generating follow-on services to continue to harden your customer environments and so for them what what those it service providers will do is use us to verify that they've installed Splunk correctly improved to their customer that Splunk was installed correctly or crowdstrike was installed correctly using our results and then use our results to drive follow-on services and revenue and then finally we've got the value-added reseller which is just a straight up reseller because of how fast our sales Cycles are these vars are able to typically go from cold email to deal close in six to eight weeks at Horizon 3 at least a single sales engineer is able to run 30 to 50 pocs concurrently because our pocs are very lightweight and don't require any on-prem customization or heavy pre-sales post sales activity so as a result we're able to have a few amount of sellers driving a lot of Revenue and volume for us well the same thing applies to bars there isn't a lot of effort to sell the product or prove its value so vars are able to sell a lot more Horizon 3 node zero product without having to build up a huge specialist sales organization so what I'm going to do is talk through uh scenario three here as an I.T service provider and just how powerful node zero can be in driving additional Revenue so in here think of for every one dollar of node zero license purchased by the IT service provider to do their business it'll generate ten dollars of additional revenue for that partner so in this example kidney group uses node 0 to verify that they have installed and deployed Splunk correctly so Kitty group is a Splunk partner they they sell it services to install configure deploy and maintain Splunk and as they deploy Splunk they're going to use node 0 to attack the environment and make sure that the right logs and alerts and monitoring are being handled within the Splunk deployment so it's a way of doing QA or verifying that Splunk has been configured correctly and that's going to be internally used by kidney group to prove the quality of their services that they've just delivered then what they're going to do is they're going to show and leave behind that node zero Report with their client and that creates a resell opportunity for for kidney group to resell node 0 to their client because their client is seeing the reports and the results and saying wow this is pretty amazing and those reports can be co-branded where it's a pen testing report branded with kidney group but it says powered by Horizon three under it from there kidney group is able to take the fixed actions report that's automatically generated with every pen test through node zero and they're able to use that as the starting point for a statement of work to sell follow-on services to fix all of the problems that node zero identified fixing l11r misconfigurations fixing or patching VMware or updating credentials policies and so on so what happens is node 0 has found a bunch of problems the client often lacks the capacity to fix and so kidney group can use that lack of capacity by the client as a follow-on sales opportunity for follow-on services and finally based on the findings from node zero kidney group can look at that report and say to the customer you know customer if you bought crowdstrike you'd be able to uh prevent node Zero from attacking and succeeding in the way that it did for if you bought humano or if you bought Palo Alto networks or if you bought uh some privileged access management solution because of what node 0 was able to do with credential harvesting and attacks and so as a result kidney group is able to resell other security products within their portfolio crowdstrike Falcon humano Polito networks demisto Phantom and so on based on the gaps that were identified by node zero and that pen test and what that creates is another feedback loop where kidney group will then go use node 0 to verify that crowdstrike product has actually been installed and configured correctly and then this becomes the cycle of using node 0 to verify a deployment using that verification to drive a bunch of follow-on services and resell opportunities which then further drives more usage of the product now the way that we licensed is that it's a usage-based license licensing model so that the partner will grow their node zero Consulting plus license as they grow their business so for example if you're a kidney group then week one you've got you're going to use node zero to verify your Splunk install in week two if you have a pen testing business you're going to go off and use node zero to be a force multiplier for your pen testing uh client opportunity and then if you have an mssp business then in week three you're going to use node zero to go execute a purple team mssp offering for your clients so not necessarily a kidney group but if you're a Deloitte or ATT these larger companies and you've got multiple lines of business if you're Optive for instance you all you have to do is buy one Consulting plus license and you're going to be able to run as many pen tests as you want sequentially so now you can buy a single license and use that one license to meet your week one client commitments and then meet your week two and then meet your week three and as you grow your business you start to run multiple pen tests concurrently so in week one you've got to do a Splunk verify uh verify Splunk install and you've got to run a pen test and you've got to do a purple team opportunity you just simply expand the number of Consulting plus licenses from one license to three licenses and so now as you systematically grow your business you're able to grow your node zero capacity with you giving you predictable cogs predictable margins and once again 10x additional Revenue opportunity for that investment in the node zero Consulting plus license my name is Saint I'm the co-founder and CEO here at Horizon 3. I'm going to talk to you today about why it's important to look at your Enterprise Through The Eyes of an attacker the challenge I had when I was a CIO in banking the CTO at Splunk and serving within the Department of Defense is that I had no idea I was Secure until the bad guys had showed up am I logging the right data am I fixing the right vulnerabilities are my security tools that I've paid millions of dollars for actually working together to defend me and the answer is I don't know does my team actually know how to respond to a breach in the middle of an incident I don't know I've got to wait for the bad guys to show up and so the challenge I had was how do we proactively verify our security posture I tried a variety of techniques the first was the use of vulnerability scanners and the challenge with vulnerability scanners is being vulnerable doesn't mean you're exploitable I might have a hundred thousand findings from my scanner of which maybe five or ten can actually be exploited in my environment the other big problem with scanners is that they can't chain weaknesses together from machine to machine so if you've got a thousand machines in your environment or more what a vulnerability scanner will do is tell you you have a problem on machine one and separately a problem on machine two but what they can tell you is that an attacker could use a load from machine one plus a low from machine two to equal to critical in your environment and what attackers do in their tactics is they chain together misconfigurations dangerous product defaults harvested credentials and exploitable vulnerabilities into attack paths across different machines so to address the attack pads across different machines I tried layering in consulting-based pen testing and the issue is when you've got thousands of hosts or hundreds of thousands of hosts in your environment human-based pen testing simply doesn't scale to test an infrastructure of that size moreover when they actually do execute a pen test and you get the report oftentimes you lack the expertise within your team to quickly retest to verify that you've actually fixed the problem and so what happens is you end up with these pen test reports that are incomplete snapshots and quickly going stale and then to mitigate that problem I tried using breach and attack simulation tools and the struggle with these tools is one I had to install credentialed agents everywhere two I had to write my own custom attack scripts that I didn't have much talent for but also I had to maintain as my environment changed and then three these types of tools were not safe to run against production systems which was the the majority of my attack surface so that's why we went off to start Horizon 3. so Tony and I met when we were in Special Operations together and the challenge we wanted to solve was how do we do infrastructure security testing at scale by giving the the power of a 20-year pen testing veteran into the hands of an I.T admin a network engineer in just three clicks and the whole idea is we enable these fixers The Blue Team to be able to run node Zero Hour pen testing product to quickly find problems in their environment that blue team will then then go off and fix the issues that were found and then they can quickly rerun the attack to verify that they fixed the problem and the whole idea is delivering this without requiring custom scripts be developed without requiring credential agents be installed and without requiring the use of external third-party consulting services or Professional Services self-service pen testing to quickly Drive find fix verify there are three primary use cases that our customers use us for the first is the sock manager that uses us to verify that their security tools are actually effective to verify that they're logging the right data in Splunk or in their Sim to verify that their managed security services provider is able to quickly detect and respond to an attack and hold them accountable for their slas or that the sock understands how to quickly detect and respond and measuring and verifying that or that the variety of tools that you have in your stack most organizations have 130 plus cyber security tools none of which are designed to work together are actually working together the second primary use case is proactively hardening and verifying your systems this is when the I that it admin that network engineer they're able to run self-service pen tests to verify that their Cisco environment is installed in hardened and configured correctly or that their credential policies are set up right or that their vcenter or web sphere or kubernetes environments are actually designed to be secure and what this allows the it admins and network Engineers to do is shift from running one or two pen tests a year to 30 40 or more pen tests a month and you can actually wire those pen tests into your devops process or into your detection engineering and the change management processes to automatically trigger pen tests every time there's a change in your environment the third primary use case is for those organizations lucky enough to have their own internal red team they'll use node zero to do reconnaissance and exploitation at scale and then use the output as a starting point for the humans to step in and focus on the really hard juicy stuff that gets them on stage at Defcon and so these are the three primary use cases and what we'll do is zoom into the find fix verify Loop because what I've found in my experience is find fix verify is the future operating model for cyber security organizations and what I mean here is in the find using continuous pen testing what you want to enable is on-demand self-service pen tests you want those pen tests to find attack pads at scale spanning your on-prem infrastructure your Cloud infrastructure and your perimeter because attackers don't only state in one place they will find ways to chain together a perimeter breach a credential from your on-prem to gain access to your cloud or some other permutation and then the third part in continuous pen testing is attackers don't focus on critical vulnerabilities anymore they know we've built vulnerability Management Programs to reduce those vulnerabilities so attackers have adapted and what they do is chain together misconfigurations in your infrastructure and software and applications with dangerous product defaults with exploitable vulnerabilities and through the collection of credentials through a mix of techniques at scale once you've found those problems the next question is what do you do about it well you want to be able to prioritize fixing problems that are actually exploitable in your environment that truly matter meaning they're going to lead to domain compromise or domain user compromise or access your sensitive data the second thing you want to fix is making sure you understand what risk your crown jewels data is exposed to where is your crown jewels data is in the cloud is it on-prem has it been copied to a share drive that you weren't aware of if a domain user was compromised could they access that crown jewels data you want to be able to use the attacker's perspective to secure the critical data you have in your infrastructure and then finally as you fix these problems you want to quickly remediate and retest that you've actually fixed the issue and this fine fix verify cycle becomes that accelerator that drives purple team culture the third part here is verify and what you want to be able to do in the verify step is verify that your security tools and processes in people can effectively detect and respond to a breach you want to be able to integrate that into your detection engineering processes so that you know you're catching the right security rules or that you've deployed the right configurations you also want to make sure that your environment is adhering to the best practices around systems hardening in cyber resilience and finally you want to be able to prove your security posture over a time to your board to your leadership into your regulators so what I'll do now is zoom into each of these three steps so when we zoom in to find here's the first example using node 0 and autonomous pen testing and what an attacker will do is find a way to break through the perimeter in this example it's very easy to misconfigure kubernetes to allow an attacker to gain remote code execution into your on-prem kubernetes environment and break through the perimeter and from there what the attacker is going to do is conduct Network reconnaissance and then find ways to gain code execution on other machines in the environment and as they get code execution they start to dump credentials collect a bunch of ntlm hashes crack those hashes using open source and dark web available data as part of those attacks and then reuse those credentials to log in and laterally maneuver throughout the environment and then as they loudly maneuver they can reuse those credentials and use credential spraying techniques and so on to compromise your business email to log in as admin into your cloud and this is a very common attack and rarely is a CV actually needed to execute this attack often it's just a misconfiguration in kubernetes with a bad credential policy or password policy combined with bad practices of credential reuse across the organization here's another example of an internal pen test and this is from an actual customer they had 5 000 hosts within their environment they had EDR and uba tools installed and they initiated in an internal pen test on a single machine from that single initial access point node zero enumerated the network conducted reconnaissance and found five thousand hosts were accessible what node 0 will do under the covers is organize all of that reconnaissance data into a knowledge graph that we call the Cyber terrain map and that cyber Terrain map becomes the key data structure that we use to efficiently maneuver and attack and compromise your environment so what node zero will do is they'll try to find ways to get code execution reuse credentials and so on in this customer example they had Fortinet installed as their EDR but node 0 was still able to get code execution on a Windows machine from there it was able to successfully dump credentials including sensitive credentials from the lsas process on the Windows box and then reuse those credentials to log in as domain admin in the network and once an attacker becomes domain admin they have the keys to the kingdom they can do anything they want so what happened here well it turns out Fortinet was misconfigured on three out of 5000 machines bad automation the customer had no idea this had happened they would have had to wait for an attacker to show up to realize that it was misconfigured the second thing is well why didn't Fortinet stop the credential pivot in the lateral movement and it turned out the customer didn't buy the right modules or turn on the right services within that particular product and we see this not only with Ford in it but we see this with Trend Micro and all the other defensive tools where it's very easy to miss a checkbox in the configuration that will do things like prevent credential dumping the next story I'll tell you is attackers don't have to hack in they log in so another infrastructure pen test a typical technique attackers will take is man in the middle uh attacks that will collect hashes so in this case what an attacker will do is leverage a tool or technique called responder to collect ntlm hashes that are being passed around the network and there's a variety of reasons why these hashes are passed around and it's a pretty common misconfiguration but as an attacker collects those hashes then they start to apply techniques to crack those hashes so they'll pass the hash and from there they will use open source intelligence common password structures and patterns and other types of techniques to try to crack those hashes into clear text passwords so here node 0 automatically collected hashes it automatically passed the hashes to crack those credentials and then from there it starts to take the domain user user ID passwords that it's collected and tries to access different services and systems in your Enterprise in this case node 0 is able to successfully gain access to the Office 365 email environment because three employees didn't have MFA configured so now what happens is node 0 has a placement and access in the business email system which sets up the conditions for fraud lateral phishing and other techniques but what's especially insightful here is that 80 of the hashes that were collected in this pen test were cracked in 15 minutes or less 80 percent 26 of the user accounts had a password that followed a pretty obvious pattern first initial last initial and four random digits the other thing that was interesting is 10 percent of service accounts had their user ID the same as their password so VMware admin VMware admin web sphere admin web Square admin so on and so forth and so attackers don't have to hack in they just log in with credentials that they've collected the next story here is becoming WS AWS admin so in this example once again internal pen test node zero gets initial access it discovers 2 000 hosts are network reachable from that environment if fingerprints and organizes all of that data into a cyber Terrain map from there it it fingerprints that hpilo the integrated lights out service was running on a subset of hosts hpilo is a service that is often not instrumented or observed by security teams nor is it easy to patch as a result attackers know this and immediately go after those types of services so in this case that ILO service was exploitable and were able to get code execution on it ILO stores all the user IDs and passwords in clear text in a particular set of processes so once we gain code execution we were able to dump all of the credentials and then from there laterally maneuver to log in to the windows box next door as admin and then on that admin box we're able to gain access to the share drives and we found a credentials file saved on a share Drive from there it turned out that credentials file was the AWS admin credentials file giving us full admin authority to their AWS accounts not a single security alert was triggered in this attack because the customer wasn't observing the ILO service and every step thereafter was a valid login in the environment and so what do you do step one patch the server step two delete the credentials file from the share drive and then step three is get better instrumentation on privileged access users and login the final story I'll tell is a typical pattern that we see across the board with that combines the various techniques I've described together where an attacker is going to go off and use open source intelligence to find all of the employees that work at your company from there they're going to look up those employees on dark web breach databases and other forms of information and then use that as a starting point to password spray to compromise a domain user all it takes is one employee to reuse a breached password for their Corporate email or all it takes is a single employee to have a weak password that's easily guessable all it takes is one and once the attacker is able to gain domain user access in most shops domain user is also the local admin on their laptop and once your local admin you can dump Sam and get local admin until M hashes you can use that to reuse credentials again local admin on neighboring machines and attackers will start to rinse and repeat then eventually they're able to get to a point where they can dump lsas or by unhooking the anti-virus defeating the EDR or finding a misconfigured EDR as we've talked about earlier to compromise the domain and what's consistent is that the fundamentals are broken at these shops they have poor password policies they don't have least access privilege implemented active directory groups are too permissive where domain admin or domain user is also the local admin uh AV or EDR Solutions are misconfigured or easily unhooked and so on and what we found in 10 000 pen tests is that user Behavior analytics tools never caught us in that lateral movement in part because those tools require pristine logging data in order to work and also it becomes very difficult to find that Baseline of normal usage versus abnormal usage of credential login another interesting Insight is there were several Marquee brand name mssps that were defending our customers environment and for them it took seven hours to detect and respond to the pen test seven hours the pen test was over in less than two hours and so what you had was an egregious violation of the service level agreements that that mssp had in place and the customer was able to use us to get service credit and drive accountability of their sock and of their provider the third interesting thing is in one case it took us seven minutes to become domain admin in a bank that bank had every Gucci security tool you could buy yet in 7 minutes and 19 seconds node zero started as an unauthenticated member of the network and was able to escalate privileges through chaining and misconfigurations in lateral movement and so on to become domain admin if it's seven minutes today we should assume it'll be less than a minute a year or two from now making it very difficult for humans to be able to detect and respond to that type of Blitzkrieg attack so that's in the find it's not just about finding problems though the bulk of the effort should be what to do about it the fix and the verify so as you find those problems back to kubernetes as an example we will show you the path here is the kill chain we took to compromise that environment we'll show you the impact here is the impact or here's the the proof of exploitation that we were able to use to be able to compromise it and there's the actual command that we executed so you could copy and paste that command and compromise that cubelet yourself if you want and then the impact is we got code execution and we'll actually show you here is the impact this is a critical here's why it enabled perimeter breach affected applications will tell you the specific IPS where you've got the problem how it maps to the miter attack framework and then we'll tell you exactly how to fix it we'll also show you what this problem enabled so you can accurately prioritize why this is important or why it's not important the next part is accurate prioritization the hardest part of my job as a CIO was deciding what not to fix so if you take SMB signing not required as an example by default that CVSs score is a one out of 10. but this misconfiguration is not a cve it's a misconfig enable an attacker to gain access to 19 credentials including one domain admin two local admins and access to a ton of data because of that context this is really a 10 out of 10. you better fix this as soon as possible however of the seven occurrences that we found it's only a critical in three out of the seven and these are the three specific machines and we'll tell you the exact way to fix it and you better fix these as soon as possible for these four machines over here these didn't allow us to do anything of consequence so that because the hardest part is deciding what not to fix you can justifiably choose not to fix these four issues right now and just add them to your backlog and surge your team to fix these three as quickly as possible and then once you fix these three you don't have to re-run the entire pen test you can select these three and then one click verify and run a very narrowly scoped pen test that is only testing this specific issue and what that creates is a much faster cycle of finding and fixing problems the other part of fixing is verifying that you don't have sensitive data at risk so once we become a domain user we're able to use those domain user credentials and try to gain access to databases file shares S3 buckets git repos and so on and help you understand what sensitive data you have at risk so in this example a green checkbox means we logged in as a valid domain user we're able to get read write access on the database this is how many records we could have accessed and we don't actually look at the values in the database but we'll show you the schema so you can quickly characterize that pii data was at risk here and we'll do that for your file shares and other sources of data so now you can accurately articulate the data you have at risk and prioritize cleaning that data up especially data that will lead to a fine or a big news issue so that's the find that's the fix now we're going to talk about the verify the key part in verify is embracing and integrating with detection engineering practices so when you think about your layers of security tools you've got lots of tools in place on average 130 tools at any given customer but these tools were not designed to work together so when you run a pen test what you want to do is say did you detect us did you log us did you alert on us did you stop us and from there what you want to see is okay what are the techniques that are commonly used to defeat an environment to actually compromise if you look at the top 10 techniques we use and there's far more than just these 10 but these are the most often executed nine out of ten have nothing to do with cves it has to do with misconfigurations dangerous product defaults bad credential policies and it's how we chain those together to become a domain admin or compromise a host so what what customers will do is every single attacker command we executed is provided to you as an attackivity log so you can actually see every single attacker command we ran the time stamp it was executed the hosts it executed on and how it Maps the minor attack tactics so our customers will have are these attacker logs on one screen and then they'll go look into Splunk or exabeam or Sentinel one or crowdstrike and say did you detect us did you log us did you alert on us or not and to make that even easier if you take this example hey Splunk what logs did you see at this time on the VMware host because that's when node 0 is able to dump credentials and that allows you to identify and fix your logging blind spots to make that easier we've got app integration so this is an actual Splunk app in the Splunk App Store and what you can come is inside the Splunk console itself you can fire up the Horizon 3 node 0 app all of the pen test results are here so that you can see all of the results in one place and you don't have to jump out of the tool and what you'll show you as I skip forward is hey there's a pen test here are the critical issues that we've identified for that weaker default issue here are the exact commands we executed and then we will automatically query into Splunk all all terms on between these times on that endpoint that relate to this attack so you can now quickly within the Splunk environment itself figure out that you're missing logs or that you're appropriately catching this issue and that becomes incredibly important in that detection engineering cycle that I mentioned earlier so how do our customers end up using us they shift from running one pen test a year to 30 40 pen tests a month oftentimes wiring us into their deployment automation to automatically run pen tests the other part that they'll do is as they run more pen tests they find more issues but eventually they hit this inflection point where they're able to rapidly clean up their environment and that inflection point is because the red and the blue teams start working together in a purple team culture and now they're working together to proactively harden their environment the other thing our customers will do is run us from different perspectives they'll first start running an RFC 1918 scope to see once the attacker gained initial access in a part of the network that had wide access what could they do and then from there they'll run us within a specific Network segment okay from within that segment could the attacker break out and gain access to another segment then they'll run us from their work from home environment could they Traverse the VPN and do something damaging and once they're in could they Traverse the VPN and get into my cloud then they'll break in from the outside all of these perspectives are available to you in Horizon 3 and node zero as a single SKU and you can run as many pen tests as you want if you run a phishing campaign and find that an intern in the finance department had the worst phishing behavior you can then inject their credentials and actually show the end-to-end story of how an attacker fished gained credentials of an intern and use that to gain access to sensitive financial data so what our customers end up doing is running multiple attacks from multiple perspectives and looking at those results over time I'll leave you two things one is what is the AI in Horizon 3 AI those knowledge graphs are the heart and soul of everything that we do and we use machine learning reinforcement techniques reinforcement learning techniques Markov decision models and so on to be able to efficiently maneuver and analyze the paths in those really large graphs we also use context-based scoring to prioritize weaknesses and we're also able to drive collective intelligence across all of the operations so the more pen tests we run the smarter we get and all of that is based on our knowledge graph analytics infrastructure that we have finally I'll leave you with this was my decision criteria when I was a buyer for my security testing strategy what I cared about was coverage I wanted to be able to assess my on-prem cloud perimeter and work from home and be safe to run in production I want to be able to do that as often as I wanted I want to be able to run pen tests in hours or days not weeks or months so I could accelerate that fine fix verify loop I wanted my it admins and network Engineers with limited offensive experience to be able to run a pen test in a few clicks through a self-service experience and not have to install agent and not have to write custom scripts and finally I didn't want to get nickeled and dimed on having to buy different types of attack modules or different types of attacks I wanted a single annual subscription that allowed me to run any type of attack as often as I wanted so I could look at my Trends in directions over time so I hope you found this talk valuable uh we're easy to find and I look forward to seeing seeing you use a product and letting our results do the talking when you look at uh you know kind of the way no our pen testing algorithms work is we dynamically select uh how to compromise an environment based on what we've discovered and the goal is to become a domain admin compromise a host compromise domain users find ways to encrypt data steal sensitive data and so on but when you look at the the top 10 techniques that we ended up uh using to compromise environments the first nine have nothing to do with cves and that's the reality cves are yes a vector but less than two percent of cves are actually used in a compromise oftentimes it's some sort of credential collection credential cracking uh credential pivoting and using that to become an admin and then uh compromising environments from that point on so I'll leave this up for you to kind of read through and you'll have the slides available for you but I found it very insightful that organizations and ourselves when I was a GE included invested heavily in just standard vulnerability Management Programs when I was at DOD that's all disa cared about asking us about was our our kind of our cve posture but the attackers have adapted to not rely on cves to get in because they know that organizations are actively looking at and patching those cves and instead they're chaining together credentials from one place with misconfigurations and dangerous product defaults in another to take over an environment a concrete example is by default vcenter backups are not encrypted and so as if an attacker finds vcenter what they'll do is find the backup location and there are specific V sender MTD files where the admin credentials are parsippled in the binaries so you can actually as an attacker find the right MTD file parse out the binary and now you've got the admin credentials for the vcenter environment and now start to log in as admin there's a bad habit by signal officers and Signal practitioners in the in the Army and elsewhere where the the VM notes section of a virtual image has the password for the VM well those VM notes are not stored encrypted and attackers know this and they're able to go off and find the VMS that are unencrypted find the note section and pull out the passwords for those images and then reuse those credentials across the board so I'll pause here and uh you know Patrick love you get some some commentary on on these techniques and other things that you've seen and what we'll do in the last say 10 to 15 minutes is uh is rolled through a little bit more on what do you do about it yeah yeah no I love it I think um I think this is pretty exhaustive what I like about what you've done here is uh you know we've seen we've seen double-digit increases in the number of organizations that are reporting actual breaches year over year for the last um for the last three years and it's often we kind of in the Zeitgeist we pegged that on ransomware which of course is like incredibly important and very top of mind um but what I like about what you have here is you know we're reminding the audience that the the attack surface area the vectors the matter um you know has to be more comprehensive than just thinking about ransomware scenarios yeah right on um so let's build on this when you think about your defense in depth you've got multiple security controls that you've purchased and integrated and you've got that redundancy if a control fails but the reality is that these security tools aren't designed to work together so when you run a pen test what you want to ask yourself is did you detect node zero did you log node zero did you alert on node zero and did you stop node zero and when you think about how to do that every single attacker command executed by node zero is available in an attacker log so you can now see you know at the bottom here vcenter um exploit at that time on that IP how it aligns to minor attack what you want to be able to do is go figure out did your security tools catch this or not and that becomes very important in using the attacker's perspective to improve your defensive security controls and so the way we've tried to make this easier back to like my my my the you know I bleed Green in many ways still from my smoke background is you want to be able to and what our customers do is hey we'll look at the attacker logs on one screen and they'll look at what did Splunk see or Miss in another screen and then they'll use that to figure out what their logging blind spots are and what that where that becomes really interesting is we've actually built out an integration into Splunk where there's a Splunk app you can download off of Splunk base and you'll get all of the pen test results right there in the Splunk console and from that Splunk console you're gonna be able to see these are all the pen tests that were run these are the issues that were found um so you can look at that particular pen test here are all of the weaknesses that were identified for that particular pen test and how they categorize out for each of those weaknesses you can click on any one of them that are critical in this case and then we'll tell you for that weakness and this is where where the the punch line comes in so I'll pause the video here for that weakness these are the commands that were executed on these endpoints at this time and then we'll actually query Splunk for that um for that IP address or containing that IP and these are the source types that surface any sort of activity so what we try to do is help you as quickly and efficiently as possible identify the logging blind spots in your Splunk environment based on the attacker's perspective so as this video kind of plays through you can see it Patrick I'd love to get your thoughts um just seeing so many Splunk deployments and the effectiveness of those deployments and and how this is going to help really Elevate the effectiveness of all of your Splunk customers yeah I'm super excited about this I mean I think this these kinds of purpose-built integration snail really move the needle for our customers I mean at the end of the day when I think about the power of Splunk I think about a product I was first introduced to 12 years ago that was an on-prem piece of software you know and at the time it sold on sort of Perpetual and term licenses but one made it special was that it could it could it could eat data at a speed that nothing else that I'd have ever seen you can ingest massively scalable amounts of data uh did cool things like schema on read which facilitated that there was this language called SPL that you could nerd out about uh and you went to a conference once a year and you talked about all the cool things you were splunking right but now as we think about the next phase of our growth um we live in a heterogeneous environment where our customers have so many different tools and data sources that are ever expanding and as you look at the as you look at the role of the ciso it's mind-blowing to me the amount of sources Services apps that are coming into the ciso span of let's just call it a span of influence in the last three years uh you know we're seeing things like infrastructure service level visibility application performance monitoring stuff that just never made sense for the security team to have visibility into you um at least not at the size and scale which we're demanding today um and and that's different and this isn't this is why it's so important that we have these joint purpose-built Integrations that um really provide more prescription to our customers about how do they walk on that Journey towards maturity what does zero to one look like what does one to two look like whereas you know 10 years ago customers were happy with platforms today they want integration they want Solutions and they want to drive outcomes and I think this is a great example of how together we are stepping to the evolving nature of the market and also the ever-evolving nature of the threat landscape and what I would say is the maturing needs of the customer in that environment yeah for sure I think especially if if we all anticipate budget pressure over the next 18 months due to the economy and elsewhere while the security budgets are not going to ever I don't think they're going to get cut they're not going to grow as fast and there's a lot more pressure on organizations to extract more value from their existing Investments as well as extracting more value and more impact from their existing teams and so security Effectiveness Fierce prioritization and automation I think become the three key themes of security uh over the next 18 months so I'll do very quickly is run through a few other use cases um every host that we identified in the pen test were able to score and say this host allowed us to do something significant therefore it's it's really critical you should be increasing your logging here hey these hosts down here we couldn't really do anything as an attacker so if you do have to make trade-offs you can make some trade-offs of your logging resolution at the lower end in order to increase logging resolution on the upper end so you've got that level of of um justification for where to increase or or adjust your logging resolution another example is every host we've discovered as an attacker we Expose and you can export and we want to make sure is every host we found as an attacker is being ingested from a Splunk standpoint a big issue I had as a CIO and user of Splunk and other tools is I had no idea if there were Rogue Raspberry Pi's on the network or if a new box was installed and whether Splunk was installed on it or not so now you can quickly start to correlate what hosts did we see and how does that reconcile with what you're logging from uh finally or second to last use case here on the Splunk integration side is for every single problem we've found we give multiple options for how to fix it this becomes a great way to prioritize what fixed actions to automate in your soar platform and what we want to get to eventually is being able to automatically trigger soar actions to fix well-known problems like automatically invalidating passwords for for poor poor passwords in our credentials amongst a whole bunch of other things we could go off and do and then finally if there is a well-known kill chain or attack path one of the things I really wish I could have done when I was a Splunk customer was take this type of kill chain that actually shows a path to domain admin that I'm sincerely worried about and use it as a glass table over which I could start to layer possible indicators of compromise and now you've got a great starting point for glass tables and iocs for actual kill chains that we know are exploitable in your environment and that becomes some super cool Integrations that we've got on the roadmap between us and the Splunk security side of the house so what I'll leave with actually Patrick before I do that you know um love to get your comments and then I'll I'll kind of leave with one last slide on this wartime security mindset uh pending you know assuming there's no other questions no I love it I mean I think this kind of um it's kind of glass table's approach to how do you how do you sort of visualize these workflows and then use things like sore and orchestration and automation to operationalize them is exactly where we see all of our customers going and getting away from I think an over engineered approach to soar with where it has to be super technical heavy with you know python programmers and getting more to this visual view of workflow creation um that really demystifies the power of Automation and also democratizes it so you don't have to have these programming languages in your resume in order to start really moving the needle on workflow creation policy enforcement and ultimately driving automation coverage across more and more of the workflows that your team is seeing yeah I think that between us being able to visualize the actual kill chain or attack path with you know think of a of uh the soar Market I think going towards this no code low code um you know configurable sore versus coded sore that's going to really be a game changer in improve or giving security teams a force multiplier so what I'll leave you with is this peacetime mindset of security no longer is sustainable we really have to get out of checking the box and then waiting for the bad guys to show up to verify that security tools are are working or not and the reason why we've got to really do that quickly is there are over a thousand companies that withdrew from the Russian economy over the past uh nine months due to the Ukrainian War there you should expect every one of them to be punished by the Russians for leaving and punished from a cyber standpoint and this is no longer about financial extortion that is ransomware this is about punishing and destroying companies and you can punish any one of these companies by going after them directly or by going after their suppliers and their Distributors so suddenly your attack surface is no more no longer just your own Enterprise it's how you bring your goods to Market and it's how you get your goods created because while I may not be able to disrupt your ability to harvest fruit if I can get those trucks stuck at the border I can increase spoilage and have the same effect and what we should expect to see is this idea of cyber-enabled economic Warfare where if we issue a sanction like Banning the Russians from traveling there is a cyber-enabled counter punch which is corrupt and destroy the American Airlines database that is below the threshold of War that's not going to trigger the 82nd Airborne to be mobilized but it's going to achieve the right effect ban the sale of luxury goods disrupt the supply chain and create shortages banned Russian oil and gas attack refineries to call a 10x spike in gas prices three days before the election this is the future and therefore I think what we have to do is shift towards a wartime mindset which is don't trust your security posture verify it see yourself Through The Eyes of the attacker build that incident response muscle memory and drive better collaboration between the red and the blue teams your suppliers and Distributors and your information uh sharing organization they have in place and what's really valuable for me as a Splunk customer was when a router crashes at that moment you don't know if it's due to an I.T Administration problem or an attacker and what you want to have are different people asking different questions of the same data and you want to have that integrated triage process of an I.T lens to that problem a security lens to that problem and then from there figuring out is is this an IT workflow to execute or a security incident to execute and you want to have all of that as an integrated team integrated process integrated technology stack and this is something that I very care I cared very deeply about as both a Splunk customer and a Splunk CTO that I see time and time again across the board so Patrick I'll leave you with the last word the final three minutes here and I don't see any open questions so please take us home oh man see how you think we spent hours and hours prepping for this together that that last uh uh 40 seconds of your talk track is probably one of the things I'm most passionate about in this industry right now uh and I think nist has done some really interesting work here around building cyber resilient organizations that have that has really I think helped help the industry see that um incidents can come from adverse conditions you know stress is uh uh performance taxations in the infrastructure service or app layer and they can come from malicious compromises uh Insider threats external threat actors and the more that we look at this from the perspective of of a broader cyber resilience Mission uh in a wartime mindset uh I I think we're going to be much better off and and will you talk about with operationally minded ice hacks information sharing intelligence sharing becomes so important in these wartime uh um situations and you know we know not all ice acts are created equal but we're also seeing a lot of um more ad hoc information sharing groups popping up so look I think I think you framed it really really well I love the concept of wartime mindset and um I I like the idea of applying a cyber resilience lens like if you have one more layer on top of that bottom right cake you know I think the it lens and the security lens they roll up to this concept of cyber resilience and I think this has done some great work there for us yeah you're you're spot on and that that is app and that's gonna I think be the the next um terrain that that uh that you're gonna see vendors try to get after but that I think Splunk is best position to win okay that's a wrap for this special Cube presentation you heard all about the global expansion of horizon 3.ai's partner program for their Partners have a unique opportunity to take advantage of their node zero product uh International go to Market expansion North America channel Partnerships and just overall relationships with companies like Splunk to make things more comprehensive in this disruptive cyber security world we live in and hope you enjoyed this program all the videos are available on thecube.net as well as check out Horizon 3 dot AI for their pen test Automation and ultimately their defense system that they use for testing always the environment that you're in great Innovative product and I hope you enjoyed the program again I'm John Furrier host of the cube thanks for watching
SUMMARY :
that's the sort of stuff that we do you
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
Patrick Coughlin | PERSON | 0.99+ |
Jennifer Lee | PERSON | 0.99+ |
Chris | PERSON | 0.99+ |
Tony | PERSON | 0.99+ |
2013 | DATE | 0.99+ |
Raina Richter | PERSON | 0.99+ |
Singapore | LOCATION | 0.99+ |
Europe | LOCATION | 0.99+ |
Patrick | PERSON | 0.99+ |
Frankfurt | LOCATION | 0.99+ |
John | PERSON | 0.99+ |
20-year | QUANTITY | 0.99+ |
hundreds | QUANTITY | 0.99+ |
AWS | ORGANIZATION | 0.99+ |
20 years | QUANTITY | 0.99+ |
seven minutes | QUANTITY | 0.99+ |
95 | QUANTITY | 0.99+ |
Ford | ORGANIZATION | 0.99+ |
2.7 billion | QUANTITY | 0.99+ |
March | DATE | 0.99+ |
Finland | LOCATION | 0.99+ |
seven hours | QUANTITY | 0.99+ |
sixty percent | QUANTITY | 0.99+ |
John Furrier | PERSON | 0.99+ |
Sweden | LOCATION | 0.99+ |
John Furrier | PERSON | 0.99+ |
six weeks | QUANTITY | 0.99+ |
seven hours | QUANTITY | 0.99+ |
19 credentials | QUANTITY | 0.99+ |
ten dollars | QUANTITY | 0.99+ |
Jennifer | PERSON | 0.99+ |
5 000 hosts | QUANTITY | 0.99+ |
Horizon 3 | TITLE | 0.99+ |
Wednesday | DATE | 0.99+ |
30 | QUANTITY | 0.99+ |
eight | QUANTITY | 0.99+ |
Asia Pacific | LOCATION | 0.99+ |
American Airlines | ORGANIZATION | 0.99+ |
Deloitte | ORGANIZATION | 0.99+ |
three licenses | QUANTITY | 0.99+ |
two companies | QUANTITY | 0.99+ |
2019 | DATE | 0.99+ |
European Union | ORGANIZATION | 0.99+ |
six | QUANTITY | 0.99+ |
seven occurrences | QUANTITY | 0.99+ |
70 | QUANTITY | 0.99+ |
three people | QUANTITY | 0.99+ |
Horizon 3.ai | TITLE | 0.99+ |
ATT | ORGANIZATION | 0.99+ |
Net Zero | ORGANIZATION | 0.99+ |
Splunk | ORGANIZATION | 0.99+ |
Uber | ORGANIZATION | 0.99+ |
five | QUANTITY | 0.99+ |
less than two percent | QUANTITY | 0.99+ |
less than two hours | QUANTITY | 0.99+ |
2012 | DATE | 0.99+ |
UK | LOCATION | 0.99+ |
Adobe | ORGANIZATION | 0.99+ |
four issues | QUANTITY | 0.99+ |
Department of Defense | ORGANIZATION | 0.99+ |
next year | DATE | 0.99+ |
three steps | QUANTITY | 0.99+ |
node 0 | TITLE | 0.99+ |
15 minutes | QUANTITY | 0.99+ |
hundred percent | QUANTITY | 0.99+ |
node zero | TITLE | 0.99+ |
10x | QUANTITY | 0.99+ |
last year | DATE | 0.99+ |
7 minutes | QUANTITY | 0.99+ |
one license | QUANTITY | 0.99+ |
second thing | QUANTITY | 0.99+ |
thousands of hosts | QUANTITY | 0.99+ |
five thousand hosts | QUANTITY | 0.99+ |
next week | DATE | 0.99+ |
Chris Hill, Horizon3.ai | Horizon3.ai Partner Program Expands Internationally
>>Welcome back everyone to the Cube and Horizon three.ai special presentation. I'm John Furrier, host of the Cube. We with Chris Hill, Sector head for strategic accounts and federal@horizonthree.ai. Great innovative company. Chris, great to see you. Thanks for coming on the Cube. >>Yeah, like I said, you know, great to meet you John. Long time listener. First time call. So excited to be here with >>You guys. Yeah, we were talking before camera. You had Splunk back in 2013 and I think 2012 was our first splunk.com. Yep. And boy man, you know, talk about being in the right place at the right time. Now we're at another inflection point and Splunk continues to be relevant and continuing to have that data driving security and that interplay. And your ceo, former CTO of Splunk as well at Horizons Neha, who's been on before. Really innovative product you guys have, but you know, Yeah, don't wait for a brief to find out if you're locking the right data. This is the topic of this thread. Splunk is very much part of this new international expansion announcement with you guys. Tell us what are some of the challenges that you see where this is relevant for the Splunk and the Horizon AI as you guys expand Node zero out internationally? >>Yeah, well so across, so you know, my role within Splunk was working with our most strategic accounts. And so I look back to 2013 and I think about the sales process like working with, with our small customers. You know, it was, it was still very siloed back then. Like I was selling to an IT team that was either using us for IT operations. We generally would always even say, yeah, although we do security, we weren't really designed for it. We're a log management tool. And you know, we, and I'm sure you remember back then John, we were like sort of stepping into the security space and in the public sector domain that I was in, you know, security was 70% of what we did. When I look back to sort of the transformation that I was, was witnessing in that digital transformation, you know when I, you look at like 2019 to today, you look at how the IT team and the security teams are, have been forced to break down those barriers that they used to sort of be silo away, would not communicate one, you know, the security guys would be like, Oh this is my BA box it, you're not allowed in today. >>You can't get away with that. And I think that the value that we bring to, you know, and of course Splunk has been a huge leader in that space and continues to do innovation across the board. But I think what we've we're seeing in the space that I was talking with Patrick Kauflin, the SVP of security markets about this, is that, you know, what we've been able to do with Splunk is build a purpose built solution that allows Splunk to eat more data. So Splunk itself, as you well know, it's an ingest engine, right? So the great reason people bought it was you could build these really fast dashboards and grab intelligence out of it, but without data it doesn't do anything, right? So how do you drive and how do you bring more data in? And most importantly from a customer perspective, how do you bring the right data in? >>And so if you think about what node zero and what we're doing in a Horizon three is that, sure we do pen testing, but because we're an autonomous pen testing tool, we do it continuously. So this whole thought of being like, Oh, crud like my customers, Oh yeah, we got a pen test coming up, it's gonna be six weeks. The wait. Oh yeah. You know, and everyone's gonna sit on their hands, Call me back in two months, Chris, we'll talk to you then. Right? Not, not a real efficient way to test your environment and shoot, we, we saw that with Uber this week. Right? You know, and that's a case where we could have helped. >>Well just real quick, explain the Uber thing cause it was a contractor. Just give a quick highlight of what happened so you can connect the >>Dots. Yeah, no problem. So there it was, I think it was one of those, you know, games where they would try and test an environment. And what the pen tester did was he kept on calling them MFA guys being like, I need to reset my password re to set my password. And eventually the customer service guy said, Okay, I'm resetting it. Once he had reset and bypassed the multifactor authentication, he then was able to get in and get access to the domain area that he was in or the, not the domain, but he was able to gain access to a partial part of the network. He then paralleled over to what would I assume is like a VA VMware or some virtual machine that had notes that had all of the credentials for logging into various domains. And so within minutes they had access. And that's the sort of stuff that we do under, you know, a lot of these tools. >>Like not, and I'm not, you know, you think about the cacophony of tools that are out there in a CTA orchestra architecture, right? I'm gonna get like a Zscaler, I'm gonna have Okta, I'm gonna have a Splunk, I'm gonna do this sore system. I mean, I don't mean to name names, we're gonna have crowd strike or, or Sentinel one in there. It's just, it's a cacophony of things that don't work together. They weren't designed work together. And so we have seen so many times in our business through our customer support and just working with customers when we do their pen test, that there will be 5,000 servers out there. Three are misconfigured. Those three misconfigurations will create the open door. Cause remember the hacker only needs to be right once, the defender needs to be right all the time. And that's the challenge. And so that's why I'm really passionate about what we're doing here at Horizon three. I see this my digital transformation, migration and security going on, which we're at the tip of the sp, it's why I joined say Hall coming on this journey and just super excited about where the path's going and super excited about the relationship with Splunk. I get into more details on some of the specifics of that. But you know, >>I mean, well you're nailing, I mean we've been doing a lot of things around super cloud and this next gen environment, we're calling it NextGen. You're really seeing DevOps, obviously Dev SecOps has, has already won the IT role has moved to the developer shift left as an indicator of that. It's one of the many examples, higher velocity code software supply chain. You hear these things. That means that it is now in the developer hands, it is replaced by the new ops, data ops teams and security where there's a lot of horizontal thinking. To your point about access, there's no more perimeter. So >>That there is no perimeter. >>Huge. A hundred percent right, is really right on. I don't think it's one time, you know, to get in there. Once you're in, then you can hang out, move around, move laterally. Big problem. Okay, so we get that. Now, the challenges for these teams as they are transitioning organizationally, how do they figure out what to do? Okay, this is the next step. They already have Splunk, so now they're kind of in transition while protecting for a hundred percent ratio of success. So how would you look at that and describe the challenges? What do they do? What is, what are the teams facing with their data and what's next? What do they, what do they, what action do they take? >>So let's do some vernacular that folks will know. So if I think about dev sec ops, right? We both know what that means, that I'm gonna build security into the app, but no one really talks about SEC DevOps, right? How am I building security around the perimeter of what's going inside my ecosystem and what are they doing? And so if you think about what we're able to do with somebody like Splunk is we could pen test the entire environment from soup to nuts, right? So I'm gonna test the end points through to it. So I'm gonna look for misconfigurations, I'm gonna, and I'm gonna look for credential exposed credentials. You know, I'm gonna look for anything I can in the environment. Again, I'm gonna do it at at light speed. And, and what we're, what we're doing for that SEC dev space is to, you know, did you detect that we were in your environment? >>So did we alert Splunk or the SIM that there's someone in the environment laterally moving around? Did they, more importantly, did they log us into their environment? And when did they detect that log to trigger that log? Did they alert on us? And then finally, most importantly, for every CSO out there is gonna be did they stop us? And so that's how we, we, we do this in, I think you, when speaking with Stay Hall, before, you know, we've come up with this boils U Loop, but we call it fine fix verify. So what we do is we go in is we act as the attacker, right? We act in a production environment. So we're not gonna be, we're a passive attacker, but we will go in un credentialed UN agents. But we have to assume, have an assumed breach model, which means we're gonna put a Docker container in your environment and then we're going to fingerprint the environment. >>So we're gonna go out and do an asset survey. Now that's something that's not something that Splunk does super well, you know, so can Splunk see all the assets, do the same assets marry up? We're gonna log all that data and think then put load that into the Splunk sim or the smoke logging tools just to have it in enterprise, right? That's an immediate future ad that they've got. And then we've got the fix. So once we've completed our pen test, we are then gonna generate a report and we could talk about about these in a little bit later. But the reports will show an executive summary the assets that we found, which would be your asset discovery aspect of that, a fixed report. And the fixed report I think is probably the most important one. It will go down and identify what we did, how we did it, and then how to fix that. >>And then from that, the pen tester or the organization should fix those. Then they go back and run another test. And then they validate through like a change detection environment to see, hey, did those fixes taste, play take place? And you know, SNA Hall, when he was the CTO of JS o, he shared with me a number of times about, he's like, Man, there would be 15 more items on next week's punch sheet that we didn't know about. And it's, and it has to do with how we, you know, how they were prioritizing the CVEs and whatnot because they would take all CVS was critical or non-critical. And it's like we are able to create context in that environment that feeds better information into Splunk and whatnot. That >>Was a lot. That brings, that brings up the, the efficiency for Splunk specifically. The teams out there. By the way, the burnout thing is real. I mean, this whole, I just finished my list and I got 15 more or whatever the list just can, keeps, keeps growing. How did Node zero specifically help Splunk teams be more efficient? Now that's the question I want to get at, because this seems like a very scalable way for Splunk customers and teams, service teams to be more efficient. So the question is, how does Node zero help make Splunk specifically their service teams be more efficient? >>So to, so today in our early interactions with building Splunk customers, what we've seen are five things, and I'll start with sort of identifying the blind spots, right? So kind of what I just talked about with you. Did we detect, did we log, did we alert? Did they stop node zero, right? And so I would, I put that at, you know, a a a more layman's third grade term. And if I was gonna beat a fifth grader at this game would be, we can be the sparring partner for a Splunk enterprise customer, a Splunk essentials customer, someone using Splunk soar, or even just an enterprise Splunk customer that may be a small shop with three people and, and just wants to know where am I exposed. So by creating and generating these reports and then having the API that actually generates the dashboard, they can take all of these events that we've logged and log them in. >>And then where that then comes in is number two is how do we prioritize those logs, right? So how do we create visibility to logs that are, have critical impacts? And again, as I mentioned earlier, not all CVEs are high impact regard and also not all are low, right? So if you daisy chain a bunch of low CVEs together, boom, I've got a mission critical AP CVE that needs to be fixed now, such as a credential moving to an NT box that's got a text file with a bunch of passwords on it, that would be very bad. And then third would be verifying that you have all of the hosts. So one of the things that Splunk's not particularly great at, and they, they themselves, they don't do asset discovery. So do what assets do we see and what are they logging from that? And then for, from, for every event that they are able to identify the, one of the cool things that we can do is actually create this low-code, no-code environment. >>So they could let, you know, float customers can use Splunk. So to actually triage events and prioritize that events or where they're being routed within it to optimize the SOX team time to market or time to triage any given event. Obviously reducing mtr. And then finally, I think one of the neatest things that we'll be seeing us develop is our ability to build glass tables. So behind me you'll see one of our triage events and how we build a lock Lockheed Martin kill chain on that with a glass table, which is very familiar to this Splunk community. We're going to have the ability, not too distant future to allow people to search, observe on those IOCs. And if people aren't familiar with an ioc, it's an incident of compromise. So that's a vector that we want to drill into. And of course who's better at drilling in into data and Splunk. >>Yeah, this is a critical, this is awesome synergy there. I mean I can see a Splunk customer going, Man, this just gives me so much more capability. Action actionability. And also real understanding, and I think this is what I wanna dig into, if you don't mind understanding that critical impact, okay. Is kind of where I see this coming. I got the data, data ingest now data's data. But the question is what not to log, You know, where are things misconfigured? These are critical questions. So can you talk about what it means to understand critical impact? >>Yeah, so I think, you know, going back to those things that I just spoke about, a lot of those CVEs where you'll see low, low, low and then you daisy chain together and you're suddenly like, oh, this is high now. But then to your other impact of like if you're a, if you're a a Splunk customer, you know, and I had, I had several of them, I had one customer that, you know, terabytes of McAfee data being brought in and it was like, all right, there's a lot of other data that you probably also wanna bring, but they could only afford, wanted to do certain data sets because that's, and they didn't know how to prioritize or filter those data sets. And so we provide that opportunity to say, Hey, these are the critical ones to bring in. But there's also the ones that you don't necessarily need to bring in because low CVE in this case really does mean low cve. >>Like an ILO server would be one that, that's the print server where the, your admin credentials are on, on like a, a printer. And so there will be credentials on that. That's something that a hacker might go in to look at. So although the CVE on it is low, if you daisy chain was something that's able to get into that, you might say, ah, that's high. And we would then potentially rank it giving our AI logic to say that's a moderate. So put it on the scale and we prioritize though, versus a, a vulner review scanner's just gonna give you a bunch of CVEs and good luck. >>And translating that if I, if I can and tell me if I'm wrong, that kind of speaks to that whole lateral movement. That's it. Challenge, right? Print server, great example, look stupid low end, who's gonna wanna deal with the print server? Oh, but it's connected into a critical system. There's a path. Is that kind of what you're getting at? >>Yeah, I used daisy chain. I think that's from the community they came from. But it's, it's just a lateral movement. It's exactly what they're doing. And those low level, low critical lateral movements is where the hackers are getting in. Right? So that's what the beauty thing about the, the Uber example is that who would've thought, you know, I've got my multifactor authentication going in a human made a mistake. We can't, we can't not expect humans to make mistakes. Were fall, were fallible, right? Yeah. The reality is is once they were in the environment, they could have protected themselves by running enough pen tests to know that they had certain exposed credentials that would've stopped the breach. Yeah. And they did not, had not done that in their environment. And I'm not poking. Yeah, >>They put it's interesting trend though. I mean it's obvious if sometimes those low end items are also not protected well. So it's easy to get at from a hacker standpoint, but also the people in charge of them can be fished easily or spear fished because they're not paying attention. Cause they don't have to. No one ever told them, Hey, be careful of what you collect. >>Yeah. For the community that I came from, John, that's exactly how they, they would meet you at a, an international event introduce themselves as a graduate student. These are national actor states. Would you mind reviewing my thesis on such and such? And I was at Adobe at the time though I was working on this and start off, you get the pdf, they opened the PDF and whoever that customer was launches, and I don't know if you remember back in like 2002, 2008 time frame, there was a lot of issues around IP being by a nation state being stolen from the United States and that's exactly how they did it. And John, that's >>Or LinkedIn. Hey I wanna get a joke, we wanna hire you double the salary. Oh I'm gonna click on that for sure. You know? Yeah, >>Right. Exactly. Yeah. The one thing I would say to you is like when we look at like sort of, you know, cuz I think we did 10,000 pen test last year is it's probably over that now, you know, we have these sort of top 10 ways that we think then fine people coming into the environment. The funniest thing is that only one of them is a, a CVE related vulnerability. Like, you know, you guys know what they are, right? So it's it, but it's, it's like 2% of the attacks are occurring through the CVEs, but yet there's all that attention spent to that. Yeah. And very little attention spent to this pen testing side. Yeah. Which is sort of this continuous threat, you know, monitoring space and, and, and this vulnerability space where I think we play such an important role and I'm so excited to be a part of the tip of the spear on this one. >>Yeah. I'm old enough to know the movie sneakers, which I love as a, you know, watching that movie, you know, professional hackers are testing, testing, always testing the environment. I love this. I gotta ask you, as we kind of wrap up here, Chris, if you don't mind the benefits to team professional services from this alliance, big news Splunk and you guys work well together. We see that clearly. What are, what other benefits do professional services teams see from the Splunk and Horizon three AI alliance? >>So if you're a, I think for, from our, our, from both of our partners as we bring these guys together and many of them already are the same partner, right? Is that first off, the licensing model is probably one of the key areas that we really excel at. So if you're an end user, you can buy for the enterprise by the enter of IP addresses you're using. But if you're a partner working with this, there's solution ways that you can go in and we'll license as to MSPs and what that business model on our MSPs looks like. But the unique thing that we do here is this c plus license. And so the Consulting Plus license allows like a, somebody a small to midsize to some very large, you know, Fortune 100, you know, consulting firms uses by buying into a license called Consulting Plus where they can have unlimited access to as many ips as they want. >>But you can only run one test at a time. And as you can imagine when we're going and hacking passwords and checking hashes and decrypting hashes, that can take a while. So, but for the right customer, it's, it's a perfect tool. And so I I'm so excited about our ability to go to market with our partners so that we underhand to sell, understand how not to just sell too or not tell just to sell through, but we know how to sell with them as a good vendor partner. I think that that's one thing that we've done a really good job building bringing into market. >>Yeah. I think also the Splunk has had great success how they've enabled partners and professional services. Absolutely. They've, you know, the services that layer on top of Splunk are multifold tons of great benefits. So you guys vector right into that ride, that wave with >>Friction. And, and the cool thing is that in, you know, in one of our reports, which could be totally customized with someone else's logo, we're going to generate, you know, so I, I used to work at another organization, it wasn't Splunk, but we, we did, you know, pen testing as a, as a for, for customers and my pen testers would come on site, they, they do the engagement and they would leave. And then another really, someone would be, oh shoot, we got another sector that was breached and they'd call you back, you know, four weeks later. And so by August our entire pen testings teams would be sold out and it would be like, wow. And in March maybe, and they'd like, No, no, no, I gotta breach now. And, and, and then when they do go in, they go through, do the pen test and they hand over a PDF and they pat you on the back and say, there's where your problems are, you need to fix it. And the reality is, is that what we're gonna generate completely autonomously with no human interaction is we're gonna go and find all the permutations that anything we found and the fix for those permutations and then once you fixed everything, you just go back and run another pen test. Yeah. It's, you know, for what people pay for one pen test, they could have a tool that does that. Every, every pat patch on Tuesday pen test on Wednesday, you know, triage throughout the week, >>Green, yellow, red. I wanted to see colors show me green, green is good, right? Not red. >>And once CIO doesn't want, who doesn't want that dashboard, right? It's, it's, it is exactly it. And we can help bring, I think that, you know, I'm really excited about helping drive this with the Splunk team cuz they get that, they understand that it's the green, yellow, red dashboard and, and how do we help them find more green so that the other guys are >>In Yeah. And get in the data and do the right thing and be efficient with how you use the data, Know what to look at. So many things to pay attention to, you know, the combination of both and then, then go to market strategy. Real brilliant. Congratulations Chris. Thanks for coming on and sharing this news with the detail around this Splunk in action around the alliance. Thanks for sharing, >>John. My pleasure. Thanks. Look forward to seeing you soon. >>All right, great. We'll follow up and do another segment on DevOps and IT and security teams as the new new ops, but, and Super cloud, a bunch of other stuff. So thanks for coming on. And our next segment, the CEO of Verizon, three AA, will break down all the new news for us here on the cube. You're watching the cube, the leader in high tech enterprise coverage.
SUMMARY :
I'm John Furrier, host of the Cube. Yeah, like I said, you know, great to meet you John. And boy man, you know, talk about being in the right place at the right time. the security space and in the public sector domain that I was in, you know, security was 70% And I think that the value that we bring to, you know, And so if you think about what node zero and what we're doing in a Horizon three is that, Just give a quick highlight of what happened so you And that's the sort of stuff that we do under, you know, a lot of these tools. Like not, and I'm not, you know, you think about the cacophony of tools that are That means that it is now in the developer hands, So how would you look at that and And so if you think about what we're able to do with before, you know, we've come up with this boils U Loop, but we call it fine fix verify. you know, so can Splunk see all the assets, do the same assets marry up? And you know, SNA Hall, when he was the CTO of JS o, So the question is, And so I would, I put that at, you know, a a a more layman's third grade term. And then third would be verifying that you have all of the hosts. So they could let, you know, float customers can use Splunk. So can you talk about what Yeah, so I think, you know, going back to those things that I just spoke about, a lot of those CVEs So put it on the scale and we prioritize though, versus a, a vulner review scanner's just gonna give you a bunch of Is that kind of what you're getting at? is that who would've thought, you know, I've got my multifactor authentication going in a Hey, be careful of what you collect. time though I was working on this and start off, you get the pdf, they opened the PDF and whoever that customer was Oh I'm gonna click on that for sure. Which is sort of this continuous threat, you know, monitoring space and, services from this alliance, big news Splunk and you guys work well together. And so the Consulting Plus license allows like a, somebody a small to midsize to And as you can imagine when we're going and hacking passwords They've, you know, the services that layer on top of Splunk are multifold And, and the cool thing is that in, you know, in one of our reports, which could be totally customized I wanted to see colors show me green, green is good, And we can help bring, I think that, you know, I'm really excited about helping drive this with the Splunk team cuz So many things to pay attention to, you know, the combination of both and then, then go to market strategy. Look forward to seeing you soon. And our next segment, the CEO of Verizon,
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
Chris | PERSON | 0.99+ |
John | PERSON | 0.99+ |
Patrick Kauflin | PERSON | 0.99+ |
2013 | DATE | 0.99+ |
70% | QUANTITY | 0.99+ |
March | DATE | 0.99+ |
Chris Hill | PERSON | 0.99+ |
Verizon | ORGANIZATION | 0.99+ |
2019 | DATE | 0.99+ |
Splunk | ORGANIZATION | 0.99+ |
McAfee | ORGANIZATION | 0.99+ |
John Furrier | PERSON | 0.99+ |
Wednesday | DATE | 0.99+ |
Uber | ORGANIZATION | 0.99+ |
six weeks | QUANTITY | 0.99+ |
last year | DATE | 0.99+ |
Adobe | ORGANIZATION | 0.99+ |
three people | QUANTITY | 0.99+ |
5,000 servers | QUANTITY | 0.99+ |
2008 | DATE | 0.99+ |
2002 | DATE | 0.99+ |
Tuesday | DATE | 0.99+ |
both | QUANTITY | 0.99+ |
Horizons Neha | ORGANIZATION | 0.99+ |
four weeks later | DATE | 0.99+ |
ORGANIZATION | 0.99+ | |
next week | DATE | 0.99+ |
today | DATE | 0.99+ |
United States | LOCATION | 0.99+ |
one | QUANTITY | 0.99+ |
August | DATE | 0.99+ |
first | QUANTITY | 0.99+ |
2012 | DATE | 0.99+ |
2% | QUANTITY | 0.98+ |
third | QUANTITY | 0.98+ |
one pen test | QUANTITY | 0.98+ |
one time | QUANTITY | 0.98+ |
this week | DATE | 0.98+ |
one test | QUANTITY | 0.98+ |
hundred percent | QUANTITY | 0.98+ |
NextGen | ORGANIZATION | 0.98+ |
15 more items | QUANTITY | 0.97+ |
two months | QUANTITY | 0.97+ |
First time | QUANTITY | 0.97+ |
five things | QUANTITY | 0.96+ |
SEC | ORGANIZATION | 0.96+ |
one customer | QUANTITY | 0.96+ |
Lockheed Martin | ORGANIZATION | 0.96+ |
15 more | QUANTITY | 0.95+ |
one thing | QUANTITY | 0.95+ |
hundred percent | QUANTITY | 0.95+ |
Sandy Carter, AWS | AWS re:Invent 2021
(upbeat music) >> Welcome back to theCUBE's coverage of AWS re:Invent 2021. I'm John Furrier, host of theCUBE. You're watching CUBE's worldwide leader in tech coverage. We're in person on the show floor. It's also a hybrid event, online as well. CUBE coverage online with Amazon re:Invent site. Great content all around, amazing announcements, transformation in all areas are exploding and in innovation, of course, we have innovation here with Sandy Carter, the worldwide public sector vice-president of partners and programs for Amazon Web Services. Sandy, welcome back, CUBE alumni. Great to see you. Thanks for coming on theCUBE. >> Great to see you and great to see you in person again. It's so exciting. The energy level, oh my God. >> Oh my God. It's so much. Thanks, great keynote. Good to see you again in person. A lot of action, give us the top announcements. What's going on? What are the top 10 AWS announcements? >> Yeah, so we, this year for 2022, as we frame it out, we decided on a 3D strategy, a three-dimensional strategy. So we started with destination then data and then delivery. So if I could do them in that order, does that sound good? >> Yeah. Destination. >> So let's start with destination. So I got this from one of the customers and he said to me, "look, Sandy, I thought it was all going to be about getting to the cloud. But when I got to the cloud, I realized it wasn't about just in the cloud, it was about what you do in the cloud." And so we made some announcements this morning, especially around migration, modernization, and optimization. So for migration, we have the mainframe announcement that Adam made, and then we also echoed it. Cause most of the mainframes today sit in public sector. So this is a managed service, it's working with Micro Focus, one of our partners. And Lockheed Martin one of our partners is one of the first into the mainframe migration, which is a service and services to help customers transform their business with the mainframe. And then as we compliment them, we look at that we also have modernization occurring. So for example, IoT. IDC tells us that IoT and that data has increased four times since COVID because now devices and sensors are tracking a lot of data. So we made an announcement around smart cities and we now have badging for our partners. We have 18 partners solutions now in smart cities. So working backwards from the partners they were talking about given now COVID is kind of in the midst of where it is smart cities and making those cities work better in public transportation and utility, it's just all where it's at. And then the final announcement in that category is containers. So 60% of our customers said that they're going to be using containers. So we announced a Rapid Adoption Assistance program for our partners to be able to help our customers move to containers overall. >> So mainframe migration, I saw that on stage, but Micro Focus, that was a good job. Get that legacy out of the way, move to the cloud. You've got smart cities, which is basically IoT, which brings cloud to the edge. And then containerization for the cloud native, either development or compatibility, interoperability kind of sets that table. That's the destination. >> That's right. That's right. Because all of those things, you know, you've got to get the mainframe to the cloud, but then it's about modernizing, right? Getting rid of all that COBOL code and then, you know, IoT and then making sure that you are ready to go with containers. It's the newest- >> So you've got the 3D, destination, data and delivery. >> That's right. >> Okay. Destination, check. Cloud. Cloud destination. >> Yeah. >> I'm putting dots together in real time. >> Destination cloud. There you go. You've got it. >> I'm still with it after all these interviews. >> Yeah, there you go. >> Data, I'll say killer Swami's onstage today, whole new data, multiple databases. What's the data focus in this area? >> So for our partners, first it's about getting the data to the cloud, which means that we need a way to really migrate it. So we announced an initiative to help get that data to the cloud. We had a set of partners that came on with us early on in this initiative to move that data to the cloud, it's called a Rapid Adoption Assistance, which helps you envision where you want to go with your data. Do you want to put it in a data lake? Do you want data stored as it is? What do you want to visualize? What do you want to do with analytics? So envision that and then get enablement. So all the new announcements, all the new services get enablement and then to pilot it. And then the second announcement in this area is a set of private offers in the marketplace. Our customers told us that they love to go after data, but that there's too many pieces and moving parts. So they need the assessment bundled with the managed service and everything bundled together so it's a solution for them. So those were our two announcements in the data area. >> So take me through the private marketplace thing, because this came up when I was talking with Stephen Orban who's now running the marketplace. What does that mean? So you're saying that this private offer is being enabling the suppliers and in government? >> Yeah. So available in the marketplace, a lot of our government agencies can buy from the marketplace. So if they have a contract, they can come and buy. But instead of having to go and say, okay, here's an assessment to tell me what I should do, now here's the offering, and now here's the managed service, they want it bundled together. So we have a set of offerings that have that bundled together today with the set of our great public sector partners. >> So tons of data action, where's the delivery fit in? >> So delivery. This one is very interesting because our customers are telling us that they no longer want just technology skills, they also need industry skills too. So they're looking for that total package. For example, you know, the state of New Jersey when hurricane Ida hit, category four storm, they wanted someone who obviously could leverage all the data, but they wanted someone who understood disaster response. And so Maxar fits that bill. They have that industry specialty along with the technology specialty. And so for our announcements here, we announced a new competency, which is an industry competency for energy. So think about renewables and sustainability and low carbon. These are the partners that do that. We have 32 different partners who met the needs of that energy competency. So we were able to GA that here today. The other really exciting announcement that we made was for small businesses to get extra training, it's called Think Big for Small Business communities. So we announced last year virtually, Think Big for Small Business. We now have about 200 companies who are part of that program, really getting extra help as diverse companies. Women owned, black owned, brown owned, veteran owned businesses, right? But now what they told us was in addition to the AWS help, what they loved is how we connected them together and we almost just stumbled upon it. I was hosting some meetings and I had Tia from Bellflower, I had Lisa from DLZP together and they got a lot of value just being connected. And we kept hearing that over and over and over again. So now we've programmatized that so it's more scalable than me introducing people to each other. We now have a program to introduce those small business leaders to each other. And then the last one that we announced is our AWS government competency is now the largest competency at AWS. So the government competency, which is pretty powerful. So now we're going to do a focus enhancement for federal. So all of our federal partners with all that opportunity can now take advantage of some private advisory council, some additional training that will go on there, additional go-to market support that they can use to help them. >> Okay. I feel like my brain is going to explode. Those are just the announcements here. There's a lot going. >> Yeah. There's a lot going on. >> I mean it's so much you've got to put them into buckets. Okay. What's the rationale around 3D? Delivery, data... I mean, destination, delivery, data. Destination, meaning cloud. Data, meeting data. And delivery meaning just new ways to get up and running- >> Skills. >> To get this delivery for the services. >> Yep. >> Okay. So is there a pattern emerging? What can you say? Cause remember we talked about this before a year ago, as well as in person at your public sector summit with your partners. Is there a pattern emerging that you're seeing here? Cause lots of the announcements are coming, done with the mainframes. Connect on your watch has been a big explosion. Adam Slansky told me personally, it's on fire. And public sector, we saw a lot of that. >> Well, in fact, you know, if you look at public sector, three factoids that we shared this morning in the keynote. Our public sector partners grew 54% this year, this is after last year we grew 45%. They grew the number of certifications that they had by 40% and the number of new customers by 32%. I mean, those are unreal numbers. Last year we did 28% new customers and we thought that was the cat's meow, now we're at 32%. So our partners are just exploding in this public sector space right now. >> It's almost as if they have an advantage because they dragged their feet for so long. >> It's true. It's true. COVID accelerated their movement to the cloud. >> A lot of slow moving verticals because of the legacy and whether it's regulation or government funding or skills- >> Or mainframes. >> All had to basically move fast, they had no excuses. And then the cloud kind of changes everyone's mindset. How about the culture? I want to ask you about the culture in the public sector, because this is coming up a lot. Again, a lot of your customers that I'm interviewing all talk... and I try to get them to talk about horizontally scalable and machine learning, and they're always, no, it's culture. >> Yeah. It's true. >> Culture is the number one thing. >> It is true. You know, culture eats strategy for lunch. So even if you have a great strategy around the cloud, if you don't have that right culture, you won't win in the marketplace. So we are seeing this a lot. In fact, one of our most popular programs is PTP, Partner Transformation Program. And it lays out a hundred day program on cloud best practices. And guess what's the number one topic? Culture. Culture, governance, technology, all of those things are so important right now. And I think because, you know, a lot of the agencies and governments and countries, they had moved to the cloud now that they're in the cloud, they went through that pain during COVID, now they're seeing all the impact of artificial intelligence and containers and blockchain and all of that, right? It's just crazy. >> That's a great insight. And I'll add to that because I think one of the things I've observed, especially with your partners is the fear of getting eliminated by technology or the fear of having a job change or fear of change in general went away once they started using it because they saw the criticality of the cloud and how it impacted their job, but then what it offered them as new opportunities. In fact, it actually increases more areas to innovate on and do more, whether it's job advancement or cross training or lateral moves, promotion, that's a huge retention piece. >> It really is. And I will tell you that the movement to the cloud enabled people to see it wasn't as scary as they thought it was going to be, and that they could still leverage a lot of the skills that they had and learn new ones. So I think it is. And this is one of the reasons why, I was just talking with Maureen launching that 29 million training program for the cloud, that really touches public sector because there is so many agencies, countries, governments that need to have that training. >> You're talking about Maureen Lonergan, she does the training. She's been working on that for years. >> Yeah. >> That's the only getting better and better. >> Yeah. >> Well Sandy, I've got to ask you, since you have a few minutes left, I want to ask you about your journey. >> Yeah. >> We've interviewed you going back a long time look where we are now. >> I know. It's incredible. >> Look at these two sets going on at CUBE. >> You've been an incredible voice on theCUBE. We really appreciate having you on because you're innovative. You're always moving like a shark. You can't sit still. You're always innovating. Still going on, you had the great women's luncheon from 20 to 200. >> Yeah, we grew. So we started out with 20 people back five years ago and now we had about 200 women and it was incredible because we do different topics. Our topic was around empathy and empathetic leadership. And you know how you can really leverage that today, back with the skills and your people. You know, given that Amazon just announced our new leadership principle about wanting to be the Earth's most employee centric company. It fits right in, empathetic leadership. And we had amazing women at that luncheon that told some great stories about empathy that I think will live in our hearts forever. >> And the other thing I want to point out, we had some of the guests on sitting on theCUBE. We had Linda Jojo from United airlines. >> Oh yeah. >> And a little factoid, yesterday in the keynote, 50% of the speakers were women. >> I know. The first time I did a blog post on it, like we had two amazing women in STEM and we had, you know, the black pilot that was highlighted. So it's showing more diversity. So I was just so excited. Thank you Adam, for doing that because I think that was an amazing, amazing focus here at the conference. >> I wanted to bring up a point. I had a note here to bring up to you. Public sector, you guys doubled the number of partners, large migrations this year. That's a big statoid. You've had 575,000 individuals hold active certifications. Okay. That grew 40% from August 2021, clearly a pandemic impact. A lot of people jumping back in getting their certs, migrating so if they're not... They're in between transitions where they have a tailwind or a headwind, whether you're United Airlines or whether you're Zoom, you got some companies were benefiting from the pandemic and some were retooling. That's something that we talked about actually at the beginning. >> That's right. Absolutely. And I do think that those certifications also demonstrate that customers have raised the bar on what they expect from a partner. It's no longer just like that technology input, it's also that industry side. And so you see the number of certifications going up because customers are demanding higher skill level. And by the way, for the partners we conducted a study with ESG and ESG said that more skilled partners, you drive more margin, profit margin, 42% more profit margin for a higher skilled partner. And we're seeing that really come to fruition with some of these really intense focus on getting more certifications and more training. >> I want to get your thoughts on the healthcare and life science. I just got a note here that tells me that the vertical is one of the fastest growing verticals with 105% year on year growth. Healthcare and life sciences, another important... Again, a lot of legacy, a lot of old silos, forced to expand and innovate with the pandemic growing. >> Yes. You know, government is our largest segment today, our largest competency. Healthcare is our fastest growing segment. So we have a big focus there. And like you said, it's not just around, you know, seeing things stay the same. It's about digital transformation. It's one of the reasons we're also seeing such an increase in our authority to operate program both on the government side and the healthcare side. So we do, you know, FedRAMP and IL5. We had six companies that got IL5, five of them in 2021, which is an amazing achievement. And then, you know, if you think about the healthcare side, our fastest growing compliance is HIPAA and HITRUST. And that ATO program really brings best practices and templates and stronger go to market for those partners too. >> Yeah. I mean, I think it's opportunity recognition and then capture during the pandemic with the cloud. More agility, more speed. >> That's right. >> Sandy, always great to have you on. In the last couple of seconds we have left, summarize the top 10 announcements in a bumper sticker. If you had to kind of put that bumper sticker on the car as it drives away from re:Invent this year, what's on that bumper sticker? What's it say? >> Partners that focus on destination, data and delivery will grow faster and add more value to their customers. >> There it is. The three dimension, DDD. Delivery... Destination, data and delivery. >> There you go. >> Here on theCUBE, bringing you all the data live on the ground here, CUBE studios, two sets wall-to-wall coverage. You're watching theCUBE, the leader in global tech coverage. I'm John Furrier your host. Thanks for watching. (soft techno music)
SUMMARY :
We're in person on the show floor. Great to see you and great Good to see you again in person. So we started with destination Cause most of the mainframes Get that legacy out of the that you are ready to go with containers. So you've got the 3D, you go. I'm still with it after What's the data focus in this area? the data to the cloud, is being enabling the and now here's the managed service, So the government competency, Those are just the announcements here. What's the rationale around 3D? Cause lots of the and the number of new customers by 32%. because they dragged movement to the cloud. I want to ask you about the a lot of the agencies and criticality of the cloud a lot of the skills that she does the training. That's the only I want to ask you about your journey. We've interviewed you I know. Look at these two the great women's luncheon So we started out with 20 And the other thing of the speakers were women. and we had, you know, the black That's something that we talked about for the partners we tells me that the vertical So we do, you know, FedRAMP and IL5. and then capture during the that bumper sticker on the car Partners that focus on There it is. live on the ground here,
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
Adam Slansky | PERSON | 0.99+ |
Adam | PERSON | 0.99+ |
Sandy Carter | PERSON | 0.99+ |
Amazon | ORGANIZATION | 0.99+ |
Maureen Lonergan | PERSON | 0.99+ |
August 2021 | DATE | 0.99+ |
Sandy | PERSON | 0.99+ |
Linda Jojo | PERSON | 0.99+ |
105% | QUANTITY | 0.99+ |
FedRAMP | ORGANIZATION | 0.99+ |
Stephen Orban | PERSON | 0.99+ |
2021 | DATE | 0.99+ |
AWS | ORGANIZATION | 0.99+ |
five | QUANTITY | 0.99+ |
John Furrier | PERSON | 0.99+ |
Amazon Web Services | ORGANIZATION | 0.99+ |
42% | QUANTITY | 0.99+ |
ESG | ORGANIZATION | 0.99+ |
60% | QUANTITY | 0.99+ |
Last year | DATE | 0.99+ |
Maureen | PERSON | 0.99+ |
40% | QUANTITY | 0.99+ |
last year | DATE | 0.99+ |
2022 | DATE | 0.99+ |
54% | QUANTITY | 0.99+ |
six companies | QUANTITY | 0.99+ |
28% | QUANTITY | 0.99+ |
New Jersey | LOCATION | 0.99+ |
two announcements | QUANTITY | 0.99+ |
45% | QUANTITY | 0.99+ |
50% | QUANTITY | 0.99+ |
one | QUANTITY | 0.99+ |
18 partners | QUANTITY | 0.99+ |
second announcement | QUANTITY | 0.99+ |
32% | QUANTITY | 0.99+ |
IL5 | ORGANIZATION | 0.99+ |
20 people | QUANTITY | 0.99+ |
IDC | ORGANIZATION | 0.99+ |
Lockheed Martin | ORGANIZATION | 0.99+ |
Lisa | PERSON | 0.99+ |
32 different partners | QUANTITY | 0.99+ |
two | QUANTITY | 0.99+ |
575,000 individuals | QUANTITY | 0.99+ |
Bellflower | ORGANIZATION | 0.99+ |
DLZP | ORGANIZATION | 0.99+ |
two sets | QUANTITY | 0.99+ |
this year | DATE | 0.99+ |
United Airlines | ORGANIZATION | 0.98+ |
yesterday | DATE | 0.98+ |
two sets | QUANTITY | 0.98+ |
29 million | QUANTITY | 0.98+ |
today | DATE | 0.98+ |
five years ago | DATE | 0.98+ |
HIPAA | TITLE | 0.98+ |
Micro Focus | ORGANIZATION | 0.97+ |
a year ago | DATE | 0.97+ |
both | QUANTITY | 0.97+ |
Earth | LOCATION | 0.97+ |
CUBE | ORGANIZATION | 0.97+ |
first | QUANTITY | 0.97+ |
three factoids | QUANTITY | 0.97+ |
about 200 companies | QUANTITY | 0.96+ |
Swami | PERSON | 0.95+ |
first time | QUANTITY | 0.95+ |
this morning | DATE | 0.95+ |
200 | QUANTITY | 0.93+ |
pandemic | EVENT | 0.92+ |
20 | QUANTITY | 0.92+ |
four times | QUANTITY | 0.9+ |
Chris Folk & Mohan Koo
>> Welcome to theCUBEs, continuing coverage of Splunk's dot conf 21. I'm Dave Nicholson, and I am joined by Chris Faulk, director, cybersecurity policy, and strategic partnerships at MITRE corporation; As well as Mohan Koo, the co-founder and chief technology officer at tech systems. Now, uh, gentlemen, we've heard this before, but I think this is going to be the best example of a conversation on this subject I've ever had. Security is a team sport. So let's talk about how that applies, where MITRE and D techs and Splunk all come together and work as a team. Uh, starting with you, Chris. miter published the, the attack framework. And, just so people are clear on that Ca- all caps, ATT, Ampersand or, AndSign, I should say. Capital C, capital K looks like attack. That's how you say it. Their framework was created by MITRE. Uh, It's a bit of a game changer. Now, enterprise security teams use that pretty religiously. So, so tell us about that, and tell us what we can expect next from MITRE. >> So thank you David, uh, pleasure to be here. You know, I think that the, um, what made attack resonate with users is it's based on data; It started with data that we observed in our networks and organized around at that time, the emergent principle that Lockheed Martin had put out on the kill chain. Uh, so it gave it structure. And we have, we have been lucky that the community has sort of embraced that concept of what we started off. We got the numbers completely wrong. Uh, we, we started off with like 41 TTPs. And, um, that was because that was based on a small subset of data that we had, uh, and what's been powerful and what's made it truly wonderful as the community's adopted it. And it's, that's, what's it's added to it. It's an additive approach. Um, and but it's all based on data and it's all just a fabulous, um, opportunity for the community to come together. So, what Myers really focused on is understanding how data, and those, uh, problems come together. And then, we surround the ecosystem of that problem with things like language. So we give it a framework and we give it, um, we give it operational data so that it actually has resonance with the users of that community. >> So give me an example, uh, of the language that's used. You know, there are, there are things that are, that are under the heading of tactics as an example. Give me an example of some of those things. What did, what's the term in plain English, and what does it mean? >> So tactics are a way for, um, an adversary to go about taking care of their business. So, in the day, uh, when we were first thinking about this, we thought about it as, um, the old cartoons where you'd have the-the-the coyote and the-the sheep would check in, you know, the coyote was given his lunchbox. He was given it, um, if you think about it, as a, uh, the adversary target list. And he was given his tools, he was, he would open up his toolbox, and he would go after those targets for the day. And he would use those tools. What we realized is that in most cases, a lot of those tools were expensive to create. They were, uh, hard to, um, train up on. And so they tended to use the same basic toolkit over and over again. What changed was, perhaps one little thing that they would exploit that was always changing. And so what, you know, what I likened it to was a burglar. A burglar would show up with his bag of- of, uh, tools. He would have a crowbar, and he would have a flashlight, and he would have a bag. And what he would do is he sometimes choose to go in through the windows. Sometimes they choose to go in through the door. Sometimes he choose to go in through the basement. It didn't matter. But once he got in the house, he had that flashlight, he had that bag, and he had that crowbar, I could figure out through my sensors, what he had in his bag or with, with him, I could catch that. And then I could alert on that, and find the other pieces of that. And so that's what really tactics, um, are about and getting that-that concept boiled down to a language that, uh, cyber defenders could readily understand and put into practice in their businesses. >> So Mohan, tell us about Dtex; And I'm particularly interested in the, in the connection between DTex and what Chris was just talking about; That MITRE has provided us, uh, this language that attack provides us. Um, essentially, you're- You're looking- you're listening for those things that go bump in the night. Chris has given us a language to describe them. Tell- tell us how Dtex fits here. >> Yeah. So, so what we're doing, David, um, and thank you for having me as well, um, what we're doing is we're bringing to the table a whole different type of telemetry, and it's all around human behavior. And, and how we got together with MITRE, um, is actually a direct connection to how we got together with Splunk as well. I'm actually sitting here in Adelaide, in Australia, at the Australian Cyber Collaboration Center. And this is an initiative we put together with the state government of South Australia, and federal government as well, um, to actually bring everybody onto one trusted group. So we could break down the silos and collaborate a hell of a lot better. As we all know, the bad guys collaborate extremely well. You know, they share everything, including their IP and their tactics, and their techniques, everything is shared. And that puts them at an extreme advantage to the good guys, and girls, right? And-and so we have to do a much better job at that collaboration. And-and when we came together and were introduced to MITRE here at the Australian Cyber Collaboration Center, we decided that taking MITREs expertise, and they've got like 15, more than 15 years, worth of dedicated experience around behavioral science, and how it contributes to insider threats and studying that in some depth. Putting that together with the data that we're collecting for our enterprise customers was something that was really, really important, and actually, you know, it was here in the Australian Cyber Collaboration Center that we first kept locked together with Splunk. And Splunk started to identify a problem statement amongst their customers too, That, you know, the data that exists out there for security operations teams just doesn't have that cleanliness and, it doesn't have the context when it comes to human behavior. And that's really what we're bringing to the, to the table here. >> So give me an example of a human behavior that you're looking for, or, you know, so, so Splunk is- Splunk is providing this data that's being gathered from logs. These events are being rolled up and, uh, and-and DTex is analyzing them. Can you give us an example that doesn't educate adversaries of-of behaviors that you look at? >> Yeah, absolutely. And I'll-I'll just touch on it. And then I'll hand over to Chris cause, cause uh, MITRE are truly the experts of this stuff. But- but what I will say is that a lot of organizations, when they think about human behavior and the insider threat, per se, they always think about the malicious actor, right? The, the Snowden type character that's, that's maliciously, and intentionally, trying to get access to take stuff. But it's, it's much more than that. It's, it's also insiders that do negligent things, and it's insider's that are victims of-of their own lack of understanding of things that they're facing. And when outsiders are cleverer, or more technically proficient, they can find ways to-to usurp the insider, and get them to do bad things without them even knowing they're doing it. And so understanding intent, and we call it, at Dtex, we call it, indicators of intent, are really important for us to know. Those indicators are what we've been working with MITRE on for the last year or so; Kind of understanding what the newest, most complicated indicators of intent are. And how do we determine those to be able to know the difference between a malicious insider, versus somebody that's just doing the wrong thing without even knowing about it? I-I don't know, Chris, if-if you wanted to touch on that a little bit. >> Yeah, yeah, yeah Chris, absolutely. You've, you know, uh, Mohan's joining us from Australia, Chris, you and MITRE have done a ton of work with the U.S. Federal Government around detection, and prevention of those insider threats. Talk to us, talk us through that. And, and more specifically, tell us how that is applicable to nongovernmental agencies. >> Yeah, well, so I mean, think at the, at the core of it, human behavior is human cue and behavior. And whether those are being applied to, uh, critical infrastructures, whether they're being applied to working at a federal government organization, or a state, local, uh, government organization, it doesn't matter. Humans, humans have behaviors. Every human has behaviors. What makes them unique, is understanding the context behind those behaviors. And then looking for, uh, indicators that are distinguishable from an individual doing his, or her, job. Right? So, one of the challenges that you have with insider behavior is that, you know, data collection is everyone's job, at every organization, right? You're always trying to put together the numbers for the spreadsheet to-to brief to your boss. Well, when you're doing that data collection, it can look like normal work. And you can't trigger on something like that, because otherwise you're going to be triggering, uh, every individual doing their job every day. So you have to add additional context, and behavioral indicators to that, to understand how the individual is doing that differently in a case where they are up to-up to no good, we'll say, as opposed to under circumstances of doing their job in a regular course of action. So, what we have long held as beliefs about how people behave are actually manifesting themselves differently in online behavior; How fast they click, um, what kinds of tools they use to do legitimate work, versus the kinds of tools that they do-to do, uh, I'll call it elicit collection. Uh, literally those kinds of subtle nuances. So while they might do the same collection activities, how fast they do it, um, where they put that information, um, how they, how often they go back to the same site, those are indicators that when taken with that behavioral context really matter. And that's what distinguishes them from just normal, typical user behavior. >> So how much does that context vary between private entities, governmental entities, and across private entities? Is this the classic 80/20 situation where, you know, 80-80% of it's the same, 20% very different? What, what does that look like? >> Yeah, I would say that, you know, an 80/20 is a very good rule. I'd probably put it up closer to 90 to 95 to five, right? So behaviors work the same. Now, the protocols that organizations have are going to drive some of that, right? So a-a government organization is going to have certain things in place that a private company may or may not. So, you know, how, how locked down the systems are, the kinds of access, um, things that, that you allow. So do you allow USB drives? Do you allow, um, those kinds of-of capabilities in your organization? So, if you're a private sector organization, but even within a private sector organization, they'd run the gamut, right? You have very locked down environments like banks, and regulated industries and then, you have very unregulated industries as well. So it really isn't about government and industry. It's about the kind of, um, protocols that are already in place for other reasons that really drive the differences between that. And then you have, again, you have those additional safeguards that you have, say with a-with a government organization and that you've got, uh, security vetting, right? So you've done security vetting of a lot of your employees, whether even if it's not security clearance, it's a- it's a personnel vetting. And so, it's an additional level, um, but all it does is change the-the emphasis of-of where you place the value in your security mechanisms. >> So, you mentioned a variety of contexts. Mohan, We've had a mass shift to remote working, obviously. Um, Splunk has shared with us that, uh, that the customers are concerned about, you know, giving- giving people visibility without compromising privacy. And I, and I-I say Splunk like Splunk is a person (man laughing) We like to personalize everything here at theCUBE, but how is DTex helping with this challenge, this challenge of not being intrusive, yet, uh, getting the important work done that needs to be done? >> Yeah, that's a, that's a great question. And-and for us, you know, we, as DTex, we kind of grew up in-in Europe, that's kind of where we became an international organization. So, employee privacy is at the heart of everything that we do. And-and, we make privacy by designing into everything that we do. So, we're actually able to, uh, pseudo anonymize every bit of data that we're collecting, so that you're actually really, truly looking for bad behaviors or unusual behaviors. You're not looking for bad people or unusual people, right? Like it's, it's a very clear distinction; and being able to do it in a way that gives you the visibility, gives the organization, the visibility to prevent against risk and to de-risk the organization without infringing on anyone's privacy is, is really critical. And, you know, as Chris was mentioning, even if you go to the private sector, you know, you've got those very regulated banks or healthcare organizations that are typically quite locked down, but we're dealing more and more with, with high-tech companies, right? A lot of bay area firms, Silicon valley companies, which have always required the flexibility for their workforce, right? They want them to be innovative. They want them to do different things. And in order to do that, they need the ability to have any tools they need to get their job done. But in those environments, you can't have too many hard and fast controls. So how do we actually provide that visibility to the organization without infringing privacy? That is absolutely what the game is about. And so, you know, not kind of having to scrape screens, and type key strokes and type video capture, you know, that's the old school way of doing it. You know, in some cases maybe you do need that level of surveillance, but in most cases you absolutely do not. And so, you know, for many, many years, a lot of enterprise security organizations have been collecting way more data than they need to and taking way more intrusive approaches. And we're about backing that off and kind of getting the right balance between security and privacy, because what we truly believe is where you overlap security and privacy, that Venn diagram that you get in the middle is where you get safety. And we really see it as, as an extension of health and safety. >> So Mohan, if we do all of these things correctly, between Splunk, MITRE, and DTex, you get the perfect scenario where you're catching bad actors and you're not inconveniencing good actors. So what's your view of this? Dystopian future, Utopian future, a mix of both? >> Well, uh, look, I think-I think that the future really is, you know, as the title to this discussion is it's a team sport, right? Like, and, and I think the, the approach that Splunk is taking right now is absolutely the right one. Like we, we need to all come together. We can't be everything to everyone. I don't think there is a one size fits all solution in enterprise security today. And those organizations that understand that and recognize that, but neither is it, are we able to continue just kind of investing in hundreds of point solutions across the enterprise and layering them across the business. Like, band-aids, we need that consolidation, but we do need to take best of breed solution providers to, to focus on those integrations and doing it properly. And that's what we've really enjoyed about working with Splunk over the last couple of years is kind of taking a very holistic approach and realizing that we all need to come together to play these teams sport because, you know, we, as detects, we bring together a very clean data set that gives you that human telemetry and then MITRE brings to get brings the behavioral science capability and behavioral science understanding. And Splunk provides that big data platform to bring everything together and show it and visualize it. And, and really that's, that's, that's, that's one way of looking at it. And I, and I think, you know, going forward those vendors or those organizations that don't recognize that that proper integration actual true integration has to be done collectively. And it has to be done in a way that's light and easy for anybody to consume. >> Perfect way to wrap this cube conversation. Thank you, Mohan. Thank you, Chris. And thank all of you for joining us on this cube conversation or continuing coverage of splunk.com 21 continues. I'm Dave Nicholson. Thanks for joining.
SUMMARY :
And, just so people are clear on that Ca- that we observed in our of the language that's used. And so what, you know, what I in the connection between DTex and and how it contributes to insider threats behaviors that you look at? and get them to do bad things without You've, you know, uh, Mohan's So, one of the challenges that you have additional safeguards that you have, done that needs to be done? get in the middle is where you So Mohan, if we do all And it has to be done in a And thank all of you for
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
David | PERSON | 0.99+ |
Dave Nicholson | PERSON | 0.99+ |
Chris | PERSON | 0.99+ |
Chris Faulk | PERSON | 0.99+ |
Adelaide | LOCATION | 0.99+ |
Europe | LOCATION | 0.99+ |
15 | QUANTITY | 0.99+ |
Australian Cyber Collaboration Center | ORGANIZATION | 0.99+ |
DTex | ORGANIZATION | 0.99+ |
Mohan Koo | PERSON | 0.99+ |
Mohan | PERSON | 0.99+ |
MITRE | ORGANIZATION | 0.99+ |
U.S. Federal Government | ORGANIZATION | 0.99+ |
Snowden | PERSON | 0.99+ |
Splunk | ORGANIZATION | 0.99+ |
Australia | LOCATION | 0.99+ |
Lockheed Martin | ORGANIZATION | 0.99+ |
20% | QUANTITY | 0.99+ |
Dtex | ORGANIZATION | 0.99+ |
last year | DATE | 0.99+ |
Chris Folk | PERSON | 0.99+ |
both | QUANTITY | 0.98+ |
five | QUANTITY | 0.98+ |
more than 15 years | QUANTITY | 0.98+ |
English | OTHER | 0.98+ |
D | ORGANIZATION | 0.98+ |
90 | QUANTITY | 0.98+ |
95 | QUANTITY | 0.98+ |
first | QUANTITY | 0.96+ |
AndSign | ORGANIZATION | 0.96+ |
Myers | PERSON | 0.96+ |
one | QUANTITY | 0.95+ |
41 TTPs | QUANTITY | 0.95+ |
Ampersand | ORGANIZATION | 0.95+ |
MITREs | ORGANIZATION | 0.95+ |
ATT | ORGANIZATION | 0.93+ |
Australian Cyber Collaboration Center | ORGANIZATION | 0.91+ |
Silicon valley | LOCATION | 0.91+ |
today | DATE | 0.9+ |
hundreds | QUANTITY | 0.9+ |
theCUBE | ORGANIZATION | 0.89+ |
splunk.com | OTHER | 0.88+ |
Splunk | PERSON | 0.87+ |
one little thing | QUANTITY | 0.86+ |
one size | QUANTITY | 0.84+ |
one way | QUANTITY | 0.83+ |
last couple of years | DATE | 0.82+ |
South Australia | ORGANIZATION | 0.76+ |
80-80% | QUANTITY | 0.74+ |
point | QUANTITY | 0.74+ |
one trusted group | QUANTITY | 0.71+ |
21 | OTHER | 0.43+ |
Keith Brooks, AWS | AWS Summit DC 2021
>>Yeah. Hello and welcome back to the cubes coverage of AWS public sector summit here in Washington D. C. We're live on the ground for two days. Face to face conference and expo hall and everything here but keith brooks who is the director and head of technical business development for a dress government Govcloud selling brains 10th birthday. Congratulations. Welcome to the cube. Thank you john happy to be E. C. 2 15 S three is 9.5 or no, that maybe they're 10 because that's the same day as sqs So Govcloud. 10 years, 20 years. What time >>flies? 10 years? >>Big milestone. Congratulations. A lot of history involved in Govcloud. Yes. Take us through what's the current situation? >>Yeah. So um let's start with what it is just for the viewers that may not be familiar. So AWS Govcloud is isolated. AWS cloud infrastructure and services that were purposely built for our U. S. Government customers that had highly sensitive data or highly regulated data or applications and workloads that they wanted to move to the cloud. So we gave customers the ability to do that with AWS Govcloud. It is subject to the fed ramp I and D O D S R G I L four L five baselines. It gives customers the ability to address ITAR requirements as well as Seaga's N'est ce MMC and Phipps requirements and gives customers a multi region architecture that allows them to also designed for disaster recovery and high availability in terms of why we built it. It starts with our customers. It was pretty clear from the government that they needed a highly secure and highly compliant cloud infrastructure to innovate ahead of demand and that's what we delivered. So back in august of 2011 we launched AWS GovCloud which gave customers the best of breed in terms of high technology, high security, high compliance in the cloud to allow them to innovate for their mission critical workloads. Who >>was some of the early customers when you guys launched after the C. I. A deal intelligence community is a big one but some of the early customers. >>So the Department of Health and Human Services, the Department of Veterans Affairs, the Department of Justice and the Department of Defense were all early users of AWS GovCloud. But one of our earliest lighthouse customers was the Nasa jet propulsion laboratory and Nasa Jpl used AWS GovCloud to procure Procure resources ahead of demand which allowed them to save money and also take advantage of being efficient and only paying for what they needed. But they went beyond just I. T. Operations. They also looked at how do they use the cloud and specifically GovCloud for their mission programs. So if you think back to all the way to 2012 with the mars curiosity rover, Nasa Jpl actually streamed and processed and stored that data from the curiosity rover on AWS Govcloud They actually streamed over 150 terabytes of data responded to over 80,000 requests per second and took it beyond just imagery. They actually did high performance compute and data analytics on the data as well. That led to additional efficiencies for future. Over there >>were entire kicking they were actually >>hard core missing into it. Mission critical workloads that also adhere to itar compliance which is why they used AWS GovCloud. >>All these compliance. So there's also these levels. I remember when I was working on the jetty uh stories that were out there was always like level for those different classifications. What does all that mean like? And then this highly available data and highly high availability all these words mean something in these top secret clouds. Can you take us through kind of meetings >>of those? Yeah absolutely. So it starts with the federal compliance program and the two most popular programs are Fed ramp and Dodi srg fed ramp is more general for federal government agencies. There are three levels low moderate and high in the short and skinny of those levels is how they align to the fisma requirements of the government. So there's fisma low fisma moderate fisma high depending on the sensitivity of the government data you will have to align to those levels of Fed ramp to use workloads and store data in the cloud. Similar story for D. O. D. With srg impact levels to 45 and six uh impacts levels to four and five are all for unclassified data. Level two is for less sensitive public defense data levels. Four and five cover more sensitive defense data to include mission critical national security systems and impact level six is for classified information. So those form the basis of security and compliance, luckily with AWS GovCloud celebrating our 10th anniversary, we address Fed ramp high for our customers that require that and D. O. D impact levels to four and five for a sensitive defense guy. >>And that was a real nuanced point and a lot of the competition can't do that. That's real people don't understand, you know, this company, which is that company and all the lobbying and all the mudslinging that goes on. We've seen that in the industry. It's unfortunate, but it happens. Um, I do want to ask you about the Fed ramp because what I'm seeing on the commercial side in the cloud ecosystem, a lot of companies that aren't quote targeting public sector are coming in on the Fed ramp. So there's some good traction there. You guys have done a lot of work to accelerate that. Any new, any new information to share their. >>Yes. So we've been committed to supporting the federal government compliance requirements effectively since the launch of GovCloud. And we've demonstrated our commitment to Fed ramp over the last number of years and GovCloud specifically, we've taken dozens of services through Fed ramp high and we're 100% committed to it because we have great relationships with the Fed ramp, Jabor the joint authorization board. We work with individual government agencies to secure agency A. T. O. S. And in fact we actually have more agency A. T. O. S. With AWS GovCloud than any other cloud provider. And the short and skinny is that represents the baseline for cloud security to address sensitive government workloads and sensitive government data. And what we're seeing from industry and specifically highly regulated industries is the standard that the U. S. Government set means that they have the assurance to run control and classified information or other levels of highly sensitive data on the cloud as well. So Fed ramp set that standard. It's interesting >>that the cloud, this is the ecosystem within an ecosystem again within crossover section. So for instance um the impact of not getting Fed ramp certified is basically money. Right. If you're a supplier vendor uh software developer or whatever used to being a miracle, no one no one would know right bed ramp. I'm gonna have to hire a whole department right now. You guys have a really easy, this is a key value proposition, isn't it? >>Correct. And you see it with a number of I. S. V. S. And software as the service providers. If you visit the federal marketplace website, you'll see dozens of providers that have Fed ramp authorized third party SAAS products running on GovCloud industry leading SAAS companies like Salesforce dot com driven technology Splunk essay PNS to effectively they're bringing their best of breed capabilities, building on top of AWS GovCloud and offering those highly compliant fed ramp, moderate fed ramp high capabilities to customers both in government and private industry that need that level of compliance. >>Just as an aside, I saw they've got a nice tweet from Teresa Carlson now it's plunk Govcloud yesterday. That was a nice little positive gesture uh, for you guys at GovCloud, what other areas are you guys moving the needle on because architecturally this is a big deal. What are some areas that you're moving the needle on for the GovCloud? >>Well, when I look back across the last 10 years, there were some pretty important developments that stand out. The first is us launching the second Govcloud infrastructure region in 2018 And that gave customers that use GovCloud specifically customers that have highly sensitive data and high levels of compliance. The ability to build fault tolerant, highly available and mission critical workloads in the cloud in a region that also gives them an additional three availability zones. So the launch of GovCloud East, which is named AWS GovCloud Us East gave customers to regions a total of six availability zones that allowed them accelerate and build more scalable solutions in the cloud. More recently, there is an emergence of another D O D program called the cybersecurity maturity model, C M M C and C M M C is something where we looked around the corner and said we need to Innovate to help our customers, particularly defense customers and the defense industrial based customers address see MMC requirements in the cloud. So with Govcloud back in December of 2020, we actually launched the AWS compliant framework for federal defense workloads, which gives customers a turnkey capability and tooling and resources to spin up environments that are configured to meet see MMC controls and D. O. D. Srg control. So those things represent some of the >>evolution keith. I'm interested also in your thoughts on how you see the progression of Govcloud outside the United States. Tactical Edge get wavelength coming on board. How does how do you guys look at that? Obviously us is global, it's not just the jet, I think it's more of in general. Edge deployments, sovereignty is also going to be world's flat, Right? I mean, so how does that >>work? So it starts back with customer requirements and I tie it back to the first question effectively we built Govcloud to respond to our U. S. Government customers and are highly regulated industry customers that had highly sensitive data and a high bar to meet in terms of regulatory compliance and that's the foundation of it. So as we look to other customers to include those outside of the US. It starts with those requirements. You mentioned things like edge and hybrid and a good example of how we marry the two is when we launched a W. S. Outpost in Govcloud last year. So outpost brings the power of the AWS cloud to on premises environments of our customers, whether it's their data centers or Coehlo environments by bringing AWS services, a. P. I. S and service and points to the customer's on premises facilities >>even outside the United States. >>Well, for Govcloud is focused on us right now. Outside of the U. S. Customers also have availability to use outpost. It's just for us customers, it's focused on outpost availability, geography >>right now us. Right. But other governments gonna want their Govcloud too. Right, Right, that's what you're getting at, >>Right? And it starts with the data. Right? So we we we spent a lot of time working with government agencies across the globe to understand their regulations and their requirements and we use that to drive our decisions. And again, just like we started with govcloud 10 years ago, it starts with our customer requirements and we innovate from there. Well, >>I've been, I love the D. O. D. S vision on this. I know jet I didn't come through and kind of went scuttled, got thrown under the bus or whatever however you want to call it. But that whole idea of a tactical edge, it was pretty brilliant idea. Um so I'm looking forward to seeing more of that. That's where I was supposed to come in, get snowball, snowmobile, little snow snow products as well, how are they doing? And because they're all part of the family to, >>they are and they're available in Govcloud and they're also authorized that fed ramp and Gov srg levels and it's really, it's really fascinating to see D. O. D innovate with the cloud. Right. So you mentioned tactical edge. So whether it's snowball devices or using outposts in the future, I think the D. O. D. And our defense customers are going to continue to innovate. And quite frankly for us, it represents our commitment to the space we want to make sure our defense customers and the defense industrial base defense contractors have access to the best debris capabilities like those edge devices and edge capable. I >>think about the impact of certification, which is good because I just thought of a clean crows. We've got aerospace coming in now you've got D O. D, a little bit of a cross colonization if you will. So nice to have that flexibility. I got to ask you about just how you view just in general, the intelligence community a lot of uptake since the CIA deal with amazon Just overall good health for eight of his gum cloud. >>Absolutely. And again, it starts with our commitment to our customers. We want to make sure that our national security customers are defense customers and all of the customers and the federal government that have a responsibility for securing the country have access to the best of breed capability. So whether it's the intelligence community, the Department of Defense are the federal agencies and quite frankly we see them innovating and driving things forward to include with their sensitive workloads that run in Govcloud, >>what's your strategy for partnerships as you work on the ecosystem? You do a lot with strategy. Go to market partnerships. Um, it's got its public sector pretty much people all know each other. Our new firms popping up new brands. What's the, what's the ecosystem looks like? >>Yeah, it's pretty diverse. So for Govcloud specifically, if you look at partners in the defense community, we work with aerospace companies like Lockheed martin and Raytheon Technologies to help them build I tar compliant E. R. P. Application, software development environments etcetera. We work with software companies I mentioned salesforce dot com. Splunk and S. A. P. And S. To uh and then even at the state and local government level, there's a company called Pay It that actually worked with the state of Kansas to develop the Icann app, which is pretty fascinating. It's a app that is the official app of the state of Kansas that allow citizens to interact with citizens services. That's all through a partner. So we continue to work with our partner uh broad the AWS partner network to bring those type of people >>You got a lot of MST is that are doing good work here. I saw someone out here uh 10 years. Congratulations. What's the coolest thing uh you've done or seen. >>Oh wow, it's hard to name anything in particular. I just think for us it's just seeing the customers and the federal government innovate right? And, and tie that innovation to mission critical workloads that are highly important. Again, it reflects our commitment to give these government customers and the government contractors the best of breed capabilities and some of the innovation we just see coming from the federal government leveraging the count now. It's just super cool. So hard to pinpoint one specific thing. But I love the innovation and it's hard to pick a favorite >>Child that we always say. It's kind of a trick question I do have to ask you about just in general, the just in 10 years. Just look at the agility. Yeah, I mean if you told me 10 years ago the government would be moving at any, any agile anything. They were a glacier in terms of change, right? Procure Man, you name it. It's just like, it's a racket. It's a racket. So, so, but they weren't, they were slow and money now. Pandemic hits this year. Last year, everything's up for grabs. The script has been flipped >>exactly. And you know what, what's interesting is there were actually a few federal government agencies that really paved the way for what you're seeing today. I'll give you some examples. So the Department of Veterans Affairs, they were an early Govcloud user and way back in 2015 they launched vets dot gov on gov cloud, which is an online platform that gave veterans the ability to apply for manage and track their benefits. Those type of initiatives paved the way for what you're seeing today, even as soon as last year with the U. S. Census, right? They brought the decennial count online for the first time in history last year, during 2020 during the pandemic and the Census Bureau was able to use Govcloud to launch and run 2020 census dot gov in the cloud at scale to secure that data. So those are examples of federal agencies that really kind of paved the way and leading to what you're saying is it's kind >>of an awakening. It is and I think one of the things that no one's reporting is kind of a cultural revolution is the talent underneath that way, the younger people like finally like and so it's cooler. It is when you go fast and you can make things change, skeptics turned into naysayers turned into like out of a job or they don't transform so like that whole blocker mentality gets exposed just like shelf where software you don't know what it does until the cloud is not performing, its not good. Right, right. >>Right. Into that point. That's why we spend a lot of time focused on education programs and up skilling the workforce to, because we want to ensure that as our customers mature and as they innovate, we're providing the right training and resources to help them along their journey, >>keith brooks great conversation, great insight and historian to taking us to the early days of Govcloud. Thanks for coming on the cube. Thanks thanks for having me cubes coverage here and address public sector summit. We'll be back with more coverage after this short break. Mhm. Mhm mm.
SUMMARY :
in Washington D. C. We're live on the ground for two days. A lot of history involved in Govcloud. breed in terms of high technology, high security, high compliance in the cloud to allow them but some of the early customers. So the Department of Health and Human Services, the Department of Veterans Affairs, itar compliance which is why they used AWS GovCloud. So there's also these levels. So it starts with the federal compliance program and the two most popular programs are a lot of companies that aren't quote targeting public sector are coming in on the Fed ramp. And the short and skinny is that represents the baseline for cloud security to address sensitive that the cloud, this is the ecosystem within an ecosystem again within crossover section. dot com driven technology Splunk essay PNS to effectively they're bringing what other areas are you guys moving the needle on because architecturally this is a big deal. So the launch of GovCloud East, which is named AWS GovCloud Us East gave customers outside the United States. So outpost brings the power of the AWS cloud to on premises Outside of the U. Right, Right, that's what you're getting at, to understand their regulations and their requirements and we use that to drive our decisions. I've been, I love the D. O. D. S vision on this. and the defense industrial base defense contractors have access to the best debris capabilities like those I got to ask you about just how you view just in general, securing the country have access to the best of breed capability. Go to market partnerships. It's a app that is the official app of the state of Kansas that What's the coolest thing uh you've done or seen. But I love the innovation and it's hard to pick a favorite ago the government would be moving at any, any agile anything. census dot gov in the cloud at scale to secure that data. the cloud is not performing, its not good. the workforce to, because we want to ensure that as our customers mature and as they innovate, Thanks for coming on the cube.
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
august of 2011 | DATE | 0.99+ |
December of 2020 | DATE | 0.99+ |
Teresa Carlson | PERSON | 0.99+ |
Department of Veterans Affairs | ORGANIZATION | 0.99+ |
two days | QUANTITY | 0.99+ |
Department of Health and Human Services | ORGANIZATION | 0.99+ |
Lockheed martin | ORGANIZATION | 0.99+ |
keith brooks | PERSON | 0.99+ |
Last year | DATE | 0.99+ |
100% | QUANTITY | 0.99+ |
Washington D. C. | LOCATION | 0.99+ |
AWS | ORGANIZATION | 0.99+ |
Department of Justice | ORGANIZATION | 0.99+ |
CIA | ORGANIZATION | 0.99+ |
2018 | DATE | 0.99+ |
last year | DATE | 0.99+ |
US | LOCATION | 0.99+ |
amazon | ORGANIZATION | 0.99+ |
10 years | QUANTITY | 0.99+ |
Census Bureau | ORGANIZATION | 0.99+ |
two | QUANTITY | 0.99+ |
United States | LOCATION | 0.99+ |
Department of Defense | ORGANIZATION | 0.99+ |
20 years | QUANTITY | 0.99+ |
10 | QUANTITY | 0.99+ |
five | QUANTITY | 0.99+ |
U. S. | LOCATION | 0.99+ |
U. S. Government | ORGANIZATION | 0.99+ |
first time | QUANTITY | 0.99+ |
over 150 terabytes | QUANTITY | 0.99+ |
Keith Brooks | PERSON | 0.99+ |
10 years ago | DATE | 0.99+ |
2015 | DATE | 0.99+ |
six availability zones | QUANTITY | 0.99+ |
Raytheon Technologies | ORGANIZATION | 0.99+ |
10th anniversary | QUANTITY | 0.99+ |
Govcloud | ORGANIZATION | 0.99+ |
second | QUANTITY | 0.99+ |
first | QUANTITY | 0.98+ |
2012 | DATE | 0.98+ |
9.5 | QUANTITY | 0.98+ |
first question | QUANTITY | 0.98+ |
this year | DATE | 0.98+ |
45 | QUANTITY | 0.98+ |
yesterday | DATE | 0.98+ |
10 years ago | DATE | 0.98+ |
Kansas | LOCATION | 0.98+ |
D. O. D. | LOCATION | 0.97+ |
three levels | QUANTITY | 0.97+ |
10th birthday | QUANTITY | 0.97+ |
Splunk | ORGANIZATION | 0.97+ |
GovCloud | ORGANIZATION | 0.97+ |
GovCloud East | TITLE | 0.97+ |
three availability zones | QUANTITY | 0.97+ |
2020 | DATE | 0.96+ |
U. S. Census | ORGANIZATION | 0.96+ |
over 80,000 requests per second | QUANTITY | 0.96+ |
four | QUANTITY | 0.96+ |
D. O. D | LOCATION | 0.96+ |
govcloud | ORGANIZATION | 0.96+ |
john | PERSON | 0.96+ |
eight | QUANTITY | 0.96+ |
one | QUANTITY | 0.95+ |
Four | QUANTITY | 0.95+ |
Nasa Jpl | ORGANIZATION | 0.95+ |
today | DATE | 0.94+ |
W. S. | LOCATION | 0.94+ |
GovCloud | TITLE | 0.94+ |
Fed ramp | TITLE | 0.94+ |
Joshua Burgin | AWS re:Invent 2020
>>From around the globe. It's the cube with digital coverage of AWS reinvent 2020 special coverage sponsored by AWS global partner network. >>Welcome everyone to the cube live covering AWS reinvent 2020. I'm your host Rebecca Knight. Today. We are joined by Joshua Virgin. He is the general manager at AWS outposts. Thanks so much for coming on the cube. Joshua, >>Thank you for having me. It's great to be here. >>It's great to have you, so tell our viewers a little bit about AWS, AWS outposts. >>Oh sure. It's one of my favorite subjects, obviously. So outposts is a service from AWS that allows you to use the same tools, technology, API APIs, programming interfaces that you do in the cloud, but install this and run it on your own premises or in a co-location facility. So it really extends the reach of AWS to far more locations than you could otherwise use it. >>So what are some of the advancements, uh, this year >>It's, it's been an amazingly busy year, even under unprecedented kind of circumstances where we've tried to turn the crank really hard and deliver value for our customers. We increased the number of countries you could order outposts in up to 51 countries. You can now connect outpost to all 22 AWS regions and our gov cloud regions, everything outside of China. And we delivered 15 new services or incremental features, including a S3 on outposts, which was the top thing that customers asked for, but also our application load balancer, Alasta cash, our relational database service RDS. Uh, you know, there's probably more than I'm missing here, but, um, you know, and we're definitely not slowing down in that regard. 2021 will probably be an even bigger year. >>So tell us a little bit about the, the response from customers since the launch of AWS outpost last year. What are, what are you hearing? >>Yeah, I mean, we're, we're hearing a lot, uh, I think we've been pleasantly surprised by the, the breadth and the depth of the customer use cases. One of the biggest things we heard from people was, you know, the, the outposts are great, but it's a, it's a full rack of compute or many racks of compute in some cases and storage, you know, their locations that people wanted to put it in that were smaller where their space constrained, maybe a restaurant or a factory floor or a small medical facility, uh, you know, a telco like a cell site. And so what we did based on that is something that we actually just announced in Andy's keynote. Uh, just a few days ago here, which is the new small form factor outposts that are one you and two use size, uh, servers. It's about the size of one or two pizza boxes stacked on top of each other. >>So that's even going to make outposts available to even more use cases, uh, you know, early on, uh, we kind of said to ourselves that it's important to kind of give people that consistent experience wherever they might need the compute and the storage and the other services. And so I've been, I've been really pleasantly surprised, as I mentioned earlier, by how many people have talked to us. We have customers like Phillips healthcare. They are, uh, they're bringing their medical imaging solution to outposts and it allows them to kind of modernize the way they deliver services to hospitals and medical research centers around the world. Something that really wouldn't be possible without having AWS everywhere. >>And that is much, much needed today. Um, tell us a little bit about more about this year in particular, you said it yourself at the beginning of our conversation, this is an unprecedented year for so many different reasons. How has the COVID-19 pandemic effected AWS outposts and how your team interacts with customers and, and gets your job done? >>Yeah, we, I think we have some unique challenges in that regard, obviously, as I mentioned earlier, AWS outposts are installed in a co-location facility or on a customer's own premises in a data center, you know, other things like that. So obviously we have to get our technicians out there to roll them in and hook them up to your network and, you know, to get them powered up. So that means that we are complying with, uh, COVID restrictions. And as I mentioned, 51 different countries. So there was even an install earlier this year at a mining location, uh, you know, far outside the U S where we had to get technicians working with, uh, local technicians from the customer following COVID guidelines, wearing protective gear, and actually installing the outpost, uh, you know, using kind of satellite conductivity and phones to phone home, and talk to us during the installation of course, cause it's not hooked up yet. So those are just kind of examples of the, the links to which we'll go to make sure that, of course we're safe, the customers are safe, but that they can kind of continue to modernize their application portfolio and get benefits from the outposts. >>And what are you hearing from clients and customers in terms of how they're thinking about their technology needs now and in the coming year? >>Yeah, that's a, that's a great question. I mean, it, it really varies by market segment. So you have customers like Ericsson and Telefonica. They're going to be using outpost to, uh, kind of run their 5g packet core technology, Abe it's, it's gotta be run at the edge right there, telcos, they need to minimize latency single digit milliseconds, or you might have a customer like Lockheed Martin. And what they've told us is they have projects that are subject to government contracts and regulations. And not only do they have of course compliance regimes, like fed ramp that they need to be aware of, but there's data residency requirements. So whether they're deploying in the United States or, you know, with our allies all around the world, the compute and the storage, they need to run in specific locations. So now outposts are going to be a key, uh, advancement and kind of a key differentiator for them in how they deliver services to their customers and still meet those data residency or compliance requirement. >>Joshua, tell our viewers more about AWS outpost ready? >>Oh, that's a, it's another thing I'm really glad you mentioned. So the outposts ready program, these are solutions from our APN and our Amazon AWS partner network that are, uh, validated and following our best practices on AWS outposts. They're certified to work and, you know, they're generally available to customers. And so it's a program where, you know, ISV and SAS providers can ensure that the technology that they provide that this third-party technology is going to work in the outpost environment. And there's, there's something about outposts that I think makes this, uh, a differentiator and uniquely valuable when I mentioned kind of that consistent hybrid experience. When you think about how outposts are deployed, you know, in a customer's data center, maybe alongside other technology they're already using. And so customers say, look, these AWS services are great, but I already use a variety of third party technology maybe from Veritas or trend micro Palo Alto networks Convolt size sense, PagerDuty, pure storage NetApp, or the, you know, the list is actually pretty extensive of what people are already using. >>And so they've said, you know, I do plan on using AWS services, but I also don't want to give up, uh, you know, what my team is already familiar with. So can you make sure that's going to work for me, whether I'm using it in the region or on the AWS outposts. And so the, the, the interest in kind of demand for this, both from customers and the enthusiasm from the partners has been off the charts. We started the program in just September, which is not that long ago, and we had 32 partners. And, uh, as of today we have an additional, uh, additional 25 partners, right? It's 57 partners, total 64 certified solutions. So that's a lot of momentum and just kind of a, a short amount of time. And I'm really happy that we can deliver that to the customer. >>So it does, it's already showing tremendous momentum. How do you think about it in terms of the primary benefits that it gives to customers and how it helps customers and partners, >>You know, in order to qualify, the solution has to be tested and validated upon, uh, against a bunch of, uh, criteria that we have very specific technical criteria, security requirements, operational, and, you know, they're, they're supported for customers with clear deployment guidelines. So, you know, the customers can kind of think of this as a guarantee that we're not just saying maybe this could work, but, but this will work. If you're already using it, it's going to continue to work in a way that's familiar to you. And again, that's important that consistent hybrid experience, whether you're using a solution from a third party or from AWS, whether you're using it in the region or on a local zone or in a wavelength zone, and some of our other kind of innovative infrastructure deployments or using it on an outpost, no matter where you're using it, it has to work the same way. >>And so this is something that customers have said, I want to be able to get up and running quickly. We had a customer riot games, uh, th they're the maker of league of legends, but also when they were launching their new game, Valerie hunt, uh, in, in June of 2020, they deployed outposts in four different locations to kind of ensure a level playing field in terms of latency and what they told us, uh, you know, very much like the service ready program is they were able to get up and running in just a matter of days once the outpost was deployed. And it's because we gave them those same API APIs, that same tooling. So I think that's really important for people and, you know, I hope we can continue to deliver on that promise. >>So to close this out here, I want you to look into your crystal ball and think ahead, 12 and 24 months, when you know, fingers crossed, things are back to somewhat more normal. Uh, what's in store for AWS outposts. >>Yeah. I mean, we're going to deliver on what we announced here at reinvent, which has the new small form factor outposts. And I think what we're going to continue to do is listen to customers. We develop outposts from the very beginning because customer said, could, could you deploy outposts in our, in our data center or, sorry, can you deploy AWS? And our data center didn't have a name back then. And so that's really the hallmark of AWS. You know, somewhere around 90% of our roadmaps are based on what customers tell us they want. And the other 10% is when we kind of look around the corner and hopefully delight people with something they didn't even know they needed. And I really hope for my team and that that's what 2021 and 2022 brings is more countries, more services, more value, more compliance, certifications, you know, all the things that people tell us they want. We're going to keep turning the crank as hard as we can. And delivering that as quickly as possible >>With the trademark Amazon customer delight. Yes, absolutely. Excellent. Well, Joshua, Virgin, thank you so much for coming on the cube. It was a pleasure having you. >>It was a pleasure talking to you. Thank you very much. >>I'm Rebecca Knight for more of the cubes coverage of AWS reinvent 2020 stay tuned.
SUMMARY :
It's the cube with digital coverage Thanks so much for coming on the cube. Thank you for having me. It's great to have you, so tell our viewers a little bit about AWS, So it really extends the reach of AWS to far We increased the number of countries you could order outposts in up to 51 countries. What are, what are you hearing? facility, uh, you know, a telco like a cell site. you know, early on, uh, we kind of said to ourselves that it's this year in particular, you said it yourself at the beginning of our conversation, this is an unprecedented year a mining location, uh, you know, far outside the U S where we had So whether they're deploying in the United States or, you know, with our allies all around the world, They're certified to work and, you know, they're generally available to customers. And so they've said, you know, I do plan on using AWS services, but I also don't want to give up, the primary benefits that it gives to customers and how it helps customers and partners, security requirements, operational, and, you know, they're, and what they told us, uh, you know, very much like the service ready program is they were able to get up and running So to close this out here, I want you to look into your crystal ball and think ahead, 12 and 24 months, more value, more compliance, certifications, you know, all the things that people tell Well, Joshua, Virgin, thank you so much for coming on the cube. Thank you very much.
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
Rebecca Knight | PERSON | 0.99+ |
Telefonica | ORGANIZATION | 0.99+ |
Ericsson | ORGANIZATION | 0.99+ |
AWS | ORGANIZATION | 0.99+ |
June of 2020 | DATE | 0.99+ |
China | LOCATION | 0.99+ |
Joshua | PERSON | 0.99+ |
Amazon | ORGANIZATION | 0.99+ |
Joshua Burgin | PERSON | 0.99+ |
Andy | PERSON | 0.99+ |
32 partners | QUANTITY | 0.99+ |
September | DATE | 0.99+ |
57 partners | QUANTITY | 0.99+ |
Joshua Virgin | PERSON | 0.99+ |
Phillips | ORGANIZATION | 0.99+ |
United States | LOCATION | 0.99+ |
15 new services | QUANTITY | 0.99+ |
last year | DATE | 0.99+ |
Lockheed Martin | ORGANIZATION | 0.99+ |
10% | QUANTITY | 0.99+ |
one | QUANTITY | 0.99+ |
25 partners | QUANTITY | 0.99+ |
two | QUANTITY | 0.99+ |
Virgin | PERSON | 0.99+ |
2021 | DATE | 0.99+ |
Today | DATE | 0.99+ |
U S | LOCATION | 0.99+ |
51 different countries | QUANTITY | 0.99+ |
today | DATE | 0.99+ |
2022 | DATE | 0.98+ |
12 | QUANTITY | 0.97+ |
24 months | QUANTITY | 0.97+ |
around 90% | QUANTITY | 0.97+ |
Palo Alto | LOCATION | 0.97+ |
both | QUANTITY | 0.97+ |
this year | DATE | 0.96+ |
64 certified solutions | QUANTITY | 0.96+ |
22 | QUANTITY | 0.94+ |
NetApp | TITLE | 0.94+ |
COVID | TITLE | 0.94+ |
single digit | QUANTITY | 0.93+ |
earlier this year | DATE | 0.92+ |
COVID-19 pandemic | EVENT | 0.92+ |
One | QUANTITY | 0.91+ |
outpost | ORGANIZATION | 0.9+ |
Veritas | ORGANIZATION | 0.85+ |
few days ago | DATE | 0.84+ |
up to 51 countries | QUANTITY | 0.83+ |
two pizza boxes | QUANTITY | 0.81+ |
2020 | TITLE | 0.78+ |
AWS outposts | ORGANIZATION | 0.76+ |
Convolt | ORGANIZATION | 0.71+ |
PagerDuty | TITLE | 0.68+ |
SAS | ORGANIZATION | 0.65+ |
2020 | DATE | 0.65+ |
ramp | ORGANIZATION | 0.64+ |
league of legends | TITLE | 0.63+ |
APN | ORGANIZATION | 0.63+ |
Abe | PERSON | 0.56+ |
telco | ORGANIZATION | 0.54+ |
Valerie | PERSON | 0.53+ |
Alasta | PERSON | 0.5+ |
S3 | TITLE | 0.44+ |
outposts | ORGANIZATION | 0.43+ |
reinvent 2020 | EVENT | 0.42+ |
Invent | EVENT | 0.4+ |
Wilfred Justin, AWS WWPS | AWS re:Invent 2020 Public Sector Day
>>from around the >>globe. It's the Cube with digital coverage of AWS reinvent 2020. Special coverage sponsored by AWS Worldwide Public sector. >>Right. Hello and welcome to the Cube. Virtual our coverage of aws reinvent 2020 with special coverage of the public sector experience. This is the day when we go through all the great conversations around public sector in context to reinvent great guest will for Justin, head of A W s ai and machine learning enablement and partnership with AWS Wilfred. Thanks for joining us. >>Thanks, John. Thanks for having me on. I'm pretty excited to be part of this cube interview. >>Well, I wish we could be in person, but with the pandemic, we gotta do the remote. But I want to get into some of the things you're working on. The A I m l Rapid Adoption Assistance Initiative eyes a big story. What is? What is it described what it is. >>So we launched this artificial intelligence slash machine learning rapid adoption assistance for all public sector partners who are part of the AP in network in September 2020. Onda. We launched this in response to the president's Executive water called the American Year Initiative. So the rapid adoption assistant what it provides us. It provides a direct scalable on automated mechanism for all the public sector partners to reach out to AWS experts within our team for assistance in building and deploying machine learning workloads on behalf of the agencies. So for all all the partners who are part off, this rapid adoption assistance will go through a journey with AWS with my team and they will go through three different faces. The first face will be the envisioning face. The second phase would be the enablement face on the third would be the bill face, as you know, in the envisioning face will dive deeply The use case, the problem that they're trying to solve. This is where we will talk about the algorithms and framework on. We will solidify the architecture er on validate the architecture er on following that will be an enablement face where we engage with the partners trained their technical team, meaning that it will be a hands on approach hands on on keyboard kind of approach where we trained them on machine learning stack On the third phase would be the bill face on the partners leverage the knowledge that they have gained through the enablement and envisioning face, and they start building on rolling out workloads on behalf of the agencies. So we will stay with them throughout the journey on We will doom or any kind of blockers be technical or business, so that's a quick overview off a more rapid adoption assistance program. >>It's funny talking to Swami over the years and watching every year at reinvent the A I. M L Portfolio. Dr Matt Wood is always doing something new. This year is no exception. Even Mawr Machine Learning and AI in the In the News on this rapid adoption assistant initiative sounds like it's an accelerant. Um, so I get all that, But I want to ask you, what problem does it solve for the customer? Or Amazon is because there's demand. There's too much demand. People wanna go faster. What problem does this initiative this rapid adoption of a I machine learning initiative solved? >>So as you know, John, artificial intelligence and related technologies like deep learning and machine learning can literally transform the way agencies operate. They can enable them to provide better services, quicker services and more secure services to the citizens of this country. And that's the reason the president released an executive water called American Initiative on it drives all the government agencies, specifically federal agencies, to promote artificial intelligence to protect and improve the security and economy of the nation. So if you think about it, the best way to achieve the goal is to enable the partners toe build workloads on behalf of agencies, because when it comes to public sector, most of the workloads are delivered by partners. So the problem that we face based on our interaction with the partners is that though the partners have been building a lot off applications with AWS for more than a decade, when it comes to artificial intelligence, they have very limited resources when it comes to deep learning and machine learning, right, like speech recognition, cognitive computing, national language frosting. So we wanted exactly address that. And that's the problem you're trying to solve by launching this rapid adoption assistance, which is nothing but a dry direct mechanism for partners to reach our creative, these experts to help them to build those kind of solutions for the government. >>You know, it's interesting because AI and machine learning it's a secret sauce for workload, especially modern workloads. You mentioned agencies and also public sector. You know, we've seen Certainly there's been pandemic a ton of focus on moving faster, right? So getting those APS out quickly ai drives a lot of that, so totally get it. Um, I think it's an accelerant great program. It just makes a lot of sense. And I know you guys have been going in tow by vertical and kind of having stage making all these other tools kind of be specialized within those verticals. So it makes a ton of sense. I get it, and it is a great, great initiative and solve the problem. The question I have is who gets access to this, right? Is it just agencies you mentioned? Is it all public sector? Could you just clarify who can apply to this program? >>Yes, it is a partner focused program. So all the existing partners, though it is going to affect the end agencies, were trying to help the agency's through the partners. So all the existing AP in partners who are part of the PSP program, we call it the public sector partner program can apply for this rapid adoption assistance. So you have been following John, you have been following AWS and AWS partners on a lot of partners have different kind of expertise on they. They show that by achieving a lot of competencies, right, it could be technical competencies like big data storage and security. Or it could be domain specific competencies like public safety education on government competency. But for a playing this program, the partners don't need to have any kind of competency, and all they have to have is they have to be part of the Amazon Partner Network on they have to be part of the public sector partner program. That is number one Second. It is open toe all partners, meaning that it is open toe. Both technology partners, as well as consulting partners Number three are playing is pretty simple, John, right? You can quickly search for a I M or rapid adoption assistance on a little pop up a page on a P network, the partners have to go on Phil pretty basic information about the workload, the problem that they're trying to solve the machine learning services that they're planning to use on a couple of other information, like contact information, and then our team reaches out to the partner on help them with the journey. >>So real. No other requirements are prerequisites. Just part of the partner program. >>Absolutely. It is meant for partners. And all you have to do is you have to be a part off 18 network, and you have to be a public sector apartment. >>Public sector partner makes sense. I mean, how you're gonna handle the demand. I'm sure the it's gonna be a tsunami of interest, because, I mean, why wouldn't someone take advantage of this? >>Yep. It is open to all kinds of partners because they have some kind of prerequisites, right? So that's what I'm trying to explain. It is open to all partners, but we have since it is open to existing partners, we kind of expect the partners toe understand the best practices off deploying a machine, learning workloads, or for that case, any kind of workload which should be scalable, land secure and resilient. So we're not going to touch? Yeah, >>Well, I wanna ask you what's what's the response been on this launch? Because, you know, I mean to me, it just makes it's just common sense. Why wouldn't someone take advantage of it? E. Whether responses partner or you have domain expertise or in a vertical just makes a lot of sense. You get access to the experts. >>The response has been great. As I said, the once you apply the journey takes six weeks, but already we just launched it. Probably close toe. Two months back in September 2nd week of September, it is almost, uh, almost two months, and we have more than 15 partners as part of this program on dykan name couple of partners say, for example, we worked with delight on We Are. We will be working on number of work clothes for the Indy agencies through delight. And there are other couple of number of other partners were making significant progress using this rapid adoption assistance that includes after associates attained ardent emcee on infinitive. So to answer your question, the response has been great so far. >>So what's the I So I gotta ask, you know, one of things I thought that Teresa Carlson about all the time in Sandy Carter is, you know, trying to get the accelerant get whether it's Fed ramp and getting certifications. I mean, you guys have done a great job of getting partners on board. Is there any kind of paperwork? What's the process? What should a partner expect to take advantage of that? I'm sure they'll be interest beyond just the launch. What's what's involved? What zit Web bases it check a form? Is that a lot of hoops to jump through? Explain what? What? The process >>is. Very interesting question. And it probably is a very important question from a part of perspective, right? So since it is offered for a peon partners, absolutely, they should have already gone through the AP in terms and conditions they should have. Already, a customer agreement or advanced partners might have enterprise agreement. So for utilizing this for leveraging this rapid adoption assistance program, absolutely. There's no paperwork involved. All they have to do is log into the Web form, fill up the basic information. It comes to us way, take it from there. So there is no hard requirements as long as you're part of the AP network. And as long as you're part of the PSP program, >>well, for great insight, congratulations on a great program. I think it's gonna be a smash hit. Who wouldn't wanna take? I know you guys a lot of goodness there with Amazon Cloud higher level services with a I machine learning people could bring it into the table. I know from a cybersecurity standpoint to just education the range of, um, workloads is gonna be phenomenal. Obviously military as well. Eso totally cool. Love it. Congratulations. Like my final question is, um, one about the partner. So I'm a partner. I like this. Say I'm a partner. I jump in Easy to get in. Walk me through What happens? I mean, I signed some paperwork. You check the boxes, I get involved, I get, like, a rep. Do I do things? Do I? What happens to me? Walk me down the path of execution. What's expectation of what will happen? >>I'll explain that in two parts, John. Right? One is from a partner journey perspective and then from AWS perspective. What? What we expect out off partners, right? So, from a experience perspective, as long as they fill out, fill out the web form on, fill out the basic information about the project that they're trying to work. It comes to us. The workflow is automated. All the information is captured on the information comes to my team on. We get back to the partners within three days, but the journey itself can take from 6 to 8 weeks because, as I mentioned during the envisioning case, we try to map the problem to the solution. But the enablement phases the second phase is where it can take anywhere from 2 to 3 weeks because, as I mentioned, we focused on the three layers of the machine learning stack for certain kind of partners. They might be interested in sage maker because they might want to build a custom machine learning model. But for some of the partners, they want the argument that existing applications using S. R or NLP or nL you so we can focus on the high level services. Or we can train them on stage makers so it can take anywhere between 2 to 3 weeks or 3 to 4 weeks. And finally, the build phase varies from partner to partner on the complexity of the work. Lord at that point were still involved with a partner, but the partner will be taking the lead on will be with them to remove any kid of Glaucus being technical or, uh, business couple of Yeah, well, I just >>want to say the word enablement in your title kind of speaks volumes. This isn't about enabling customers. >>It is all about enabling the in customers through partners. So we focus on enabling partners. They could be business big system integrators like Lockheed's or Raytheon's or Delight. Or it could be nimble in small partners. Or it could be a technology partner building an entire pass or SAS service on behalf of the government agencies. Right or that could help the comment agencies in different verticals. So we just enabled the in the agency's through the partners. And the focus of this program is all about partner enablement. >>Well, for just ahead of a does a i machine learning enablement in partnership, part of public sector with a W. S. This is our special coverage. Well, for thanks for coming on being a cube virtual guest. I wish we could be in person, but this year it's remote. This is the cube virtual. I'm John for a year. Host of the Cube. Thanks for watching. >>Thanks a lot, John.
SUMMARY :
It's the Cube with digital coverage of AWS This is the day when we go through all the great I'm pretty excited to be part of this cube interview. of the things you're working on. So for all all the partners Even Mawr Machine Learning and AI in the In the News on this rapid adoption So the problem that we face based And I know you guys have been going in tow by vertical and kind of having stage making all these other tools kind So all the existing AP in partners who are part of the PSP program, Just part of the partner program. And all you have to do is you have to be a part off 18 I'm sure the it's gonna be a tsunami It is open to all partners, but we have since it You get access to the experts. As I said, the once you apply the journey takes six weeks, So what's the I So I gotta ask, you know, one of things I thought that Teresa Carlson about all the time in Sandy Carter is, All they have to do is log into the Web form, I know from a cybersecurity standpoint to just education the range of, All the information is captured on the information comes to my team on. want to say the word enablement in your title kind of speaks volumes. It is all about enabling the in customers through partners. This is the cube virtual.
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
Lockheed | ORGANIZATION | 0.99+ |
John | PERSON | 0.99+ |
Amazon | ORGANIZATION | 0.99+ |
September 2020 | DATE | 0.99+ |
AWS | ORGANIZATION | 0.99+ |
Teresa Carlson | PERSON | 0.99+ |
Raytheon | ORGANIZATION | 0.99+ |
Justin | PERSON | 0.99+ |
Wilfred Justin | PERSON | 0.99+ |
six weeks | QUANTITY | 0.99+ |
2 | QUANTITY | 0.99+ |
3 | QUANTITY | 0.99+ |
two parts | QUANTITY | 0.99+ |
Matt Wood | PERSON | 0.99+ |
Sandy Carter | PERSON | 0.99+ |
Amazon Partner Network | ORGANIZATION | 0.99+ |
4 weeks | QUANTITY | 0.99+ |
second phase | QUANTITY | 0.99+ |
third | QUANTITY | 0.99+ |
3 weeks | QUANTITY | 0.99+ |
One | QUANTITY | 0.99+ |
6 | QUANTITY | 0.99+ |
Delight | ORGANIZATION | 0.99+ |
more than a decade | QUANTITY | 0.99+ |
three days | QUANTITY | 0.99+ |
8 weeks | QUANTITY | 0.98+ |
this year | DATE | 0.98+ |
third phase | QUANTITY | 0.98+ |
more than 15 partners | QUANTITY | 0.98+ |
first face | QUANTITY | 0.98+ |
a year | QUANTITY | 0.97+ |
Swami | PERSON | 0.97+ |
Phil | PERSON | 0.97+ |
Second | QUANTITY | 0.96+ |
This year | DATE | 0.96+ |
September 2nd week of September | DATE | 0.95+ |
three layers | QUANTITY | 0.94+ |
three different faces | QUANTITY | 0.94+ |
Indy | ORGANIZATION | 0.94+ |
pandemic | EVENT | 0.93+ |
Two months | DATE | 0.92+ |
We Are | ORGANIZATION | 0.92+ |
almost two months | QUANTITY | 0.91+ |
AWS Worldwide | ORGANIZATION | 0.9+ |
NLP | ORGANIZATION | 0.89+ |
A W | ORGANIZATION | 0.87+ |
one | QUANTITY | 0.86+ |
couple of partners | QUANTITY | 0.85+ |
Number three | QUANTITY | 0.82+ |
AP | ORGANIZATION | 0.82+ |
Mawr | ORGANIZATION | 0.8+ |
AWS Wilfred | ORGANIZATION | 0.79+ |
Invent 2020 Public Sector Day | EVENT | 0.75+ |
public sector partner program | OTHER | 0.71+ |
Both technology | QUANTITY | 0.7+ |
couple | QUANTITY | 0.69+ |
Amazon Cloud | ORGANIZATION | 0.67+ |
S. R | ORGANIZATION | 0.66+ |
Cube | COMMERCIAL_ITEM | 0.65+ |
American Initiative | TITLE | 0.63+ |
Onda | ORGANIZATION | 0.63+ |
Rapid Adoption Assistance Initiative | OTHER | 0.61+ |
American Year Initiative | OTHER | 0.61+ |
Glaucus | ORGANIZATION | 0.59+ |
18 network | QUANTITY | 0.58+ |
aws reinvent 2020 | TITLE | 0.58+ |
SAS | ORGANIZATION | 0.58+ |
infinitive | TITLE | 0.57+ |
reinvent 2020 | TITLE | 0.49+ |
WWPS | TITLE | 0.45+ |
dykan | OTHER | 0.39+ |
Joshua Burgin | AWS re:Invent 2020
>>from >>around the globe. It's the Cube with digital coverage of AWS reinvent 2020. Special coverage sponsored by AWS Global Partner Network >>Right. Welcome, everyone to the Cube. Live covering aws reinvent 2020. I'm your host, Rebecca Knight. Today we're joined by Joshua Virgin. He is the general manager at AWS Outpost. Thanks so much for coming on the Cube. Joshua, >>thank you for having me. It's great to be here. >>Well, it's great to have you So tell our viewers a little bit about aws out AWS Outpost. >>Sure, it's the one of my favorite subjects, obviously. So outpost is a service from AWS that allows you to use the same tools technology ap ice. You know, programming interfaces that you do in the cloud, but install this and run it on your own premises or in a co location facility. So it really extends the reach of A W S two far more locations than you could otherwise use it. >>So what are some of the advancements this year? >>It's been an amazingly you know, busy year, even under unprecedented kind of circumstances, where we've tried to turn the crank really hard and deliver value for our customers. We increase the number of countries you could order outposts in up to 51 countries. You can now connect outpost all 22 AWS regions and or govcloud regions everything outside of China. On we delivered 15 new services or incremental features, including S three on outpost, which was the top thing that customers asked for. But also our application load balancer, elastic cash are relational database service RDS. You know, there's probably more that I'm missing here, but, you know, and we're definitely not slowing down in that regard. 2021 will probably be an even bigger year. >>So tell us a little bit about the response from customers since the launch of a W s outpost last year. What are you hearing? >>Yeah, I mean, we're hearing a lot. I think we've been pleasantly surprised by the breadth and the depth of the customer use cases. One >>of the >>biggest things we heard from people was, you know, the the outposts are great, but it's a it's a full rack of compute or many racks of compute in some cases in storage, you know, their locations that people wanted to put it in that were smaller where their space constrained. Maybe a restaurant or a factory floor or ah, you know, small medical facility. You know, a telco like a cell site. And and so what we did, based on that is something that we actually just announced and Andy's keynote just a few days ago here, which is the new small form factor outposts that are one you and to you size servers. It's about the size of one or two pizza boxes stacked on top of each other. So that's even going to make outposts available toe even Mawr use cases. Uh, you know, early on we kind of said to ourselves that it's important to kind of give people that consistent experience wherever they might need the compute and storage and the other services. And so I've been I've been really pleasantly surprised, as I mentioned earlier by how many people have talked to us. We have customers like Philips Healthcare. They are. They're bringing their medical imaging solution toe outposts, and it allows them to kind of modernize the way they deliver services, the hospitals and medical research centers around the world, something that really wouldn't be possible without having A W s everywhere, >>and that is much, much needed today. Um, tell us a little bit about Maura. About this year in particular. You said it yourself at the beginning of our conversation. This is an unprecedented year for so many different reasons. How has the cove in 19 pandemic affected AWS outpost and how your team interacts with customers and get your job done? >>Yeah, we I >>think we have >>some unique, you know, challenges in that regard. Obviously, as I mentioned earlier, a W s outposts are installed in a co location, facility or on a customer's own premises in a data center. You know, other things like that. So obviously we have to get our technicians out there toe, roll them in and hook them up to your network and, you know, to get them powered up. So that means that we are complying with, uh, covert restrictions. And as I mentioned 51 different countries. So there was even an install earlier this year at a mining location, you know, far outside the U. S. Where we had to get technicians working with, uh, local technicians from the customer following Kobe guidelines wearing protective gear and actually installing the outpost. You know, using kind of satellite connectivity and phones, toe phone home and talk to us during the installation, of course, because it's not hooked up yet. So those were just kind of examples of the lengths to which will go to make sure that, of course, we're safe. The customers were safe, but that they can kind of continue to modernize their application portfolio and get benefits from the outpost. >>And what are you hearing from clients and customers in terms of how they're thinking about their technology needs now and in the coming year? >>Yeah, that's a That's a great question. I mean, it really varies by market segment. So you have customers like Cisco and Ericsson and Telefonica. They're gonna be using Outpost Thio kind of run their five g packet core technology. It it's got to be run at the edge right there. Telcos. They need to minimize Leighton, see single digit milliseconds, or you might have a customer like Lockheed Martin, And what they've told us is they have projects that are subject to government contracts and regulations. And not only do they have, of course, compliance regimes like Fed ramp that they need to be aware of. But there's data residency requirements. So whether they're deploying in the United States or, you know, with our allies all around the world, the compute in the storage that they need to run in specific locations. So now outposts are going to be a key advancement and kind of a key differentiator for them in how they deliver services to their customers and still meet those data residency or compliance requirements. >>Joshua, tell our viewers more about AWS Outpost ready? >>Oh, that zits. Another thing. I'm really glad you mentioned. So the Outpost Ready program. These are solutions from our a Pienaar Amazon AWS partner Network that are validated in following our best practices on AWS outposts. They're certified toe work and you know they're generally available to customers. And so it's a program where, you know, I SVs and saz providers can ensure that the technology that they provide this third party technology is going to work in the outpost environment. And and there's there's something about outpost that I think makes this, uh, differentiator and uniquely valuable. When I mentioned kind of that consistent hybrid experience. When you think about how outposts are deployed, you know, in a customer's data center, Mike. Maybe alongside other technology they're already using. And so customers say, Look, these AWS services are great, but I already use a variety of, you know, third party technology, maybe from Veritas or Trend Micro Palo Alto Networks. Con vault sigh since pager duty Pure storage Netapp. You know, the list is actually pretty extensive of what people are already using. And so they said, you know, I do plan on using AWS services, but I also don't want to give up. You know what what my team is already familiar with, So can you make sure that's gonna work for me, whether I'm using it in the region or on the AWS outposts? And so the interest and kind of demand for this both from customers and the enthusiasm from the partners has been off the charts. We started the program in just September, which is not that long ago, and we had 32 partners, and as of today we have an additional, uh, additional 25 partners, right? It's 57 partners, total 64 certified solutions so that that's a lot of momentum in just kind of, ah, short amount of time. And I'm really happy that we can deliver that to the customers >>so it doesn't. It's already showing tremendous momentum. How do you think about it in terms of the primary benefits that it gives to customers and how it helps customers and partners? >>Yeah, I think, you know, in order to qualify, the solution has to be tested and validated upon against a bunch of criteria that we have very specific technical criteria, security requirements operational and you know, they're they're supported for customers with clear deployment guidelines. So you know, the customers can kind of think of this as a guarantee that we're not just saying maybe this could work, but but this will work. If you're already using it, it's going to continue to work in a way that's familiar to you and and again, that's important. That consistent hybrid experience, whether you're using a solution from a third party or from AWS, whether you're using it in the region or on a local zone or in a wavelength zone, some of our other, you know, kind of innovative infrastructure deployments or using it on outpost, no matter where you're using it, it has to work the same way. And so this is something that customers have said. I want to be able to get up and running quickly. We had a customer riot games. They're the maker of league of Legends. But also when they were launching their new game, Valerie Int, in June of 2020 they deployed outpost in four different locations to kind of ensure a level playing field in terms of latency. What they told us, you know, very much like this service ready program is they were able to get up and running in just a matter of days once the outpost was deployed. And it's because we gave them those same a p I s that same tooling. So I think that's really important for people. And, you know, I hope we can continue to deliver on that promise. >>So the closest out here, I want you to look into your crystal ball and think ahead 12 and 24 months when you know, fingers crossed things are back to somewhat more normal. What? What's in store for AWS Outpost? >>Yeah, I mean, we're going to deliver on what we announced here at reinvent, which is the new small form factor outposts on. I think what we're going to continue to do is listen to customers. We developed outpost from the very beginning because customers said Could could you deploy outposts in our in our data center or Sorry, can you deploy eight of us? And our data center didn't have a name back then. And so that's really the hallmark of AWS, you know, somewhere around 90% of our road maps or based on what customers tell us they want, then the other 10% is when we kind of look around the corner and hopefully delight people with something they didn't even know they needed. And I really hope for my team. And that that's what 2021 2022 brings is, you know, more countries, more services, more value, more compliance certifications. You know, all the things that people tell us they want. We're going to keep turning the crank as hard as we can and delivering that as quickly as possible >>with the trademark Amazon customer delight. >>Yes, absolutely >>excellent. Well, Joshua Virgin. Thank you so much for coming on the Cube. It was a pleasure having you. >>That was a pleasure talking to you. Thank you very much. >>I'm Rebecca night for more of the cubes. Coverage of AWS reinvent 2020. Stay tuned. >>Yeah.
SUMMARY :
It's the Cube with digital coverage Thanks so much for coming on the Cube. thank you for having me. Well, it's great to have you So tell our viewers a little bit about aws out AWS You know, programming interfaces that you do in the cloud, but install this and run it on We increase the number of countries you could order outposts in up to 51 countries. What are you hearing? the depth of the customer use cases. biggest things we heard from people was, you know, the the outposts are great, but it's a it's a full rack of compute How has the cove in 19 pandemic affected a mining location, you know, far outside the U. S. you know, with our allies all around the world, the compute in the storage that they need to run in specific where, you know, I SVs and saz providers can ensure that the technology of the primary benefits that it gives to customers and how it helps customers and So you know, the customers can kind of think of this as a guarantee So the closest out here, I want you to look into your crystal ball and think ahead 12 and 24 months really the hallmark of AWS, you know, somewhere around 90% of our road maps or based on what customers Thank you so much for coming on the Cube. Thank you very much. I'm Rebecca night for more of the cubes.
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
Rebecca Knight | PERSON | 0.99+ |
Telefonica | ORGANIZATION | 0.99+ |
Ericsson | ORGANIZATION | 0.99+ |
Cisco | ORGANIZATION | 0.99+ |
AWS | ORGANIZATION | 0.99+ |
June of 2020 | DATE | 0.99+ |
Joshua Burgin | PERSON | 0.99+ |
Veritas | ORGANIZATION | 0.99+ |
China | LOCATION | 0.99+ |
57 partners | QUANTITY | 0.99+ |
Joshua | PERSON | 0.99+ |
32 partners | QUANTITY | 0.99+ |
Andy | PERSON | 0.99+ |
Telcos | ORGANIZATION | 0.99+ |
Joshua Virgin | PERSON | 0.99+ |
United States | LOCATION | 0.99+ |
September | DATE | 0.99+ |
Amazon | ORGANIZATION | 0.99+ |
one | QUANTITY | 0.99+ |
Mike | PERSON | 0.99+ |
25 partners | QUANTITY | 0.99+ |
15 new services | QUANTITY | 0.99+ |
last year | DATE | 0.99+ |
Lockheed Martin | ORGANIZATION | 0.99+ |
AWS Global Partner Network | ORGANIZATION | 0.99+ |
10% | QUANTITY | 0.99+ |
2021 | DATE | 0.99+ |
12 | QUANTITY | 0.99+ |
64 certified solutions | QUANTITY | 0.99+ |
Trend Micro Palo Alto Networks | ORGANIZATION | 0.99+ |
51 different countries | QUANTITY | 0.99+ |
today | DATE | 0.99+ |
U. S. | LOCATION | 0.99+ |
24 months | QUANTITY | 0.98+ |
eight | QUANTITY | 0.98+ |
Today | DATE | 0.98+ |
both | QUANTITY | 0.98+ |
Philips Healthcare | ORGANIZATION | 0.97+ |
Leighton | ORGANIZATION | 0.97+ |
league of Legends | TITLE | 0.97+ |
this year | DATE | 0.96+ |
22 | QUANTITY | 0.96+ |
around 90% | QUANTITY | 0.95+ |
earlier this year | DATE | 0.95+ |
Outpost Thio | ORGANIZATION | 0.93+ |
two pizza boxes | QUANTITY | 0.9+ |
AWS Outpost | ORGANIZATION | 0.9+ |
few days ago | DATE | 0.89+ |
One | QUANTITY | 0.89+ |
Kobe | ORGANIZATION | 0.88+ |
Rebecca | PERSON | 0.87+ |
AWS Outpost | ORGANIZATION | 0.84+ |
single digit | QUANTITY | 0.83+ |
up to 51 countries | QUANTITY | 0.82+ |
aws | ORGANIZATION | 0.78+ |
Valerie Int | PERSON | 0.76+ |
aws reinvent 2020 | TITLE | 0.76+ |
2020 | TITLE | 0.74+ |
Pienaar | ORGANIZATION | 0.73+ |
2022 | DATE | 0.73+ |
2020 | DATE | 0.72+ |
19 pandemic | EVENT | 0.72+ |
S three | TITLE | 0.71+ |
About | DATE | 0.7+ |
Invent | EVENT | 0.67+ |
Cube | COMMERCIAL_ITEM | 0.66+ |
outpost | ORGANIZATION | 0.65+ |
S two | COMMERCIAL_ITEM | 0.54+ |
Fed | ORGANIZATION | 0.5+ |
A W | LOCATION | 0.49+ |
Outpost | COMMERCIAL_ITEM | 0.43+ |
Netapp | TITLE | 0.43+ |
Maura | TITLE | 0.37+ |
g | COMMERCIAL_ITEM | 0.36+ |
Session 8 California’s Role in Supporting America’s Space & Cybersecurity Future
(radio calls) >> Announcer: From around the globe, its theCUBE covering Space & Cybersecurity Symposium 2020, hosted by Cal poly. Hello, welcome back to theCUBE virtual coverage with Cal Poly for the Space and Cybersecurity Symposium, a day four and the wrap up session, keynote session with the Lieutenant Governor of California, Eleni Kounalakis. She's here to deliver her keynote speech on the topic of California's role in supporting America's Cybersecurity future. Eleni, take it away. >> Thank you, John, for the introduction. I am Lieutenant Governor Eleni Kounalakis. It is an honor to be part of Cal Poly Space and Cybersecurity Symposium. As I speak kind of Pierre with the governor's office of business and economic development is available on the chat, too ready to answer any questions you might have. California and indeed the world are facing significant challenges right now. Every day we are faced with the ongoing COVID-19 pandemic and the economic downturn that is ensued. We have flattened the curve in California and are moving in the right direction but it is clear that we're not out of the woods yet. It is also impossible right now to escape the reality of climate change from the fire sparked by exceptionally rare, dry lightening events to extreme heat waves threatening public health and putting a strain on our electricity grid. We see that climate change is here now. And of course we've been recently confronted with a series of brutal examples of institutionalized racism that have created an awakening among people of all walks of life and compelled us into the streets to march and protest. In the context of all this, we cannot forget that we continue to be faced with other less visible but still very serious challenges. Cybersecurity threats are one of these. We have seen cities, companies and individuals paralyzed by attacks costing time and money and creating an atmosphere of uncertainty and insecurity. Our state agencies, local governments, police departments, utilities, news outlets and private companies from all industries are target. The threats around cybersecurity are serious but not unlike all the challenges we face in California. We have the tools and fortitude to address them. That is why this symposium is so important. Thank you, Cal Poly and all the participants for being here and for the important contributions you bring to this conference. I'd like to also say a few words about California's role in America's future in space. California has been at the forefront of the aerospace industry for more than a century through all the major innovations in aerospace from wooden aircraft, to World War II Bombers, to rockets and Mars rovers. California has played a pivotal role. Today, California is the number one state in total defense spending, defense contract spending and total number of personnel. It is estimated the Aerospace and Defense Industry, provides $168 billion in economic impact to our state. And America's best trained and most experienced aerospace and technology workforce lives here in California. The fact that the aerospace and defense sector, has had a strong history in California is no accident. California has always had strong innovation ecosystem and robust infrastructure that puts many sectors in a position to thrive. Of course, a big part of that infrastructure is a skilled workforce. And at the foundation of a skilled workforce is education. California has the strongest system of public higher education in the world. We're home to 10 university of California campuses, 23 California State university campuses and 116 California Community Colleges. All told nearly 3 million students are enrolled in public higher education. We also have world renowned private universities including the California Institute of Technology and Stanford University numbers one and three in the country for aerospace engineering. California also has four national laboratories and several NASA facilities. California possesses a strong spirit of innovation, risk taking and entrepreneurship. Half of all venture capital funding in the United States, goes to companies here in California. Lastly, but certainly no less critical to our success, California is a diverse state. 27% of all Californians are foreign born, 27% more than one in four of our population of 40 million people are immigrants from another country, Europe central and South America, India, Asia, everywhere. Our rich cultural diversity is our strength and helps drive our economy. As I look to the future of industries like cybersecurity and the growing commercial space industry, I know our state will need to work with those industries to make sure we continue to train our workforce for the demands of an evolving industry. The office of the lieutenant governor has a unique perspective on higher education and workforce development. I'm on the UC Board of Regents, the CSU Board of Trustees. And as of about two weeks ago, the Community Colleges Board of Governors. The office of the lieutenant governor is now the only office that is a member of every governing board, overseeing our public higher education system. Earlier in the symposium, we heard a rich discussion with Undersecretary Stewart Knox from the California Labor and Workforce Development Agency about what the state is doing to meet the needs of space and cybersecurity industries. As he mentioned, there are over 37,000 job vacancies in cybersecurity in our state. We need to address that gap. To do so, I see an important role for public private partnerships. We need input from industry and curriculum development. Some companies like Lockheed Martin, have very productive partnerships with universities and community colleges that train students with skills they need to enter aerospace and cyber industries. That type of collaboration will be key. We also need help from the industry to make sure students know that fields like cybersecurity even exist. People's early career interests are so often shaped by the jobs that members of their family have or what they see in popular culture. With such a young and evolving field like cybersecurity, many students are unaware of the job opportunities. I know for my visits to university campuses that students are hungry for STEM career paths where they see opportunities for good paying jobs. When I spoke with students at UC Merced, many of them were first generation college students who went through community college system before enrolling in a UC and they gravitated to STEM majors. With so many job opportunities available to STEM students, cybersecurity ought to be one that they are aware of and consider. Since this symposium is being hosted by Cal Poly, I wanted to highlight the tremendous work they're doing as leaders in the space and cybersecurity industry. Cal Poly California Cybersecurity Institute, does incredible work bringing together academia, industry and government training the next generation of cyber experts and researching emerging cybersecurity issues. As we heard from the President of Cal Poly, Jeff Armstrong the university is in the perfect location to contribute to a thriving space industry. It's close to Vandenberg Air Force Base and UC Santa Barbara and could be home to the future permanent headquarters of US Space Command. The state is also committed to supporting this space industry in the Central Coast. In July, the State of California, Cal poly US-based force and the others signed a memorandum of understanding to develop a commercial space port at Vandenberg Air Force Base and to develop a master plan to grow the commercial space industry in the region. Governor Newsom has made a commitment to lift up all regions of the state. And this strategy will position the Central Coast to be a global leader in the future of the space industry. I'd like to leave you with a few final thoughts, with everything we're facing. Fires, climate change, pandemic. It is easy to feel overwhelmed but I remain optimistic because I know that the people of the State of California are resilient, persistent, and determined to address our challenges and show a path toward a better future for ourselves and our families. The growth of the space industry and the economic development potential of projects like the Spaceport at Vandenberg Air Force Base, our great example of what we can look forward to. The potential for the commercial space industry to become a $3 trillion industry by mid century, as many experts predict is another. There are so many opportunities, new companies are going to emerge doing things we never could have dreamed of today. As Lieutenant General John Thompson said in the first session, the next few years of space and cyber innovation are not going to be a pony ride at the state fair, they're going to be a rodeo. We should all saddle up. Thank you. >> Okay, thank you very much, Eleni. I really appreciate it. Thank you for your participation and all your support to you and your staff. You guys doing a lot of work, a lot going on in California but cybersecurity and space as it comes together, California's playing a pivotal role in leading the world and the community. Thank you very much for your time. >> Okay, this session is going to continue with Bill Britton. Who's the vice president of technology and CIO at Cal Poly but more importantly, he's the director of the cyber institute located at Cal Poly. It's a global organization looking at the intersection of space and cybersecurity. Bill, let's wrap this up. Eleni had a great talk, talking about the future of cybersecurity in America and its future. The role California is playing, Cal Poly is right in the Central Coast. You're in the epicenter of it. We've had a great lineup here. Thanks for coming on. Let's put a capstone on this event. >> Thank you, John. But most importantly, thanks for being a great partner helping us get this to move forward and really changing the dynamic of this conversation. What an amazing time we're at, we had quite an unusual group but it's really kind of the focus and we've moved a lot of space around ourselves. And we've gone from Lieutenant General Thompson and the discussion of the opposition and space force and what things are going on in the future, the importance of cyber in space. And then we went on and moved on to the operations. And we had a private company who builds, we had the DOD, Department Of Defense and their context and NASA and theirs. And then we talked about public private partnerships from President Armstrong, Mr. Bhangu Mahad from the DOD and Mr. Steve Jacques from the National Security Space Association. It's been an amazing conference for one thing, I've heard repeatedly over and over and over, the reference to digital, the reference to cloud, the reference to the need for cybersecurity to be involved and really how important that is to start earlier than just at the employment level. To really go down into the system, the K through 12 and start there. And what an amazing time to be able to start there because we're returning to space in a larger capacity and it's now all around us. And the lieutenant governor really highlighted for us that California is intimately involved and we have to find a way to get our students involved at that same level. >> I want to ask you about this inflection point that was a big theme of this conference and symposium. It was throughout the interviews and throughout the conversations, both on the chat and also kind of on Twitter as well in the social web. Is that this new generation, it wasn't just space and government DOD, all the normal stuff you see, you saw JPL, the Hewlett Foundation, the Defense Innovation Unit, Amazon Web Services, NASA. Then you saw entrepreneurs come in, who were doing some stuff. And so you had this confluence of community. Of course, Cal Poly had participated in space. You guys does some great job, but it's not just the physical face-to-face show up, gets to hear some academic papers. This was a virtual event. We had over 300 organizations attend, different organizations around the world. Being a virtual event you had more range to get more people. This isn't digital. This symposium isn't about Central California anymore. It's global. >> No, it really has gone. >> What really happened to that? >> It's really kind of interesting because at first all of this was word of mouth for this symposium to take place. And it just started growing and growing and the more that we talk to organizations for support, the more we found how interconnected they were on an international scale. So much so that we've decided to take our cyber competition next year and take it globally as well. So if in fact as Major General Shaw said, this is about a multinational support force. Maybe it's time our students started interacting on that level to start with and not have to grow into it as they get older, but do it now and around space and around cybersecurity and around that digital environment and really kind of reduce the digital dividing space. >> Yeah, General Thompson mentioned this, 80 countries with programs. This is like the Olympics for space and we want to have these competitions. So I got great vision and I love that vision, but I know you have the number... Not number, the scores and from the competition this year that happened earlier in the week. Could you share the results of that challenge? >> Yeah, absolutely. We had 83 teams participate this year in the California Cyber Innovation Challenge. And again, it was based around a spacecraft scenario where a spacecraft, a commercial spacecraft was hacked and returned to earth. And the students had to do the forensics on the payload. And then they had to do downstream network analysis, using things like Wireshark and autopsy and other systems. It was a really tough competition. The students had to work hard and we had middle school and high school students participate. We had an intermediate league, new schools who had never done it before or even some who didn't even have STEM programs but were just signing up to really get involved in the experience. And we had our ultimate division which was those who had competed in several times before. And the winner of that competition was North Hollywood. They've been the winning team for four years in a row. Now it's a phenomenal program, they have their hats off to them for competing and winning again. Now what's really cool is not only did they have to show their technical prowess in the game but they also have to then brief and out-brief what they've learned to a panel of judges. And these are not pushovers. These are experts in the field of cybersecurity in space. We even had a couple of goons participating from DefCon and the teams present their findings. So not only are we talking technical, we're talking about presentation skills. The ability to speak and understand. And let me tell you, after reading all of their texts to each other over the weekend adds a whole new language they're using to interact with each other. It's amazing. And they are so more advanced and ready to understand space problems and virtual problems than we are. We have to challenge them even more. >> Well, it sounds like North Hollywood got the franchise. It's likethe Patriots, the Lakers, they've got a dynasty developing down there in North Hollywood. >> Well, what happens when there's a dynasty you have to look for other talent. So next year we're going global and we're going to have multiple states involved in the challenge and we're going to go international. So if North Hollywood pulls it off again next year, it's going to be because they've met the best in the world than defeated >> Okay, the gauntlet has been thrown down, got to take down North Hollywood from winning again next year. We'll be following that. Bill, great to get those results on the cyber challenge we'll keep track and we'll put a plug for it on our site. So we got to get some press on that. My question to you is now as we're going digital, other theme was that they want to hire digital natives into the space force. Okay, the DOD is looking at new skills. This was a big theme throughout the conference not just the commercial partnerships with government which I believe they had kind of put more research and personally, that's my personal opinion. They should be putting in way more research into academic and these environments to get more creative. But the skill sets was a big theme. What's your thoughts on how you saw some of the highlight moments there around skill sets? >> John, it's really interesting 'cause what we've noticed is in the past, everybody thinks skill sets for the engineering students. And it's way beyond that. It's all the students, it's all of them understanding what we call cyber cognizance. Understanding how cybersecurity works whatever career field they choose to be in. Space, there is no facet of supporting space that doesn't need that cyber cognizance. If you're in the back room doing the operations, you're doing the billing, you're doing the contracting. Those are still avenues by which cybersecurity attacks can be successful and disrupt your space mission. The fact that it's international, the connectivities, all of those things means that everyone in that system digitally has to be aware of what's going on around them. That's a whole new thought process. It's a whole new way of addressing a problem and dealing with space. And again it's virtual to everyone. >> That's awesome. Bill, great to have you on. Thank you for including theCUBE virtual, our CUBE event software platform that we're rolling out. We've been using it for the event and thank you for your partnership in this co-creation opening up your community, your symposium to the world, and we're so glad to be part of it. I want to thank you and Dustin and the team and the President of Cal Poly for including us. Thank you very much. >> Thank you, John. It's been an amazing partnership. We look forward to it in the future. >> Okay, that's it. That concludes the Space and Cybersecurity Symposium 2020. I'm John Furrier with theCUBE, your host with Cal Poly, who put on an amazing virtual presentation, brought all the guests together. And again, shout out to Bill Britton and Dustin DeBrum who did a great job as well as the President of Cal poly who endorsed and let them do it all. Great event. See you soon. (flash light sound)
SUMMARY :
and the wrap up session, keynote session and for the important and the community. of the cyber institute the reference to the need for but it's not just the and the more that we talk to This is like the Olympics for space And the students had to do It's likethe Patriots, the Lakers, in the challenge and we're of the highlight moments for the engineering students. and the President of Cal We look forward to it in the future. as the President of Cal poly
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
Amazon Web Services | ORGANIZATION | 0.99+ |
John | PERSON | 0.99+ |
DOD | ORGANIZATION | 0.99+ |
NASA | ORGANIZATION | 0.99+ |
Eleni | PERSON | 0.99+ |
Dustin | PERSON | 0.99+ |
Jeff Armstrong | PERSON | 0.99+ |
National Security Space Association | ORGANIZATION | 0.99+ |
Bill Britton | PERSON | 0.99+ |
California | LOCATION | 0.99+ |
Dustin DeBrum | PERSON | 0.99+ |
California Institute of Technology | ORGANIZATION | 0.99+ |
John Furrier | PERSON | 0.99+ |
California Labor and Workforce Development Agency | ORGANIZATION | 0.99+ |
Defense Innovation Unit | ORGANIZATION | 0.99+ |
Lockheed Martin | ORGANIZATION | 0.99+ |
America | LOCATION | 0.99+ |
UC Board of Regents | ORGANIZATION | 0.99+ |
Steve Jacques | PERSON | 0.99+ |
Bill Britton | PERSON | 0.99+ |
United States | LOCATION | 0.99+ |
July | DATE | 0.99+ |
Cal poly | ORGANIZATION | 0.99+ |
Cal Poly | ORGANIZATION | 0.99+ |
Hewlett Foundation | ORGANIZATION | 0.99+ |
$3 trillion | QUANTITY | 0.99+ |
Department Of Defense | ORGANIZATION | 0.99+ |
Asia | LOCATION | 0.99+ |
$168 billion | QUANTITY | 0.99+ |
Bhangu Mahad | PERSON | 0.99+ |
next year | DATE | 0.99+ |
India | LOCATION | 0.99+ |
Cal Poly California Cybersecurity Institute | ORGANIZATION | 0.99+ |
CSU Board of Trustees | ORGANIZATION | 0.99+ |
Bill | PERSON | 0.99+ |
President | PERSON | 0.99+ |
four years | QUANTITY | 0.99+ |
Olympics | EVENT | 0.99+ |
23 | QUANTITY | 0.99+ |
Central Coast | LOCATION | 0.99+ |
JPL | ORGANIZATION | 0.99+ |
Stanford University | ORGANIZATION | 0.99+ |
Pierre | PERSON | 0.99+ |
three | QUANTITY | 0.99+ |
116 | QUANTITY | 0.99+ |
earth | LOCATION | 0.99+ |
27% | QUANTITY | 0.99+ |
South America | LOCATION | 0.99+ |
Vandenberg Air Force Base | LOCATION | 0.99+ |
Community Colleges Board of Governors | ORGANIZATION | 0.99+ |
first session | QUANTITY | 0.99+ |
40 million people | QUANTITY | 0.99+ |
mid century | DATE | 0.99+ |
Lakers | ORGANIZATION | 0.99+ |
California Cyber Innovation Challenge | EVENT | 0.99+ |
Undersecretary | PERSON | 0.99+ |
UC Merced | ORGANIZATION | 0.99+ |
Governor | PERSON | 0.99+ |
Central California | LOCATION | 0.99+ |
Vandenberg Air Force Base | LOCATION | 0.99+ |
North Hollywood | ORGANIZATION | 0.99+ |
this year | DATE | 0.99+ |
US Space Command | ORGANIZATION | 0.99+ |
four national laboratories | QUANTITY | 0.98+ |
10 university | QUANTITY | 0.98+ |
over 300 organizations | QUANTITY | 0.98+ |
80 countries | QUANTITY | 0.98+ |
3 teams | QUANTITY | 0.98+ |
Eleni Kounalakis | PERSON | 0.98+ |
Pham and Britton and Fleischer V1
>>covering the space and cybersecurity symposium 2020 hosted by Cal poly. Hold on. Welcome to this special presentation with Cal poly hosting the space and cybersecurity symposium, 2020 virtual, um, John for your host with the cube and Silicon angle here in our Palo Alto studios with our remote guests, we couldn't be there in person, but we're going to be here remotely. Got a great session and a panel for one hour topic preparing students for the jobs of today and tomorrow, but a great lineup. Bill Britain, Lieutenant Colonel from the us air force, retired vice president for information technology and CIO and the director of the California cyber security Institute for Cal poly bill. Thanks for joining us, dr. Amy Fisher, who's the Dean of the college of engineering at Cal poly and trunk fam professor and researcher at the U S air force Academy. Folks, thanks for joining me today. >>Our pleasure got a great, great panel. This is one of my favorite topics preparing students for the next generation, the jobs for today and tomorrow. We've got an hour. I'd love you guys to start with an opening statement, to kick things off a bill. We'll start with you. Well, I'm really pleased to be, to start on this. Um, as the director for the cybersecurity Institute and the CIO at Cal poly, it's really a fun, exciting job because as a Polytechnic technology, as such a forefront in what we're doing, and we've had a, a wonderful opportunity being 40 miles from Vandenberg air force base to really look at the nexus of space and cyber security. And if you add into that, uh, both commercial government and civil space and cybersecurity, this is an expanding wide open time for cyber and space. In that role that we have with the cyber security Institute, we partner with elements of the state and the university. >>And we try to really add value above our academic level, which is some of the highest in the nation and to really merge down and go a little lower and start younger. So we actually are running the week prior to this showing a cybersecurity competition for high schools or middle schools in the state of California, that competition this year is based on a scenario around hacking of a commercial satellite and the forensics of the payload that was hacked and the networks associated with it. This is going to be done using products like Wireshark autopsy and other tools that will give those high school students. What we hope is a huge desire to follow up and go into cyber and cyber space and space and follow that career path. And either come to Cal poly or some other institution that's going to let them really expand their horizons in cybersecurity and space for the future >>Of our nation. >>Bill, thanks for that intro, by the way, it's gonna give you props for an amazing team and job you guys are doing at Cal poly, that Dex hub and the efforts you guys are having with your challenge. Congratulations on that great work. Thank you >>Star team. It's absolutely amazing. You find that much talent in one location. And I think Amy is going to tell you she's got the same amount of talent in her staff. So it's, it's a great place to be. >>Amy flasher. You guys have a great organization down there, amazing curriculum, grazing people, great community, your opening statement. >>Hello everybody. It's really great to be a part of this panel on behalf of the Cal poly college of engineering here at Cal poly, we really take preparing students for the jobs of today and tomorrow completely seriously. And we claim that our students really graduate. So they're ready day one for their first real job, but that means that in getting them to that point, we have to help them get valuable and meaningful job experience before they graduate, but through our curriculum and through multiple internship or summer research opportunities. So we focus our curriculum on what we call a learn by doing philosophy. And this means that we have a combination of practical experience and learn by doing both in and out of the classroom. And we find that to be really critical for preparing students for the workforce here at Cal poly, we have more than 6,000 engineering students. >>We're one of the largest undergraduate engineering schools in the country. Um, and us news ranks us the eighth best undergraduate engineering program in the, in the country and the top ranked state school. We're really, really proud that we offer this impactful hands on engineering education that really exceeds that of virtually all private universities while reaching a wider audience of students. We offer 14 degree programs and really we're talking today about cyber and space. And I think most of those degree programs can really make an impact in the space and cybersecurity economy. And this includes not only things like Aero and cyber directly, but also electrical engineering, mechanical engineering, computer engineering, materials, engineering, even manufacturing, civil and biomedical engineering. As there's a lot of infrastructure needs that go into supporting launch capabilities. Our aerospace program graduates hundreds of aerospace engineers, and most of them are working right here in California. >>I'm with many of our corporate partners, including Northrop Grumman, Lockheed, Boeing, Raytheon space, X, Virgin, galactic JPL, and so many other places where we have Cal poly engineer's impacting the space economy. Our cybersecurity focus is found mainly in our computer science and software engineering programs. And it's really a rapidly growing interest among our students. Computer science is our most popular major and industry interest and partnerships are integrated into our curriculum. And we do that oftentimes through support from industry. So we have partnerships with Northrop Grumman for professorship and a cyber lab and from PG and E for critical infrastructure, cybersecurity lab, and professorship. And we think that industry partnerships like these are really critical to preparing students for the future as the field's evolving so quickly and making sure we adapt our facilities and our curriculum to stay in line with what we're seeing in industry is incredibly important. >>In our aerospace program, we have an educational partnership with the air force research labs. That's allowing us to install new high performance computing capabilities and a space environments lab. That's going to enhance our satellite design capabilities. And if we talk about satellite design, Cal poly is the founding home of the cube sat program, which pioneered small satellite capabilities. And we remain the worldwide leader in maintaining the cube set standard. And our student program has launched more cube sets than any other program. So here again, we have this learn by doing experience every year for dozens of aerospace, electrical, computer science, mechanical engineering students, and other student activities that we think are just as important include ethical hacking through our white hat club, Cal poly space systems, which does really, really big rocket launches and our support program for women in both of these fields like wish, which is women in software and hardware. >>Now, you know, really trying to bring in a wide variety of people into these fields is incredibly important and outreach and support to those demographics. Traditionally underrepresented in these fields is going to be really critical to future success. So by drawing on the lived experiences by people with different types of backgrounds, while we develop the type of culture and environment where all of us can get to the best solution. So in terms of bringing people into the field, we see that research shows, we need to reach kids when they're in late elementary and middle schools to really overcome that cultural bias that works against diversity in our fields. And you heard bill talking about the cyber cybersec, the California cybersecurity institutes a year late cyber challenge. There's a lot of other people who are working to bring in a wider variety of, uh, of people into the field, like girl Scouts, which has introduced dozens of new badges over the past few years, including a whole cybersecurity series of badges and a concert with Palo Alto networks. So we have our work cut out for us, but we know what we need to do. And if we're really committed to prep properly preparing the workforce for today and tomorrow, I think our future is going to be bright. I'm looking forward to our discussion today. >>Yeah, you got a flashy for great, great comment, opening statement and congratulations. You got the right formula down there, the right mindset, and you got a lot of talent and community as well. Thank thank you for that opening statement. Next step from Colorado Springs, trunk fam, who's a professor and researcher. The us air force Academy is doing a lot of research around the areas that are most important for the intersection of space and technology trunk. >>Good afternoon, first electric and Cal poli for the opportunity. And today I want to go briefly about cyber security in S application. Whenever we talk about cyber security, the impression is got yes, a new phew that is really highly complex involving a lot of technical area. But in reality, in my personal opinion, it is in be complex because involve many disciplines. The first thing we think about is computer engineering and computer networking, but it's also involving communication sociology, law practice. And this practice of cyber security goes in on the info computer expert, but it's also info everybody else who has a computing device that is connected to the internet. And this participation is obviously every body in today's environment. When we think about the internet, we know that is a good source of information, but come with the convenience of information that we can access. >>We are constantly faced in being from the internet. Some of them, we might be aware of some of them we might not be aware of. For example, when we search on the internet, a lot of time, our browser will be saved and gotten this site is not trusted. So we will be more careful. What about the sites that we trusted? We know getting those salad chicken sites, but they're not a hundred percent good at proof. What happened? It was all side, uh, attack by hacker. And then they will be a silent source that we might not be aware of. So in the reality, we need to be more practicing the, um, cyber security from our SIBO point of view and not from a technical point of view. When we talk about space application, we should know that all the hardware, a computer based tool by computer system and therefore the hardware and the software must go through some certification process so that they can be record that air with the flight. >>What the, when we know that in the certification process is focusing on the functionality of the hardware and software, but one aspect that is explicitly and implicitly required is the security of those components. And we know that those components have to be connected with the ground control station and be communication is through the air, through the layby or signal. So anybody who has access to those communication regular signal will be able to control the space system that we put up there. And we certainly do not want our system to be hijacked by a third party. >>I'm not going to aspect of cybersecurity is we try to design the space system in a very strong manner. So it's almost impossible to hack in, but what about some August week system that might be connected to so strong system? For example, the spare system will be connected to the ground control station and on the ground control station, we have the human controller in those people have cell phone. They are allowed to use cell phones for communication, but at the same time, they are connected to the internet, to the cell phone and their cell phone might be connected to the computer that control the flight software and hardware. So what I want to say is that we try to build strong system and we protected them, but there will be some weaker system that we could not intended, but exists to be connected to our strong system. And those are the points that hacker will be trying to attack. If we know how to control the access to those points, we will be having a much better system for the space system. And when we see the cybersecurity that is requiring the participation everywhere, it's important to Merck that there is a source of opportunity for students to engage the workforce. To concede the obviously student in engineering can focus their knowledge and expertise to provide technological solution, to protect the system that we view. But we also >>Have students in business who can focus to write a business plan to reach the market. We also have student in law who can focus policy governing the cyber security. And we also have student in education who can focus the expert. She should be saying how to teach cyber security practice and students can focus the effort to implement security measures and it implies job opportunity. >>Thank you trunk for those great comments, great technology opportunities, but interesting as well as the theme that we're seeing across the entire symposium and in the virtual hallways that we're hearing conversations and you pointed out some of them, dr. Fleischer did as well. And bill, you mentioned it. It's not one thing. It's not just technology, it's different skills. And, um, Amy, you mentioned that computer science is the hottest degree, but you have the hottest aerospace program in the world. I mean, so all of this is kind of balancing it's interdisciplinary. It's a structural change before we get into some of the, um, how they prepare the students. Can you guys talk about some of the structural changes that are modern now in preparing, um, in these opportunities because societal impact is a law potentially impact it's, it's how we educate there's no cross-discipline skillsets. It's not just get the degree, see out in the field bill, you want to start. >>Well, what's really fun about this job is, is that in the air force, uh, I worked in the space and missile business and what we saw was a heavy reliance on checklist format, security procedures, analog systems, and what we're seeing now in our world, both in the government and the commercial side, uh, is a move to a digital environment. And the digital environment is a very quick and adaptive environment. And it's going to require a digital understanding. Matter of fact, um, the, uh, under secretary of the air force for acquisition, uh, rev recently referenced the need to understand the digital environment and how that's affecting acquisition. So as, as both Amy, um, and trunk said, even business students are now in the >>Cybersecurity business. And, and so, again, what we're seeing is, is the change. Now, another phenomenon that we're seeing in the space world is there's just so much data. Uh, one of the ways that we addressed that in the past was to look at high performance computing. It was a lot stricter control over how that worked, but now what we're seeing these adaptation of cloud cloud technologies in space support, space, data, command, and control. Uh, and so what we see is a modern space engineer who asked to understand digital, has to understand cloud and has to understand the context of all those with a cyber environment. That's really changing the forefront of what is a space engineer, what is a digital engineer and what does a future engineer, both commercial or government? So I think the opportunity for all of these things is really good, particularly for a Polytechnic air force Academy and others that are focusing on a more, uh, widened experiential level of cloud and engineering and other capabilities. >>And I'll tell you the part that as the CIO, I have to remind everybody, all this stuff works for the it stuff. So you've got to understand how your it infrastructures are tied and working together. Um, as we noted earlier, one of the things is, is that these are all relays from point the point, and that architecture is part of your cybersecurity architecture. So again, every component has now become a cyber aware cyber knowledgeable, and in what we'd like to call as a cyber cognizant citizen, where they have to understand the context, patients chip software, that the Fleischer talk about your perspective, because you mentioned some of the things that computer science. Remember when I'm in the eighties, when I got my computer science degree, they call the software engineers, and then you became software developers. And then, so again, engineering is the theme. If you're engineering a system, there's now software involved, um, and there's also business engineering business models. So talk about some of your comments was, you mentioned, computer science is hot. You got the aerospace, you've got these multidisciplines you got definitely diversity as well. It brings more perspectives in as well. Your thoughts on these structural interdisciplinary things. >>I think this is, this is really key to making sure that students are prepared to work in the workforce is looking at the, the blurring between fields no longer are you just a computer scientist, no longer are you just an aerospace engineer? You really have to have an expertise where you can work with people across disciplines. All of these, all of these fields are just working with each other in ways we haven't seen before. And bill brought up data, you know, data science is something that's cross cutting across all of our fields. So we want engineers that have the disciplinary expertise so that they can go deep into these fields, but we want them to be able to communicate with each and to be able to communicate across disciplines and to be able to work in teams that are across disciplines. You can no longer just work with other computer scientists or just work with other aerospace engineers. >>There's no part of engineering that is siloed anymore. So that's how we're changing. You have to be able to work across those, those disciplines. And as you, as Tron pointed out, you know, ethics has to come into this. So you can no longer try to fully separate what we would traditionally have called the, the liberal arts and say, well, that's over there in general education. No ethics is an important part of what we're doing and how we integrate that into our curriculum. So it was communication. So is working on public policy and seeing where all of these different aspects tied together to make the impact that we want to have in the world. So it, you no longer can work solo in these fields. >>Great point. And bill also mentioned the cloud. One thing about the cloud that showed us as horizontal scalability has created a lot of value and certainly data is now horizontal Trung. You mentioned some of the things about cryptography for the kids out there. I mean, you can look at the pathway for career. You can do a lot of tech and, but you don't have to go deep. Sometimes you can go, you can go as deep as you want, but there's so much more there. Um, what technology do you see, how it's going to help students in your opinion? >>Well, I'm a professor in computer science, so I'd like to talk out a little bit about computer programming. Now we, uh, working in complex project. So most of the time we design a system from scratch. We view it from different components and the components that we have either we get it from or some time we get it from the internet in the open source environment, it's fun to get the source code and then work to our own application. So now when we are looking at a Logie, when we talk about encryption, for example, we can easily get the source code from the internet. And the question is, is safe to use those source code. And my, my, my question is maybe not. So I always encourage my students to learn how to write source score distribution, where that I learned a long time ago before I allow them to use the open source environment. And one of the things that they have to be careful, especially with encryption is be quote that might be hidden in the, in the source, get the download here, some of the source. >>So open source, it's a wonderful place to be, but it's also that we have to be aware of >>Great point before we get into some of the common one quick thing for each of you like to get your comments on, you know, the there's been a big movement on growth mindset, which has been a great, I'm a big believer in having a growth mindset and learning and all that good stuff. But now that when you talk about some of these things that we're mentioning about systems, there's, there's an, there's a new trend around a systems mindset, because if everything's now a system distributed systems, now you have space in cyber security, you have to understand the consequences of changes. And you mentioned some of that Trung in changes in the source code. Could you guys share your quick opinions on the, the idea of systems thinking, is that a mindset that people should be looking at? Because it used to be just one thing, Oh, you're a systems guy or galley. There you go. You're done. Now. It seems to be in social media and data. Everything seems to be systems. What's your take dr. Fleischer, we'll start with you. >>Uh, I'd say it's a, it's another way of looking at, um, not being just so deep in your discipline. You have to understand what the impact of the decisions that you're making have on a much broader, uh, system. And so I think it's important for all of our students to get some exposure to that systems level thinking and looking at the greater impact of the decision that they're making. Now, the issue is where do you set the systems boundary, right? And you can set the systems boundary very close in and concentrate on an aspect of a design, or you can continually move that system boundary out and see, where do you hit the intersections of engineering and science along with ethics and public policy and the greater society. And I think that's where some of the interesting work is going to be. And I think at least exposing students and letting them know that they're going to have to make some of these considerations as they move throughout their career is going to be vital as we move into the future. Bill. What's your thoughts? >>Um, I absolutely agree with Amy and I think there's a context here that reverse engineering, um, and forensics analysis and forensics engineering are becoming more critical than ever, uh, the ability to look at what you have designed in a system and then tear it apart and look at it for gaps and holes and problem sets, or when you're given some software that's already been pre developed, checking it to make sure it is, is really going to do what it says it's going to do. That forensics ability becomes more and more a skillset that also you need the verbal skills to explain what it is you're doing and what you found. So the communication side, the systems analysis, >>The forensics analysis side, >>These are all things that are part of that system >>Approach that I think you could spend hours on. And we still haven't really done great job on it. So it's a, it's. One of my fortes is the really the whole analysis side of forensics and it reverse engineering >>Try and real quick systems thinking. >>Well, I'd like to share with you my experience. When I worked in the space patient program at NASA, we had two different approaches. One is a down approach where we design it from the system general point of view, where we put components to complex system. But at the same time, we have the bottom up approach where we have Ken Chile who spent time and effort the individual component. And they have to be expert in those Chinese component. That might be general component the gallery. And in the space station program, we bring together the welcome up engineer, who designed everything in detail in the system manager who manage the system design from the top down. And we meet in the middle and took the idea with compromise a lot of differences. Then we can leave a display station that we are operating to be okay, >>Great insight. And that's the whole teamwork collaboration that, that was mentioning. Thanks so much for that insight. I wanted to get that out there because I know myself as a, as a parent, I'm always trying to think about what's best for my kids in their friends, as they grow up into the workforce. I know educators and leaders in industry would love to know some of the best practices around some of the structural changes. So thanks for that insight, but this topics about students and helping them prepare. Uh, so we heard, you know, be, be multiple discipline, broaden your horizons, think like systems top down, bottom up, work together as a team and follow the data. So I got to ask you guys, there's a huge amount of job openings in cybersecurity. It's well documented and certainly at the intersection of space and cyber, it's only gonna get bigger, right? You're going to see more and more demand for new types of jobs. How do we get high school and college students interested in security as a career at the flagship? We'll start with you in this one. >>I would say really one of the best ways to get students interested in the career is to show them the impact that it's going to have. There's definitely always going to be students who are going to want to do the technology for the technology sake, but that will limit you to a narrow set of students. And by showing that the greater impact that these types of careers are going to have on the types of problems that you're going to be able to solve and the impact you're going to be able to have on the world, around you, that's the word that we really need to get out. And a wide variety of students really respond to these messages. So I think it's really kind of reaching out at the, uh, the elementary, the middle school level, and really kind of getting this idea that you can make a big difference, a big positive difference in the field with some of these careers is going to be really critical. >>Real question, follow up. What do you think is the best entry point? You mentioned middle squad in here, elementary school. This comes, there's a lot of discussions around pipelining and we're going to get into women in tech and under-represented matters later, but you know, is it too early or what's the, what's your feeling on this? >>My feeling is the earlier we can normalize it the better the, uh, if you can normalize an interest in, in computers and technology and building an elementary school, that's absolutely critical. But the dropoff point that we're seeing is between what I would call like late elementary and early middle school. Um, and just kind of as an anecdote, I, for years ran an outreach program for girl Scouts in grades four and five and grade six, seven, and eight. And we had a hundred slots in each program. And every year the program would sell out for girls in grades four and five, and every year we'd have spots remaining in grades six, seven, and eight. And that's literally where the drop-off is occurring between that late elementary and that middle school range. So that's the area that we need to target to make sure we keep those young women involved and interested as we move forward. >>Bill, how are we going to get these kids interested in security? You mentioned a few programs you got. Yeah. I mean, who wants to, who wouldn't want to be a white hat hacker? I mean, yeah, that sounds exciting. Yeah. Great questions. Let's start with some basic principles though. Is let me ask you a question, John, a name for me, one white hat, good person hacker. The name who works in the space industry and is an exemplar for students to look up to, um, you, um, Oh man. I'm hearing really. I can't, I can't, I can't, I can't imagine because the answer we normally get is the cricket sound. So we don't have individuals we've identified in those areas for them to look up to. I was going to be snarky and say, most white hackers won't even use their real name, but, um, there's a, there's an aura around their anonymity here. >>So, so again, the real question is, is how do we get them engaged and keep them engaged? And that's what Amy was pointing out too. Exactly the engagement and sticking with it. So one of the things that we're trying to do through our competition on the state level and other elements is providing connections. We call them ambassadors. These are people in the business who can contact the students that are in the game or in that, uh, challenge environment and let them interact and let them talk about what they do and what they're doing in life would give them a challenging game format. Um, a lot of computer based training, um, capture the flag stuff is great, but if you can make it hands on, if you can make it a learn by doing experiment, if you can make it am personally involved and see the benefit as a result of doing that challenge and then talk to the people who do that on a daily basis, that's how you get them involved. >>The second part is as part of what we're doing is, is we're involving partnership companies in the development of the teams. So this year's competition that we're running has 82 teams from across the state of California, uh, of those 82 teams at six students team, middle school, high school, and many of those have company partners. And these are practitioners in cybersecurity who are working with those students to participate. It's it's that adult connectivity, it's that visualization. Um, so at the competition this year, um, we have the founder of Def con red flag is a participant to talk to the students. We have Vince surf as who is of course, very well known for something called the internet to participate. It's really getting the students to understand who's in this. Who can I look up to and how do I stay engaged with them? >>There's definitely a celebrity aspect of it. I will agree. I mean, the influencer aspect here with knowledge is key. Can you talk about, um, these ambassadors and, and, and how far along are you on that program? First of all, the challenge stuff is anything gamification wise. We've seen that with hackathons is just really works well. Grades, bonding, people who create together kinda get sticky and get very high community aspect to it. Talking about this ambassador thing. What does that industry is that academic >>Absolutely partners that we've identified? Um, some of which, and I won't hit all of them. So I'm sure I'll short changes, but, uh, Palo Alto, Cisco, um, Splunk, um, many of the companies in California and what we've done is identified, uh, schools, uh, to participate in the challenge that may not have a strong STEM program or have any cyber program. And the idea of the company is they look for their employees who are in those school districts to partner with the schools to help provide outreach. It could be as simple as a couple hours a week, or it's a team support captain or it's providing computers and other devices to use. Uh, and so again, it's really about a constant connectivity and, uh, trying to help where some schools may not have the staff or support units in an area to really provide them what they need for connectivity. What that does gives us an opportunity to not just focus on it once a year, but throughout the year. So for the competition, all the teams that are participating have been receiving, um, training and educational opportunities in the game of education side, since they signed up to participate. So there's a website, there's learning materials, there's materials provided by certain vendor companies like Wireshark and others. So it's a continuum of opportunity for the, >>You know, I've seen just the re randomly, just going to random thought, you know, robotics clubs are moving den closer into that middle school area, in fact Fleischer. And certainly in high schools, it's almost like a varsity sport. E-sports is another one. My son just combined made the JV at the college Dean, you know, it's big and it's up and serious. Right. And, um, it's fun. This is the aspect of fun. It's hands on. This is part of the culture down there you learn by doing, is there like a group? Is it like, um, is it like a club? I mean, how do you guys organize these bottoms up organically interest topics? >>So, so here in the college of engineering, uh, when we talk about learning by doing, we have learned by doing both in the classroom and out of the classroom. And if we look at the, these types of, out of the classroom activities, we have over 80 clubs working on all different aspects of many of these are bottom up. The students have decided what they want to work on and have organized themselves around that. And then they get the leadership opportunities. The more experienced students train in the less experienced students. And it continues to build from year after year after year with them even doing aspects of strategic planning from year to year for some of these competitions. So, yeah, it's an absolutely great experience. And we don't define for them how their learned by doing experiences should be, we want them to define it. And I think the really cool thing about that is they have the ownership and they have the interest and they can come up with new clubs year after year to see which direction they want to take it. And, you know, we will help support those clubs as old clubs fade out and new clubs come in >>Trunk real quick. Before we go on the next, uh, talk track, what, what do you recommend for, um, middle school, high school or even elementary? Um, a little bit of coding Minecraft. I mean, what, how do you get them hooked on the fun and the dopamine of, uh, technology and cybersecurity? What's your, what's your take on that? >>On, on this aspect, I like to share with you my experience as a junior high and high school student in Texas, the university of Texas in Austin organized a competition for every high school in Texas. If we phew from poetry to mathematics, to science, computer engineering, but it's not about with university of Texas. The university of Texas is on the serving SSN for the final competition that we divide the competition to be strict and then regional, and then spit at each level, we have local university and colleges volunteering to host it competition and make it fun. >>Also students with private enterprises to raise funding for scholarship. So students who see the competition they get exposed to so they can see different option. They also get a scholarship when they attend university in college. So I've seen the combination in competition aspect would be a good thing to be >>Got the engagement, the aspiration scholarship, you know, and you mentioned a volunteer. I think one of the things I'll observe is you guys are kind of hitting this as community. I mean, the story of Steve jobs and was, was building the Mac, they call it bill Hewlett up in Palo Alto. It was in the phone book and they scoured some parts from them. That's community. This is kind of what you're getting at. So this is kind of the formula we're seeing. So the next question I really want to get into is the women in technology, STEM, underrepresented minorities, how do we get them on cybersecurity career path? Is there a best practices there, bill, we'll start with you? >>Well, I think it's really interesting. First thing I want to add is if I could have just a clarification, what's really cool that the competition that we have and we're running, it's run by student from Cal poly. Uh, so, you know, Amy referenced the clubs and other activities. So many of the, uh, organizers and developers of the competition that we're running are the students, but not just from engineering. So we actually have theater and liberal arts majors and technology for liberal arts majors who are part of the competition. And we use their areas of expertise, set design, and other things, uh, visualization of virtualization. Those are all part of how we then teach and educate cyber in our game effication and other areas. So they're all involved in their learning as well. So we have our students teaching other students. So we're really excited about that. And I think that's part of what leads to a mentoring aspect of what we're providing, where our students are mentoring the other students. And I think it's also something that's really important in the game. Um, the first year we held the game, we had several all girl teams and it was really interesting because a, they, they didn't really know if they could compete. I mean, this is their, their reference point. We don't know if they did better than anybody. I mean, they, they knocked the ball out >>Of the park. The second part then is building that confidence level that they can going back and telling their cohorts that, Hey, it's not this thing you can't do. It's something real that you can compete and win. And so again, it's building that comradery, that spirit, that knowledge that they can succeed. And I think that goes a long way and an Amy's programs and the reach out and the reach out that Cal poly does to schools to develop. Uh, I think that's what it really is going to take. It. It is going to take that village approach to really increase diversity and inclusivity for the community. >>That's the flusher. I'd love to get your thoughts. You mentioned, um, your, your outreach program and the dropoff, some of those data, uh, you're deeply involved in this. You're passionate about it. What's your thoughts on this career path opportunity for STEM? >>Yeah, I think STEM is an incredible career path opportunity for so many people. There's so many interesting problems that we can solve, particularly in cyber and in space systems. And I think we have to meet the kids where they are and kind of show them, you know, what the exciting part is about it, right. But, you know, bill was, was alluding to this. And when he was talking about, you know, trying to name somebody that you can can point to. And I think having those visible people where you can see yourself in that is, is absolutely critical and those mentors and that mentorship program. So we use a lot of our students going out into California, middle schools and elementary schools. And you want to see somebody that's like you, somebody that came from your background and was able to do this. So a lot of times we have students from our national society of black engineers or a society of Hispanic professional engineers or our society of women engineers. >>We have over a thousand members, a thousand student members in our society of women engineers who were doing these outreach programs. But like I also said, it's hitting them at the lower levels too. And girl Scouts is actually distinguishing themselves as one of the leading STEM advocates in the country. And like I said, they developed all these cybersecurity badges, starting in kindergarten. There's a cybersecurity badge for kindergarten and first graders. And it goes all the way up through late high school, the same thing with space systems. And they did the space systems in partnership with NASA. They did the cybersecurity and partnership with Palo Alto networks. And what you do is you want to build these, these skills that the girls are developing. And like bill said, work in and girl led teams where they can do it. And if they're doing it from kindergarten on, it just becomes normal. And they never think, well, this is not for me. And they see the older girls who are doing it and they see a very clear path leading them into these careers. >>Yeah. It's interesting. You used the word normalization earlier. That's exactly what it is. It's life, you get life skills and a new kind of badge. Why wouldn't learn how to be a white, white hat hacker, or have fun or learn new skills just in, in the, in the grind of your fun day. Super exciting. Okay. Trung your thoughts on this. I mean, you have a diverse diversity. It brings perspective to the table in cybersecurity because you have to think like the other, the adversary, you got to be the white headed hippie, a white hat, unless you know how black hat thinks. So there's a lot of needs here for more, more, more points of view. How are we going to get people trained on this from under represented minorities and women? What's your thoughts? >>Well, as a member of, I took a professional society of directed pool in the electronic engineer. You have the, uh, we participate in the engineering week. We'll be ploy our members to local junior high school and high school to talk about our project, to promote the discovery of engineering. But at the same time, we also participate in the science fair that we scaled up flex. As the squad organizing our engineer will be mentoring students, number one, to help them with the part check, but number two, to help us identify talents so that we can recruit them further into the field of STEM. One of the participation that week was the competition of the, what they call future CV. We're still going, we'll be doing a CT on a computer simulation. And in recent year we promote ops smart CV where CT will be connected the individual houses to be added in through the internet. >>And we want to bring awareness of cybersecurity into competition. So we deploy engineer to supervise the people, the students who participate in the competition, we bring awareness, not in the technical be challenged level, but in what we've called the compound level. So speargun will be able to know what is, why to provide cyber security for the smart city that they are building. And at the same time, we were able to identify talent, especially talent in the minority and in the room. And so that we can recruit them more actively. And we also raise money for scholarship. We believe that scholarship is the best way to get students to continue education in Epic college level. So with scholarship, it's very easy to recruit them, to give you and then push them to go further into the cyber security Eylea. >>Yeah. I mean, you know, I see a lot of the parents like, Oh, my kid's going to go join the soccer team, >>Private lessons, and maybe look at a scholarship >>Someday. Well, they only do have scholarships anyway. I mean, this is if they spent that time doing other things, it's just, again, this is a new lifestyle, like the girl Scouts. And this is where I want to get into this whole silo breaking down because Amy, you brought this up and bill, you were talking about as well, you've got multiple stakeholders here with this event. You got, you know, public, you got private and you've got educators. It's the intersection of all of them. It's again, that those, if those silos break down the confluence of those three stakeholders have to work together. So let's, let's talk about that. Educators. You guys are educating young minds, you're interfacing with private institutions and now the public. What about educators? What can they do to make cyber better? Cause there's no real manual. I mean, it's not like this court is a body of work of how to educate cybersecurity is maybe it's more recent, it's cutting edge, best practices, but still it's an, it's an evolving playbook. What's your thoughts for educators, bill? We'll start with you. >>Well, I don't really, I'm going to turn it off. >>I would say, I would say as, as educators, it's really important for us to stay on top of how the field is evolving, right? So what we want to do is we want to promote these tight connections between educators and our faculty and, um, applied research in industry and with industry partnerships. And I think that's how we're going to make sure that we're educating students in the best way. And you're talking about that inner, that confluence of the three different areas. And I think you have to keep those communication lines open to make sure that the information on where the field is going and what we need to concentrate on is flowing down into our educational process. And that, that works in both ways that, you know, we can talk as educators and we can be telling industry what we're working on and what are types of skills our students have and working with them to get the opportunities for our students to work in industry and develop those skills along the way as well. >>And I think it's just all part of this is really looking at, at what's going to be happening and how do we get people talking to each other and the same thing with looking at public policy and bringing that into our education and into these real hands on experiences. And that's how you really cement this type of knowledge with students, not by not by talking to them and not by showing them, but letting them do it. It's this learn by doing and building the resiliency that it takes when you learn by doing. And sometimes you learn by failing, but you just up and you keep going. >>And these are important skills that you develop along the way >>You mentioned, um, um, sharing too. That's the key collaborating and sharing knowledge. It's an open, open world and everyone's collaborating feel private public partnerships. I mean, there's a real private companies. You mentioned Palo Alto networks and others. There's a real intersection there there's, they're motivated. They could, the scholarship opportunities, trunk points to that. What is the public private educator view there? How do companies get involved? What's the benefit for them? >>Well, that's what a lot of the universities are doing is to bring in as part of either their cyber centers or institutes, people who are really focused on developing and furthering those public private partnerships. That's really what my role is in all these things is to take us to a different level in those areas, uh, not to take away from the academic side, but to add additional opportunities for both sides. Remember in a public private partnership, all entities have to have some gain in the process. Now, what I think is really interesting is the timing on particularly this subject space and cyber security. This has been an absolute banner year for space. The Stanhope of space force, the launch of commercial partnership, leaving commercial platforms, delivering astronauts to the space station, recovering them and bringing back the ability of a commercial satellite platform to be launched a commercial platforms that not only launch, but return back to where they're launched from. >>These are things that are stirring the hearts of the American citizens, the kids, again, they're getting interested, they're seeing this and getting enthused. So we have to seize upon that and we have to find a way to connect that public private partnerships is the answer for that. It's not one segment that can handle it all. It's all of them combined together. If you look at space, space is going to be about commercial. It's going to be about civil moving from one side of the earth, to the other via space. And it's about government. And what's really cool for us. All those things are in our backyard. Yeah. That's where that public private comes together. The government's involved, the private sector is involved. The educators are involved and we're all looking at the same things and trying to figure out like this forum, what works best to go to the future. >>You know, if people are bored and they want to look for an exciting challenge, he couldn't have laid it out any clearer. It's the most exciting discipline. It hits everything. I mean, we just talk about space. GPS is everything we do is well tested. Do with satellites. >>I have to tell you a story on that, right? We have a very unique GPS story right in our backyard. So our sheriff is the son of the father of GPS for the air force. So you can't get better than that when it comes to being connected to all those platforms. So we, we really want to say, you know, this is so exciting for all of us because >>It gives everybody a job for a long time. >>You know, the kids that don't think tick toxic, exciting, wait til they see what's going on here with you guys, this program, trunk final word on this from the public side, you're at the air force. You're doing research. Are you guys opening it up? Are you integrating into the private and educational sectors? How do you see that formula playing out? And what's the best practice for students and preparing them? >>I think it's the same in athlete university CP in the engineering program will require our students to be final project before graduation. And in this kind of project, we send them out to work in the private industry. The private company got sponsor. Then they get the benefit of having an intern working for them and they get the benefit of reviewing the students as the prospective employee in the future. So it's good for the student to gain practical experience working in this program. Some, some kind of, we call that a core program, some kind, we call that a capstone program and the company will accept the students on a trial PRCS, giving them some assignment and then pay them a little bit of money. So it's good for the student to earn some extra money, to have some experience that they can put on their resume when they apply for the final of the job. >>So the collaboration between university and private sector is really important. We, when I joined a faculty, normally they already exist that connection. It came from. Normally it came from the Dean of engineering who would whine and dine with companies. We work relationship and sign up women, but it's approach to do a good performance so that we can be credibility to continue the relationship with those company and the students that we selected to send to those company. We have to make sure that they will represent the university. Well, they will go a good job and they will make a good impression. >>Thank you very much for great insight, trunk, bill, Amy, amazing topic. I'd like to end this session with each of you to make a statement on the importance of cybersecurity to space. We'll go Trung bill and Amy Truong, the importance of cybersecurity space statement. >>We know that it's affecting components that we are using and we are connecting to. And normally we use them for personal purpose. But when we connect to the important system that the government public company put into space, so it's really important to practice cyber security and a lot of time, it's very easy to know concept. We have to be careful, but in reality, we tend to forget to partnership the way we forget how to ride safely. And with driving a car, we have a program called defensive driving that requires every two or three years to get. We can get discount. >>We are providing the cyber security practice, not to tell people about the technology, but to remind them not practicing cybersecurity. And it's a requirement for every one of us, bill, the importance of cyber security to space. It's not just about young people. It's about all of us as we grow and we change as I referenced it, you know, we're changing from an analog world to a digital world. Those of us who have been in the business and have hair that looks like mine. We need to be just as cognizant about cybersecurity practice as the young people, we need to understand how it affects our lives and particularly in space, because we're going to be talking about people, moving people to space, moving payloads, data, transfer all of those things. And so there's a whole workforce that needs to be retrained or upskilled in cyber that's out there. So the opportunity is ever expensive for all of us, Amy, the importance of cybersecurity space, >>Uh, and the, the emphasis of cybersecurity is space. Just simply, can't be over emphasized. There are so many aspects that are going to have to be considered as systems get ever more complex. And as we pointed out, we're putting people's lives at stake here. This is incredibly, incredibly complicated and incredibly impactful, and actually really exciting the opportunities that are here for students and the workforce of the future to really make an enormous impact on the world around us. And I hope we're able to get that message out to students, to children >>Today. But these are my really interesting fields that you need to consider. >>Thank you very much. I'm John foray with the cube and the importance of cybersecurity and space is the future of the world's all going to happen in and around space with technology, people and society. Thank you to Cal poly. And thank you for watching the Cypress of computer security and space symposium 2020.
SUMMARY :
Bill Britain, Lieutenant Colonel from the us air force, In that role that we have with the cyber security Institute, we partner with elements of the state And either come to Cal poly or some other institution that's going to let them Cal poly, that Dex hub and the efforts you guys are having with your challenge. And I think Amy is going to tell You guys have a great organization down there, amazing curriculum, grazing people, And this means that we have a combination of practical experience and learn by doing both in the country and the top ranked state school. So we have partnerships with Northrop Grumman And we remain the worldwide leader in maintaining the cube So in terms of bringing people into the field, that are most important for the intersection of space and technology trunk. the internet, we know that is a good source of information, So in the reality, we need to be more practicing the, able to control the space system that we put up there. and on the ground control station, we have the human controller And we also have student in education who can focus the expert. It's not just get the degree, see out in the field And the digital environment is a very quick and adaptive environment. Uh, one of the ways that we addressed that in the past was to look patients chip software, that the Fleischer talk about your perspective, because you mentioned some of the things that computer science. expertise so that they can go deep into these fields, but we want them to be able to communicate with each and to make the impact that we want to have in the world. And bill also mentioned the cloud. And the question is, is safe to use Great point before we get into some of the common one quick thing for each of you like to get your comments on, you know, Now, the issue is where do you set the systems boundary, right? So the communication side, the systems analysis, One of my fortes is the really the whole analysis side of forensics But at the same time, we have the bottom up approach So I got to ask you guys, And by showing that the greater impact in tech and under-represented matters later, but you know, is it too early or what's the, what's your feeling on this? So that's the area that we need to target to make sure we keep those young women I can't, I can't, I can't, I can't imagine because the answer that challenge and then talk to the people who do that on a daily basis, that's how you get It's really getting the students to understand who's in this. I mean, the influencer aspect here with knowledge is key. And the idea of the company is they You know, I've seen just the re randomly, just going to random thought, you know, robotics clubs are moving den closer So, so here in the college of engineering, uh, when we talk about learning by doing, Before we go on the next, uh, talk track, what, what do you recommend for, On, on this aspect, I like to share with you my experience as So I've seen the combination Got the engagement, the aspiration scholarship, you know, and you mentioned a volunteer. And we use their areas of expertise, set design, and other things, uh, It's something real that you can compete and win. That's the flusher. And I think we have to meet the kids where they are and kind of show them, And it goes all the way up through late high school, the same thing with space systems. I mean, you have a diverse diversity. But at the same time, we also participate in the science And at the same time, we were able to identify talent, especially talent It's the intersection of all of them. And I think you have to keep those communication lines open to make sure that the information And sometimes you learn by failing, but you just up and What is the public private educator view there? The Stanhope of space force, the launch of commercial partnership, So we have to seize upon that and we have to find a way to connect that public private partnerships It's the most exciting discipline. I have to tell you a story on that, right? You know, the kids that don't think tick toxic, exciting, wait til they see what's going on here with you guys, So it's good for the student to earn a good performance so that we can be credibility to continue the on the importance of cybersecurity to space. the way we forget how to ride safely. we grow and we change as I referenced it, you know, we're changing from an analog world to a digital And as we pointed out, we're putting people's lives at stake here. But these are my really interesting fields that you need to consider. is the future of the world's all going to happen in and around space with technology, people and society.
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
Amy | PERSON | 0.99+ |
Boeing | ORGANIZATION | 0.99+ |
NASA | ORGANIZATION | 0.99+ |
Northrop Grumman | ORGANIZATION | 0.99+ |
Lockheed | ORGANIZATION | 0.99+ |
Cisco | ORGANIZATION | 0.99+ |
Texas | LOCATION | 0.99+ |
California | LOCATION | 0.99+ |
Virgin | ORGANIZATION | 0.99+ |
Cal poly | ORGANIZATION | 0.99+ |
Amy Truong | PERSON | 0.99+ |
Palo Alto | LOCATION | 0.99+ |
first | QUANTITY | 0.99+ |
82 teams | QUANTITY | 0.99+ |
U S air force Academy | ORGANIZATION | 0.99+ |
Ken Chile | PERSON | 0.99+ |
Bill Britain | PERSON | 0.99+ |
six students | QUANTITY | 0.99+ |
California cyber security Institute | ORGANIZATION | 0.99+ |
John | PERSON | 0.99+ |
X | ORGANIZATION | 0.99+ |
hundreds | QUANTITY | 0.99+ |
Minecraft | TITLE | 0.99+ |
one hour | QUANTITY | 0.99+ |
Steve | PERSON | 0.99+ |
tomorrow | DATE | 0.99+ |
40 miles | QUANTITY | 0.99+ |
One | QUANTITY | 0.99+ |
Colorado Springs | LOCATION | 0.99+ |
today | DATE | 0.99+ |
second part | QUANTITY | 0.99+ |
Splunk | ORGANIZATION | 0.99+ |
more than 6,000 engineering students | QUANTITY | 0.99+ |
14 degree programs | QUANTITY | 0.99+ |
each program | QUANTITY | 0.99+ |
Fleischer | PERSON | 0.99+ |
both sides | QUANTITY | 0.99+ |
dozens | QUANTITY | 0.99+ |
Merck | ORGANIZATION | 0.99+ |
both | QUANTITY | 0.99+ |
Austin | LOCATION | 0.99+ |
one | QUANTITY | 0.98+ |
Vince surf | PERSON | 0.98+ |
each | QUANTITY | 0.98+ |
Bill | PERSON | 0.98+ |
over 80 clubs | QUANTITY | 0.98+ |
each level | QUANTITY | 0.98+ |
August | DATE | 0.98+ |
earth | LOCATION | 0.98+ |
three years | QUANTITY | 0.98+ |
John foray | PERSON | 0.98+ |
Polytechnic air force Academy | ORGANIZATION | 0.97+ |
dr. | PERSON | 0.97+ |
Amy flasher | PERSON | 0.97+ |
Today | DATE | 0.97+ |
one aspect | QUANTITY | 0.96+ |
Pham and Britton and Fleischer V1
>> Announcer: From around the globe, it's theCUBE, covering Space and Cybersecurity Symposium 2020, hosted by Cal Poly. >> Everyone, welcome to this special presentation with Cal Poly hosting the Space and Cybersecurity Symposium 2020 virtual. I'm John Furrier, your host with theCUBE and SiliconANGLE here in our Palo Alto studios with our remote guests. We couldn't be there in person, but we're going to be here remote. We got a great session and a panel for one hour, topic preparing students for the jobs of today and tomorrow. Got a great lineup. Bill Britton, Lieutenant Colonel from the US Air Force, retired vice president for information technology and CIO and the director of the California Cybersecurity Institute for Cal Poly. Bill, thanks for joining us. Dr. Amy Fleischer, who's the dean of the College of Engineering at Cal Poly, and Trung Pham, professor and researcher at the US Air Force Academy. Folks, thanks for joining me today. >> Our pleasure. >> Got a great- >> Great to be here. >> Great panel. This is one of my favorite topics. >> Thank you for the opportunity. >> Preparing students for the next generation, the jobs for today and tomorrow. We got an hour. I'd love you guys to start with an opening statement to kick things off. Bill, we'll start with you. >> Well, I'm really pleased to be, to start on this as the director for the Cybersecurity Institute and the CIO at Cal Poly, it's really a fun, exciting job, because as a polytechnic, technology has such a forefront in what we're doing, and we've had a wonderful opportunity being 40 miles from Vandenberg Air Force Base to really look at the nexus of space and cybersecurity. And if you add into that both commercial, government, and civil space and cybersecurity, this is an expanding wide open time for cyber and space. In that role that we have with the Cybersecurity Institute, we partner with elements of the state and the university, and we try to really add value above our academic level, which is some of the highest in the nation, and to really merge down and go a little lower and start younger. So we actually are running the week prior to this showing a cybersecurity competition for high schools and middle schools in the state of California. That competition this year is based on a scenario around hacking of a commercial satellite and the forensics of the payload that was hacked and the networks associated with it. This is going to be done using products like Wireshark, Autopsy, and other tools that will give those high school students what we hope is a huge desire to follow up and go into cyber and cyberspace and space and follow that career path and either come to Cal Poly or some other institution that's going to let them really expand their horizons in cybersecurity and space for the future of our nation. >> Bill, thanks for that intro. By the way, I just want to give you props for an amazing team and job you guys are doing at Cal Poly, the DxHub and the efforts you guys are having with your challenge. Congratulations on that great work. >> Thank you. It's a rock star team. It's absolutely amazing to find that much talent at one location. And I think Amy's going to tell you, she's got the same amount of talent in her staff, so it's a great place to be. >> Dr. Amy Fleischer. You guys have a great organization down there, amazing curriculum, amazing people, great community. Your opening statement. >> Hello everybody. It's really great to be a part of this panel on behalf of the Cal Poly College of Engineering. Here at Cal Poly, we really take preparing students for the jobs of today and tomorrow completely seriously, and we can claim that our students really graduate so they're ready day one for their first real job. But that means that in getting them to that point, we have to help them get valuable and meaningful job experience before they graduate, both through our curriculum and through multiple internship or summer research opportunities. So we focus our curriculum on what we call a learn by doing philosophy. And this means that we have a combination of practical experience and learn by doing both in and out of the classroom. And we find that to be really critical for preparing students for the workforce. Here at Cal Poly, we have more than 6,000 engineering students. We're one of the largest undergraduate engineering schools in the country. And US News ranks us the eighth best undergraduate engineering program in the country and the top ranked state school. We're really, really proud that we offer this impactful hands-on engineering education that really exceeds that of virtually all private universities while reaching a wider audience of students. We offer 14 degree programs, and really, we're talking today about cyber and space, and I think most of those degree programs can really make an impact in the space and cybersecurity economy. And this includes not only things like aero and cyber directly, but also electrical engineering, mechanical engineering, computer engineering, materials engineering, even manufacturing, civil, and biomedical engineering, as there's a lot of infrastructure needs that go into supporting launch capabilities. Our aerospace program graduates hundreds of aerospace engineers and most of them are working right here in California with many of our corporate partners, including Northrop Grumman, Lockheed, Boeing, Raytheon, SpaceX, Virgin Galactic, JPL, and so many other places where we have Cal Poly engineers impacting the space economy. Our cybersecurity focus is found mainly in our computer science and software engineering programs, and it's really a rapidly growing interest among our students. Computer science is our most popular major, and industry interests and partnerships are integrated into our cyber curriculum, and we do that oftentimes through support from industry. So we have partnerships with Northrop Grumman for professorship in a cyber lab and from PG&E for critical infrastructure cybersecurity lab and professorship. And we think that industry partnerships like these are really critical to preparing students for the future as the field is evolving so quickly and making sure we adapt our facilities and our curriculum to stay in line with what we're seeing in industry is incredibly important. In our aerospace program, we have an educational partnership with the Air Force Research Labs that's allowing us to install new high-performance computing capabilities and a space environments lab that's going to enhance our satellite design capabilities. And if we talk about satellite design, Cal Poly is the founding home of the CubeSat program, which pioneered small satellite capabilities, And we remain the worldwide leader in maintaining the CubeSat standard, and our student program has launched more CubeSats than any other program. So here again we have this learn by doing experience every year for dozens of aerospace, electrical, computer science, mechanical engineering students, and other student activities that we think are just as important include ethical hacking through our white hat club, Cal Poly Space Systems, which does really, really big rocket launches, and our support program for women in both of these fields, like WISH, which is Women In Software and Hardware. Now, you know, really trying to bring in a wide variety of people into these fields is incredibly important, and outreach and support to those demographics traditionally underrepresented in these fields is going to be really critical to future success. So by drawing on the lived experiences by people with different types of backgrounds will we develop the type of culture and environment where all of us can get to the best solution. So in terms of bringing people into the field, we see that research shows we need to reach kids when they're in late elementary and middle schools to really overcome that cultural bias that works against diversity in our fields. And you heard Bill talking about the California Cybersecurity Institute's yearly cyber challenge, and there's a lot of other people who are working to bring in a wider variety of people into the field, like Girl Scouts, which has introduced dozens of new badges over the past few years, including a whole cybersecurity series of badges in concert with Palo Alto Networks. So we have our work cut out for us, but we know what we need to do, and if we're really committed to properly preparing the workforce for today and tomorrow, I think our future is going to be bright. I'm looking forward to our discussion today. >> Thank you, Dr. Fleischer, for a great comment, opening statement, and congratulations. You got the right formula down there, the right mindset, and you got a lot of talent, and community, as well. Thank you for that opening statement. Next up, from Colorado Springs, Trung Pham, who's a professor and researcher at the US Air Force Academy. He's doing a lot of research around the areas that are most important for the intersection of space and technology. Trung. >> Good afternoon. First I'd like to thank Cal Poly for the opportunity. And today I want to go briefly about cybersecurity in space application. Whenever we talk about cybersecurity, the impression is that it's a new field that is really highly complex involving a lot of technical area. But in reality, in my personal opinion, it is indeed a complex field because it involves many disciplines. The first thing we think about is computer engineering and computer networking, but it's also involving communication, sociology, law practice. And this practice of cybersecurity doesn't only involve computer expert, but it's also involve everybody else who has a computing device that is connected to the internet, and this participation is obviously everybody in today's environment. When we think about the internet, we know that it's a good source of information but come with the convenience of information that we can access, we are constantly facing danger from the internet. Some of them we might be aware of. Some of them we might not be aware of. For example, when we search on the internet, a lot of time our browser will be saying that this site is not trusted, so we will be more careful. But what about the sites that we trusted? We know that those are legitimate sites, but they're not 100% bulletproof. What happen if those site are attacked by a hacker and then they will be a silent source of danger that we might not be aware of. So in the reality, we need to be more practicing the cybersecurity from our civil point of view and not from a technical point of view. When we talk about space application, we should know that all the hardware are computer-based or controlled by by computer system, and therefore the hardware and the software must go through some certification process so that they can be rated as airworthy or flightworthy. When we know that in the certification process is focusing on the functionality of the hardware and software, but one aspect that is explicitly and implicitly required is the security of those components. And we know that those components have to be connected with the ground control station, and the communication is through the air, through the radio signal, so anybody who has access to those communication radio signal will be able to control the space system that we put up there. And we certainly do not want our system to be hijacked by a third party. Another aspect of cybersecurity is that we try to design the space system in a very strong manner so it's almost impossible to hack in. But what about some other weak system that might be connected to the strong system? For example, the space system will be connected to the ground control station, and on the ground control station, we have the human controller, and those people have cell phone. They are allowed to use cell phone for communication. But at the same time, they are connected to the internet through the cell phone, and their cell phone might be connected to the computer that control the flight software and hardware. So what I want to say is we try to build strong system and we've protected them, but there will be some weaker system that we could not intended but exists to be connected to our strong system, and those are the points the hacker will be trying to attack. If we know how to control the access to those weak points, we will be having a much better system for the space system. And when we see the cybersecurity that is requiring the participation everywhere it's important to notice that there is a source of opportunity for students who enter the workforce to consider. Obviously students in engineering can focus their knowledge and expertise to provide technological solution to protect the system that we view. But we also have students in business who can focus their expertise to write business plan so that they can provide a pathway for the engineering advances to reach the market. We also have student in law who can focus their expertise in policy governing the internet, governing the cybersecurity practice. And we also have student in education who can focus their expertise to design how to teach cybersecurity practice, and student in every other discipline can focus their effort to implement security measure to protect the system that they are using in their field. So it's obvious that cybersecurity is everywhere and it implies job opportunity everywhere for everybody in every discipline of study. Thank you. >> Thank you, Trung, for those great comments. Great technology opportunities. But interesting, as well, is the theme that we're seeing across the entire symposium and in the virtual hallways that we're hearing conversations, and you pointed out some of them. Dr. Fleischer did, as well. And Bill, you mentioned it. It's not one thing. It's not just technology. It's different skills. And Amy, you mentioned that computer science is the hottest degree, but you have the hottest aerospace program in the world. I mean, so all this is kind of balancing. It's interdisciplinary. It's a structural change. Before we get into some of the, how they prepare the students, can you guys talk about some of the structural changes that are modern now in preparing in these opportunities, because societal impact is a, law potentially impact, it's how we educate. There's now cross-discipline skill sets. It's not just get the degree, see you out in the field. Bill, you want to start? >> Well, what's really fun about this job is that in the Air Force, I worked in the space and missile business, and what we saw was a heavy reliance on checklist format, security procedures, analog systems, and what we're seeing now in our world, both in the government and the commercial side, is a move to a digital environment, and the digital environment is a very quick and adaptive environment, and it's going to require a digital understanding. Matter of fact, the undersecretary of Air Force for acquisition recently referenced the need to understand the digital environment and how that's affecting acquisition. So as both Amy and Trung said, even business students are now in the cybersecurity business. And so again, what we're seeing is the change. Now, another phenomenon that we're seeing in the space world is there's just so much data. One of the ways that we addressed that in the past was to look at high-performance computing. There was a lot stricter control over how that worked. But now what we're seeing is adaptation of cloud, cloud technologies in space support, space data, command and control. And so what we see is a modern space engineer who has to understand digital, has to understand cloud, and has to understand the context of all those with a cyber environment. That's really changing the forefront of what is a space engineer, what is a digital engineer, and what is a future engineer, both commercial or government. So I think the opportunity for all of these things is really good, particularly for a polytechnic, Air Force Academy, and others that are focusing on a more widened experiential level of cloud and engineering and other capabilities. And I'll tell you the part that as the CIO I have to remind everybody, all this stuff works with the IT stuff. So you've got to understand how your IT infrastructures are tied and working together. As we noted earlier, one of the things is that these are all relays from point to point, and that architecture is part of your cybersecurity architecture. So again, every component has now become a cyber aware, cyber knowledgeable, and what we like to call as a cyber cognizant citizen where they have to understand the context. (speaking on mute) >> (indistinct) software Dr. Fleischer, talk about your perspective, 'cause you mentioned some of the things about computer science. I remember in the '80s when I got my computer science degree, they called us software engineers and then you became software developers. And then, so again, engineering is the theme. If you're engineering a system, there's now software involved, and there's also business engineering, business models. So talk about some of your comments, 'cause you mentioned computer science is hot. You got the aerospace. You got these multi-disciplines. You got definitely diversity, as well, brings more perspectives in, as well. Your thoughts on these structural interdisciplinary things? >> I think this is really key to making sure that students are prepared to work in the workforce is looking at the blurring between fields. No longer are you just a computer scientist. No longer are you just an aerospace engineer. You really have to have an expertise where you can work with people across disciplines. All of these fields are just working with each other in ways we haven't seen before. And Bill brought up data. You know, data science is something that's cross-cutting across all of our fields. So we want engineers that have the disciplinary expertise that they can go deep into these fields, but we want them to be able to communicate with each other and to be able to communicate across disciplines and to be able to work in teams that are across disciplines. You can no longer just work with other computer scientists or just work with other aerospace engineers. There's no part of engineering that is siloed anymore. So that's how we're changing. You have to be able to work across those disciplines. And as you, as Trung pointed out, ethics has to come into this. So you can no longer try to fully separate what we would traditionally have called the liberal arts and say, well, that's over there in general education. No, ethics is an important part of what we're doing and how we integrate that into our curriculum. So is communication. So is working on public policy and seeing where all these different aspects tie together to make the impact that we want to have in the world. So you no longer can work solo in these fields. >> That's great point. And Bill also mentioned the cloud. One thing about the cloud that's showed us is horizontal scalability has created a lot of value, and certainly data is now horizontal. Trung, you mentioned some of the things about cryptography for the kids out there, I mean, you can look at the pathway for career. You can do a lot of tech, but you don't have to go deep sometimes. You can as deep as you want, but there's so much more there. What technology do you see that's going to help students, in your opinion? >> Well, I'm a professor in computer science, so I like to talk a little bit about computer programming. Now we are working in complex projects. So most of the time we don't design a system from scratch. We build it from different components, and the components that we have, either we get it from vendors or sometimes we get it from the internet in the open source environment. It's fun to get the source code and then make it work to our own application. So now when we are looking at cryptology, when we talk about encryption, for example, we can easily get the source code from the internet. And the question, is it safe to use those source code? And my question is maybe not. So I always encourage my students to learn how to write source code the traditional way that I learned a long time ago before I allow them to use the open source environment. And one of the things that they have to be careful especially with encryption is the code that might be hidden in the source that they downloaded. Some of the source might be harmful. It might open up back gate for a hacker to get in later. We've heard about these back gates back then when Microsoft designed the operating system with the protection of encryption, and it is true that is existing. So while open source code is a wonderful place to develop complex system, but it's also a dangerous place that we have to be aware of. >> Great point. Before we get into the comments, one quick thing for each of you I'd like to get your comments on. There's been a big movement on growth mindset, which has been a great big believer in having a growth mindset and learning and all that good stuff. But now when you talk about some of these things we're mentioning about systems, there's a new trend around a systems mindset, because if everything's now a system, distributed systems now you have space and cybersecurity, you have to understand the consequences of changes. And you mention some of that, Trung, in changes in the source code. Could you guys share your quick opinions on the of systems thinking? Is that a mindset that people should be looking at? Because it used to be just one thing. Oh, you're a systems guy or gal. There you go. You're done. Now it seems to be in social media and data, everything seems to be systems. What's your take? Dr. Fleischer, we'll start with you. >> I'd say it's another way of looking at not being just so deep in your discipline. You have to understand what the impact of the decisions that you're making have on a much broader system. And so I think it's important for all of our students to get some exposure to that systems level thinking and looking at the greater impact of the decision that they're making. Now, the issue is where do you set the systems boundary, right? And you can set the systems boundary very close in and concentrate on an aspect of a design, or you can continually move that system boundary out and see where do you hit the intersections of engineering and science along with ethics and public policy and the greater society. And I think that's where some of the interesting work is going to be. And I think at least exposing students and letting them know that they're going to have to make some of these considerations as they move throughout their career is going to be vital as we move into the future. >> Bill, what's your thoughts? >> I absolutely agree with Amy. And I think there's a context here that reverse engineering and forensics analysis and forensics engineering are becoming more critical than ever. The ability to look at what you have designed in a system and then tear it apart and look at it for gaps and holes and problem sets. Or when you're given some software that's already been pre-developed, checking it to make sure it is really going to do what it says it's going to do. That forensics ability becomes more and more a skillset that also you need the verbal skills to explain what it is you're doing and what you found. So the communication side, the systems analysis side, the forensics analysis side, these are all things that are part of system approach that I think you could spend hours on and we still haven't really done a great job on it. So it's one of my fortes is really the whole analysis side of forensics and reverse engineering. >> Trung, real quick, systems thinking, your thoughts. >> Well, I'd like to share with you my experience when I worked in the space station program at NASA. We had two different approaches. One is a compound approach where we design it from the system general point of view where we put components together to be a complex system. But at the same time, we have the (indistinct) approach where we have an engineer who spent time and effort building individual component and they have to be expert in those tiny component that general component they deliver. And in the space station program, we bring together the (indistinct) engineer who designed everything in detail and the system manager who managed the system design from the top down, and we meet in the middle, and together we compromised a lot of differences and we delivered the space station that we are operating today. >> Great insight. And that's the whole teamwork collaboration that Dr. Fleischer was mentioning. Thanks so much for that insight. I wanted to get that out there because I know myself as a parent, I'm always trying to think about what's best for my kids and their friends as they grow up into the workforce. I know educators and leaders in industry would love to know some of the best practices around some of the structural changes. So thanks for that insight. But this topic's about students and helping them prepare. So we heard be multiple discipline, broaden your horizons, think like systems, top down, bottom up, work together as a team, and follow the data. So I got to ask you guys, there's a huge amount of job openings in cybersecurity. It's well-documented. And certainly with the intersection of space and cyber, it's only going to get bigger, right? You're going to see more and more demand for new types of jobs. How do we get high school and college students interested in security as a career? Dr. Fleischer, we'll start with you on this one. I would say really one of the best ways to get students interested in a career is to show them the impact that it's going to have. There's definitely always going to be students who are going to want to do the technology for the technology's sake, but that will limit you to a narrow set of students, and by showing the greater impact that these types of careers are going to have on the types of problems that you're going to be able to solve and the impact you're going to be able to have on the world around you, that's the word that we really need to get out. And a wide variety of students really respond to these messages. So I think it's really kind of reaching out at the elementary, the middle school level, and really kind of getting this idea that you can make a big difference, a big positive difference in the field with some of these careers, is going to be really critical. >> Real question to follow up. What do you think is the best entry point? You mentioned middle. I didn't hear elementary school. There's a lot of discussions around pipelining, and we're going to get into women in tech and underrepresented minorities later. But is it too early, or what's your feeling on this? >> My feeling is the earlier we can normalize it, the better. If you can normalize an interest in computers and technology and building in elementary school, that's absolutely critical. But the drop-off point that we're seeing is between what I would call late elementary and early middle school. And just kind of as an anecdote, I for years ran an outreach program for Girl Scouts in grades four and five and grade six, seven, and eight. And we had 100 slots in each program. And every year the program would sell out for girls in grades four and five, and every year we'd have spots remaining in grades six, seven, and eight. And that's literally where the drop-off is occurring between that late elementary and that middle school range. So that's the area that we need to target to make sure we keep those young women involved and interested as we move forward. >> Bill, how are we going to get these kids interested in security? You mentioned a few programs you got. >> Yeah. >> I mean, who wouldn't want to be a white hat hacker? I mean, that sounds exciting. >> So yeah, great questions. Let's start with some basic principles, though, is let me ask you a question, John. Name for me one white hat, good person hacker, the name, who works in the space industry and is an exemplar for students to look up to. >> You? >> Oh man, I'm feeling really... >> I'm only, I can't imagine a figure- >> (indistinct) the answer because the answer we normally get is the cricket sound. So we don't have individuals we've identified in those areas for them to look up to. >> I was going to be snarky and say most white hackers won't even use their real name, but... >> Right, so there's an aura around their anonymity here. So again, the real question is how do we get them engaged and keep them engaged? And that's what Amy was pointing out to exactly, the engagement and sticking with it. So one of the things that we're trying to do through our competition on the state level and other elements is providing connections. We call them ambassadors. These are people in the business who can contact the students that are in the game or in that challenge environment and let 'em interact and let 'em talk about what they do and what they're doing in life. But give them a challenging game format. A lot of computer-based training, capture the flag stuff is great, but if you can make it hands-on, if you can make it a learn by doing experiment, if you can make it personally involved and see the benefit as a result of doing that challenge and then talk to the people who do that on a daily basis, that's how you get them involved. The second part is part of what we're doing is we're involving partnership companies in the development of the teams. So this year's competition that we're running has 82 teams from across the state of California. Of those 82 teams at six students a team, middle school, high school, and many of those have company partners, and these are practitioners in cybersecurity who are working with those students to participate. It's that adult connectivity. It's that visualization. So at the competition this year, we have the founder of Defcon Red Flag is a participant to talk to the students. We have Vint Cerf, who is, of course, very well-known for something called the internet, to participate. It's really getting the students to understand who's in this, who can I look up to, and how do I stay engaged with them? >> There's definitely a celebrity aspect of it, I will agree. I mean, the influencer aspect here with knowledge is key. Can you talk about these ambassadors, and how far along are you on that program? First of all, the challenge stuff is, anything gamification-wise, we've seen that with hackathons, it just really works well. Creates bonding. People who create together can get sticky and get very high community aspect to it. Talk about this ambassador thing. What is that, industry, is that academic? >> Yeah, absolutely. >> What is this ambassador thing? >> Industry partners that we've identified, some of which, and I won't hit all of 'em, so I'm sure I'll short change this, but Palo Alto, Cisco, Splunk, many of the companies in California, and what we've done is identified schools to participate in the challenge that may not have a strong STEM program or have any cyber program. And the idea of the company is they look for their employees who are in those school districts to partner with the schools to help provide outreach. It could be as simple as a couple hours a week, or it's a team support captain or it's providing computers and other devices to use. And so again, it's really about a constant connectivity and trying to help where some schools may not have the staff or support units in an area to really provide them what they need for connectivity. What that does is it gives us an opportunity to not just focus on it once a year, but throughout the year. So for the competition, all the teams that are participating have been receiving training and educational opportunities in the gamification side since they signed up to participate. So there's a website, there's learning materials, there's materials provided by certain vendor companies like Wireshark and others. So it's a continuum of opportunity for the students. >> You know, I've seen, just randomly, just got a random thought. Robotics clubs are moving then closer into that middle school area, Dr. Fleischer, and in certainly in high schools, it's almost like a varsity sport. E-sports is another one. My son just called me. "I made the JV at the college team." It's big and serious, right? And it's fun. This is the aspect of fun. It's hands-on. This is part of the culture down there. Learn by doing. Is there, like, a group? Is it, like, a club? I mean, how do you guys organize these bottoms-up organically interest topics? >> So here in the college of engineering, when we talk about learn by doing, we have learned by doing both in the classroom and out of the classroom. And if we look at these types of out of the classroom activities, we have over 80 clubs working on all different aspects, and many of these are bottom-up. The students have decided what they want to work on and have organized themselves around that. And then they get the leadership opportunities. The more experienced students train the less experienced students. And it continues to build from year after year after year with them even doing aspects of strategic planning from year to year for some of these competitions. Yeah, it's an absolutely great experience. And we don't define for them how their learn by doing experiences should be. We want them to define it. And I think the really cool thing about that is they have the ownership and they have the interest and they can come up with new clubs year after year to see which direction they want to take it, and we will help support those clubs as old clubs fade out and new clubs come in. >> Trung, real quick, before we go on the next talk track, what do you recommend for middle school, high school, or even elementary? A little bit of coding, Minecraft? I mean, how do you get 'em hooked on the fun and the dopamine of technology and cybersecurity? What's your take on that? >> On this aspect, I'd like to share with you my experience as a junior high and high school student in Texas. The university of Texas in Austin organized a competition for every high school in Texas in every field from poetry to mathematics to science, computer engineering. But it's not about the University of Texas. The University of Texas is only serving as a center for the final competition. They divide the competition to district and then regional and then state. At each level, we have local university and colleges volunteering to host the competition and make it fun for the student to participate. And also they connected the students with private enterprises to raise fund for scholarship. So student who see the competition is a fun event for them, they get exposed to different university hosting the event so that they can see different option for them to consider college. They also get a promise that if they participate, they will be considered for scholarship when they attend university and college. So I think the combination of fun and competition and the scholarship aspect will be a good thing to entice the student to commit to the area of cybersecurity. >> Got the engagement, the aspiration, scholarship, and you mentioned a volunteer. I think one of the things I'll observe is you guys are kind of hitting this as community. I mean, the story of Steve Jobs and Woz building the Mac, they called Bill Hewlett up in Palo Alto. He was in the phone book. And they scoured some parts from him. That's community. This is kind of what you're getting at. So this is kind of the formula we're seeing. So the next question I really want to get into is the women in technology, STEM, underrepresented minorities, how do we get them on cybersecurity career path? Is there a best practices there? Bill, we'll start with you. >> Well, I think it's really interesting. First thing I want to add is, if I could, just a clarification. What's really cool, the competition that we have and we're running, it's run by students from Cal Poly. So Amy referenced the clubs and other activities. So many of the organizers and developers of the competition that we're running are the students, but not just from engineering. So we actually have theater and liberal arts majors and technology for liberal arts majors who are part of the competition, and we use their areas of expertise, set design and other things, visualization, virtualization. Those are all part of how we then teach and educate cyber in our gamification and other areas. So they're all involved and they're learning, as well. So we have our students teaching other students. So we're really excited about that. And I think that's part of what leads to a mentoring aspect of what we're providing where our students are mentoring the other students. And I think it's also something that's really important in the game. The first year we held the game, we had several all-girl teams, and it was really interesting because A, they didn't really know if they could compete. I mean, this is their reference point. We don't know if. They did better than anybody. I mean, they just, they knocked the ball out of the park. The second part, then, is building that confidence level that can, going back and telling their cohorts that, hey, it's not this obtuse thing you can't do. It's something real that you can compete and win. And so again, it's building that camaraderie, that spirit, that knowledge that they can succeed. And I think that goes a long way. And Amy's programs and the reach out and the reach out that Cal Poly does to schools to develop, I think that's what it really is going to take. It is going to take that village approach to really increase diversity and inclusivity for the community. >> Dr. Fleischer, I'd love to get your thoughts. You mentioned your outreach program and the drop-off, some of those data. You're deeply involved in this. You're passionate about it. What's your thoughts on this career path opportunity for STEM? >> Yeah, I think STEM is an incredible career path opportunity for so many people. There's so many interesting problems that we can solve, particularly in cyber and in space systems. And I think we have to meet the kids where they are and kind of show them what the exciting part is about it, right? But Bill was alluding to this when he was talking about trying to name somebody that you can point to. And I think having those visible people where you can see yourself in that is absolutely critical, and those mentors and that mentorship program. So we use a lot of our students going out into California middle schools and elementary schools. And you want to see somebody that's like you, somebody that came from your background and was able to do this. So a lot of times we have students from our National Society of Black Engineers or our Society of Hispanic Professional Engineers or our Society of Women Engineers, which we have over 1,000 members, 1,000 student members in our Society of Women Engineers who are doing these outreach programs. But like I also said, it's hitting them at the lower levels, too, and Girl Scouts is actually distinguishing themselves as one of the leading STEM advocates in the country. And like I said, they developed all these cybersecurity badges starting in kindergarten. There's a cybersecurity badge for kindergartener and first graders. And it goes all the way up through late high school. The same thing with space systems. And they did the space systems in partnership with NASA. They did the cybersecurity in partnership with Palo Alto Networks. And what you do is you want to build these skills that the girls are developing, and like Bill said, work in girl-led teams where they can do it, and if they're doing it from kindergarten on, it just becomes normal, and they never think, well, this is not for me. And they see the older girls who are doing it and they see a very clear path leading them into these careers. >> Yeah, it's interesting, you used the word normalization earlier. That's exactly what it is. It's life, you get life skills and a new kind of badge. Why wouldn't you learn how to be a white hat hacker or have some fun or learn some skills? >> Amy: Absolutely. >> Just in the grind of your fun day. Super exciting. Okay, Trung, your thoughts on this. I mean, you have a diverse, diversity brings perspective to the table in cybersecurity because you have to think like the other guy, the adversary. You got to be the white hat. You can't be a white hat unless you know how black hat thinks. So there's a lot of needs here for more points of view. How are we going to get people trained on this from underrepresented minorities and women? What's your thoughts? >> Well, as a member of the IEEE Professional Society of Electrical and Electronic Engineers, every year we participate in the engineering week. We deploy our members to local junior high school and high school to talk about our project to promote the study of engineering. But at the same time, we also participate in the science fair that the state of Texas is organizing. Our engineer will be mentoring students, number one, to help them with the project, but number two, to help us identify talent so that we can recruit them further into the field of STEM. One of the participation that we did was the competition of the, what they call Future City, where students will be building a city on a computer simulation. And in recent year, we promote the theme of smart city where city will be connected the individual houses and together into the internet. And we want to bring awareness of cybersecurity into that competition. So we deploy engineer to supervise the people, the students who participate in the competition. We bring awareness not in the technical detail level, but in what we've call the compound level so student will be able to know what required to provide cybersecurity for the smart city that they are building. And at the same time, we were able to identify talent, especially talent in the minority and in the woman, so that we can recruit them more actively. And we also raise money for scholarship. We believe that scholarship is the best way to entice student to continue education at the college level. So with scholarship, it's very easy to recruit them to the field and then push them to go further into the cybersecurity area. >> Yeah, I mean, I see a lot of the parents like, oh, my kid's going to go join the soccer team, we get private lessons, and maybe they'll get a scholarship someday. Well, they only do half scholarships. Anyway. I mean, if they spent that time doing these other things, it's just, again, this is a new life skill, like the Girl Scouts. And this is where I want to get into this whole silo breaking down, because Amy, you brought this up, and Bill, you were talking about it, as well. You got multiple stakeholders here with this event. You've got public, you've got private, and you've got educators. It's the intersection of all of them. It's, again, if those silos break down, the confluence of those three stakeholders have to work together. So let's talk about that. Educators. You guys are educating young minds. You're interfacing with private institutions and now the public. What about educators? What can they do to make cyber better? 'Cause there's no real manual. I mean, it's not like this court is a body of work of how to educate cybersecurity. Maybe it's more recent. There's cutting edge best practices. But still, it's an evolving playbook. What's your thoughts for educators? Bill, we'll start with you. >> Well, I'm going to turn to Amy and let her go first. >> Let you go. >> That's fine. >> I would say as educators, it's really important for us to stay on top of how the field is evolving, right? So what we want to do is we want to promote these tight connections between educators and our faculty and applied research in industry and with industry partnerships. And I think that's how we're going to make sure that we're educating students in the best way. And you're talking about that inner, that confluence of the three different areas. And I think you have to keep those communication lines open to make sure that the information on where the field is going and what we need to concentrate on is flowing down into our educational process. And that works in both ways, that we can talk as educators and we can be telling industry what we're working on and what types of skills our students have and working with them to get the opportunities for our students to work in industry and develop those skills along the way, as well. And I think it's just all part of this really looking at what's going to be happening and how do we get people talking to each other? And the same thing with looking at public policy and bringing that into our education and into these real hands-on experiences. And that's how you really cement this type of knowledge with students, not by talking to them and not by showing them, but letting them do it. It's this learn by doing and building the resiliency that it takes when you learn by doing. And sometimes you learn by failing, but you just pick up and you keep going. And these are important skills that you develop along the way. >> You mentioned sharing, too. That's the key. Collaborating and sharing knowledge. It's an open world and everyone's collaborating. Bill, private-public partnerships. I mean, there's a real, private companies, you mentioned Palo Alto Networks and others. There's a real intersection there. They're motivated. They could, there's scholarship opportunities. Trung points to that. What is the public-private educator view there? How do companies get involved and what's the benefit for them? >> Well, that's what a lot of the universities are doing is to bring in as part of either their cyber centers or institutes people who are really focused on developing and furthering those public-private partnerships. That's really what my role is in all these things is to take us to a different level in those areas, not to take away from the academic side, but to add additional opportunities for both sides. Remember, in a public-private partnership, all entities have to have some gain in the process. Now, what I think is really interesting is the timing on particularly this subject, space and cybersecurity. This has been an absolute banner year for space. The standup of Space Force, the launch of commercial partnership, you know, commercial platforms delivering astronauts to the space station, recovering them, and bringing them back. The ability of a commercial satellite platform to be launched. Commercial platforms that not only launch but return back to where they're launched from. These are things that are stirring the hearts of the American citizens, the kids, again, they're getting interested. They're seeing this and getting enthused. So we have to seize upon that and we have to find a way to connect that. Public-private partnerships is the answer for that. It's not one segment that can handle it all. It's all of them combined together. If you look at space, space is going to be about commercial. It's going to be about civil. Moving from one side of the Earth to the other via space. And it's about government. And what's really cool for us, all those things are in our backyard. That's where that public-private comes together. The government's involved. The private sector's involved. The educators are involved. And we're all looking at the same things and trying to figure out, like this forum, what works best to go to the future. >> You know, if people are bored and they want to look for an exciting challenge, you couldn't have laid it out any clearer. It's the most exciting discipline. It's everything. I mean, we just talk about space. GPS is, everything we do is involved, has to do with satellites. (laughs) >> I have to tell you a story on that right? We have a very unique GPS story right in our backyard. So our sheriff is the son of the father of GPS for the Air Force. So you can't get better than that when it comes to being connected to all those platforms. So we really want to say, you know, this is so exciting for all of us because it gives everybody a job for a long time. >> You know, the kids that think TikTok's exciting, wait till they see what's going on here with you guys, this program. Trung, final word on this from the public side. You're at the Air Force. You're doing research. Are you guys opening it up? Are you integrating into the private and educational sectors? How do you see that formula playing out? And what's the best practice for students and preparing them? >> I think it's the same in every university in the engineering program will require our students to do the final project before graduation. And in this kind of project, we send them out to work in the private industry, the private company that sponsor them. They get the benefit of having an intern working for them and they get the benefit of reviewing the students as the prospective employee in the future. So it's good for the student to gain practical experience working in this program. Sometimes we call that a co-op program. Sometimes we call that a capstone program. And the company will accept the student on a trial basis, giving them some assignment and then pay them a little bit of money. So it's good for the student to earn some extra money, to have some experience that they can put on their resume when they apply for the final, for the job. So the collaboration between university and private sector is really important. When I join a faculty normally there already exist that connection. It came from normally, again, from the dean of engineering, who would wine and dine with companies, build up relationship, and sign up agreement. But it's us professor who have to do the (indistinct) approach to do a good performance so that we can build up credibility to continue the relationship with those company and the student that we selected to send to those company. We have to make sure that they will represent the university well, they will do a good job, and they will make a good impression. >> Thank you very much for a great insight, Trung, Bill, Amy. Amazing topic. I'd like to end this session with each of you to make a statement on the importance of cybersecurity to space. We'll go Trung, Bill, and Amy. Trung, the importance of cybersecurity to space, brief statement. >> The importance of cybersecurity, we know that it's affecting every component that we are using and we are connecting to, and those component, normally we use them for personal purpose, but when we enter the workforce, sometimes we connect them to the important system that the government or the company are investing to be put into space. So it's really important to practice cybersecurity, and a lot of time, it's very easy to know the concept. We have to be careful. But in reality, we tend to forget to to practice it the way we forget how to drive a car safely. And with driving a car, we have a program called defensive driving that requires us to go through training every two or three years so that we can get discount. Every organization we are providing the annual cybersecurity practice not to tell people about the technology, but to remind them about the danger of not practicing cybersecurity and it's a requirement for every one of us. >> Bill, the importance of cybersecurity to space. >> It's not just about young people. It's about all of us. As we grow and we change, as I referenced it, we're changing from an analog world to a digital world. Those of us who have been in the business and have hair that looks like mine, we need to be just as cognizant about cybersecurity practice as the young people. We need to understand how it affects our lives, and particularly in space, because we're going to be talking about people, moving people to space, moving payloads, data transfer, all of those things. And so there's a whole workforce that needs to be retrained or upskilled in cyber that's out there. So the opportunity is ever expansive for all of us. >> Amy, the importance of cybersecurity in space. >> I mean the emphasis of cybersecurity is space just simply can't be over emphasized. There are so many aspects that are going to have to be considered as systems get ever more complex. And as we pointed out, we're putting people's lives at stake here. This is incredibly, incredibly complicated and incredibly impactful, and actually really exciting, the opportunities that are here for students and the workforce of the future to really make an enormous impact on the world around us. And I hope we're able to get that message out to students and to children today, that these are really interesting fields that you need to consider. >> Thank you very much. I'm John Furrier with theCUBE, and the importance of cybersecurity and space is the future of the world's all going to happen in and around space with technology, people, and society. Thank you to Cal Poly, and thank you for watching the Cybersecurity and Space Symposium 2020. (bright music)
SUMMARY :
the globe, it's theCUBE, and the director of the This is for the next generation, and the networks associated with it. By the way, I just want to give you props And I think Amy's going to tell you, You guys have a great and out of the classroom. and you got a lot of talent, and on the ground control station, and in the virtual hallways One of the ways that we engineering is the theme. and to be able to work in teams And Bill also mentioned the cloud. and the components that we have, in changes in the source code. and looking at the greater impact and what you found. thinking, your thoughts. and the system manager who and by showing the greater impact and we're going to get into women in tech So that's the area that we need to target going to get these kids to be a white hat hacker? the name, who works in the space industry because the answer we normally get and say most white hackers and see the benefit as a First of all, the challenge stuff is, and other devices to use. This is the aspect of fun. and out of the classroom. and make it fun for the Jobs and Woz building the Mac, and developers of the program and the drop-off, that the girls are developing, and a new kind of badge. Just in the grind of your fun day. and then push them to go further and now the public. Well, I'm going to turn and building the resiliency that it takes What is the public-private and we have to find a way to connect that. It's the most exciting discipline. So our sheriff is the You know, the kids that and the student that we selected on the importance of the way we forget how Bill, the importance and have hair that looks like mine, Amy, the importance of of the future to really and the importance of
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
Amy | PERSON | 0.99+ |
SpaceX | ORGANIZATION | 0.99+ |
Boeing | ORGANIZATION | 0.99+ |
Society of Hispanic Professional Engineers | ORGANIZATION | 0.99+ |
JPL | ORGANIZATION | 0.99+ |
NASA | ORGANIZATION | 0.99+ |
Texas | LOCATION | 0.99+ |
PG&E | ORGANIZATION | 0.99+ |
Lockheed | ORGANIZATION | 0.99+ |
Bill Britton | PERSON | 0.99+ |
Society of Women Engineers | ORGANIZATION | 0.99+ |
California | LOCATION | 0.99+ |
Cisco | ORGANIZATION | 0.99+ |
Cal Poly | ORGANIZATION | 0.99+ |
Bill | PERSON | 0.99+ |
Fleischer | PERSON | 0.99+ |
Raytheon | ORGANIZATION | 0.99+ |
Amy Fleischer | PERSON | 0.99+ |
John | PERSON | 0.99+ |
John Furrier | PERSON | 0.99+ |
California Cybersecurity Institute | ORGANIZATION | 0.99+ |
Trung | PERSON | 0.99+ |
Palo Alto | LOCATION | 0.99+ |
Northrop Grumman | ORGANIZATION | 0.99+ |
IEEE Professional Society of Electrical and Electronic Engineers | ORGANIZATION | 0.99+ |
Air Force Research Labs | ORGANIZATION | 0.99+ |
National Society of Black Engineers | ORGANIZATION | 0.99+ |
Palo Alto Networks | ORGANIZATION | 0.99+ |
first | QUANTITY | 0.99+ |
82 teams | QUANTITY | 0.99+ |
40 miles | QUANTITY | 0.99+ |
six students | QUANTITY | 0.99+ |
Virgin Galactic | ORGANIZATION | 0.99+ |
hundreds | QUANTITY | 0.99+ |
US Air Force Academy | ORGANIZATION | 0.99+ |
One | QUANTITY | 0.99+ |
one hour | QUANTITY | 0.99+ |
tomorrow | DATE | 0.99+ |
Northrop Grumman | ORGANIZATION | 0.99+ |
Cal Poly Space Systems | ORGANIZATION | 0.99+ |
Splunk | ORGANIZATION | 0.99+ |
100% | QUANTITY | 0.99+ |
US Air Force | ORGANIZATION | 0.99+ |
Palo Alto Networks | ORGANIZATION | 0.99+ |
100 slots | QUANTITY | 0.99+ |
Earth | LOCATION | 0.99+ |
University of Texas | ORGANIZATION | 0.99+ |
Cybersecurity Institute | ORGANIZATION | 0.99+ |
today | DATE | 0.99+ |
First | QUANTITY | 0.99+ |
second part | QUANTITY | 0.99+ |
both | QUANTITY | 0.99+ |
Armstrong and Guhamad and Jacques V1
>> Announcer: From around the globe, it's The Cube, covering Space and Cybersecurity Symposium 2020, hosted by Cal Poly. >> Everyone, welcome to this special virtual conference, the Space and Cybersecurity Symposium 2020 put on by Cal Poly with support from The Cube. I'm John Furey, your host and master of ceremony's got a great topic today, and this session is really the intersection of space and cybersecurity. This topic, and this conversation is a cybersecurity workforce development through public and private partnerships. And we've got a great lineup, we've Jeff Armstrong is the president of California Polytechnic State University, also known as Cal Poly. Jeffrey, thanks for jumping on and Bong Gumahad. The second, Director of C4ISR Division, and he's joining us from the Office of the Under Secretary of Defense for the acquisition and sustainment of Department of Defense, DOD, and of course Steve Jacques is Executive Director, founder National Security Space Association, and managing partner at Velos. Gentlemen, thank you for joining me for this session, we've got an hour of conversation, thanks for coming on. >> Thank you. >> So we've got a virtual event here, we've got an hour to have a great conversation, I'd love for you guys to do an opening statement on how you see the development through public and private partnerships around cybersecurity and space, Jeff, we'll start with you. >> Well, thanks very much, John, it's great to be on with all of you. On behalf of Cal Poly, welcome everyone. Educating the workforce of tomorrow is our mission at Cal Poly, whether that means traditional undergraduates, masters students, or increasingly, mid-career professionals looking to upskill or re-skill. Our signature pedagogy is learn by doing, which means that our graduates arrive at employers, ready day one with practical skills and experience. We have long thought of ourselves as lucky to be on California's beautiful central coast, but in recent years, as we've developed closer relationships with Vandenberg Air Force Base, hopefully the future permanent headquarters of the United States Space Command with Vandenberg and other regional partners, We have discovered that our location is even more advantageous than we thought. We're just 50 miles away from Vandenberg, a little closer than UC Santa Barbara and the base represents the Southern border of what we have come to think of as the central coast region. Cal Poly and Vandenberg Air Force Base have partnered to support regional economic development, to encourage the development of a commercial space port, to advocate for the space command headquarters coming to Vandenberg and other ventures. These partnerships have been possible because both parties stand to benefit. Vandenberg, by securing new streams of revenue, workforce, and local supply chain and Cal Poly by helping to grow local jobs for graduates, internship opportunities for students and research and entrepreneurship opportunities for faculty and staff. Crucially, what's good for Vandenberg Air Force Base and for Cal Poly is also good for the central coast and the U.S., creating new head of household jobs, infrastructure, and opportunity. Our goal is that these new jobs bring more diversity and sustainability for the region. This regional economic development has taken on a life of its own, spawning a new nonprofit called REACH which coordinates development efforts from Vandenberg Air Force Base in the South to Camp Roberts in the North. Another factor that has facilitated our relationship with Vandenberg Air Force Base is that we have some of the same friends. For example, Northrop Grumman has as long been an important defense contractor and an important partner to Cal Poly, funding scholarships in facilities that have allowed us to stay current with technology in it to attract highly qualified students for whom Cal Poly's costs would otherwise be prohibitive. For almost 20 years, Northrop Grumman has funded scholarships for Cal Poly students. This year, they're funding 64 scholarships, some directly in our College of Engineering and most through our Cal Poly Scholars Program. Cal Poly scholars support both incoming freshmen and transfer students. These are especially important, 'cause it allows us to provide additional support and opportunities to a group of students who are mostly first generation, low income and underrepresented, and who otherwise might not choose to attend Cal Poly. They also allow us to recruit from partner high schools with large populations of underrepresented minority students, including the Fortune High School in Elk Grove, which we developed a deep and lasting connection. We know that the best work is done by balanced teams that include multiple and diverse perspectives. These scholarships help us achieve that goal and I'm sure you know Northrop Grumman was recently awarded a very large contract to modernize the U.S. ICBM armory with some of the work being done at Vandenberg Air Force Base, thus supporting the local economy and protecting... Protecting our efforts in space requires partnerships in the digital realm. Cal Poly has partnered with many private companies such as AWS. Our partnerships with Amazon Web Services has enabled us to train our students with next generation cloud engineering skills, in part, through our jointly created digital transformation hub. Another partnership example is among Cal Poly's California Cyber Security Institute College of Engineering and the California National Guard. This partnership is focused on preparing a cyber-ready workforce, by providing faculty and students with a hands on research and learning environment side by side with military law enforcement professionals and cyber experts. We also have a long standing partnership with PG&E most recently focused on workforce development and redevelopment. Many of our graduates do indeed go on to careers in aerospace and defense industry. As a rough approximation, more than 4,500 Cal Poly graduates list aerospace or defense as their employment sector on LinkedIn. And it's not just our engineers in computer sciences. When I was speaking to our fellow panelists not too long ago, speaking to Bong, we learned that Rachel Sims, one of our liberal arts majors is working in his office, so shout out to you, Rachel. And then finally, of course, some of our graduates soar to extraordinary heights, such as Commander Victor Glover, who will be heading to the International Space Station later this year. As I close, all of which is to say that we're deeply committed to workforce development and redevelopment, that we understand the value of public-private partnerships, and that we're eager to find new ways in which to benefit everyone from this further cooperation. So we're committed to the region, the state and the nation, in our past efforts in space, cyber security and links to our partners at, as I indicated, aerospace industry and governmental partners provides a unique position for us to move forward in the interface of space and cyber security. Thank you so much, John. >> President Armstrong, thank you very much for the comments and congratulations to Cal Poly for being on the forefront of innovation and really taking a unique, progressive view and want to tip a hat to you guys over there, thank you very much for those comments, appreciate it. Bong, Department of Defense. Exciting, you've got to defend the nation, space is global, your opening statement. >> Yes, sir, thanks John, appreciate that. Thank you everybody, I'm honored to be in this panel along with Preston Armstrong of Cal Poly and my longtime friend and colleague Steve Jacques of the National Security Space Association to discuss a very important topic of a cybersecurity workforce development as President Armstrong alluded to. I'll tell you, both of these organizations, Cal Poly and the NSSA have done and continue to do an exceptional job at finding talent, recruiting them and training current and future leaders and technical professionals that we vitally need for our nation's growing space programs, as well as our collective national security. Earlier today, during session three, I, along with my colleague, Chris Samson discussed space cyber security and how the space domain is changing the landscape of future conflicts. I discussed the rapid emergence of commercial space with the proliferation of hundreds, if not thousands of satellites, providing a variety of services including communications, allowing for global internet connectivity, as one example. Within DOD, we continued to look at how we can leverage this opportunity. I'll tell you, one of the enabling technologies, is the use of small satellites, which are inherently cheaper and perhaps more flexible than the traditional bigger systems that we have historically used and employed for DOD. Certainly not lost on me is the fact that Cal Poly pioneered CubeSats 28, 27 years ago, and they set a standard for the use of these systems today. So they saw the value and benefit gained way ahead of everybody else it seems. And Cal Poly's focus on training and education is commendable. I'm especially impressed by the efforts of another of Steven's colleague, the current CIO, Mr. Bill Britton, with his high energy push to attract the next generation of innovators. Earlier this year, I had planned on participating in this year's cyber innovation challenge in June, Oops, Cal Poly hosts California middle, and high school students, and challenge them with situations to test their cyber knowledge. I tell you, I wish I had that kind of opportunity when I was a kid, unfortunately, the pandemic changed the plan, but I truly look forward to future events such as these, to participate in. Now, I want to recognize my good friend, Steve Jacques, whom I've known for perhaps too long of a time here, over two decades or so, who was an acknowledged space expert and personally I've truly applaud him for having the foresight a few years back to form the National Security Space Association to help the entire space enterprise navigate through not only technology, but policy issues and challenges and paved the way for operationalizing space. Space, it certainly was fortifying domain, it's not a secret anymore, and while it is a unique area, it shares a lot of common traits with the other domains, such as land, air, and sea, obviously all are strategically important to the defense of the United States. In conflict, they will all be contested and therefore they all need to be defended. One domain alone will not win future conflicts, and in a joint operation, we must succeed in all. So defending space is critical, as critical as to defending our other operational domains. Funny, space is the only sanctuary available only to the government. Increasingly as I discussed in a previous session, commercial space is taking the lead in a lot of different areas, including R&D, the so-called new space. So cybersecurity threat is even more demanding and even more challenging. The U.S. considers and futhered access to and freedom to operate in space, vital to advancing security, economic prosperity and scientific knowledge of the country, thus making cyberspace an inseparable component of America's financial, social government and political life. We stood up US Space Force a year ago or so as the newest military service. Like the other services, its mission is to organize, train and equip space forces in order to protect U.S. and allied interest in space and to provide spacecape builders who joined force. Imagine combining that U.S. Space Force with the U.S. Cyber Command to unify the direction of the space and cyberspace operation, strengthen DOD capabilities and integrate and bolster a DOD cyber experience. Now, of course, to enable all of this requires a trained and professional cadre of cyber security experts, combining a good mix of policy, as well as a high technical skill set. Much like we're seeing in STEM, we need to attract more people to this growing field. Now, the DOD has recognized the importance to the cybersecurity workforce, and we have implemented policies to encourage its growth. Back in 2013, the Deputy Secretary of Defense signed a DOD Cyberspace Workforce Strategy, to create a comprehensive, well-equipped cyber security team to respond to national security concerns. Now, this strategy also created a program that encourages collaboration between the DOD and private sector employees. We call this the Cyber Information Technology Exchange program, or CITE that it's an exchange program, which is very interesting in which a private sector employee can naturally work for the DOD in a cyber security position that spans across multiple mission critical areas, important to the DOD. A key responsibility of the cyber security community is military leaders, unrelated threats, and the cyber security actions we need to have to defeat these threats. We talked about rapid acquisition, agile business processes and practices to speed up innovation, likewise, cyber security must keep up with this challenge. So cyber security needs to be right there with the challenges and changes, and this requires exceptional personnel. We need to attract talent, invest in the people now to grow a robust cybersecurity workforce for the future. I look forward to the panel discussion, John, thank you. >> Thank you so much, Bob for those comments and, you know, new challenges or new opportunities and new possibilities and freedom to operate in space is critical, thank you for those comments, looking forward to chatting further. Steve Jacques, Executive Director of NSSA, you're up, opening statement. >> Thank you, John and echoing Bongs, thanks to Cal Poly for pulling this important event together and frankly, for allowing the National Security Space Association be a part of it. Likewise, on behalf of the association, I'm delighted and honored to be on this panel of President Armstrong, along with my friend and colleague, Bong Gumahad. Something for you all to know about Bong, he spent the first 20 years of his career in the Air Force doing space programs. He then went into industry for several years and then came back into government to serve, very few people do that. So Bong, on behalf of the space community, we thank you for your lifelong devotion to service to our nation, we really appreciate that. And I also echo a Bong shout out to that guy, Bill Britton. who's been a long time co-conspirator of ours for a long time, and you're doing great work there in the cyber program at Cal Poly, Bill, keep it up. But Professor Armstrong, keep a close eye on him. (laughter) I would like to offer a little extra context to the great comments made by President Armstrong and Bong. And in our view, the timing of this conference really could not be any better. We all recently reflected again on that tragic 9/11 surprise attack on our homeland and it's an appropriate time we think to take pause. While a percentage of you in the audience here weren't even born or were babies then, for the most of us, it still feels like yesterday. And moreover, a tragedy like 9/11 has taught us a lot to include, to be more vigilant, always keep our collective eyes and ears open, to include those "eyes and ears from space," making sure nothing like this ever happens again. So this conference is a key aspect, protecting our nation requires we work in a cyber secure environment at all times. But you know, the fascinating thing about space systems is we can't see 'em. Now sure, we see space launches, man, there's nothing more invigorating than that. But after launch they become invisible, so what are they really doing up there? What are they doing to enable our quality of life in the United States and in the world? Well to illustrate, I'd like to paraphrase elements of an article in Forbes magazine, by Bongs and my good friend, Chuck Beames, Chuck is a space guy, actually had Bongs job a few years in the Pentagon. He's now Chairman and Chief Strategy Officer at York Space Systems and in his spare time, he's Chairman of the Small Satellites. Chuck speaks in words that everyone can understand, so I'd like to give you some of his words out of his article, paraphrase somewhat, so these are Chuck's words. "Let's talk about average Joe and plain Jane. "Before heading to the airport for a business trip "to New York city, Joe checks the weather forecast, "informed by NOAA's weather satellites, "to see what to pack for the trip. "He then calls an Uber, that space app everybody uses, "it matches riders with drivers via GPS, "to take him to the airport. "So Joe has launched in the airport, "unbeknownst to him, his organic lunch is made "with the help of precision farming "made possible to optimize the irrigation and fertilization "with remote spectral sensing coming from space and GPS. "On the plane, the pilot navigates around weather, "aided by GPS and NOAA's weather satellites "and Joe makes his meeting on time "to join his New York colleagues in a video call "with a key customer in Singapore, "made possible by telecommunication satellites. "En route to his next meeting, "Joe receives notice changing the location of the meeting "to the other side of town. "So he calmly tells Siri to adjust the destination "and his satellite-guided Google maps redirect him "to the new location. "That evening, Joe watches the news broadcast via satellite, "report details of meeting among world leaders, "discussing the developing crisis in Syria. "As it turns out various forms of "'remotely sensed information' collected from satellites "indicate that yet another banned chemical weapon "may have been used on its own people. "Before going to bed, Joe decides to call his parents "and congratulate them for their wedding anniversary "as they cruise across the Atlantic, "made possible again by communication satellites "and Joe's parents can enjoy the call "without even wondering how it happened. "The next morning back home, "Joe's wife, Jane is involved in a car accident. "Her vehicle skids off the road, she's knocked unconscious, "but because of her satellite equipped OnStar system, "the crash is detected immediately, "and first responders show up on the scene in time. "Joe receives the news, books an early trip home, "sends flowers to his wife "as he orders another Uber to the airport. "Over that 24 hours, "Joe and Jane used space system applications "for nearly every part of their day. "Imagine the consequences if at any point "they were somehow denied these services, "whether they be by natural causes or a foreign hostility. "In each of these satellite applications used in this case, "were initially developed for military purposes "and continued to be, but also have remarkable application "on our way of life, just many people just don't know that." So ladies and gentlemen, now you know, thanks to Chuck Beames. Well, the United States has a proud heritage of being the world's leading space-faring nation. Dating back to the Eisenhower and Kennedy years, today, we have mature and robust systems operating from space, providing overhead reconnaissance to "watch and listen," provide missile warning, communications, positioning, navigation, and timing from our GPS system, much of which you heard in Lieutenant General JT Thomson's earlier speech. These systems are not only integral to our national security, but also to our quality of life. As Chuck told us, we simply no longer can live without these systems as a nation and for that matter, as a world. But over the years, adversaries like China, Russia and other countries have come to realize the value of space systems and are aggressively playing catch up while also pursuing capabilities that will challenge our systems. As many of you know, in 2007, China demonstrated its ASAT system by actually shooting down one of its own satellites and has been aggressively developing counterspace systems to disrupt ours. So in a heavily congested space environment, our systems are now being contested like never before and will continue to be. Well, as a Bong mentioned, the United States have responded to these changing threats. In addition to adding ways to protect our system, the administration and the Congress recently created the United States Space Force and the operational United States Space Command, the latter of which you heard President Armstrong and other Californians hope is going to be located at Vandenberg Air Force Base. Combined with our intelligence community, today we have focused military and civilian leadership now in space, and that's a very, very good thing. Commensurately on the industry side, we did create the National Security Space Association, devoted solely to supporting the National Security Space Enterprise. We're based here in the DC area, but we have arms and legs across the country and we are loaded with extraordinary talent in scores of former government executives. So NSSA is joined at the hip with our government customers to serve and to support. We're busy with a multitude of activities underway, ranging from a number of thought-provoking policy papers, our recurring spacetime webcasts, supporting Congress's space power caucus, and other main serious efforts. Check us out at nssaspace.org. One of our strategic priorities and central to today's events is to actively promote and nurture the workforce development, just like Cal-Poly. We will work with our U.S. government customers, industry leaders, and academia to attract and recruit students to join the space world, whether in government or industry, and to assist in mentoring and training as their careers progress. On that point, we're delighted to be working with Cal Poly as we hopefully will undertake a new pilot program with them very soon. So students stay tuned, something I can tell you, space is really cool. While our nation's satellite systems are technical and complex, our nation's government and industry workforce is highly diverse, with a combination of engineers, physicists and mathematicians, but also with a large non-technical expertise as well. Think about how government gets these systems designed, manufactured, launching into orbit and operating. They do this via contracts with our aerospace industry, requiring talents across the board, from cost estimating, cost analysis, budgeting, procurement, legal, and many other support tasks that are integral to the mission. Many thousands of people work in the space workforce, tens of billions of dollars every year. This is really cool stuff and no matter what your education background, a great career to be part of. In summary, as Bong had mentioned as well, there's a great deal of exciting challenges ahead. We will see a new renaissance in space in the years ahead and in some cases it's already begun. Billionaires like Jeff Bezos, Elon Musk, Sir Richard Branson, are in the game, stimulating new ideas and business models. Other private investors and startup companies, space companies are now coming in from all angles. The exponential advancement of technology and micro electronics now allows a potential for a plethora of small sat systems to possibly replace older satellites, the size of a Greyhound bus. It's getting better by the day and central to this conference, cybersecurity is paramount to our nation's critical infrastructure in space. So once again, thanks very much and I look forward to the further conversation. >> Steve, thank you very much. Space is cool, it's relevant, but it's important as you pointed out in your awesome story about how it impacts our life every day so I really appreciate that great story I'm glad you took the time to share that. You forgot the part about the drone coming over in the crime scene and, you know, mapping it out for you, but we'll add that to the story later, great stuff. My first question is, let's get into the conversations, because I think this is super important. President Armstrong, I'd like you to talk about some of the points that was teased out by Bong and Steve. One in particular is the comment around how military research was important in developing all these capabilities, which is impacting all of our lives through that story. It was the military research that has enabled a generation and generation of value for consumers. This is kind of this workforce conversation, there are opportunities now with research and grants, and this is a funding of innovation that is highly accelerated, it's happening very quickly. Can you comment on how research and the partnerships to get that funding into the universities is critical? >> Yeah, I really appreciate that and appreciate the comments of my colleagues. And it really boils down to me to partnerships, public-private partnerships, you have mentioned Northrop Grumman, but we have partnerships with Lockheed Martin, Boeing, Raytheon, Space X, JPL, also member of an organization called Business Higher Education Forum, which brings together university presidents and CEOs of companies. There's been focused on cybersecurity and data science and I hope that we can spill into cybersecurity and space. But those partnerships in the past have really brought a lot forward. At Cal Poly, as mentioned, we've been involved with CubeSat, we've have some secure work, and we want to plan to do more of that in the future. Those partnerships are essential, not only for getting the R&D done, but also the students, the faculty, whether they're master's or undergraduate can be involved with that work, they get that real life experience, whether it's on campus or virtually now during COVID or at the location with the partner, whether it may be governmental or industry, and then they're even better equipped to hit the ground running. And of course we'd love to see more of our students graduate with clearance so that they could do some of that secure work as well. So these partnerships are absolutely critical and it's also in the context of trying to bring the best and the brightest in all demographics of California and the U.S. into this field, to really be successful. So these partnerships are essential and our goal is to grow them just like I know our other colleagues in the CSU and the UC are planning to do. >> You know, just as my age I've seen, I grew up in the eighties and in college and they're in that system's generation and the generation before me, they really kind of pioneered the space that spawned the computer revolution. I mean, you look at these key inflection points in our lives, they were really funded through these kinds of real deep research. Bong, talk about that because, you know, we're living in an age of cloud and Bezos was mentioned, Elon Musk, Sir Richard Branson, you got new ideas coming in from the outside, you have an accelerated clock now in terms of the innovation cycles and so you got to react differently, you guys have programs to go outside of the defense department, how important is this because the workforce that are in schools and/or folks re-skilling are out there and you've been on both sides of the table, so share your thoughts. >> No, thanks Johnny, thanks for the opportunity to respond to, and that's what, you know, you hit on the nose back in the 80's, R&D and space especially was dominated by government funding, contracts and so on, but things have changed as Steve pointed out, allow these commercial entities funded by billionaires are coming out of the woodwork, funding R&D so they're taking the lead, so what we can do within the DOD in government is truly take advantage of the work they've done. And since they're, you know, paving the way to new approaches and new way of doing things and I think we can certainly learn from that and leverage off of that, saves us money from an R&D standpoint, while benefiting from the product that they deliver. You know, within DOD, talking about workforce development, you know, we have prioritized and we have policies now to attract and retain the talent we need. I had the folks do some research and it looks like from a cybersecurity or workforce standpoint, a recent study done, I think last year in 2019, found that the cyber security workforce gap in U.S. is nearing half a million people, even though it is a growing industry. So the pipeline needs to be strengthened, getting people through, you know, starting young and through college, like Professor Armstrong indicated because we're going to need them to be in place, you know, in a period of about maybe a decade or so. On top of that, of course, is the continuing issue we have with the gap with STEM students. We can't afford not have expertise in place to support all the things we're doing within DoD, not only DoD but the commercial side as well, thank you. >> How's the gap get filled, I mean, this is, again, you've got cybersecurity, I mean, with space it's a whole other kind of surface area if you will, it's not really surface area, but it is an IOT device if you think about it, but it does have the same challenges, that's kind of current and progressive with cybersecurity. Where's the gap get filled, Steve or President Armstrong, I mean, how do you solve the problem and address this gap in the workforce? What are some solutions and what approaches do we need to put in place? >> Steve, go ahead., I'll follow up. >> Okay, thanks, I'll let you correct me. (laughter) It's a really good question, and the way I would approach it is to focus on it holistically and to acknowledge it upfront and it comes with our teaching, et cetera, across the board. And from an industry perspective, I mean, we see it, we've got to have secure systems in everything we do, and promoting this and getting students at early ages and mentoring them and throwing internships at them is so paramount to the whole cycle. And that's kind of, it really takes a focused attention and we continue to use the word focus from an NSSA perspective. We know the challenges that are out there. There are such talented people in the workforce, on the government side, but not nearly enough of them and likewise on the industry side, we could use more as well, but when you get down to it, you know, we can connect dots, you know, the aspects that Professor Armstrong talked about earlier to where you continue to work partnerships as much as you possibly can. We hope to be a part of that network, that ecosystem if you will, of taking common objectives and working together to kind of make these things happen and to bring the power, not just of one or two companies, but of our entire membership thereabout. >> President Armstrong-- >> Yeah, I would also add it again, it's back to the partnerships that I talked about earlier, one of our partners is high schools and schools Fortune, Margaret Fortune, who worked in a couple of administrations in California across party lines and education, their fifth graders all visit Cal Poly, and visit our learned-by-doing lab. And you've got to get students interested in STEM at an early age. We also need the partnerships, the scholarships, the financial aid, so the students can graduate with minimal to no debt to really hit the ground running and that's exacerbated and really stress now with this COVID induced recession. California supports higher education at a higher rate than most states in the nation, but that has brought this year for reasons all understand due to COVID. And so our partnerships, our creativity, and making sure that we help those that need the most help financially, that's really key because the gaps are huge. As my colleagues indicated, you know, half a million jobs and I need you to look at the students that are in the pipeline, we've got to enhance that. And the placement rates are amazing once the students get to a place like Cal Poly or some of our other amazing CSU and UC campuses, placement rates are like 94%. Many of our engineers, they have jobs lined up a year before they graduate. So it's just going to take a key partnerships working together and that continued partnership with government local, of course, our state, the CSU, and partners like we have here today, both Steve and Bong so partnerships is the thing. >> You know, that's a great point-- >> I could add, >> Okay go ahead. >> All right, you know, the collaboration with universities is one that we put on lot of emphasis here, and it may not be well known fact, but just an example of national security, the AUC is a national centers of academic excellence in cyber defense works with over 270 colleges and universities across the United States to educate and certify future cyber first responders as an example. So that's vibrant and healthy and something that we ought to take advantage of. >> Well, I got the brain trust here on this topic. I want to get your thoughts on this one point, 'cause I'd like to define, you know, what is a public-private partnership because the theme that's coming out of the symposium is the script has been flipped, it's a modern era, things are accelerated, you've got security, so you've got all of these things kind of happenning it's a modern approach and you're seeing a digital transformation play out all over the world in business and in the public sector. So what is a modern public-private partnership and what does it look like today because people are learning differently. COVID has pointed out, which is that we're seeing right now, how people, the progressions of knowledge and learning, truth, it's all changing. How do you guys view the modern version of public-private partnership and some examples and some proof points, can you guys share that? We'll start with you, Professor Armstrong. >> Yeah, as I indicated earlier, we've had, and I could give other examples, but Northrop Grumman, they helped us with a cyber lab many years ago that is maintained directly, the software, the connection outside it's its own unit so the students can learn to hack, they can learn to penetrate defenses and I know that that has already had some considerations of space, but that's a benefit to both parties. So a good public-private partnership has benefits to both entities and the common factor for universities with a lot of these partnerships is the talent. The talent that is needed, what we've been working on for years of, you know, the undergraduate or master's or PhD programs, but now it's also spilling into upskilling and reskilling, as jobs, you know, folks who are in jobs today that didn't exist two years, three years, five years ago, but it also spills into other aspects that can expand even more. We're very fortunate we have land, there's opportunities, we have ONE Tech project. We are expanding our tech park, I think we'll see opportunities for that and it'll be adjusted due to the virtual world that we're all learning more and more about it, which we were in before COVID. But I also think that that person to person is going to be important, I want to make sure that I'm driving across a bridge or that satellite's being launched by the engineer that's had at least some in person training to do that in that experience, especially as a first time freshman coming on campus, getting that experience, expanding it as an adult, and we're going to need those public-private partnerships in order to continue to fund those at a level that is at the excellence we need for these STEM and engineering fields. >> It's interesting people and technology can work together and these partnerships are the new way. Bongs too with reaction to the modern version of what a public successful private partnership looks like. >> If I could jump in John, I think, you know, historically DOD's had a high bar to overcome if you will, in terms of getting rapid... pulling in new companies, miss the fall if you will, and not rely heavily on the usual suspects, of vendors and the like, and I think the DOD has done a good job over the last couple of years of trying to reduce that burden and working with us, you know, the Air Force, I think they're pioneering this idea around pitch days, where companies come in, do a two-hour pitch and immediately notified of, you know, of an a award, without having to wait a long time to get feedback on the quality of the product and so on. So I think we're trying to do our best to strengthen that partnership with companies outside of the main group of people that we typically use. >> Steve, any reaction, any comment to add? >> Yeah, I would add a couple and these are very excellent thoughts. It's about taking a little gamble by coming out of your comfort zone, you know, the world that Bong and I, Bong lives in and I used to live in the past, has been quite structured. It's really about, we know what the threat is, we need to go fix it, we'll design as if as we go make it happen, we'll fly it. Life is so much more complicated than that and so it's really, to me, I mean, you take an example of the pitch days of Bong talks about, I think taking a gamble by attempting to just do a lot of pilot programs, work the trust factor between government folks and the industry folks and academia, because we are all in this together in a lot of ways. For example, I mean, we just sent a paper to the white house at their request about, you know, what would we do from a workforce development perspective and we hope to embellish on this over time once the initiative matures, but we have a piece of it for example, is a thing we call "clear for success," getting back to president Armstrong's comments so at a collegiate level, you know, high, high, high quality folks are in high demand. So why don't we put together a program that grabs kids in their underclass years, identifies folks that are interested in doing something like this, get them scholarships, have a job waiting for them that they're contracted for before they graduate, and when they graduate, they walk with an SCI clearance. We believe that can be done, so that's an example of ways in which public-private partnerships can happen to where you now have a talented kid ready to go on day one. We think those kinds of things can happen, it just gets back down to being focused on specific initiatives, giving them a chance and run as many pilot programs as you can, like pitch days. >> That's a great point, it's a good segue. Go ahead, President Armstrong. >> I just want to jump in and echo both the Bong and Steve's comments, but Steve that, you know, your point of, you know our graduates, we consider them ready day one, well they need to be ready day one and ready to go secure. We totally support that and love to follow up offline with you on that. That's exciting and needed, very much needed more of it, some of it's happening, but we certainly have been thinking a lot about that and making some plans. >> And that's a great example, a good segue. My next question is kind of re-imagining these workflows is kind of breaking down the old way and bringing in kind of the new way, accelerate all kinds of new things. There are creative ways to address this workforce issue and this is the next topic, how can we employ new creative solutions because let's face it, you know, it's not the days of get your engineering degree and go interview for a job and then get slotted in and get the intern, you know, the programs and you'd matriculate through the system. This is multiple disciplines, cybersecurity points at that. You could be smart in math and have a degree in anthropology and be one of the best cyber talents on the planet. So this is a new, new world, what are some creative approaches that's going to work for you? >> Alright, good job, one of the things, I think that's a challenge to us is, you know, somehow we got me working for, with the government, sexy right? You know, part of the challenge we have is attracting the right level of skill sets and personnel but, you know, we're competing, oftentimes, with the commercial side, the gaming industry as examples is a big deal. And those are the same talents we need to support a lot of the programs that we have in DOD. So somehow we have do a better job to Steve's point about making the work within DOD, within the government, something that they would be interested early on. So attract them early, you know, I could not talk about Cal Poly's challenge program that they were going to have in June inviting high school kids really excited about the whole idea of space and cyber security and so on. Those are some of the things that I think we have to do and continue to do over the course of the next several years. >> Awesome, any other creative approaches that you guys see working or might be an idea, or just to kind of stoke the ideation out there? Internships, obviously internships are known, but like, there's got to be new ways. >> Alright, I think you can take what Steve was talking about earlier, getting students in high school and aligning them sometimes at first internship, not just between the freshman and sophomore year, but before they enter Cal Poly per se and they're involved. So I think that's absolutely key, getting them involved in many other ways. We have an example of upskilling or work redevelopment here in the central coast, PG&E Diablo nuclear plant that is going to decommission in around 2024. And so we have a ongoing partnership to work and reposition those employees for the future. So that's, you know, engineering and beyond but think about that just in the manner that you were talking about. So the upskilling and reskilling, and I think that's where, you know, we were talking about that Purdue University, other California universities have been dealing with online programs before COVID, and now with COVID so many more Faculty were pushed into that area, there's going to be a much more going and talk about workforce development in upskilling and reskilling, the amount of training and education of our faculty across the country in virtual and delivery has been huge. So there's always a silver linings in the cloud. >> I want to get your guys' thoughts on one final question as we end the segment, and we've seen on the commercial side with cloud computing on these highly accelerated environments where, you know, SAS business model subscription, and that's on the business side, but one of the things that's clear in this trend is technology and people work together and technology augments the people components. So I'd love to get your thoughts as we look at a world now, we're living in COVID, and Cal Poly, you guys have remote learning right now, it's at the infancy, it's a whole new disruption, if you will, but also an opportunity enable new ways to encollaborate, So if you look at people and technology, can you guys share your view and vision on how communities can be developed, how these digital technologies and people can work together faster to get to the truth or make a discovery, hire, develop the workforce, these are opportunities, how do you guys view this new digital transformation? >> Well, I think there's huge opportunities and just what we're doing with this symposium, we're filming this on Monday and it's going to stream live and then the three of us, the four of us can participate and chat with participants while it's going on. That's amazing and I appreciate you, John, you bringing that to this symposium. I think there's more and more that we can do. From a Cal Poly perspective, with our pedagogy so, you know, linked to learn by doing in-person will always be important to us, but we see virtual, we see partnerships like this, can expand and enhance our ability and minimize the in-person time, decrease the time to degree, enhance graduation rate, eliminate opportunity gaps for students that don't have the same advantages. So I think the technological aspect of this is tremendous. Then on the upskilling and reskilling, where employees are all over, they can re be reached virtually, and then maybe they come to a location or really advanced technology allows them to get hands on virtually, or they come to that location and get it in a hybrid format. So I'm very excited about the future and what we can do, and it's going to be different with every university, with every partnership. It's one size does not fit all, There's so many possibilities, Bong, I can almost imagine that social network that has a verified, you know, secure clearance. I can jump in, and have a little cloak of secrecy and collaborate with the DOD possibly in the future. But these are the kind of crazy ideas that are needed, your thoughts on this whole digital transformation cross-pollination. >> I think technology is going to be revolutionary here, John, you know, we're focusing lately on what we call visual engineering to quicken the pace of the delivery capability to warfighter as an example, I think AI, Machine Language, all that's going to have a major play in how we operate in the future. We're embracing 5G technologies, and the ability for zero latency, more IOT, more automation of the supply chain, that sort of thing, I think the future ahead of us is very encouraging, I think it's going to do a lot for national defense, and certainly the security of the country. >> Steve, your final thoughts, space systems are systems, and they're connected to other systems that are connected to people, your thoughts on this digital transformation opportunity. >> Such a great question and such a fun, great challenge ahead of us. Echoing my colleagues sentiments, I would add to it, you know, a lot of this has, I think we should do some focusing on campaigning so that people can feel comfortable to include the Congress to do things a little bit differently. You know, we're not attuned to doing things fast, but the dramatic, you know, the way technology is just going like crazy right now, I think it ties back to, hoping to convince some of our senior leaders and what I call both sides of the Potomac river, that it's worth taking this gamble, we do need to take some of these things you know, in a very proactive way. And I'm very confident and excited and comfortable that this is going to be a great time ahead and all for the better. >> You know, I always think of myself when I talk about DC 'cause I'm not a lawyer and I'm not a political person, but I always say less lawyers, more techies than in Congress and Senate, so (laughter)I always get in trouble when I say that. Sorry, President Armstrong, go ahead. >> Yeah, no, just one other point and Steve's alluded to this and Bong did as well, I mean, we've got to be less risk averse in these partnerships, that doesn't mean reckless, but we have to be less risk averse. And also, as you talk about technology, I have to reflect on something that happened and you both talked a bit about Bill Britton and his impact on Cal Poly and what we're doing. But we were faced a few years ago of replacing traditional data, a data warehouse, data storage, data center and we partnered with AWS and thank goodness, we had that in progress and it enhanced our bandwidth on our campus before COVID hit, and with this partnership with the digital transformation hub, so there's a great example where we had that going. That's not something we could have started, "Oh COVID hit, let's flip that switch." And so we have to be proactive and we also have to not be risk-averse and do some things differently. That has really salvaged the experience for our students right now, as things are flowing well. We only have about 12% of our courses in person, those essential courses and I'm just grateful for those partnerships that I have talked about today. >> And it's a shining example of how being agile, continuous operations, these are themes that expand the space and the next workforce needs to be built. Gentlemen, thank you very much for sharing your insights, I know Bong, you're going to go into the defense side of space in your other sessions. Thank you gentlemen, for your time, for a great session, I appreciate it. >> Thank you. >> Thank you gentlemen. >> Thank you. >> Thank you. >> Thank you, thank you all. I'm John Furey with The Cube here in Palo Alto, California covering and hosting with Cal Poly, the Space and Cybersecurity Symposium 2020, thanks for watching. (bright atmospheric music)
SUMMARY :
the globe, it's The Cube, and of course Steve Jacques on how you see the development and the California National Guard. to you guys over there, Cal Poly and the NSSA have and freedom to operate and nurture the workforce in the crime scene and, you and it's also in the context and the generation before me, So the pipeline needs to be strengthened, does have the same challenges, and likewise on the industry side, and I need you to look at the students and something that we in business and in the public sector. so the students can learn to hack, to the modern version miss the fall if you will, and the industry folks and academia, That's a great point, and echo both the Bong and bringing in kind of the new way, and continue to do over the course but like, there's got to be new ways. and I think that's where, you and that's on the business side, and it's going to be different and certainly the security of the country. and they're connected to other systems and all for the better. of myself when I talk about DC and Steve's alluded to and the next workforce needs to be built. the Space and Cybersecurity
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
Steve | PERSON | 0.99+ |
Chuck | PERSON | 0.99+ |
John | PERSON | 0.99+ |
Joe | PERSON | 0.99+ |
Bob | PERSON | 0.99+ |
Chris Samson | PERSON | 0.99+ |
NSSA | ORGANIZATION | 0.99+ |
Jeff Bezos | PERSON | 0.99+ |
Cal Poly | ORGANIZATION | 0.99+ |
Boeing | ORGANIZATION | 0.99+ |
Steve Jacques | PERSON | 0.99+ |
Bill Britton | PERSON | 0.99+ |
AWS | ORGANIZATION | 0.99+ |
Rachel | PERSON | 0.99+ |
NOAA | ORGANIZATION | 0.99+ |
Jeff Armstrong | PERSON | 0.99+ |
Northrop Grumman | ORGANIZATION | 0.99+ |
PG&E | ORGANIZATION | 0.99+ |
2007 | DATE | 0.99+ |
Chuck Beames | PERSON | 0.99+ |
National Security Space Association | ORGANIZATION | 0.99+ |
National Security Space Enterprise | ORGANIZATION | 0.99+ |
United States Space Command | ORGANIZATION | 0.99+ |
Department of Defense | ORGANIZATION | 0.99+ |
California | LOCATION | 0.99+ |
Lockheed Martin | ORGANIZATION | 0.99+ |
California National Guard | ORGANIZATION | 0.99+ |
United States Space Force | ORGANIZATION | 0.99+ |
Amazon Web Services | ORGANIZATION | 0.99+ |
Rachel Sims | PERSON | 0.99+ |
JPL | ORGANIZATION | 0.99+ |
Steven | PERSON | 0.99+ |
Jeff | PERSON | 0.99+ |
DOD | ORGANIZATION | 0.99+ |
one | QUANTITY | 0.99+ |
Space X | ORGANIZATION | 0.99+ |
Jeffrey | PERSON | 0.99+ |
Jane | PERSON | 0.99+ |
Johnny | PERSON | 0.99+ |
John Furey | PERSON | 0.99+ |
Cal Poly | ORGANIZATION | 0.99+ |
National Security Space Association | ORGANIZATION | 0.99+ |
Armstrong | PERSON | 0.99+ |
June | DATE | 0.99+ |
2013 | DATE | 0.99+ |
Singapore | LOCATION | 0.99+ |
United States | LOCATION | 0.99+ |
New York | LOCATION | 0.99+ |
U.S. Space Force | ORGANIZATION | 0.99+ |
Bong | PERSON | 0.99+ |
Elon Musk | PERSON | 0.99+ |
Siri | TITLE | 0.99+ |
Joe McMann & Bob Meindl, Capgemini | RSAC USA 2020
>>Fly from San Francisco. It's the cube covering RSA conference 2020 San Francisco brought to you by Silicon angled medias >>live in. Welcome to the cube coverage here in San Francisco at Moscone hall for RSA 2020 I'm John furrier, host of the cube. We're here breaking down all the actions in cyber security. I'll say three days of wall-to-wall cube coverage. You got two great guests here, experts in the cybersecurity enterprise security space. Over 25 years. We've got two gurus and experts. We've got Bob Mindell, executive vice president of North America cyber practice for cap Gemini and Joe McMahon, head of North America cyber strategy, even a practitioner in the intelligence community. Langley, you've been in the business for 25 years. You've seen the waves guys, welcome to the cube. Thank you John. Thanks for having us. So first let's just take a step back. A cyber certainly on the number one agenda kind of already kind of broken out of it in terms of status, board level conversation, every CSO, risk management and a lot of moving parts. >>Now, cyber is not just a segment in the industry. It is the industry. Bob, this is a big part of business challenge today. What's your view? What was going on? So John has a great point. It's actually a business challenge and that's one of the reasons why it's now the top challenge. It's been a tech challenge for a long time. It wasn't always a business challenge for you as was still considered an it challenge and once it started impacting business and got into a board level discussion, it's now top of mind as a business challenge and how it can really impact the business continuity. Joe is talking before we came on camera about you know CEOs can have good days here and there and bad days then but sees us all have bad days all the time because there's so much, it's so hard. You're on the operations side. >>You see a day to day in the trenches as well as the strategy. This is really an operations operationalizing model. As new technology comes out, the challenge is operationalizing them for not only a business benefit but business risk management. It's like changing an airplane engine out at 35,000 feet. It's really hard. What are you seeing as the core challenge? This is not easy. It's a really complex industry. I mean, you take the word cybersecurity, right? Ready? Cybersecurity conference. I see technology, I see a multitude of different challenges that are trying to be solved. It means something different to everybody, and that's part of the problem is it's a really broad ecosystem that we're in. If you meet one person that says, I know all of cyber, they're lying, right? It's just like saying, I know active directory and GRC and I know DNS and I know how to, how to code, right? >>Those people don't exist and cyber is a little bit the same way. So for me, it's just recognizing the intricacies. It's figuring out the complexities, how people processing technology really fit together and it's an operation. It is an ongoing, and during operation, this isn't a program that you can run. You run it for a year, you install and you're done. There's ebbs and flows. You talked about the CISOs and the bad days. There's wins and there's losses. Yeah. And I think part of that is just having the conversation with businesses. Just like in it, you have bad days and good days wins and losses. It's the same thing in cybersecurity and we've got to set that expectation. Yeah, you didn't bring up a good point. I've been saying this on the cube and we've been having conversations around this. It used to be security as part of it, right? >>But now that it's part of the business, the things that you're mentioning around people, process, technology, the class, that kind of transformational formula, it is business issues, organizational behavior. Not everyone's an expert specialism versus generalists. So this is like not just a secure thing, it's the business model of a company is changing. So that's clear. There's no doubt. And then you've got the completion of the cloud coming, public cloud, hybrid multi-cloud. Bob, this is a number one architectural challenge. So outside of the blocking and tackling basics, right, there's now the future business is at risk. What does cap Gemini do? And because you guys are well known, great brand, helping companies be successful, how do you guys go to customers and say, Hey, here's what you do. What's the, what's the cap Gemini story? >>So the cat termini stories is really about increasing your cybersecurity maturity, right? As Joe said, starting out at the basics. If you look at a lot of the breaches that have occurred today have occurred because we got away from the basics and the fundamentals, right? Shiny new ball syndrome. Really. Exactly exasperates that getting away from the basics. So the technology is an enabler, but it's not the be all and end all right, go into the cloud is absolutely a major issue. That's increasing the perimeter, right? We've gone through multiple ways as we talked about, right? So now cloud is is another way, cloud, mobile, social. How do you deal with those from on prem, off prem. But ultimately it's about increasing your cyber cyber security maturity and using the cloud as just increasing the perimeter, right? So you need to, you really need to understand, you have your first line defense and then your maturity is in place. Whether the data resides in your organization, in the cloud, on a mobile device, in a social media, you're responsible for it all. And if you don't have the basics, then you're, you're really, and you guys bring a playbook, is that what you guys come in and do? Correct. Correct. Right. So our goal is to coordinate people, process technology and leverage playbooks, leverage the run books that we had been using for many years. >>I want to get down to you on this one because of what happens when you take that to the, into the practitioner mode or at implementation. Customers want the best technology possible. They go for the shiny new choice. Bob just laid out. There's also risks too because it may or may not be big. So you've got to balance out. I got to get an edge technically because the perimeters becoming huge surface area now or some say has gone. Now you've got edge, just all one big exposed environment, surface area for vulnerabilities is massive. So I need better tech. How do you balance and obtain the best tech and making sure it works and it's in production and secure. So there's a couple of things, right, and this is not, it's not just our, and you'll hear it from other people that have been around a long time, but a lot of organizations that we see have built themselves so that their cybersecurity organization is supporting all these tools that we see. >>That's the wrong way to do it. The tools should support the mission of the organization, right? If my mission is to defend my enterprise, there are certain things that I need to do, right? There's questions I need to be able to ask and get answers to. There's data I need visibility into. There's protections and controls I need to be able to implement. If I can lay those out in some coordinated strategic fashion and say, here's all the things I'm trying to accomplish, here's who's going to do it. Here's my really good team, here's my skilled resources, here's my workflows, my processes, all that type of stuff. Then I can go find the right technology to put into that. And I can actually measure if that technology is effective in supporting my mission. But too often we start with the technology and then we hammer against it and we run into CISOs and they say, I bought all this stuff and it's not working and come hell yeah. >>And that's backing into it the wrong. So I've heard from CSOs, I'd like they buying all these tools. It's like a tool shed. Don't be the fool with the wrong tool as they I say. But that brings up the question of, okay, as you guys go to customers, what are some of the main pain points or issues that they're trying to overcome that that are opportunities that you guys are helping with? Uh, on the business side and on the technical side, what are some of the things? So on the business side, you know, one is depending on their level of maturity and the maturity of the organization and the board of directors and their belief in, in how they need to help fund this. We can start there. We can start by helping draw out the threat landscape within that organization where they are maturity-wise and where they need to go and help them craft that message to the board of directors and get executive sponsorship from the board down in order to take them from baby, a very immature organization or you know, a reactive organization to an adaptive organization, right. >>And really become defenders. So from a business perspective, we can help them there. From the technology perspective, Joe, uh, you know, or an implementation perspective. I think, you know, it's been a really interesting road like being in this a long time, you know, late two thousands when nation States were first really starting to become a thing. All the industries we were talking to, every customer is like, I want to be the best in my industry. I want to be the shining example. And boards in leadership were throwing money at it and everybody was on this really aggressive path to get there. The conversation is shifted a little bit with a lot of the leadership we talked to. It's, I just want to be good enough, maybe a little bit better than good enough, but my, my objective anymore is it to leave the industry. Cause that's really expensive and there's only one of those. >>My objective is to complete my mission maybe a little bit above and beyond, but I need the right size and right. So we spent a lot of time helping organizations, I would say optimize, right? It's what is the right level of people, what is the right amount of resources, what's the right spend, what's the right investment, the right allocation of technology and mix of everything, right? And sometimes it's finding the right partner. Sometimes it's doing certain things in house. It's, there's no one way to solve this problem, but you've got to go look at the business challenges. Look at the operational realities of the customer, their budgets, all those, their geographies mattered, right? Some places it's easy to hire talent. Some places it's not so easy to hire talent. And that's a good point, right? Some organizations, >>they just need to understand what does good look like and we can, we have so many years of experience. We have so many customers use skates is we've been there and we've done that. We can bring the band and show them this is what good looks like and this is sustainable >>of what good looks like. I want to get your reactions to, I was talking to Keith Alexander, general Keith Alexander, a former cyber command had last night and we were talking about officers, his defense and that kind of reaction. How the Sony hack was was just was just, they just went after him as an example. Everyone knows about that hack, but he really was getting at the idea of human efficiency, the human equation, which is if you have someone working on something that here, but their counterpart might be working on it maybe from a different company or in the same company, they're redundant. So there's a lot of burnout, a lot of people putting out fires. So reactive is clearly, I see as a big trend that the conversation's shifting towards let's be proactive, let's get more efficient in the collaboration as well as the technology. What you, how do you guys react to that? What's your view on that statement? So >>people is the number one issue, in my opinion. In this space, there's a shortage of people. The people that are in it are working very long hours. They're burnt out. So we constantly need to be training and bringing more people into the industry. Then there's the scenario around information sharing, right? Threat information sharing, and then what levels are you comfortable with as an organization to share that information? How can you share best practices? So that's where the ice sacks come into play. That's also where us as a practitioner and we have communities, we have customers, we bring them together to really information, share, share, best practice. It's in all of our best interests. We all have the same goal and the goal is to protect our assets, especially in the United States. We have to protect our assets. So we need, the good thing is that it's a pretty open community in that regards and sharing the information, training people, getting people more mature in their people, process technology, how they can go execute it. >>Yeah. What's your take on the whole human equation piece? Right? So sharing day, you probably heard a word and the word goes back to where I came from, from my heritage as well, but I'm sure general Alexander used the word mission at some point, right? So to me, that's the single biggest rallying point for all of the people in this. If you're in this for the right reasons, it's because you care about the mission. The mission is to defend us. Stop the bad guys from doing days, right? Whether you're defending the government, whether you're defending a commercial enterprise, whether you're defending the general public, right? Whatever the case is, if you're concerned, you know, if you believe in the mission, if you're committed to the mission, that's where the energy comes from. You know, there's a lot of, there's a lot of talk about the skill gap and the talent gap and all of those types of things. >>To me, it's more of a mindset issue than anything. Right? The skill sets can be taught. They can be picked up over time. I was a philosophy major. All right? Somehow I ended up here. I have no idea how, um, but it's because I cared about the mission and everybody has a part to play. If you build that peer network, uh, both at an individual level and at an organizational and a company level, that's really important in this. Nobody's, nobody's an expert at everything. Like we said, you brought a philosophy. I think one of the things I have observed in interviewing and talking to people is that the world's changed so much that you almost need those fresh perspectives because the problems are new problems, statements, technology is just a part of the problem set back to the culture. The customer problem, Bob, is that they got to get all this work done. >>And so what are some of the use cases that you guys are working on that that is a low hanging fruit in the industry or our customer base? How do you guys engage with customers? So our target market is fortune 500 global 1000 so the biggest of the big enterprises in the world, right? And because of that, we've seen a lot of a complex environments, multinational companies as our customers. Right? We don't go at it from a pure vertical base scenario or a vertical base solution. We believe that horizontal cybersecurity can it be applied to most verticals. Right. And there's some tweaking along the way. Like in financial services, there's regulars and FFIC that you need to be sure you adapt to. But for the most part the fundamentals are applicable. All right. With that said, you know, large multinational manufacturing organization, right? They have a major challenge in that they have manufacturing sites all over the world. >>They building something that is, you know, unique. It has significant IP to it, but it's not secure. Historically they would have said, well, nobody's really gonna just deal steal what we do because it's really not differentiated in the world, but it is differentiated and it's a large corporation making a lot of money. Unfortunately ransomware, that'd be a photographer. Ransomware immediately, right? Like exact down their operations and their network, right? So their network goes down. They can have, they can, they can not have zero downtown and their manufacturing plants around the world. So for us, we're implementing solutions and it's an SLA for them is less than six seconds downtime by two that help secure these global manufacturing environment. That's classic naive when they are it. Oh wow. We've got to think about security on a much broader level. I guess the question I have for you guys, Joe, you talk about when do you guys get called in? >>I mean what's your main value proposition that you guys, cause you guys got a broad view of the industry, that expertise. Why do, why are customers calling you guys and what do you guys deliver? They need something that actually works, right? It's, it's you mentioned earlier, I think when we were talking how important experiences, right? And it's, Bob said it too, having been there, done that I think is really important. The fact that we're not chasing hype, we're not selling widgets. That we have an idea of what good looks like and we can help an organization kind of, you know, navigate that path to get there is really important. So, uh, you know, one of our other customers, large logistics company, been operating for a very long time. You know, very, very mature in terms of their, it operations, those types of things. But they've also grown through merger and acquisition. >>That's a challenge, uh, cause you're taking on somebody else's problem set and they just realize, simply put that their existing security operations wasn't meeting their needs. So we didn't come in and do anything fancy necessarily. It's put a strategic plan in place, figure out where they are today, what are the gaps, what do they need to do to overcome those gaps? Let's go look at their daily operations, their concept of operations, their mission, their vision, all of that stuff down to the individual analysts. Like we talked about the mindset and skillset. But then frankly it's putting in the hard work, right? And nobody wants to put in the heart. I don't want to say nobody wants to put in the hard work. That's fun. There's a lot of words that's gets done I guess by the questions that you guys getting called in on from CSOs chief and Mason security officers. >>Guess who calls you? So usually we're in talking to the Cisco, right? We're having the strategic level conversation with the Cisco because the Cisco either has come in new or has been there. They may have had a breach. Then whatever that compelling event may be, they've come to the realization that they're not where they need to be from a maturity perspective and their cyber defense needs revamping. So that's our opportunity for us to help them really increase the maturity and help them become defenders. Guys, great for the insight. Thanks for coming on the cube. Really appreciate you sharing the insights. Guys. Give a quick plug for what you guys are doing. Cap Gemini, you guys are growing. What do you guys look to do? What are some of the things that's going on? Give the company plug. Thanks Sean show. It's been a very interesting journey. >>You know this business started out from Lockheed Martin to Leidos cyber. We were acquired by cap Gemini a year ago last week. It's a very exciting time. We're growing the business significantly. We have huge growth targets for 2020 and beyond, right? We're now over 800 practitioners in North America, over 2,500 practitioners globally, and we believe that we have some very unique differentiated skill sets that can help large enterprises increase their maturity and capabilities plug there. Yeah, I mean, look, nothing makes us happier than getting wins when we're working with an organization and we get to watch a mid level analyst brief the so that they just found this particular attack and Oh by the way, because we're mature and we're effective, that we were able to stop it and prevent any impact to the company. That's what makes me proud. That's what makes it so it makes it fun. >>Final question. We got a lot of CSOs in our community. They're watching. What's the pitch to the CSO? Why, why you guys, we'd love to come in to understand what are their goals, how can we help them, but ultimately where do they believe they think they are and where do they need to go and we can help them walk that journey. Whether it's six months, a year, three years, five years. We can take them along that journey and increase the cyber defense maturity. Joe, speak to the CSO. What are they getting? They're getting confidence. They're getting execution. They're getting commitment to delivery. They're getting basically a, a partner in this whole engagement. We're not a vendor. We're not a service provider. We are a partner. A trusted partner. Yeah, partnerships is key. Building out in real time. A lot new threats. Got to be on offense and defense going on. A lot of new tech to deal with. I mean, it's a board level for a long time. Guys, thanks for coming on. Cap Gemini here inside the cube, bringing their practices, cybersecurity, years of experience with big growth targets. Check them out. I'm John with the cube. Thanks for watching.
SUMMARY :
It's the cube covering John furrier, host of the cube. It's actually a business challenge and that's one of the reasons why it's now the As new technology comes out, the challenge is operationalizing So for me, it's just recognizing the intricacies. But now that it's part of the business, the things that you're mentioning around people, process, So the technology is an enabler, but it's not the be all and end all right, I want to get down to you on this one because of what happens when you take that to the, into the practitioner mode or at implementation. Then I can go find the right technology to put into that. So on the business side, you know, From the technology perspective, Joe, uh, you know, or an implementation perspective. Look at the operational realities of the customer, their budgets, all those, their geographies mattered, We can bring the band and show them efficiency, the human equation, which is if you have someone working on something We all have the same goal and the goal is to protect our assets, of the people in this. statements, technology is just a part of the problem set back to the culture. So our target market is fortune 500 global 1000 so the biggest of the big I guess the question I have for you guys, Joe, you talk about when do you guys get called in? Why do, why are customers calling you guys and what do you guys deliver? There's a lot of words that's gets done I guess by the questions that you guys getting called in on from CSOs chief and Mason We're having the strategic level conversation with the Cisco because the Cisco either has We're growing the business significantly. What's the pitch to the
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
Joe | PERSON | 0.99+ |
Joe McMahon | PERSON | 0.99+ |
Keith Alexander | PERSON | 0.99+ |
Bob Mindell | PERSON | 0.99+ |
Cisco | ORGANIZATION | 0.99+ |
John | PERSON | 0.99+ |
2020 | DATE | 0.99+ |
six months | QUANTITY | 0.99+ |
five years | QUANTITY | 0.99+ |
three years | QUANTITY | 0.99+ |
Lockheed Martin | ORGANIZATION | 0.99+ |
Bob | PERSON | 0.99+ |
25 years | QUANTITY | 0.99+ |
San Francisco | LOCATION | 0.99+ |
35,000 feet | QUANTITY | 0.99+ |
Alexander | PERSON | 0.99+ |
North America | LOCATION | 0.99+ |
Bob Meindl | PERSON | 0.99+ |
less than six seconds | QUANTITY | 0.99+ |
United States | LOCATION | 0.99+ |
Sony | ORGANIZATION | 0.99+ |
over 2,500 practitioners | QUANTITY | 0.99+ |
one | QUANTITY | 0.99+ |
two gurus | QUANTITY | 0.99+ |
two | QUANTITY | 0.99+ |
FFIC | ORGANIZATION | 0.99+ |
Langley | PERSON | 0.99+ |
Joe McMann | PERSON | 0.98+ |
both | QUANTITY | 0.98+ |
first line | QUANTITY | 0.98+ |
last night | DATE | 0.98+ |
Sean | PERSON | 0.98+ |
Capgemini | ORGANIZATION | 0.98+ |
Mason | ORGANIZATION | 0.98+ |
two great guests | QUANTITY | 0.98+ |
a year ago | DATE | 0.98+ |
a year | QUANTITY | 0.98+ |
today | DATE | 0.98+ |
over 800 practitioners | QUANTITY | 0.98+ |
first | QUANTITY | 0.98+ |
three days | QUANTITY | 0.97+ |
RSAC | ORGANIZATION | 0.97+ |
Over 25 years | QUANTITY | 0.97+ |
Gemini | PERSON | 0.97+ |
Leidos | ORGANIZATION | 0.96+ |
1000 | QUANTITY | 0.96+ |
cap Gemini | ORGANIZATION | 0.95+ |
one person | QUANTITY | 0.92+ |
Moscone hall | LOCATION | 0.88+ |
USA | LOCATION | 0.87+ |
RSA 2020 | EVENT | 0.83+ |
CSOs | ORGANIZATION | 0.83+ |
one issue | QUANTITY | 0.8+ |
Cap | PERSON | 0.78+ |
executive | PERSON | 0.78+ |
single biggest | QUANTITY | 0.77+ |
RSA conference 2020 | EVENT | 0.76+ |
zero | QUANTITY | 0.76+ |
John furrier | PERSON | 0.74+ |
North | LOCATION | 0.72+ |
last week | DATE | 0.72+ |
Cap Gemini | ORGANIZATION | 0.71+ |
GRC | ORGANIZATION | 0.71+ |
Silicon | ORGANIZATION | 0.67+ |
North America | ORGANIZATION | 0.65+ |
fortune | QUANTITY | 0.59+ |
two thousands | QUANTITY | 0.58+ |
America | ORGANIZATION | 0.46+ |
500 | QUANTITY | 0.38+ |
Sanjay Munshi, NETSCOUT | CUBEConversation, June 2019
>> from our studios in the heart of Silicon Valley. HOLLOWAY ALTO, California It is a cube conversation. >> Hi, and welcome to the Cube studios for another cube conversation where we go in depth with thought leaders driving innovation across the tech industry. I'm your host today, Peter Boris. One of the biggest challenges that every enterprise faces is how best to focus attention on the most important assets that are driving or facilitating that drive the digital business and digital business transformation. There's been a lot of emphasis over the last 50 years in tech on the hardware assets, but increasingly we need to look at the elements of it that are actually creating net new value within a business now, maybe the people, the services and the data that make digital business possible. And that requires that we rethink our approach is to how we actually manage, conceive of and monitor those key assets and is likely to lead to some very interesting unification Tze over the next few years, especially in SEC ups and neck cops now and have that conversation got a great guest today. Sanjay Moon. She is the vice president, product management, that net scout Technologies. Sanjay, welcome to the >> Cube. Thank you, Peter. Thank you. >> So, Sanjay, I said a lot upfront. But before we get into that, tell us a little bit about Net Scout. >> Thank you, Peter, for the introduction. Net Scout is a smart data company. Net Scout has three decades of leadership and innovation in troubleshooting monitoring and securing it based networks. We are deployed in 90% off the Fortune 500 companies and 90% off the top communication service providers. World White. We have 50% market teacher In each of the three segments that we playing. Where is the next biggest competitor? We have has less than 5%. Those three areas are number one network and application performance monitoring for hybrid cloud infrastructure for enterprises, D does and on security for enterprise and service providers and service assurance for service providers, which includes mobile operators, cable providers as well as I speak. Today we operate in 50 plus countries worldwide. We have 25 100 plus employees and 500 plus pattern store credit. >> Impressive story. Let's get right to the issue, though, and how Net scout is actually participating in some of these crucial transformations. I mentioned upfront that one of the biggest challenges that every enterprise has is to focus Maura their attention on those digital assets that are actually driving change and new sources of value named of the data, the services and the devices and the people, the applications or people that use those. So one >> of >> the challenges that we've had is that, ah, focus on devices leads to a focus on certain classes of data that are mainly improved or focus on improving the productivity of devices. Give us a background and how that's what that means. >> Let me in to do the concept of smart data that's that's born out ofthe nets, calibrated with smart data. Next called Pioneer. The leverage off Wired ate our package data three decades back that drives over ingenious portfolio that drives net ops and cloud tops. S i r. Adapt to service intelligence. This is a smart data that comes out ofthe packets with S I smart data. We uniquely converge application and network performance monitoring you are customers Toro visibility across application tears and two and networks and diverse data center locations. >> So just toe pick up on that moving away from a log focus, which is again mainly, Let's improve the productivity of the device. We're moving in a sigh, which is focus on Let's improve the productivity of the connection in the application. >> Absolutely absolute. And we'll talk a little bit more about long. Let's talk about Log and Net flew other sources of data that folks have gravitated towards, which is not there, not there, not authority to by any means. Let's say log data, for example, this log data, you know, as soon as a threat actor, for example, gets access to your systems. The first thing the protector will do is to turn off flogging are doing verse changed the log days, change the cyst, log messaging itself. Let's take a look at net flow data. For example, Net flow data number one Problem is, it's not Doesn't have layers. Seven. Intelligence, innit? Number two. It's not generated by all the devices in the network. For example, the Coyote devices do not generate any kind of flow data, so only data that authoritative and that comes with high fidelity is packet or wire data. That's one element off of smart data that we have the other element of smart data comes from our arbor portfolio. Arbor products are deployed in 400 plus tier one operators, mobile operators and service providers worldwide. And as such, we see 1/3 of the Internet traffic to our strategically located. Sensors in the service provider corps were able to generate another type of smart data that we call Atlas Intelligence feed R A F in sharp air for it. Plus intelligence Feed essentially tracks cyber reputation across domains across joe locations and across user identities. The combination of the A S I smart data that is generated from the core of the hybrid cloud infrastructure. Let's call it intranet and F Smart data that is generated from the Internet Corps gives Net Scout a unique data set combination that's unparalleled in the marketplace and makes us perhaps Lee, one of the food vendors who can drive a consolidated visibility architectures across net ops, cloud ups and second >> Okay, So let's turn that into against very practical things for folks, because what it has historically done is by focusing on individual devices or classes of devices and the data that those devices generate, they end up with a panoply Ah, wide arrangement of security tools that are each good at optimizing those devices with those, he said, they may not necessarily be a forte tive, but it's difficult to weave that into a consolidated, unified SEC ops Net ops overall, not just architecture but platform for performing the work crucial work of sustaining your digital business infrastructure. How does smart data translate into unified operation >> is appoint Peter? Thank you. That's a very good point. So let me give an example and talk about the customers that we have deployed our smart data, our hybrid cloud infrastructure. This is a typical Fortune 500 where we are deployed. Next card is deployed as the hybrid cloud monitoring infrastructure, and the networks in the club cloud upside. Typically, you will see this type of organization has one tool to cover the entire hybrid cloud monitoring infrastructure across their entire portfolio, whether it is on Prem, whether it's in the cloud, whether it's in the core location facility. But when you look at the SEC locks and the security side, the story is completely different. The same organization, the same Enterprise customer, has 25 to 30 different disparate display tools As a matter of fact, analysts are saying today that a typical Fortune 500 the US has 70 disparate security tools. Why is that the case? Why is it that on the net tops and cloud upside, they need 11 tool net scout, for example? But in the second up there, 70 different products. The reason is not only smart data but also smart architecture. So what? We have seen what we have done over the past three decades, We have designed this two tier architecture that generates Margarita. The dear one is our distributed instrumentation of sense of framework, which we call in Finnish Stream or the Stream. This is the distributor sensor framework that is deployed in the hybrid cloud infrastructure that generates the smart data. And then we had the centralized Analytics layer, which is our ingenious platform that essentially correlates data across the hybrid cloud infrastructure and provide customers complete visibility across the portfolio off the data centers. On the second upside, security side security is roughly 1 10 to 15 years old. Security tried to emulate the studio model as well, but the security industry failed. In doing that, nobody could design this distributed sensor instrumentation cost effectively tto make violate our feasible for analytics with the result they migrated to. As you said, this subpar sources of data like CeCe log like net flow. And today they put all the emphasis on the analytics layer with the result. They need one tool for use case or one vendor per use case on the second offside. And that's why you see the two proliferation because they don't have this distributed sensor framework that will make violate our package data feasible for the analytics lately. >> And I want I want to build on something you're saying because, uh, the it's a It's a misperception that all resources and all work of digital business and technology is going to end up in a central crowd location. The cloud really is an architecture form or broad distribution of data and work, which means, ultimately, that if we don't deal with this proliferation security tools now we're going tow. Probably have an even greater explosion in the number of security tools, which will mohr radically diminish or ability to establish new classes of options and digital business. >> Very good point. As a matter of fact, just a couple of years back, the average number of tools was 40 in in a SEC cops portfolio on enterprise has in the U. S. To date 70 it could go 200. But if you look at the risk profile, well, this profile has stayed the same, are in and make mint. Many cases deteriorated, right? What we found is the tool that a number of tools is going up. The cost of breaches going up the third. The number of breaches are going up, and at the same time, the number of analysts is always and Earth. So in short, high investments on the security side failed to reduce risk. So the risk and investment factor both are going in the north bound go, both are going up. So how do you control that? How do you make them come down? The only way? Smart data on a smart platform on a smart analytics later. >> Yeah. Again, let me emphasize this crucial point because it's one of things that we've seen in our conversation with clients is, ah, proliferation of tools. Proliferation of data leads to a proliferation of tasks and response responsibilities within a business, and you end up with more human failures of consequence. So by bringing all these things together, you end up with smarter data, smarter platform, simpler operations, more unified operations and get greater leverage. So so, let's talk then about ultimately, how should a business What's the road map? What's the next two or three things that an enterprise needs to do to start bringing these to start unifying these resources and generating the simplicity so that you open up greater strategic options for how you configure your digital business? >> That's a very good point. So >> two things we talked about already one is smart data relying on smart data, which comes from wide ate our package data. And the second is smart, smart architecture, which comprises of this two tier architecture with distributed instrumentation and centralized analytics. What happens when you do that is the first thing is early warning detection. What we have realized, Peter, is that if you look at the traditional kill chain in Lockheed Martin's kill chain, our miter mortal that people are using now traditional reconnaissance weaponization shin as well as ex filtration, we have seen that if you rely, if you generate analytics based on packet date are smart data, which we do as a net scow. You can detect these phases much earlier than if you rely on device data. Net floor, sis log. So what I call day minus not day zero, but day minus so leveraging the smart data and smart architecture. Er, we're able tto detect these threats or compromises much earlier than a traditional kill chain more than lot of miter models, >> but But again, the reason why is because we're looking at patterns in the traffic. >> We're looking at behavioral patterns in the traffic. That's correct. Let me go little bit more technical, if you will, were looking at transactions at the DNA's level, transactions at the CP level or at the active directly level that happened much earlier than when electoral movement or a reconnaissance is detected. This happens much earlier because we have the smart data, the wide ADA that enables us to do this early warning detection, >> get more visibility to source as opposed to the target. >> That's correct. The second thing that happens with US smart architecture, the two tier architecture is the consolidation of fuse case. We talked about it a little bit, so today if you want in our in our hybrid cloud scenario that we the next card is deployed in Fortune five hundreds. Over the past 23 decades, our customers have moved from private cloud infrastructure. First they had the core righty. Then they moved Private cloud. You know, I am Francisco. Then they moved echolocation clinics and others. And then they moved also to public cloud. All the workloads are migrating and everywhere we did not make any change to our instrumentation there. Can you believe it? No changes You only changes we made was in the analytics layer to take care of the news cases. So with the result, we could consolidate multiple whose case is in the cloud monitoring in tow. One platform, the smart platform that smart data. Now we're building that value into security with the smart platform and smart data that we talked about. So the consolidation of use cases on the security side is the second advantage other than the early warning detection that we talked about. >> So this has got to improve. Detection has got intrude. Management's gonna improve. Forensics. If I got that right, >> made a good point. And forensics we should talk about a little bit more. Perhaps the second set of things that we're doing is we have done is consolidate in the SEC upside forensics and detection. So let me explain that a little bit more. If you look at a typical enterprise today, they use Seymour security information and even management platforms to correlate data from multiple sources. So in the event off a seam alert, off alert generated best SIM platform forensics teams need to determine what happened and what systems were impacted. Essentially the what when, how, where off, the off the alert or the compromise that has been detected today. As we said, security teams are not using packet data at all but foreign. 16. In orderto validate that alert, they need toe access sessions. They need to access packets belonging to that Ellen, but they cannot today because none of the devices none of the security platforms is using violator in the first place. So what the security teams are doing? Forensic analysts. They're leveraging devices like via shark and tracking investigations with spreadsheets. This is delaying the investigation time. As you know today, it's well known that this cause is alert, fatigue and 50% of the alerts that are going to the seam today are disregarded by the security analysts. With the result, the real threats are getting unabated, and enterprises come to know about a security breach from the media rather than from their own IT department. >> Sanjay. So we've had a great conversation talking about how smart data smart platform is going to lead to greater unification of tasks, people, responsibilities and set ups and net tops and some of the it impacts on eh enterprises Overall response stance both from a detection, management and forensic standpoint. So what's going on? Thank you very much for being on the cue. Sanjay Moon. She Thank you. Thank you. And thanks again for joining us for the Cube conversation. We've been Sanjay Moon, she of Net scout technology. I'm Peter Burke's. See you next time
SUMMARY :
from our studios in the heart of Silicon Valley. One of the biggest challenges that every enterprise faces is how Thank you. But before we get into that, tell us a little bit about Net In each of the three segments that we playing. the devices and the people, the applications or people that use those. the challenges that we've had is that, ah, focus on devices leads to a focus This is a smart data that comes out ofthe packets with Let's improve the productivity of the device. The combination of the A S I smart data that classes of devices and the data that those devices generate, they end up with a that is deployed in the hybrid cloud infrastructure that generates the smart data. greater explosion in the number of security tools, which will mohr radically diminish or ability So in short, high investments on the security side failed to reduce risk. What's the next two or three things that an enterprise needs to do to start So And the second is smart, smart architecture, at the CP level or at the active directly level that So the consolidation of use cases on the security side is the second advantage other So this has got to improve. fatigue and 50% of the alerts that are going to the seam today are disregarded by the security Thank you very much for being on the cue.
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
Sanjay | PERSON | 0.99+ |
25 | QUANTITY | 0.99+ |
Peter Boris | PERSON | 0.99+ |
Sanjay Moon | PERSON | 0.99+ |
50% | QUANTITY | 0.99+ |
Sanjay Munshi | PERSON | 0.99+ |
June 2019 | DATE | 0.99+ |
Net Scout | ORGANIZATION | 0.99+ |
90% | QUANTITY | 0.99+ |
Silicon Valley | LOCATION | 0.99+ |
Peter | PERSON | 0.99+ |
Net Scout | ORGANIZATION | 0.99+ |
11 tool | QUANTITY | 0.99+ |
second advantage | QUANTITY | 0.99+ |
second set | QUANTITY | 0.99+ |
one tool | QUANTITY | 0.99+ |
40 | QUANTITY | 0.99+ |
two things | QUANTITY | 0.99+ |
50 plus countries | QUANTITY | 0.99+ |
Today | DATE | 0.99+ |
one | QUANTITY | 0.99+ |
One platform | QUANTITY | 0.99+ |
Internet Corps | ORGANIZATION | 0.99+ |
less than 5% | QUANTITY | 0.99+ |
both | QUANTITY | 0.99+ |
70 different products | QUANTITY | 0.99+ |
second | QUANTITY | 0.99+ |
70 disparate security tools | QUANTITY | 0.99+ |
SEC | ORGANIZATION | 0.99+ |
15 years | QUANTITY | 0.99+ |
two tier | QUANTITY | 0.99+ |
500 plus | QUANTITY | 0.99+ |
First | QUANTITY | 0.99+ |
Coyote | ORGANIZATION | 0.99+ |
one vendor | QUANTITY | 0.99+ |
today | DATE | 0.99+ |
Earth | LOCATION | 0.98+ |
second thing | QUANTITY | 0.98+ |
Peter Burke | PERSON | 0.98+ |
each | QUANTITY | 0.98+ |
three things | QUANTITY | 0.98+ |
200 | QUANTITY | 0.98+ |
U. S. | LOCATION | 0.98+ |
Lockheed Martin | ORGANIZATION | 0.98+ |
Atlas Intelligence | ORGANIZATION | 0.97+ |
third | QUANTITY | 0.97+ |
two | QUANTITY | 0.97+ |
25 100 plus employees | QUANTITY | 0.97+ |
One | QUANTITY | 0.97+ |
Fortune 500 | ORGANIZATION | 0.97+ |
three segments | QUANTITY | 0.97+ |
World White | ORGANIZATION | 0.97+ |
Lee | PERSON | 0.96+ |
US | LOCATION | 0.96+ |
Seymour | ORGANIZATION | 0.96+ |
first thing | QUANTITY | 0.95+ |
Seven | QUANTITY | 0.95+ |
Pioneer | ORGANIZATION | 0.94+ |
net scout Technologies | ORGANIZATION | 0.93+ |
three decades | QUANTITY | 0.93+ |
one element | QUANTITY | 0.93+ |
70 | QUANTITY | 0.91+ |
HOLLOWAY ALTO, California | LOCATION | 0.91+ |
Arbor | ORGANIZATION | 0.89+ |
day zero | QUANTITY | 0.89+ |
three decades back | DATE | 0.89+ |
Jim Whitehurst, Red Hat | Red Hat Summit 2019
>> live from Boston, Massachusetts. It's the queue covering your red. Have some twenty nineteen. You buy bread. >> Oh, good morning. Welcome back to our live coverage here on the Cube of Red Hat Summit twenty nineteen, along with two men. Timon, I'm John Walls were in Boston. A delightful day here in Beantown. Even made more so by the presidents of Jim White, her's president, CEO, Red hat. Jim, Thanks for joining us. Number one. Number two. What else could go right for you here this week? This has just been a great show. Great keynotes. You had great regulatory news on Monday. I mean, you've got a four leaf clover in that pocket there. I think for him >> to tell you what the weather is holding up well, for us, you're right with great partnership announcements. Amazing product launches. You have been a red hat, but eleven years now and this is only my third rail launch, right? When we deliver it, we commit to long lives. And so But it's awesome to be a part of that. And we had all the engineers on stage. I can't imagine how it could get any better. >> You >> win the lottery >> Oh, yeah? Well, yes. This one step at a time here. Relate and open share for we'LL get to those just a little bit. Let's go back to the keynote last night. First life, you have CEOs of IBM and Microsoft. Very big statements, right? We know about the IBM situation. I think a lot of people got a charge out of that a little bit. You know, Jenny commenting about have a death wish for this company. And I have thirty four billion reasons why I wanted to succeed. But a very good message. I think about this. This linkage that's about to occur, most likely. And the thought going forward from the IBM side of the fence? >> Yeah. I thought it was really good toe have her there. Not only to say that, you know, we're obviously bought it toe to make it grow, but also really making a statement about how important open source is to the future of IBM, right? Yeah. What became clear to me early on when we were talking is this is a major major. I would say that the company might be too strong a word, but it is a major kind of largest possible initiative around open source than you can imagine. And so I can't imagine, uh, imagine a better kind of validation of open source with one large technology companies the world basically going all in with us on it >> to talk about validation of open source, such a nadella up on stage. If you had told me five years ago that within a week I would see Satya Nadella up on stage with the CEO of'Em wear and then a week later up on stage with the CEO, right hat, I'm like, Are we talking about the same Microsoft? This is not the Microsoft that I grew up with on and worked with soap. We're talking your team and walking around. It wasn't just, you know, he flew in from Seattle. I did. The casino left. He was meeting with customers. There's a lot of product pieces that are going together, explain a little bit, that kind of the depth of the partnership and >> what we've made. Just tremendous progress over the last several years with Microsoft, you know, started back in two thousand fifteen. Where were you across certified hyper visors, And that's kind of a basic you know, let's work together. Over the last couple of years, it's truly blossomed into a really good partnership where, you know, I think they've and we both gotten over this, you know, Lennox versus Windows thing. And you know, I say, we've gotten over. I think we both recognized, you know, we need to serve our customers in the best possible way on that clearly means is two of the largest infrastructure software providers working closely together and what's been interesting. As we've gone forward, we find more and more common ground about how we could better serve our customers. Whether that's you know what might sound mundane. That's a big deal sequel server on Realm and setting benchmarks around that or dot net running on our platforms. Now all the way to really be able to deliver a hybrid cloud with a seamless experience with open shift from, you know, on premise to to Azure and having Deutsche Bank on State's twenty five a thousand containers running in production, moving back and forth to your >> you know what getting customers to change is challenging. You know, it's a little surprising even after that this morning to be like Oh, yeah. Let me pull up windows and log in and do all this stuff. We've talked to you a lot over the years about culture, you know, loved your book. We've talked a lot about it, but I really enjoyed. Last night is I mean, you had some powerful customers stories talking about how red hats helping them through the transformation. And like the Lockheed one for me was like And here's how we failed at first because we tried to go from waterfall to scrum Fall on. Do you know he definitely had the audience you're after? >> Yeah, I really wanted to make Mikey No talking about it called How we have so many great What's to talk about your rela a open ship for bringing all those capabilities from for OS. But I really wanted Teo talk about the hell, because that actually is the hardest part for customers. And so having kind of customers back in back to back to back, talking about success stories and failures to get there, and it really is about culture. And so that's where we called the open source way, which we kind of coin, which is, you know, beyond the code. It's, you know, meritocracy and how you get people to work together and collaboration. That's what more and more our customers want to talk about. In fact, I'd say ninety percent of the customer meetings I'm in, which are, you know, more CIA level meetings they're all about. Tell me about culture. Tell me how you go about doing that. Yeah, We trust the technology's gonna work. We don't have that issue with open source anymore. Everybody assumes you're gonna have open source. It's really how do you actually make that effective? And so that's what I really wanted to tow highlight over the course of the evening. >> You know, there was a lot of conversation, too. And you have your talking to Jenny about culture last night that you have multiple discussions over the course of the negotiation or of the conversations. So it wasn't just some cursory attention This I mean, the both of you had a really strong realization that this has to work in terms of this, you know, merging basically of philosophies and whatever. But you've had great success, right with your approach. So if you can share a little bit about how those cops is ations How you went through what transpired? Kind of how we got to where we are Now that you know, we're on the cusp of successful moment for you. Yeah, >> sure. So, yeah. I mean, from day one, that was the center of the discussion, I think early on. So year Agos, um, IBM announced, contain arising their software on open shift. And I think that's when the technical light went off about Hey. Having the same bits running across multiple clouds is really, really valuable in open shifts. The only real way to do that. And yes. Oh, Arvind was here from IBM on stage talking about that. And so I think technically, it was like, OK, ding, this makes sense. Nobody else could do it. And IBM, with their capabilities and services integration center. Just lot of strategic logic, I think the difficult part. Even before they approached this. Now, kind of looking back on it, having all these discussions with him now it's okay. Well, culturally, how do we bring it together? Because, you know, we both have strong cultures, mean IBM has a famous culture. We do that air very, very, very different. And so from the moment Jenny first approached me literally, you know, Hey, we're instant this, But let's talk about cultural, how we're going to make this work because, you know, it is a lot of money to spend on a company with No I p. And so you know, I think as we started to work through it, I think what we recognized is we can celebrate the strength of each other's cultures, and you know the key. And this is to not assume that there's one culture that's right for everything. We have a culture hyper optimized for collaboration and co creation, whether that's upstream with our source communities or downstream with our customers or with our employees and how that works. And that's great. Let's celebrate that for what it is. And, you know, IBM kind of run some of those big, most mission critical systems in the world, you know, on mainframes and how you do that looks and feels different. And that's okay. And it's okay to be kind of different. But together, if we can share the same values if we can, you know, share the same desire to serve our customers and put them first how we go about doing it. It's okay if those aren't exact. And as we got more comfortable with that, um, that's when I got more comfortable with it. And then, most importantly for me is we talk about culture. But a lot of our culture comes from the fact that we're truly a mission kind of purpose driven company, right? We're all about making open source the default choice in the world. And you know, to some extent remember, have these conversations with senior teams like, Hey, we were going to think we're going to change the world. You know? How better can we propel this for? This is such a huge platform to do it, and yet it's going to be hard. But aren't we here to do hard things? >> So it talked about it, You know, it's it's always been difficult selling when you don't have the. There's been a lot of discussions in the ecosystem today, as companies that build I p with open source and some of the models have been changing and some of the interactions with some of the hyper scale companies and just curious when you look at that, it's you know, related to what you're doing, what feedback you have and what you're seeing. >> Yeah. Look, first, I'LL say, I can't talk about that as an interested observer because our model is different than a lot of open source software companies. You know, Paul talked about in his keynote today, and we talked a lot about you know, our models one hundred percent open source, where we take open source code, typically getting involved in existing communities in creating life cycles, et cetera, et cetera, et cetera. And so that model's worked well for us. Other open source companies where I think this is more of a challenge with the hyper scale er's right more of the software themselves. And obviously they therefore need to monetize that in a more direct way. You know, our sins are businessmen always say it's a really bad business model the right software and give it away. You know, that's not what we do where hundreds and open source, but you know, if you look at our big communities were, you know, ten to twenty percent of the contribution, because we want to rely on communities. The issue for those companies that are doing Maur. The code contribution themselves is there's a leakage in the open source license, which is, you know, the open source, like the viral licenses. You know, if you make changes and you redistribute, you have toe also, you know, redistribute your code as well. And redistribution now is to find in a hyper scale is just different. So there's kind of a leakage in the model. I think that ultimately gets fixed by tweaks to the licenses. I know it's really controversial, and companies do it, but, you know, Mongo has done it. I think you'LL see continuing tweaks to the length the licenses would still allow broad use, but kind of close that loophole if you want to call that a loophole. >> Yeah, well, it's something that you know as observers. We've always watched this space and you know, when you talk about Lennox, you know, you've created over three billion dollar company, But the ripple effects of Lennox has been huge. And I know you've got some research that we want to hear about when we've looked at like the soup space. When you look at the impact of big data and now where is going you know, the hoodoo distribution was a very, very small piece of that. So, you know, talk a little bit about the ripples. Is some new research that >> way? Had some research that was that we commission to say, What is the impact of Lenin's right hand and press linens? And then we were all blown away. Ten trillion dollars. I mean, so this isn't our numbers or we had really experts do this and e. I mean, it really blew us away. But I think what happens is if you think about how pervasive it is in the economy, it's ultimately hard to have any transaction done that doesn't somehow ripple into technology and technology. Days primarily built around Lynn IQ. So in red headed President X is the leader, so it just pervades and pervades. When you look at the size in the aperture and you make a really good point around, whether it's a duper lennox, I mean, we could look a red hat, the leader and Lennox and we're, you know, less than four billion dollars of revenue. But we've created this massive ecosystem the same thing with the Duke. You think about how big an impactful. Big data and the analytics and built on it are massive. The company's doing are only a couple hundred million dollars, and I will say I've become comfortable with I'd say, five years ago, I used to say in my glass half empty day I'd be like we're creating all of this value yet we're just only getting this little tiny sliver. Um, I've now flip that around and say My glass Half full days I look and say Wow, with this lever we have with this little bit of investment were fundamentally changing the world. And so everybody's benefiting in a much larger scale around that. And when you think about it, that aperture is something really, really, really excited >> about. Well, you talk about, you know where the impact will be. Talk about Cloud, that the wave of container ization, you know, Where do you see that ending up? You know, I look, you know, Cooper Netease is one of those things. There's a lot of excitement and rightfully so. It was going to change the market, but it's not about a Cuban aunties distribution. It's going to be baked into every platform out there. Yeah, gunships doing quite well. And you know all the cloud providers, your partner with them and working with them. It's less fighting to see who leads and Maura's toe. How do we all work together on this? >> Well, you know, I think that's >> the great thing about ah well functioning, mature, open source projects is it behooves everybody to share. Now we'LL compete ultimately, you know, kind of downstream. But it who's everybody to share and build on this kind of common kind of component. And, you know, like any good open source project, it has a defined set of things that it does. I think you hit on a really important point. Cooper Netease is such an important layer. Doesn't work without Lennox, right? I mean, lyrics is, you know, containers or Lennox. And so how do you think about putting those pieces to gather manageability and automation thinks like answerable. And so, you know, at least from our perspective, it's How do you take these incredible technologies that are cadence ng, you know, at their own pace and are fundamentally different but can't work unless you put them all together? Which to us, you know, that creates a big opportunity to say, How do I take this incredible technology that thousands of, of really technically Swiss cave people are working on and make it consumable? Archer Traditional model has been like linnet, simply saying We're going to snap shot. We're going created to find life we're going back for, you know, do patching for what? And we still do that. But there's now an added sir sort of value, something like open shift, where you can say, Okay, we could put these pieces together in life cycle and together. And, you know, we see instances all the time where an issue with Cooper Netease requires, you know, a change analytics. And so being able to life cycle in together, I think we can really put out a platform where we literally now we're saying in the platform you're getting the benefits of millions of people working on overtime on Lenox with tens of thousands people working on Cooper, Netease and the Learnings are all been kind of wrapping back into a platform. So our ability to do that is it kind of open source continues to move up. The stack is really, really exciting. >> Now. You were talking about transformative technologies on DH. How great it is to be a part of that right now. You alluded to that last night in the keynote. So you're talking about this, You know your history lessons. You know how much you love doing that? Your ki notes and you know, the scientific method Industrial Revolution open source. Just without asking you to re can you are a recount. All that. Just give us an idea about how those air philosophically aligned it. How you think those air open source follows that lineage, if you will, where it is fundamentally changing the world. It is a true global game change. Yeah, And >> so the point last night was a really kind of illustrate how a change in thinking can fundamentally change the world we live in. And so what I talked about just kind of quickly is so the scientific method developed and kind of the fifteen hundreds ish time frame was a different way to discover knowledge. So it goes from kind of dictates coming down from, you know, on high, too. Very simple hypothesis, experiment, observation of the results of the things that go through that process and stand the test of time and become what we consider knowledge right? And that change lead immediately to an explosion of innovation, whether that with the underpinnings of the industrial revolution or enlightenment, what we've done in medicine, whole bunch of areas. And yeah, the analogy I came to was around well, the old way we just try to innovate constrains us in a more open approach is a fundamentally better way to innovate. But what I found so interesting in and I think you picked up on it if it didn't emphasize this much, wanted to excite and having a lot of time, its many of the same characteristics of scientific discovery. So the idea of you know, independence anybody could actually do this pinpoints the importance of experimentation and learning those Air Corps components of, you know, tef ops and agile and open source, right? It's very, uh, in the end, the characteristics are actually quite similar as well. I think that's just fascinating to see happen. >> So e think about that. And if you could bring it back to the customers you're talking to, you have a lot of executive conversation, said You focus a lot on the how is really challenging. We understand. You know, the organizational structure of most companies goes back over a hundred years to military. So you know, what you see is some of the one of the biggest challenges that, you know, executive thieves we're facing these days. And, you know, how are they getting past that? Stuck? >> Yeah. And so, you know, I think the simple is way to state. The problem, which I hear over and over again, is we tried an agile transformation, and it failed because our culture was already and cultures Mohr of, ah always tell the executor when they said to me, It's like, Okay, but recognized cultures and output, not an input. And it's an output of leadership behaviors, beliefs, values what's been rewarded over time. So if you want your culture to change, actually to think about changing the way that you lied and manage and broadly, the structures, the hierarchies, the bureaucratic systems that we have in place today are really good at driving efficiency in a static environment. So if you're trying to slightly take a little bit of cost out building a car, you start with what you did last year. You get a bunch of scientists are consultants to look at it, and then you direct some fairly small changes. So the structure were in places other wrong with them. When value creation was about standardization of economies of scale. The hierarchies work really, really well to distribute tasks and allow specialization and optimization. The problem is now most value creation. It's requiring innovation. It's how doe I innovate and how I engage with my customer. You know the example I used a couple years ago? Its summit was, you know, the average cars use ninety minutes today. So if you think about how to reduce the cost of transfer port ation, is it taking two percent out of the cost of building a car? Or is it figuring out whether it's ride sharing or other ways? Teo. A fractional ownership. Whether it is to increase the average utilization of the car, it's clearly the ladder. But you can't do that in about bureaucratic hierarchical system that requires creativity and innovation, and the model to do that requires injecting variants in. That's what allows innovation to happen. So as leaders, you have to show up and say, all right, how do I encourage descent, you know, how do I accept failure? Right. So this idea of somebody tries something and it fails. If you fire him, nobody's gonna try anything again. But experimentation by definition requires a lot of failures and how you learn from it. So how do you build that into the culture where as executives you say holding people accountable doesn't mean, you know, firing him or beating him up. If they make a mistake, it's how do I encourage the right level of risk taking in mistakes, you know, even down to the soft side. So you know, how do you hold somebody accountable in an agile scrum, right. Your leaders have to be mature enough to sit down, have a conversation. Not around here. The five things you were supposed to do and you did forum. So you get in eighty right now, you can't say exactly what they need to do because it's a little blurry. So you have to have leaders mature enough to sit down and have a conversation with somebody is I think you got an eighty. Thank you. Got an eighty because here's what you did well, and here's what you didn't. But it's subjective. And how do you build that skill and leaders? They oughta have those subjective conversations, right? That sounds really, really soft, but it's not gonna work if you don't have leaders who can do that right? And so that's why it's hard. Because, you know, changing peep people is hard. And so that's why I think so. Many CEOs and executives want to talk about it. But that's what I mean by it's a soft side. And how do you get that type of change to happen? Because if you do that, pick ours honestly, pick somebody else's, you know, agile Davis with methodologies. They'LL work if you have a culture, this accepting of it >> before they let you go. There were two things to our quick observations about last night. Number one rule Samant hitch up on the licensing, so I know you've got your hands full on that. Good luck with that. You mentioned licensing a little bit ago, and I learned that thirty four billion dollars is a good deal. Well, right, that's what you said I heard it from are absolutely well. Things >> were a separate entity. We don't have licenses. So I don't know how we would go into an l A >> given. We don't have a license to sell. So got some expectations setting >> we need to do with our customers and then, you know, but separately, You know, I think people do forget that Red Hat is a not only a really fast growing company were also really profitable company. Most of the other software companies that are growing at our pace on a gap basis makes little to no money. We have because we get the leverage of open source, we actually generate a very large amount of free cash flow. And if you actually not to get the details of the financials. But we look at our free cash flow generation in our growth, I would argue, was a smoking good deal. That thirty four. I was asking for a lot more than that. >> You could had smoking good the last night that was gonna work to give thanks for the time. >> It's great to be here. >> Thank you. Thank you for hosting us here. Great opportunities on this show for I know that's exciting to see two but continued success. We wish you all >> thanks. So much. Thank you for being here. It's great to have you, >> Jim. White House joining us back with more live coverage here on the Cube. You are watching our coverage here in Boston of Red Hat Some twenty nineteen. Well,
SUMMARY :
It's the queue covering right for you here this week? to tell you what the weather is holding up well, for us, you're right with great partnership announcements. First life, you have CEOs of IBM and Not only to say that, you know, It wasn't just, you know, he flew in from Seattle. I think we both recognized, you know, we need to serve our customers in the best possible over the years about culture, you know, loved your book. I'd say ninety percent of the customer meetings I'm in, which are, you know, more CIA level meetings they're Kind of how we got to where we are Now that you know, we're on the cusp of successful And you know, to some extent remember, have these conversations with senior teams like, Hey, we were and some of the interactions with some of the hyper scale companies and just curious when you look at that, You know, that's not what we do where hundreds and open source, but you know, if you look at our big communities were, So, you know, talk a little bit about the the leader and Lennox and we're, you know, less than four billion dollars of revenue. that the wave of container ization, you know, Where do you see that ending up? And so, you know, at least from our perspective, it's How do you take these incredible technologies that Your ki notes and you know, the scientific method Industrial Revolution open source. So the idea of you know, independence anybody could actually do this pinpoints So you know, what you see is some of the one of the biggest challenges that, you know, So you know, how do you hold somebody accountable in an agile scrum, that's what you said I heard it from are absolutely well. So I don't know how we would go into an l A We don't have a license to sell. we need to do with our customers and then, you know, but separately, We wish you all Thank you for being here. You are watching our coverage here in Boston
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
Microsoft | ORGANIZATION | 0.99+ |
Jenny | PERSON | 0.99+ |
Paul | PERSON | 0.99+ |
ten | QUANTITY | 0.99+ |
Seattle | LOCATION | 0.99+ |
Arvind | PERSON | 0.99+ |
Jim | PERSON | 0.99+ |
IBM | ORGANIZATION | 0.99+ |
Jim White | PERSON | 0.99+ |
Boston | LOCATION | 0.99+ |
two percent | QUANTITY | 0.99+ |
Lenin | PERSON | 0.99+ |
Deutsche Bank | ORGANIZATION | 0.99+ |
Satya Nadella | PERSON | 0.99+ |
Jim Whitehurst | PERSON | 0.99+ |
John Walls | PERSON | 0.99+ |
Timon | PERSON | 0.99+ |
eleven years | QUANTITY | 0.99+ |
Monday | DATE | 0.99+ |
two | QUANTITY | 0.99+ |
millions | QUANTITY | 0.99+ |
ninety minutes | QUANTITY | 0.99+ |
last year | DATE | 0.99+ |
two men | QUANTITY | 0.99+ |
Boston, Massachusetts | LOCATION | 0.99+ |
Ten trillion dollars | QUANTITY | 0.99+ |
nadella | PERSON | 0.99+ |
Red Hat | ORGANIZATION | 0.99+ |
thirty four billion dollars | QUANTITY | 0.99+ |
less than four billion dollars | QUANTITY | 0.99+ |
ninety percent | QUANTITY | 0.99+ |
Air Corps | ORGANIZATION | 0.99+ |
Beantown | LOCATION | 0.99+ |
Lennox | ORGANIZATION | 0.99+ |
last night | DATE | 0.99+ |
two things | QUANTITY | 0.99+ |
five years ago | DATE | 0.99+ |
Mikey No | PERSON | 0.99+ |
a week later | DATE | 0.99+ |
Agos | ORGANIZATION | 0.99+ |
White House | ORGANIZATION | 0.99+ |
CIA | ORGANIZATION | 0.99+ |
today | DATE | 0.99+ |
thousands | QUANTITY | 0.98+ |
eighty | QUANTITY | 0.98+ |
five things | QUANTITY | 0.98+ |
both | QUANTITY | 0.98+ |
five years ago | DATE | 0.98+ |
this week | DATE | 0.98+ |
Last night | DATE | 0.98+ |
fifteen hundreds | QUANTITY | 0.98+ |
First | QUANTITY | 0.98+ |
Mongo | ORGANIZATION | 0.98+ |
Samant | PERSON | 0.98+ |
Red hat | ORGANIZATION | 0.97+ |
one | QUANTITY | 0.97+ |
twenty percent | QUANTITY | 0.97+ |
Lenox | ORGANIZATION | 0.97+ |
one hundred percent | QUANTITY | 0.97+ |
over three billion dollar | QUANTITY | 0.97+ |
Teo | PERSON | 0.97+ |
tens of thousands people | QUANTITY | 0.96+ |
first | QUANTITY | 0.96+ |
Azure | TITLE | 0.96+ |
hundreds | QUANTITY | 0.96+ |
Cooper Netease | ORGANIZATION | 0.95+ |
Lockheed | ORGANIZATION | 0.94+ |
Duke | ORGANIZATION | 0.94+ |
Day Three AWS re:Invent 2018 Analysis | AWS re:Invent 2018
>> Live from Las Vegas, it's theCUBE covering AWS re:Invent 2018 brought to you by Amazon Web Services, Intel and, their Ecosystem Partners. >> Okay, welcome back everyone. Day three, we're live in Las Vegas for AWS re:Invent 2018. It's our sixth year covering Amazon re:Invent and AWS, Amazon Web Services meteoric rise in value, profitability, market share, just a rising tide floating all boats. I'm here with Dave Vellante. We're kicking off day three analyzing, you know, Vernon's keynote. Things start to wind down. Yesterday was kind of the big day with Andy Jassy. Dave, after yesterday it's pretty clear that there's a couple big mega trends that people are talking about. One AWS Outpost, okay, that is going to be a one year conversation about what that means, what implications. I mean basically if you're a Cloud-native company you order a data center and Amazon Prime will deliver it in two days, why would anyone want to buy hardware again from HPE or other companies? This is a huge risk, huge challenge, a huge shot across the bow to the industry because this essentially the thing. This is essentially Cloud in a box. Put it in, plug it in, we'll service, turn it on and it works and developers can just do their thing, that's amazing. So I think that's going to be a very hotly-contested topic throughout, at least one year until they ship that and all the posturing and jockeying's going to go on there. And then the other thing that was interesting was there was a lot of coolness, the F1, Racing car with analytics. You had Lockheed Martin with space satellite provisioning, that was pretty cool. And, you know, you got robots and IoT. That's cool, you got space, you got robots, you got, you know, sports cars all using analytics, all using AI, all using large-scale compute storage and networking, very elastic, all with all kinds of new tools and reference engines, but Jerry Chen laid it out from Greylock yesterday around the strategy. Amazon drives the cost down on the infrastructure side and bring the API concept up to AI and bring the marketplace together. So, a lot of action. Today we're going to see the impact and the fallout of that. What's your thoughts? >> Well, first of all John, there's so much to talk about. I want to say, so Werner Vogels this morning gave the keynote. When, when I first joined, you know this industry, we, IBM was everything, IBM was the dominant player. So we used to pour over IBM system and technology guides, and IBM white papers, because they set the technical standard for the industry and they shared that knowledge obviously with their customers to inspire them to buy more stuff, but they were giving back to the community as well to help people understand architectures and core computer science. Listening to Werner Vogels today, Amazon is now the beacon of technology in the industry. He went through the worse day of his life, which was December 12, 2004 when their Oracle Database went down for 12 hours because of a bug in the code and because they were pushing it beyond its limits. And so he described how they solved that problem over a multi-year effort and really got heavy into the technology of database, and recovery, and it was actually quite fascinating. But my takeaway was Amazon is now the company that is setting the technical direction of the industry for the next wave of Cloud-based applications. So that was actually really fascinating. We heard similar things on S3 and S3 recovery, even though they're still using some Oracle stuff it was really, really fascinating to see and very, very impressive. So that's one. As you say, there's so much to talk about. The IoT pieces, John, I really like what Amazon is doing with IoT. They're coming at it from a bottoms up approach, what do I mean by that? Do you remember when mobile first came out Microsoft basically said, hey we're going to put Windows on a phone, top down. We're going to take our existing IT Desktop standards, we're going to push 'em down to mobile, didn't work. And I see a lot of IT companies trying to do that with IoT today, not Amazon. Amazon's saying, look we're going to go bottoms up and serve the operation's technology people with a software development platform that's secure, that allows it, that's fully managed and allows them to build applications for IoT. I think it's the right approach. >> I think the other thing that's coming out is a Tweet here from Bobby Allen who we know from theCUBE days. I, you know, when we, I shared a Tweet about, you know, the future of the converged infrastructure on the outpost he says, software should be where tech companies differentiation value lies. This is back to our beating of the drum about software, software, software, you know. Andy Bechtolsheim, the Rembrandt of motherboards, Pat Gelsinger calls him, said, he's the founder of Arista, hardware's easy, software's hard. Software's where the action is. What Amazon's doing is essentially pushing large-scale platform capabilities and trying to make that as cheap and affordable as possible, the range of services, while creating a new shim layer around API concepts and microservices up the stack to enable people to write software faster, more compelling, more meaningful, and to iterate, and this is resonating with customers, Dave, because if I'm a business I got to write software, okay. I don't want to be in the running data center business because the data center powers the business. So the end doesn't justify the means in that regard. You say, hey, I need a data center to power my top-line revenue which is either going to be software-based or some sort of Edge network scenario, or even a human interface wearable or whatever. Software is the key. So if Amazon can continue to push the cost structure the lock-in spec is locked in because the better value so if it's going to be 80% less cost, and you call that a lock-in spec? A lot of lock-in spec, it's not like a technical lock-in spec, that's just called value. >> I'm locked in to Google Search. I mean, you know, I don't know what to tell ya. I'm not going to use any alternative search I'm just familiar with it, I like it, it's better. >> But software's the key, your thoughts. >> Okay, so, my thoughts on lock-in are, lock-in is one of the most overstated concepts in the business. I'm not saying that lock-in doesn't happen, it does happen, it happens everywhere. It happens across open-source. You do open-source you're locked-in to your developers. I've done research on this John and my research shows that 15% of the buyers really make primary decisions based on whether or not they're going to be locked-in. 85% look at the business value and they trade that off against lock-in so, you know, yeah, buyer beware, blah, blah, blah, but I think it's just really overstated. Yes, it's a Cloud, mother of all lock-ins, but what's the value that you get out of it? Speaking about another lock-in. I want to talk about Intel a little bit because the press has been like chirping about, about Intel and alternative processors, and the arm-based stuff that Amazon is doing. >> Well hold on, let's just set the table on this conversation. Intel announced a series of proprietary processors, their own silicon, you know the-- >> Amazon you mean. >> I mean Amazon, yeah, proprietary processors that are specific to certain workloads, inference engines, and other things around network-- >> Based on the Annapurna acquisition of 2015, a small Israeli-based company that they acquired. >> Yeah, so the press, I've been sharing on, oh, chips must be confronting Intel, your thoughts. >> Yeah, so here's the deal. Look it, Intel is massive and they do a huge amount of business with the Cloud players. Now, here's the thing about Intel, it's really, I've observed Intel for decades. Intel wants a level playing field amongst its customer base and so it wants a lot of different Cloud suppliers even though there's three, four, five, you know, worldwide, there's, there's many dozens, and hundreds of Cloud players out there. Intel wants to support them all. They're an arms dealer, right? They love all their customers and so, so what they do is they sprinkle around the innovation in the industry, they try to open up their architecture such that people can, you know, write software to their architecture and they try to support all their customers. We see it at all the shows. You see it at Lenovo, you see it at Dell, you see it here at AWS, you see at Google, Intel is everywhere and they are by far the biggest supplier. Now, Amazon, of course, has to have alternatives, right? They care about data-center power, you know, they do buy some stuff AMD, why not, why wouldn't you second-source some of this stuff? They do a lot of work with Invidia, ARM has its place, and so, but it's a rounding error in the grand scheme in the market. Now why people get excited is they say, okay, ARM now has a foot in the door, oh, Intel's in trouble. Intel obviously still a dominant player. I think it's, you know-- >> Is Intel in trouble? >> The press likes to glom onto that. Intel's like the dominant player in the microprocessor business and it has to move, and it has to move fast. I would not say Intel is in trouble, I'd say it continues to be the dominant player in the data center. It's got opportunities for alternative processors like Invidia. Intel strategy is to put as much function on the DI as possible and to grab that function, it's always the way it's behaved. You see people like Invidia trying to create opportunities, and doing a very good job of it, and so, there's white space there. It's competition, we love competition, right? >> Here's my, here's my. >> Intel needs some competition frankly. >> Here's my take. One, Intel pays, Amazon pays Intel a lot of money. >> Huge amount of money. >> So it's not like Intel's hurting, Intel's not in trouble. Here's why Intel's not in trouble. One, the Cloud service provider business that Raejeanne runs, she was on theCube yesterday, is growing significantly. A new total adjustable market, they call TAM expansion, is happening. >> So, you know, if you're looking at microprocessors it's not a one, or few, suppliers, it's a total TAM expansion and of course with that expansion of the market Intel's going to take a big chunk of the shares, so they are not in trouble, Amazon pays them a lot of money, they're a big-time supplier to AWS, check. Two, Intel is on a cadence on processor design that spans years. And Raejeanne and other Intel executives have spoken to us off the record, and here on theCUBE that hey, you know, sometimes there's use cases where they're not responding fast enough that are outside they're operating cycles, but as Raejeanne said, Amazon makes them get better, okay? So, they have to manage that, but there's no way Intel's in trouble. I think the press are using this as, to create link bait, for news that is sensational. But, yeah, I mean, on the surface you go, oh, chip, Intel, oh that's Intel's business, it must be bad for Intel. So, yeah, Amazon made their own processor. They got some specific things they want to build specialized processors for like GP Alternative, or inference engines that are tied to the stack, why wouldn't they? Why wouldn't they? >> What Intel will do, what Intel will do is they'll learn from that and they'll respond with functionality for maybe others, or maybe they'll earn Amazon's business, we'll see, but yield to your point, you know, Intel's exposure to the desktop and the laptop, a lot of people wrote about that, that Intel is, the (mumbles) entry is Intel's business, they're so huge, the cost of doing what they do, Intel's such a strategic supplier to so many companies and as we talked to Raejeanne about yesterday the Cloud has completely changed that dynamic and actually brought more suppliers. The data center consolidation that you've seen has been offset by the Cloud explosions, that's a good trend for Intel. And of course the mobile dynamic, you know more about that then I do, but, everybody said mobile's going to kill Intel, it obviously didn't happen. >> Look it, Intel, Intel's smart, they've been around, they're going to not miss the ball. They got a big team that services a lot of these big players. >> Are they still paranoid in your opinion? >> I think they are. >> I do too. >> I do too, I mean I, look it, Intel is, have a cadence of Moore's law. They have a execution style that's somewhat similar to AWS, they've very strict about how they execute and they have a great execution engine. So I would bet the farm that Intel's talking to Amazon and saying, what do you need for us to be better? And if Amazon does what they do best, which is tell them what they need, Intel will deliver. So I'm kind of not worried about Intel on that front. I think in the short term maybe this processor doesn't fit for that, but, that's why GPUs became popular, floating point was a unique thing that CPUs didn't do well on so a GPU comes out, there it is. And we're going to see processors like data-processing units, Pradeep Sindu, former founder of Juniper's, got a venture called, Fungible, that's building a data-processing unit. It's a dedicated chip to serve analytic workloads. These are specialized silicon chips that are going to come on faster, and, to the marketplace. So , just because there's more chips doesn't mean Intel dies 'cause if the TAM expands it's a, it's an overall bigger market so their share might not be as dominant on a smaller market, but it's-- >> You know, I got a, I got to come back to your John Chambers interview. I've watched it a couple times now and I would recommend people would go to, thecube.net, and see John Furrier's interview with John Chambers. The great companies of this industry have survived, you know, I talked about paranoia, Andy Grove, they've survived because they were not dogmatic about the past. So for the past several decades this industry has marched to the cadence of Moore's law and that was obviously very favorable to Intel. Well, that's changing, and it's changed, the innovation engine now, you've called it the innovation sandwich, which is data, machine intelligence applied to that data, in the scale of Cloud. So Intel has to pivot to that to take advantage of that and that's exactly what they're doing. So the great companies of the future, the Microsoft's, the Intel's, the AWS's, they survive because they can evolve. It's the Wang's that didn't, they denied, it was the PC-- >> They were entitled. >> The digital, right. They thought they were entitled and the point that John Chambers made is there's no entitlement and he kept referring to Boston 128, it used to be the Silicon Valley. And the leading executives today, of companies like, like Cisco, like Intel, like Microsoft, can see a vision to the future and they change when they have to change. >> So companies that are entitled, who are they (chuckling)? >> Wow, that' a really-- >> Is Oracle entitled? >> A good question. >> HPE, Dell? >> I think Oracle absolutely acts as though they're entitled and they're bunkering down into their red stack. Now, you know I've often said, don't bet against Larry Ellison, and I wouldn't make that bet against Larry Ellison, but his TAM is confined to Oracle customers. He's not currently going after, non-Oracle customers in my opinion at least not with a strategy that's obvious to me. And I think that's part of the reason why Thomas Kurian left the company is I think they had a battle about that, at least that's what my sources tell me. I haven't talked to him directly, I actually don't know him, but I know people who know him and have worked with him. HPE, I think HPE is more confused as to what the next step is. When they split the company apart they kind of gave up on software, they gave up on an integrated-supply chain. Mike Odell took the other approach, and thanks to VMware he's got a wining strategy. So, I think today's leading executives realize that they have to change. Look at Ginni Rometty, remember IBM was in trouble in my opinion because Watson failed, and their Cloud strategy essentially failed. So they just made a 34 billion dollar acquisition, a Red Hat, which is a bold move. And that, again, demonstrated a company who said, okay, hey it's not working, we have to pivot and we have to invest and go forward. >> Alright Dave, great kickoff day three. Andy Jassy coming up at the end of the day and he's going to do his annual, kind of, end of the last day roundup on theCUBE, kind of lean back, talk about what's going on and how he feels from the quotes, what people missed, what people got, and do a full review of re:Invent 2018. Day three kicks off here, CUBE, two sets on the floor gettin' all the content. We already have over a hundred videos. We'll have 500 total video assets, go to siliconangle.com and check out the blog there. A lot of stories flowing, a lot of flow, a lot of demand for the content. Stay with us for more after this short break.
SUMMARY :
brought to you by Amazon Web Services, Intel and all the posturing and jockeying's going to go on there. and serve the operation's technology people and to iterate, and this is resonating I'm not going to use any alternative search and my research shows that 15% of the buyers Well hold on, let's just set the table the Annapurna acquisition of 2015, Yeah, so the press, I've been sharing on, Now, Amazon, of course, has to have alternatives, right? on the DI as possible and to grab that function, Here's my take. One, the Cloud service provider business or inference engines that are tied to the stack, And of course the mobile dynamic, they've been around, they're going to not miss the ball. to Amazon and saying, what do you need I got a, I got to come back to your John Chambers interview. and the point that John Chambers made realize that they have to change. and how he feels from the quotes,
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
Microsoft | ORGANIZATION | 0.99+ |
Raejeanne | PERSON | 0.99+ |
IBM | ORGANIZATION | 0.99+ |
Amazon Web Services | ORGANIZATION | 0.99+ |
Andy Bechtolsheim | PERSON | 0.99+ |
Cisco | ORGANIZATION | 0.99+ |
Oracle | ORGANIZATION | 0.99+ |
Amazon | ORGANIZATION | 0.99+ |
Mike Odell | PERSON | 0.99+ |
Jerry Chen | PERSON | 0.99+ |
Dave Vellante | PERSON | 0.99+ |
Pat Gelsinger | PERSON | 0.99+ |
December 12, 2004 | DATE | 0.99+ |
Andy Jassy | PERSON | 0.99+ |
Bobby Allen | PERSON | 0.99+ |
Dave | PERSON | 0.99+ |
Andy Grove | PERSON | 0.99+ |
John | PERSON | 0.99+ |
12 hours | QUANTITY | 0.99+ |
2015 | DATE | 0.99+ |
AWS | ORGANIZATION | 0.99+ |
Dell | ORGANIZATION | 0.99+ |
Thomas Kurian | PERSON | 0.99+ |
Larry Ellison | PERSON | 0.99+ |
80% | QUANTITY | 0.99+ |
one year | QUANTITY | 0.99+ |
Pradeep Sindu | PERSON | 0.99+ |
Intel | ORGANIZATION | 0.99+ |
John Chambers | PERSON | 0.99+ |
Invidia | ORGANIZATION | 0.99+ |
hundreds | QUANTITY | 0.99+ |
Lenovo | ORGANIZATION | 0.99+ |
15% | QUANTITY | 0.99+ |
John Furrier | PERSON | 0.99+ |
AMD | ORGANIZATION | 0.99+ |
ORGANIZATION | 0.99+ | |
Las Vegas | LOCATION | 0.99+ |
Ginni Rometty | PERSON | 0.99+ |
three | QUANTITY | 0.99+ |
four | QUANTITY | 0.99+ |
five | QUANTITY | 0.99+ |
Red Hat | ORGANIZATION | 0.99+ |
Silicon Valley | LOCATION | 0.99+ |
Vernon | PERSON | 0.99+ |
Juniper | ORGANIZATION | 0.99+ |
Today | DATE | 0.99+ |
two sets | QUANTITY | 0.99+ |
ARM | ORGANIZATION | 0.99+ |
sixth year | QUANTITY | 0.99+ |
yesterday | DATE | 0.99+ |
Andy Jassy, AWS | AWS re:Invent 2018
live from Las Vegas it's the cube covering AWS reinvent 2018 brought to you by Amazon Web Services Intel and their ecosystem partners okay welcome back and we're live here in Las Vegas day three last interview of the day three days of wall-to-wall coverage two sets here at AWS reinvent 2018 our sixth year we've been at every reinvent except for the first one and it's been great to watch the rise I'm Jeff we're with Dean Volante we're here with Andy Jesse the CEO of AWS started this as it working backwards document years ago twelve years ago 12 half year zine years ago was when the document was written and we've launched 12 and a half years ago great to see you thanks for spending time I know you're super busy congratulations we met last week you couldn't really talk about it but boy there was so much more payload in the announcements than they were before are you happy with the results certainly three our keynote was taxing what's good impression when the keynote was over but ya know we're thrilled with it and most importantly the reason we're thrilled is because our customers are thrilled I think they just couldn't believe how much we delivered this week you know well over 100 capabilities and they were super excited about you know the storage announced was the thing is when you have millions of customers any announcement you make is going to be popular with thousands of customers so some people walked up to me and said oh I know it's not sexy but I love the storage announcements I needed the file systems I wanted that glacier deep archive some customers love the database releases with lots of customers that were excited about the machine learning piece and you know the another unsexy one where the enterprise abstractions just to make it so much easier for that type of builder who wants more prescriptive guidance to be able to get started quicker and then you know people are pretty excited that outpost too so it has you a question I'll talk Amazon speak now what what areas of the show do you feel you raise the bar this year on what was that what would you point to bar raising moments announcements well you know I think each year one of the things I like about reinvent and that we work hard on is we'd like to have we don't really want it to be a corporate event we wanted to be quirky and we want it to be authentic and we want you know we want our community to fit to have fun here while they also learn so you know Midnight Madness is for instance something we do every you know we've done the last couple years and we try radically different things and so I thought that Tatanka eating contest raised the bar is again this year was the second year in a row that we said again as political World Records and you know I thought I really liked Peter De Santis --is and Myrna Vogel's keynotes on Monday and today respectively I thought they both were fantastic and you know keep raising the bar are you over a year and you know so they're you know we're hoping I too will be something that people feel like raise the bar year over year what the house band synchronicity was quite good too you know yeah I tell you that that fan is terrific and you know and I think that again all those things I mentioned are part of what we you know think makes the event fun and quirky and different but the most important thing by far is the learning of the education and then our customers excited about not just the platform but we launched so many things do they feel like it helps them do their job better well while we're on the raising bar we've got a prop here this is the the deep racer deep the deep racer machine learning it's a toy for testing and the question comes up how old do you have to be to use this and I said hey if your kid can code machine learning good for them but talk about this because this is kind of interesting because it's fun but where'd this come from you know it came from last year when we release sage maker and we were making machine learning so much easier for everyday developers of scientists we said what can we do to give people hands-on experience because you learn things better if you actually try it and so we tried to help developers get more experience to computer vision by having a deep lens you know video camera and that was wildly popular and so as we were thinking about this year making reinforcement learning available as easily as we are in sage maker which we think is a huge potential game-changer grant Forsman learning the team kept thinking about it's great but nobody knows enforcement learning and nobody has experienced with it how can we give them experience what are ways they can get hands-on experience and that's how the deep racer car came up which is really making it simple where they can just give us a reward function with a line of Python strip and then Sage Maker will automatically train an RL algorithm and then they get to play it to the car and then race against one another and when we watched how competitive it was getting inside our own house on these RL infused cars racing each other we figured other people might find a compelling as well and I couldn't believe how many people participate yesterday yeah and then I don't know if you saw it three burners right before burners keynote the finals were really exciting to like the fact that there were some imperfections were actually made it more compelling to watch and so we had a racer Cup coming up - I met play 19 competitive yes that's going to happen yeah today was the accelerated version of the first ever deep racer League championship Cup but next year will be a full season at our 20 AWS summits the top winners in the in the deep racers you see bracer League races at each of those summits plus the top 10 vote getters in points from those summits will come here and compete for the championship Cup now you and I talked about a new persona last week when we met but now the announcements pretty clear now why this points to a whole new persona developer you got eSports on the twitch side booming heat sports is changing the game and in the whole digital sports category robotics space you got a satellite announcement this is a genre changed in digital culture and you see the AI stuff and machine learning how does the web services stack play in this new world where AI is now a service it's a whole nother paradigm shift what's your thoughts on all that well you know I mean all those areas that were continuing to expand into our areas that our customers are asking us to help them with and where there are huge opportunities for customers but where it's hard I mean if you look at space as an example if you've to interact with a satellite it's it's expensive to have to have all those satellites set up you know and those drown ground antennas set up and then you have to program them and then and you actually have to pay this fixed price instead of on-demand customers so why can't you give us access those satellites the way we consume AWS and then if you can have the ground antennas where when the data comes down from the satellite it's basically on the same premises as your AWS region so we can store the data and process the data analyze it and take action that is very compelling so that that just felt like a natural fit you know and the same thing with robotics I think that robotics is one of the most underrated areas of Technology I think robots will do all kinds of things for us at work and in a home and the tools out there to make it easy to build robotic applications and to do the simulation to deploy them and then have them work with the rest of your applications and infrastructure have been pretty primitive and so robot maker is I agree with you I think you look at the younger generation too even at the high school elementary level people are gravitating towards robotics robotics clubs are booming that maker culture goes through a whole nother level with robotic congratulation you know it's funny we had the youngest person to ever pass the AWS certification exam is a kid named Karthik nine years old passed and he was here this week actually and I got a chance to meet with him today and I said well after the certification what are you doing he said well I'm building a robot you know I'm feeling Ruben he said now with your launch of deep racer I want to try and find a way to to have the deep racer car be the eyes and the camera and the reinforcement learning for my robot nine years old yes it's gonna be a different generation with what they build John and I were talking this morning Andy at our open about you're making it harder for the critics used to be self-service only it criticized your open source contributions the hybrid strategy your turn a tick in the box is on all those outpost was I think surprised a lot of people it didn't so much surprise us that you were moving in that direction but I wonder if you could sort of talk about some of those key initiatives I know it's customer driven but wow the the TAM expansion the the customer value that you're bringing it's like a whole new era that you're entering yeah you know everything we build is you guys know we talk about all the time it's just it's driven by what customers want and so we just started over the last six months you know and really by virtue of having this partnership with VMware where we have a lot of enterprise engagement as they're moving to the cloud using VMware cloud and AWS we had a bunch of customers say it's really great I'm moving most my application of the cloud but there's some that aren't moving for a while because they got to be close to selling on-premises and I want to use AWS for this I don't want a different environment can you just find a way to put some services like compute and storage on-premises and hardware but I want to actually use the same control plan I'm going to use for the rest of AWS and I wanted to easily connect with the rest of my applications in AWS and we had you know we didn't like as you and I talked about a week or two ago we just have not like the model that's been out there so far to do this because it's you know the control plane is different the api's are different the tools are different the hardware is different the functionality is different and customers don't like it's why it's not getting much traction and we didn't want to pursue it if we didn't think it was going to be useful but we had this concept we were working on with a couple customers where they wanted compute and storage on-premises but they wanted to have that connect with all the other applications in the AWS cloud and so we have this idea that maybe this local set of compute and storage would be like a far zone from an availability zone they were using and we started thinking about that and we thought there was much more generalized idea which became outposts and so the thing that I think people are gonna love about that is for the applications that can't move easily because they need to be close slang on-premises you get AWS like real AWS compute real AWS Storage Analytics database sage maker will be in there as well but it's the same api's same control playing the same tools the same hardware we use in our data centers and it will easily connect through the same control plane to the rest of AWS the rest of the services and the rest of their applications there so and it provides a platform for a whole host of new services down I mean every customer meeting I've had in the last we made the announcement people are excited about I want to ask you guys are talking about all the innovation and new areas and we're seeing an expansion of the AWS distinct brand and things like TV advertising statcast I wonder what's behind that can you address that yeah it's a good question I mean there's kind of two different types of I'll call it TV advert Swartz we're doing one is straight-up advertising one is less so which is you know the one that less so is that a number of the sports leagues are really interested in and actually pretty sophisticated in using cloud computing and analytics and machine learning if you look at Major League Baseball now NFL and Formula One and they want to make the user experience and the viewer experience so much better and so they're building on top of AWS and then we like the ability of helping them showcase the capabilities that they're you know both the customer experience and the ml and AI capabilities then there's just a straight-up advertising them that we've been trying we tried a little bit of it last q4 and you know it's always very difficult to quantitatively measure tvf but we have a lot of ways that we try to triangulate that and we were really surprised and what looked like the positive numbers we saw for both TV as well as the outdoor media and things like in the airports and things like that and so we decided we would try it again this q4 and you know I think I would call us right now still experimenting yeah and it's very much kind of what Amazon does which is we try different things to see what resonates the see Whitefield says so so far so good and we expect to keep experimenting I I think that's a good call because the brand lift is probably there I'll see impressions get reach vehicle but you guys are in a rising tide market we're hearing co-creation VMware co-creating deep meaningful partnerships you always talk about that so it's kind of this success model of innovation to reimagine the satellite Lockheed Martin a partnership this seems to be a new way to do business in this rising tide how are you guys getting the word out education people want to know more this is a big kind of movement yeah well you know I think that if you looked at the first several years of AWS I was always surprised when I would go see enterprises and they would have no idea that Amazon was doing anything in the cloud even though we had the only cloud offering at the time so I think if you compare where we were a few years ago to today there's you know gigantic awareness relatively speaking but I still think that there are so many majority of workloads still live on premises I mean we have a twenty seven billion dollar revenue run rate business it's growing forty six percent year-over-year and yet we're still at the early stages of the meet of enterprise of public sector adoption in the u.s. you go outside the US where there twelve to thirty six months behind depending on the country in the industry and sometimes it feels like you know like Groundhog's Day well you guys are doing regions out there Italy as was announced yeah you're expanding very fast globally can you talk about that real quick yeah it's it's a you know we've had customers from 192 countries using AWS for many many years but they've been using AWS in regions outside of their country usually because there are a lot of workloads that could stand that latency and where the data doesn't have to be on natural soil but increasingly if you want to help customers get done what they want to and serve the broader array of their applications you have to have regions in their country both so that they have lower latency to their end users and because the data sovereignty laws which are getting really more rigid rather than more flexible let me ask you a question about competition you you said I can't members on the cube or in person there's no compression reach out gorilla for experience and time elastic economies with scale when you have copycat people trying to copy Amazon how do you talk about some of those things that are those diseconomies of scale what are the points that customers should look at when they say okay I got someone else is talking cloud Amazon's got years of experience ahead of the competition more services what do you talk about what do you point to you it's not about slimming the competition but what is the diseconomy of scale to try to match the trajectory of Amazon yeah it's it's a bunch of things you know first of all it's operational performance you know a lot of the hardest lessons you learn and operating of scale only happen when you get to that level of scale and you know there's some events that we see sometimes elsewhere we look at that and then we read the post-mortem we say oh yeah 2011 you know we remember they went through that I don't wish it on anybody but when you have a business at several times larger than the next or providers combined you just said a different level of scale and you've learned lessons earlier I also think that the reason that we continue to have both so much more functionality and innovate at a faster clip and seem to get capabilities that customers want is because we have so many more customers than anybody else you know a lot of times and this is happening all week to where customers will say to me I can't believe that you knew that I wanted that and I always say it's because you told us yeah it's not like we're Nostradamus you've told us that and so when you have so many more customers and when they feel free to give you feedback and when you've built good mechanisms like we have to get that feedback from the field to the product builders it means there's this real flywheel of getting you know getting more customers leads to more feedback leads to more features leads to better functionality where there's a network effect from being on the platform with all those other customers and all those industries I wonder if you could add some color to a premise that we've put forth on your edge strategy so what you guys you know we do a lot of these shows and a lot of the IOT and edge strategies that we've seen from traditional IT players what you call the old guard have fallen flat in our opinion because it's a top-down approach it reminds us of the Windows Phone it just didn't work and it's not going to work as their operations technologies people we see what you've announced here as a Bottoms Up approach you developing an application platform to build secure and manage apps for those folks right at the edge I wonder if you could add some color to that and some thoughts on your edge strategy yeah I mean again for us if we don't have some top-down strategy that you know that I think is grandiose it's just what customers want and so we have so many customers who have all these devices at the edge and all these assets at the edge and they said to us well the first problem I have I want to get this data into the cloud and then I want to do analytics item we say ok well how can we help they say well the first thing is I don't even know how to translate this data from the device protocol to just being able to operate in the cloud so that's the first problem we go solve well then people say ok now I can get it in but I actually I need security like you know if you look at the amount of security options for these edge devices it's a new field you know let that dine attack that took a lot of the internet down a couple years ago came from you know a device on the edge and so that's why you know we built you know a security capability and people say well okay now you've made it so I can run devices but if I'm gonna run thousands of devices I need a way to manage all those devices of scale and we build telling to manage two devices and people say well ok it's great that I can do it and device is big enough that have a CPU but what about when they don't have a CPU you know they have just a microcontroller and that's why we built the our toss piece and you know the list kind of keeps going people so this is great now that I get all this data in the cloud I can take all these analytics actions but on my device sometimes I don't want to make the round trip to the cloud so can you give me a way to use the same programming model and and pick which triggers I want to take action with cloud versus those that want to take on the device itself which was what green grass was so all of those pieces is not some kind of top-down master plan as much as we know that customers have all these devices the edge that they want to use that data analyze that data take action on that data and send it back in multiple ways and you have you have the cloud platform to give them the services to make the tools the right tools for the right job yeah that's the main team yeah so I got to ask you about one of the big controversies that we don't think that's that controversial but the chips that you announced new Amazon Web Services front microprocessors the chips yeah do two of them talk about them and Intel's also a partner a lot of people are talking about this in the press yeah Intel Amazon chips well that annapurna acquisition is Norton they bear fruit was 2015 I think yeah early it really the annapurna team is fantastic and they've added a huge amount of value to AWS and Amazon as a whole you know the first thing I would say is that Intel is a very deep partner of AWS and will be for a long time I mean that that's not changing and we've been a long thought that they were gonna be lots of different processors out there and and different ones that did different things at different price points and so like a lot of other companies we've been interested in arm for a long time and for a while it wasn't mature enough and the technology is matured and we found a way in in building our own ARM chip with graviton where we think we can allow customers to run a lot of their scale out generalize were close but up to 45 percent less expensively and so when you find a value proposition that compelling for customers you need to do it and you know as I mentioned in the keynote yesterday when we were talking about inference we feel like a lot of the world has been solvent for training and not solvent as much for inference yet and we've made training so much easier with the things that we've built in AWS over the last couple years but inferences where most of the cost is gonna be and so elastic inference we think it you know will allow people to be much more efficient in how they use them for use and how they spend money but when you've got the type of workloads at scale and productions that use whole GPUs or that need that low latency where you need it on the hardware of a chip that's optimized for inference they is faster that's more cost effective that's high throughput we can get hundreds of tops on it and thousands to you ban them together he's gonna totally change the game for imprison and so that was something that wasn't easy for us to find elsewhere and when we have team fortunately they could build it and it's the combination of the elastic service of inference with the chip that makes the difference it specialism there so it's not like I mean you can use each on their own and we expect they'll be a bunch of customers who will use each on their own but there will be an opportunity to use those in combination that will be very powerful it comes down to really deeply understanding the customer problem again at night training versus inference and everybody talks about the training right the the technical challenge you got a child is the internet and tells gonna make a lot of money as it stands expanding market banding so they'll get their share the chips get taped out their con a couple year to three year life cycles and everything starts anew every time somebody's building a new chip so I think it's actually great for customers of all sorts that there's multiple processors that are possible but we will have a deep relationship with Intel forever I think so I want to talk about one of the cool demos you did on stage not a lot you did customer did f1 that was a super cool I love that imagery because it said an analogy of high performance competitive racing that can be applied to this play sports anything and the level of accuracy that they need in the real time time series kind of encapsulates a lot of the cloud value talk about the f1 analytic thing are you guys gonna sponsor these events there's a relationship there give us what the picture of what's going on there you have a deep relationship with Formula One where they're using our platform to to do their all their digital properties as well as their analytics and machine learning and it was super cool to see Ross demo the way that they're changing the user experience for for viewers and you know it's it's it's an amazing sport you know it's not watched as much maybe in the US but outside the US that is the motorsport and the way that they're changing the experience the way that they're able to assess what's happening with drivers and with cars and then predict what's actually happening and make the viewer feel like they're actually either in the cockpit or actually in the pit itself with it with the crew is it's really exciting and it's non err to be a partner so you do some events they'll get the cube they're these these big time again there's a tech angle now and everything it's a plug for you to be at the they have one event cloud demócrata you're hitting now new industries I mean this is the thing right I mean it's disrupting every industry I mean what aren't you disrupting I mean what areas do you see that yet aren't coming online to the cloud I don't see industry segments at this point that aren't moving to the cloud I would have told you 18 to 24 months ago that I felt like financial services was moving a lot more slowly than then I thought they should or you know probably healthcare also was a little bit slower but both of those industry segments are moving very aggressively well it's taking longer they're high-risk industries and the digital transformation has it occurred fast enough but it's coming and there's regulatory pieces that they legitimately have to sort through and you know we have just if you look at financial services as an example we have a pretty significant team that does nothing but work with our partners to help them with the regulatory bodies because what we find is when we go with a customer to a regulator and show them a real use case and then how it will be done in a DOP is the regulator says oh well that's more secure that you do on-premises and so it's just an education process and you know I think that's been helpful in it and I'll get final questions for you what have you observed here at reinvent Houston glad people talking so you get a lot of feedback actually to clopped two-part question because I was asked the final final question so I'll just get it out front what are people missing of all the announcements you've had a lot of signal in there a lot of a lot of announcements what are what is something that you've observed that you think should be amplified that people might have not overlooked but like you feel like it's more important to sign the light on we'll start with that one well you know it's a little hard for me to tell this moment just because there have been so many in such a short amount of time and and if we just look a little bit at the coverage it seems and if I take just as inputs they comments and and the questions from customers it's been pretty broadly understood and people are pretty excited and as I said different segments have kind of their favorite areas but I feel like people are pretty excited by the breadth of capabilities you know I think that if I pick two in particular I would say that people are still in the machine learning space people are blown away by how much we provided are all three layers of the stack I think people are still getting their heads around which layer of the stack am I gonna participate at you know I mean the one that probably has the most potential for most companies is that middle layer because most companies have gobs of data and there are jewels in that data and if you can enable their developers their everyday developers to be able to build models and get at the predictive value and add value that has huge impact for companies moving forward but most modern companies with technology functions will use all three layers of the stack and so just getting their arms around which layers of the stack they should take advantage of first and having the personnel to be able to do it and we're making that much easier with things like sage maker and then you know I think if you look at the blockchain space I think that that is just one of those spaces that has a huge amount of buzz people talk a lot about it exactly sure sometimes what they're gonna do but but I also think that a lot of people said to us that breaking those into those two real customer jobs to be done and then having a great solution that does each of those jobs really well is not only something that AWS does all the time that makes it easier for them but it also made it easier for a lot of them to understand that a lot of customers said to us you know that qld be that ledger database with a single trust of central authority for my supply chain that's what I need for my supply chain I don't need all the complexity of a blockchain framework and then there were a lot of other people said oh yeah that is what I want I wanted to decentralize trust between peers but I just needed a way easier way to manage hyper ledger fabric and etherium so I think those are two that people like are so interested and still figuring out how to use as expansively as I think they hope they will Andy thanks so much for your time and I want to just say watching you guys in the past six years has been a fun journey together but watching the execution you guys have done an amazing job of keeping your eye on the ball and being humble but being proud and loud at the same time so congratulations and you know guns blaring in 2019 what's your top pray all right besides listening to the customers what's your top 20 19 we know you listen to cut oh my gosh we have so many things that we're doing in 2019 but you know we have a lot of delivery in front and in front of us I mean as much as we launched 140 unique things over the last six to eight business days and yet I tell you to stay tuned the rest of 2018 we have more coming and then in nineteen you'll you should expect to see more few capabilities more database capabilities more machine learning capabilities more analytics capability look a lot I could spend all night John we don't need it we don't need a post reinvent post you know traumatic announcements syndrome because just to digest it all yeah it's a lot of work looking forward to seeing how enterprises continue to make to to kind of manage their hybrid approach as they're as they're making this trend transition from on-premises to the cloud how many continue to jump on to VMware cloud an AWS how many jump onto outpost so I think that that transition and helping customers do that easily is something on here of course we'll be commentating and pontificating on that for the next year thanks for your time I really should have me and I appreciate that you guys come at regular pay our pleasure okay winding down that's the last interview here wall to wall covers two cents 110 interviews in the books we'll have 500 video assets total blog post on Sylvia angle calm that's reinvent closing down 2018 thanks for watching [Music]
SUMMARY :
the our toss piece and you know the list
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
Andy Jesse | PERSON | 0.99+ |
2019 | DATE | 0.99+ |
AWS | ORGANIZATION | 0.99+ |
2015 | DATE | 0.99+ |
Andy Jassy | PERSON | 0.99+ |
US | LOCATION | 0.99+ |
Dean Volante | PERSON | 0.99+ |
Amazon | ORGANIZATION | 0.99+ |
Karthik | PERSON | 0.99+ |
forty six percent | QUANTITY | 0.99+ |
Amazon Web Services | ORGANIZATION | 0.99+ |
last year | DATE | 0.99+ |
Ruben | PERSON | 0.99+ |
2011 | DATE | 0.99+ |
two | QUANTITY | 0.99+ |
Andy | PERSON | 0.99+ |
Monday | DATE | 0.99+ |
Myrna Vogel | PERSON | 0.99+ |
2018 | DATE | 0.99+ |
last week | DATE | 0.99+ |
twelve | QUANTITY | 0.99+ |
today | DATE | 0.99+ |
Las Vegas | LOCATION | 0.99+ |
Italy | LOCATION | 0.99+ |
first problem | QUANTITY | 0.99+ |
next year | DATE | 0.99+ |
192 countries | QUANTITY | 0.99+ |
yesterday | DATE | 0.99+ |
two-part | QUANTITY | 0.99+ |
John | PERSON | 0.99+ |
Las Vegas | LOCATION | 0.99+ |
thousands of customers | QUANTITY | 0.99+ |
first problem | QUANTITY | 0.99+ |
Norton | ORGANIZATION | 0.99+ |
three year | QUANTITY | 0.99+ |
thousands | QUANTITY | 0.99+ |
last week | DATE | 0.99+ |
two devices | QUANTITY | 0.99+ |
110 interviews | QUANTITY | 0.99+ |
twelve years ago | DATE | 0.99+ |
sixth year | QUANTITY | 0.98+ |
thirty six months | QUANTITY | 0.98+ |
one | QUANTITY | 0.98+ |
first thing | QUANTITY | 0.98+ |
this week | DATE | 0.98+ |
millions of customers | QUANTITY | 0.98+ |
each | QUANTITY | 0.98+ |
VMware | ORGANIZATION | 0.98+ |
Python | TITLE | 0.98+ |
both | QUANTITY | 0.97+ |
next year | DATE | 0.97+ |
first one | QUANTITY | 0.97+ |
Jeff | PERSON | 0.97+ |
Sylvia | PERSON | 0.97+ |
thousands of devices | QUANTITY | 0.97+ |
this year | DATE | 0.97+ |
u.s. | LOCATION | 0.97+ |
first | QUANTITY | 0.97+ |
first several years | QUANTITY | 0.97+ |
Intel | ORGANIZATION | 0.97+ |
Groundhog's Day | EVENT | 0.97+ |
Shayn Hawthorne, AWS | AWS re:Invent 2018
>> Live, from Las Vegas, it's theCUBE covering AWS re:Invent 2018. Brought to you by Amazon Web Services, Intel, and their ecosystem partners. >> Hey, welcome back everyone. Live, Cube here in Las Vegas for AWS re:Invent. I'm John Furrier with my co-host, Dave Vellante. Day three of wall to wall coverage, holding our voices together, excited for our next guest, Shayn Hawthorne, general manager at AWS, for the exciting project around the Ground Station, partnership with Lockheed Martin. Really kind of outside the box, announced on Tuesday, not at the keynote, but this is a forward thinking real project which satellites can be provisioned like cloud computing resources. Totally innovative, and will change the nature of edge computing, feeding connectivity to anything. So, thanks for joining us. >> Thank you guys for having me. You're right, my voice is going out this week too. We've been doing a lot of talking. (John laughs) >> Great service. This is really compelling, 'cause it changes the nature of the network. You can feed connectivity, 'cause power and connectivity drive everything. Power, you got battery. Connectivity, you got satellite. Totally obvious, now that you look at it, but, not before this. Where did it come from? How did it all start? >> You know, it came from listening to our customers. Our customers have been talking with us and they had a number of challenges in getting the data off of their satellites and down to the ground. So, we listened to these customers and we listened to the challenges they were experiencing in getting their data to the ground, having access to ground stations, having the ability at the network level, to move the data around the world quickly to where they wanted to process it. And then also, having complex business process logic and other things that were required to help them run their satellite downlinks and uplinks. And then finally, the ability to actually have AWS services right there where the data came down into the cloud, so that you could do great things with that data within milliseconds of it hitting the ground. >> So it's a essentially satellite as a service with a back end data capability, data ingestion, analytics, and management capability. That, how'd that idea come about? I mean, it just underscores the scale of AWS. And I'm thinking about other things that you might be able to, where'd the idea come from? How was it germinated? >> Well and actually, let me just say one thing, we actually would call it Ground Station as the service. It's the Ground Station on the surface of the earth that communicates with the satellite. It allows us to get the data off the satellite or send commands up to it. And so, like I was saying, we came up the idea by talking to our customers, and so we went into, I think this is an incredible part of working at Amazon, because we actually follow through with our leadership principals. We worked backwards from the customer. We actually put together a press release and a frequently asked questions document, a PR/FAQ, in a traditional six page format. And we started working it through our leadership and it got all the way to the point that Andy and the senior leadership team within AWS made the decision that they were going to support our idea and the concept and the architecture that we had come up with to meet these customers' requirements, we actually were able to get to that by about March of 2018. By the end of March, Andy had even had us go in and talk with Jeff. He gave us the thumbs up as well, and after six months, we've already procured 24 antennas. We've already built two Ground Stations in the United States and we've downlinked over hundreds of contacts with satellites, bringing Earth imagery down and other test data to prove that this system works. Get it ready for preview. >> It's unbelievable, because you're basically taking the principals of AWS, which is eliminating the heavy lifting, applying that to building Ground Stations, presumably, right, so, the infrastructure that you're building out, do you have partners that you're working with, are there critical players there, that are enabling this? >> Yeah, it's really neat. We've actually had some really great partnerships, both with helping us build AWS Ground Station, as well as partners that helped us learn what the customers need. Let me tell you, first off, about the partnership that we've had with Lockheed Martin to develop a new innovative antenna system that will collaboratively come together with the parabolic reflectors that AWS Ground Station uses. They've been working on this really neat idea that gives them ability to downlink data all over the entire United States in a very resilient way, which means if some of their Ground Stations antennas in Verge don't work, due to man made reasons or due to natural occurrences, then we're actually able to use the rest of the network to still continue to downlink data. And then, we complimentary bring in AWS Astra for certain types of downlinks and then also to provide uplink commanding to other satellites. The other customer partnership that we've worked with was working with the actual customers who are going to use AWS Ground Station, like DigitalGlobe, Black Sky, Capella SAR, HawkEye 360, who all provided valuable inputs to us about exactly what do they need in a Ground Station. They need the ability to rapidly downlink data, they need the ability to pay by the minute so that there are actually able to use variable expense to pay for satellite downlinks instead of capital expenses to go out and build it. And then by doing that, we're able to offer them a product that's 80% cheaper than if they'd had to go out and build a complete network similar to what we built. And, they're able to, like I said before, access great AWS services like Rekognition, or SageMaker, so that they can make sense of the data that they bring down to the Earth. >> It's a big idea and I'm just sort of curious as to, how and if you, sort of, validated it. How'd ya increase the probability that it was actually going to, you know, deliver a business return? Can you talk about that process? >> Well, we were really focused on validating that we could meet customer challenges and really give them the data securely and reliably with great redundancy. So we validated, first off by, we built our antennas and the Ground Stations in the previous software. We finished over a month and a half ago, and we've been rigorously testing it with our customer partners and then letting them validate that the information we've provided back to them was 100% as good as what they would've received on their own network, and we tested it out, and we've actually got a number of pictures and images downloaded over at our kiosk that were all brought in on AWS Ground Station, and its a superb products over there. >> So Shayn, how does it work? You write this press release, this working backwards document, describe that process. Was that process new to you? Had you done it at other companies? How did you find it? Was it a useful process, obviously it was, 'cause you got the outcome you're looking for, but, talk a little bit more about that approach. >> Yeah, it's actually very cool, I've only been at AWS for a year and a half. And so, I would say that my experience at AWS so far completely validates working backwards from customers. We were turned on to the idea by talking to our customers and the challenges they said. I started doing analysis after the job was assigned to me by Dave Nolton, my boss, and I started putting together the first draft of our PR/FAQ, started engaging with customers immediately. Believe it or not, we went through 28 iterations of the PR/FAQ before we even got to Andy. Everybody in our organization took part in helping to make it better, add in, ask hard questions, ensure that we were really thinking this idea through and that we were obsessing on the customer. And then after we got to Andy, and we got through approving that, it probably went through another 28 iterations before we got to Jeff. And then we went through talking with him. He asked additional hard questions to make sure that we were doing the right for the customer and that we were putting together the right kind of product. And finally we've been iterating it on it ever since until we launched it couple of days ago. >> Sounds like you were iterating, raising the bar, and it resonated with customers. >> Totally. And even as part of getting out of it-- >> That's Amazon's language of love. >> And then your engineering resource, you know, if people are asking you hard questions, you obviously need engineering folks to validate that it's doable. At what point do you get that engineering resource, how does that all work? >> Well, it's neat. In my division, Region Services Division, we actually were supporting it completely from within the division, all the way until we got approval from Andy. And then we actually went in and started hiring very good skills. To show you what kind of incredible people we have at Amazon, we only had to hire about 10% space expertise from outside of the company. We were actually able to bring together 80-90% of the needed skills to build AWS Ground Station from people who've been working at Amazon.com and AWS. And we came together, we really learned quickly, we iterated, failed fast, put things together, changed it. And we were able to deliver the product in time. The whole cloth made from our own expertise. >> So just to summarize, from idea to actual, we're going to do this, how long did that take? >> I'd say that took about three months. From idea to making a decision, three months. From decision to have a preview product that we could launch at re:Invent, six months. >> That's unbelievable. >> It is. >> If you think about something of this scope. >> And it was a joy, I mean it was an incredible to be a part of something like this. It was the best work I've ever done in my life. >> Yeah, space is fun. >> It is. >> Shayn, thanks for coming on theCUBE, sharing your story and insight, we love this. We're going to keep following it. And we're going see you guys at the Public Sector Summits, and all the events you guys are at, so, looking forward to seeing and provisioning some satellite. >> I'm looking forward to showing you what we do next. So thank you for having me. >> Great. We'll get a sneak peak. >> Congratulations. >> This is theCUBE here in Las Vegas, we'll be back with more coverage after this short break. (futuristic music)
SUMMARY :
Brought to you by Amazon Web Services, Intel, of edge computing, feeding connectivity to anything. Thank you guys for having me. Totally obvious, now that you look at it, and we listened to the challenges they were experiencing that you might be able to, where'd the idea come from? that we had come up with and then also to provide that it was actually going to, you know, that the information we've provided back to them Was that process new to you? and that we were obsessing on the customer. and it resonated with customers. And even as part of getting out of it-- to validate that it's doable. of the needed skills to build AWS Ground Station that we could launch at re:Invent, six months. to be a part of something like this. and all the events you guys are at, so, I'm looking forward to showing you what we do next. with more coverage after this short break.
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
Jeff | PERSON | 0.99+ |
Dave Nolton | PERSON | 0.99+ |
Dave Vellante | PERSON | 0.99+ |
Shayn Hawthorne | PERSON | 0.99+ |
Shayn | PERSON | 0.99+ |
Andy | PERSON | 0.99+ |
Amazon Web Services | ORGANIZATION | 0.99+ |
AWS | ORGANIZATION | 0.99+ |
80% | QUANTITY | 0.99+ |
Amazon | ORGANIZATION | 0.99+ |
Amazon.com | ORGANIZATION | 0.99+ |
24 antennas | QUANTITY | 0.99+ |
100% | QUANTITY | 0.99+ |
John Furrier | PERSON | 0.99+ |
Lockheed Martin | ORGANIZATION | 0.99+ |
John | PERSON | 0.99+ |
28 iterations | QUANTITY | 0.99+ |
Tuesday | DATE | 0.99+ |
Earth | LOCATION | 0.99+ |
Intel | ORGANIZATION | 0.99+ |
Las Vegas | LOCATION | 0.99+ |
six page | QUANTITY | 0.99+ |
a year and a half | QUANTITY | 0.99+ |
United States | LOCATION | 0.99+ |
three months | QUANTITY | 0.99+ |
both | QUANTITY | 0.98+ |
this week | DATE | 0.98+ |
end of March | DATE | 0.98+ |
80-90% | QUANTITY | 0.98+ |
six months | QUANTITY | 0.98+ |
Ground Station | COMMERCIAL_ITEM | 0.97+ |
Public Sector Summits | EVENT | 0.97+ |
earth | LOCATION | 0.96+ |
about 10% | QUANTITY | 0.95+ |
Ground Station | LOCATION | 0.95+ |
first draft | QUANTITY | 0.94+ |
couple of days ago | DATE | 0.94+ |
about three months | QUANTITY | 0.94+ |
first | QUANTITY | 0.93+ |
one thing | QUANTITY | 0.93+ |
March of 2018 | DATE | 0.92+ |
Day three | QUANTITY | 0.9+ |
over a month and a half ago | DATE | 0.9+ |
Astra | COMMERCIAL_ITEM | 0.9+ |
Station | ORGANIZATION | 0.87+ |
HawkEye 360 | COMMERCIAL_ITEM | 0.86+ |
Live | TITLE | 0.85+ |
Region Services Division | ORGANIZATION | 0.82+ |
Capella | ORGANIZATION | 0.81+ |
re:Invent 2018 | EVENT | 0.8+ |
hundreds | QUANTITY | 0.8+ |
Sky | COMMERCIAL_ITEM | 0.77+ |
Cube | PERSON | 0.74+ |
Black | ORGANIZATION | 0.74+ |
two Ground Stations | QUANTITY | 0.71+ |
Invent 2018 | EVENT | 0.71+ |
AWS Ground Station | ORGANIZATION | 0.71+ |
Ground Stations | COMMERCIAL_ITEM | 0.68+ |
Stations | LOCATION | 0.65+ |
re:Invent | EVENT | 0.64+ |
Ground | COMMERCIAL_ITEM | 0.6+ |
SAR | COMMERCIAL_ITEM | 0.58+ |
contacts | QUANTITY | 0.56+ |