Bryan Inman, Armis | Managing Risk With The Armis Platform REV2
(upbeat music) >> Hello everyone, welcome back to the manager risk across the extended attack surface with Armis. I'm John Furrier, your host of theCUBE. Got the demo. Got here, Bryan Inman sales engineer at Armis. Bryan, thanks for coming on. We're looking forward to the demo. How you doing? >> I'm doing well, John, thanks for having me. >> We heard from Nadir describing Armis' platform, lot of intelligence. It's like a search engine meets data at scale, intelligent platform around laying out the asset map, if you will, the new vulnerability module among other things that really solves CISCO's problems. A lot of great customer testimonials and we got the demo here that you're going to give us. What's the demo about? What are we going to see? >> Well, John, thanks. Great question. And truthfully, I think as Nadir has pointed out what Armis as a baseline is giving you is great visibility into every asset that's communicating within your environment. And from there, what we've done is we've layered on known vulnerabilities associated with not just the device, but also what else is on the device. Is there certain applications running on that device, the versions of those applications, and what are the vulnerabilities known with that? So that's really gives you great visibility in terms of the devices that folks aren't necessarily have visibility into now, unmanaged devices, IoT devices, OT, and critical infrastructure, medical devices things that you're not necessarily able to actively scan or put an agent on. So not only is Armis telling you about these devices but we're also layering on those vulnerabilities all passively and in real time. >> A lot of great feedback we've heard and I've talked to some of your customers. Rhe agentless is a huge deal. The discoveries are awesome. You can see everything and just getting real time information. It's really, really cool. So I'm looking forward to the demo for our guests. Take us on that tour. Let's go with the demo for the guests today. >> All right. Sounds good. So what we're looking at here is within the Armis console is just a clean representation of the passive reporting of what Armis has discovered. So we see a lot of different types of devices from your virtual machines and personal computers, things that are relatively easy to manage. But working our way down, you're able to see a lot of different types of devices that are not necessarily easy to get visibility into, things like your up systems, IT cameras, dash cams, et cetera, lighting systems. And today's day and age where everything is moving to that smart feature, it's great to have that visibility into what's communicating on my network and getting that, being able to layer on the risk factors associated with it as well as the vulnerabilities. So let's pivot over to our vulnerabilities tab and talk about the the AVM portion, the asset vulnerability management. So what we're looking at is the dashboard where we're reporting another clean representation with customizable dashlets that gives you visuals and reporting and things like new vulnerabilities as they come in. What are the most critical vulnerabilities, the newest as they roll in the vulnerabilities by type? We have hardware. We have application. We have operating systems. As we scroll down, we can see things to break it down by vulnerabilities, by the operating system, Windows, Linux, et cetera. We can create dashlets that show you views of the number of devices that are impacted by these CVEs. And scrolling down, we can see how long have these vulnerabilities been sitting within my environment? So what are the oldest vulnerabilities we have here? And then also of course, vulnerabilities by applications. So things like Google Chrome, Microsoft Office. So we're able to give a good representation of the amount of vulnerabilities as they're associated to the hardware and applications as well. So we're going to dig in and take a a deeper look at one of these vulnerabilities here. So I'm excited to talk today about of where Armis AVM is, but also where it's going as well. So we're not just reporting on things like the CVSS score from NIST NVD. We're also able to report on things like the exploitability of that. How actively is this CVE being exploited in the wild? We're reporting EPSS scores. For example, we're able to take open source information as well as a lot of our partnerships that we have with other vendors that are giving us a lot of great value of known vulnerabilities associated with the applications and with hardware, et cetera. But where we're going with this is in very near future releases, we're going to be able to take an algorithm approach of, what are the most critical CVSS that we see? How exploitable are those? What are common threat actors doing with these CVEs? Have they weaponized these CVEs? Are they actively using those weaponized tools to exploit these within other folks' environments? And who's reporting on these? So we're going to take all of these and then really add that Armis flavor of we already know what that device is and we can explain and so can the users of it, the business criticality of that device. So we're able to pivot over to the matches as we see the CVEs. We're able to very cleanly view, what exactly are the devices that the CVE resides on. And as you can see, we're giving you more than just an IP address or a lot more context and we're able to click in and dive into what exactly are these devices. And more importantly, how critical are these devices to my environment? If one of these devices were to go down if it were to be a server, whatever it may be, I would want to focus on those particular devices and ensuring that that CVE, especially if it's an exploitable CVE were to be addressed earlier than say the others and really be able to manage and prioritize these. Another great feature about it is, for example, we're looking at a particular CVE in terms of its patch and build number from Windows 10. So the auto result feature that we have, for example, we've passively detected what this particular personal computer is running Windows 10 and the build and revision numbers on it. And then once Armis passively discovers an update to that firmware and patch level, we can automatically resolve that, giving you a confidence that that has been addressed from that particular device. We're also able to customize and look through and potentially select a few of these, say, these particular devices reside on your guest network or an employee wifi network where we don't necessarily, I don't want to say care, but we don't necessarily value that as much as something internally that holds significantly, more business criticality. So we can select some of these and potentially ignore or resolve for determining reasons as you see here. Be able to really truly manage and prioritize these CVEs. As I scroll up, I can pivot over to the remediation tab and open up each one of these. So what this is doing is essentially Armis says, through our knowledge base been able to work with the vendors and pull down the patches associated with these. And within the remediation portion, we're able to view, for example, if we were to pull down the patch from this particular vendor and apply it to these 60 devices that you see here, right now we're able to view which patches are going to gimme the most impact as I prioritize these and take care of these affected devices. And lastly, as I pivot back over. Again, where we're at now is we're able to allow the users to customize the organizational priority of this particular CVE to where in terms of, this has given us a high CVSS score but maybe for whatever reasons it may be, maybe this CVE in terms of this particular logical segment of my network, I'm going to give it a low priority for whatever the use case may be. We have compensating controls set in place that render this CVE not impactful to this particular segment of my environment. So we're able to add that organizational priority to that CVE and where we're going as you can see that popped up here but where we're going is we're going to start to be able to apply the organizational priority in terms of the actual device level. So what we'll see is we'll see a column added to here to where we'll see the the business impact of that device based on the importance of that particular segment of your environment or the device type, be it critical networking device or maybe a critical infrastructure device, PLCs, controllers, et cetera, but really giving you that passive reporting on the CVEs in terms of what the device is within your network. And then finally, we do integrate with your vulnerability management and scanners as well. So if you have a scanner actively scanning these, but potentially they're missing segments of your net network, or they're not able to actively scan certain devices on your network, that's the power of Armis being able to come back in and give you that visibility of not only what those devices are for visibility into them, but also what vulnerabilities are associated with those passive devices that aren't being scanned by your network today. So with that, that concludes my demo. So I'll kick it back over to you, John. >> Awesome. Great walk through there. Take me through what you think the most important part of that. Is it the discovery piece? Is it the interaction? What's your favorite? >> Honestly, I think my favorite part about that is in terms of being able to have the visibility into the devices that a lot of folks don't see currently. So those IoT devices, those OT devices, things that you're not able to run a scan on or put an agent on. Armis is not only giving you visibility into them, but also layering in, as I said before, those vulnerabilities on top of that, that's just visibility that a lot of folks today don't have. So Armis does a great job of giving you visibility and vulnerabilities and risks associated with those devices. >> So I have to ask you, when you give this demo to customers and prospects, what's the reaction? Falling out of their chair moment? Are they more skeptical? It's almost too good to be true and end to end vulnerability management is a tough nut to crack in terms of solution. >> Honestly, a lot of clients that we've had, especially within the OT and the medical side, they're blown away because at the end of the day when we can give them that visibility, as I've said, Hey, I didn't even know that those devices resided in that portion, but not only we showing them what they are and where they are and enrichment on risk factors, et cetera, but then we show them, Hey, we've worked with that vendor, whatever it may be and Rockwell, et cetera, and we know that there's vulnerabilities associated with those devices. So they just seem to be blown away by the fact that we can show them so much about those devices from behind one single console. >> It reminds me of the old days. I'm going to date myself here. Remember the old Google Maps mashup days. Customers talk about this as the Google Maps for their assets. And when you have the Google Maps and you have the Ubers out there, you can look at the trails, you can look at what's happening inside the enterprise. So there's got to be a lot of interest in once you get the assets, what's going on those networks or those roads, if you will, 'cause you got in packet movement. You got things happening. You got upgrades. You got changing devices. It's always on kind of living thing. >> Absolutely. Yeah, it's what's on my network. And more importantly at times, what's on those devices? What are the risks associated with the the applications running on those? How are those devices communicating? And then as we've seen here, what are the vulnerabilities associated with those and how can I take action with them? >> Real quick, put a plug in for where I can find the demo. Is it online? Is it on YouTube? On the website? Where does someone see this demo? >> Yeah, the Armis website has a lot of demo content loaded. Get you in touch with folks like engineers like myself to provide demos whenever needed. >> All right, Bryan, thanks for coming on this show. Appreciate, Sales Engineer at Armis, Bryan Inman. Given the demo God award out to him. Good job. Thanks for the demo. >> Thanks, thanks for having me. >> Okay. In a moment, we're going to have my closing thoughts on this event and really the impact to the business operations side, in a moment. I'm John Furrier of theCUBE. Thanks for watching. (upbeat music)
SUMMARY :
We're looking forward to the demo. thanks for having me. and we got the demo here in terms of the devices and I've talked to some of your customers. So the auto result feature that we have, Is it the discovery piece? to have the visibility So I have to ask you, So they just seem to be blown away So there's got to be a lot of interest What are the risks associated On the website? to provide demos whenever needed. Given the demo God award out to him. to the business operations
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
John Furrier | PERSON | 0.99+ |
John | PERSON | 0.99+ |
Bryan | PERSON | 0.99+ |
CISCO | ORGANIZATION | 0.99+ |
Bryan Inman | PERSON | 0.99+ |
60 devices | QUANTITY | 0.99+ |
Rockwell | ORGANIZATION | 0.99+ |
Windows 10 | TITLE | 0.99+ |
Armis | ORGANIZATION | 0.99+ |
YouTube | ORGANIZATION | 0.99+ |
Google Maps | TITLE | 0.99+ |
today | DATE | 0.98+ |
one | QUANTITY | 0.98+ |
Linux | TITLE | 0.96+ |
one single console | QUANTITY | 0.96+ |
NIST NVD | ORGANIZATION | 0.95+ |
Windows | TITLE | 0.95+ |
each one | QUANTITY | 0.93+ |
Armis' | ORGANIZATION | 0.91+ |
Ubers | ORGANIZATION | 0.9+ |
Nadir | ORGANIZATION | 0.85+ |
Microsoft | ORGANIZATION | 0.81+ |
Google Chrome | TITLE | 0.79+ |
theCUBE | ORGANIZATION | 0.75+ |
Nadir | PERSON | 0.71+ |
Armis | PERSON | 0.56+ |
REV2 | TITLE | 0.53+ |
Office | TITLE | 0.51+ |
God | TITLE | 0.47+ |
Armis Platform | ORGANIZATION | 0.4+ |
Tim Everson, Kalahari Resorts and Conventions | Manage Risk with the Armis Platform
>> Okay, welcome back to the portion of the program for customer lightning talks, where we chat with Armis' customers for a rapid fire five minute session on their Cisco perspectives and insights into cybersecurity. First up is Tim Everson, CISO of Kalahari resorts and conventions. Let's get it going. Hi, Tim. Welcome to theCUBE and Armis program, managing risk across your extended surface area. >> Thanks for having me appreciate it. >> So let's get going. So unified visibility across the extended asset serves as key. You can't secure what you can't see. Tell me about what you're able to centralize, your views on network assets and what is Armis doing from an impact standpoint that's had on your business? >> Sure. So traditionally basically you have all your various management platforms, your Cisco platforms, your Sims, your wireless platforms, all the different pieces and you've got a list of spare data out there and you've got to chase all of this data through all these different tools. Armis is fantastic and was really point blank dropping in place for us as far as getting access to all of that data all in one place and giving us visibility to everything. Basically opened the doors letting us see our customer wireless traffic, our internal traffic, our PCI traffic because we deal with credit cards, HIPAA, compliance, all this traffic, all these different places, all into one. >> All right, next up, vulnerability management is a big topic, across all assets, not just IT devices. The gaps are there in the current vulnerability management programs. How has Armis vulnerability management made things better for your business and what can you see now that you couldn't see before? >> So Armis gives me better visibility of the network side of these vulnerabilities. You have your Nessus vulnerability scanners, the things that look at machines, look at configurations and hard facts. Nessus gives you all those. But when you turn to Armis, Armis looks at the network perspective, takes all that traffic that it's seeing on the network and gives you the network side of these vulnerabilities. So you can see if something's trying to talk out to a specific port or to a specific host on the internet and Armis consolidates all that and gives you trusted sources of information to validate where those are coming from. >> When you take into account all the criticality of the different kinds of assets involved in a business operation and they're becoming more wider, especially with edge in other areas, how has the security workload changed? >> The security workload has increased dramatically, especially in hospitality. In our case, not only do we have hotel rooms and visitors and our guests, we also have a convention center that we deal with. We have water parks and fun things for people to do. Families and businesses alike. And so when you add all those things up and you add the wireless and you add the network and the audio video and all these different pieces that come into play with all of those things in hospitality and you add our convention centers on top of it, the footprint's just expanded enormously in the past few years. >> When you have a digital transformation in a use case like yours, it's very diverse. You need a robust network, you need a robust environment to implement SaaS solutions. No ages to deploy, no updates needed. You got to be in line with that to execute and scale. How easy was Armis to implement ease of use of simplicity, the plug and play? In other words, how quickly do you achieve this time to value? >> Oh goodness. We did a proof of concept about three months ago in one of our resort locations, we dropped in an Armis appliance and literally within the first couple hours of the appliance being on the network, we had data on 30 to 40,000 devices that were touching our network. Very quick and easy, very drop and plug and play and moving from the POC to production, same deal. We, we dropped in these appliances in site. Now we're seeing over 180,000 devices touching our networks within a given week. >> Armis has this global asset knowledge base, it's crowdsourced an a asset intelligent engine, it's a game changer. It tracks managed, unmanaged IOT devices. Were you shocked when you discovered how many assets they were able to discover and what impact did that have for you? >> Oh, absolutely. Not only do we have the devices that we have, but we have guests that bring things on site all the time, Roku TVs and players and Amazon Fire Sticks and all these different things that are touching our network and seeing those in real time and seeing how much traffic they're using we can see utilization, we can see exactly what's being brought on, we can see vehicles in our parking lot that have access points turned on. I mean, it's just amazing how much data this opened our eyes to that you know it's there but you don't ever see it. >> It's bring your own equipment to the resort just so you can watch all your Netflix, HDMI cable, everyone's doing it now. I mean, this is the new user behavior. Great insight. Anything more you'd want to say about Armis for the folks watching? >> I would say the key is they're very easy to work with. The team at Armis has worked very closely with me to get the integrations that we've put in place with our networking equipment, with our wireless, with different pieces of things and they're working directly with me to help integrate some other things that we've asked them to do that aren't there already. Their team is very open. They listen, they take everything that we have to say as a customer to heart and they really put a lot of effort into making it happen. >> All right, Tim. Well, thanks for your time. I'm John Furrier with theCUBE, the leader in enterprise tech coverage. Up next in this lightning talk session is Brian Gilligan, manager, security and Operations at Brookfield Properties. Thanks for watching.
SUMMARY :
the portion of the program You can't secure what you can't see. you have all your various and what can you see now and gives you the network and you add the network that to execute and scale. the POC to production, same deal. when you discovered how that you know it's there about Armis for the folks watching? everything that we have to say and Operations at Brookfield Properties.
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
Brian Gilligan | PERSON | 0.99+ |
Tim | PERSON | 0.99+ |
Tim Everson | PERSON | 0.99+ |
30 | QUANTITY | 0.99+ |
Amazon | ORGANIZATION | 0.99+ |
Armis | ORGANIZATION | 0.99+ |
John Furrier | PERSON | 0.99+ |
Nessus | ORGANIZATION | 0.99+ |
Cisco | ORGANIZATION | 0.99+ |
five minute | QUANTITY | 0.99+ |
First | QUANTITY | 0.99+ |
Fire Sticks | COMMERCIAL_ITEM | 0.99+ |
Kalahari Resorts and Conventions | ORGANIZATION | 0.98+ |
over 180,000 devices | QUANTITY | 0.98+ |
first couple hours | QUANTITY | 0.97+ |
40,000 devices | QUANTITY | 0.97+ |
Brookfield Properties | ORGANIZATION | 0.95+ |
one | QUANTITY | 0.92+ |
Netflix | ORGANIZATION | 0.92+ |
one place | QUANTITY | 0.9+ |
three months ago | DATE | 0.86+ |
Roku | ORGANIZATION | 0.83+ |
Kalahari | ORGANIZATION | 0.78+ |
theCUBE | ORGANIZATION | 0.77+ |
CISO | PERSON | 0.67+ |
past few years | DATE | 0.6+ |
HIPAA | TITLE | 0.56+ |
about | DATE | 0.53+ |
Armis' | ORGANIZATION | 0.52+ |
rs | ORGANIZATION | 0.4+ |
Brian Galligan, Brookfield Properties | Manage Risk with the Armis Platform
>> Okay, up next in the Lightning Talk Session is Brian Galligan; Mgr, Security and Operations at Brookfield Properties. Brian, great to see you. Thanks for coming on. >> Thanks for having me, John. >> So unified visibility across extended asset surface area is key these days. You can't secure what you can't see. So tell me more about how you were able to centralize your view of network assets with Armis and what impact that had on your business. >> Yeah, that's been a really key component of ours where we've actually owned multiple companies with them and are always acquiring companies from time to time. So it's always a question. What is actually out there and what do we need to be worried about. So from an inventory perspective it's definitely something that we've been looking into. Armis was a great partner in being able to get us the visibility into a lot of the IoT that we have out in the environment. And then also trying to find what we have and what's actually installed on those devices. What's running, who's talking to who. So that's definitely been a key component with our partnership with Armis. >> You know, we interview a lot of practitioners and companies and one things we found is vulnerability Management programs. There's a lot of gaps. You know, vulnerability management comes across more sometimes just IT devices, but not all assets. How has Armis Vulnerability Management made things better for your business? And what can you see now that you couldn't see before? >> Yeah, again, because we own multiple companies and they actually use different tools for vulnerability management. It's been a challenge to be able to compare apples to apples on when we have vulnerability. When we have risk out there, how do you put a single number to it? How do you prioritize different initiatives across those sectors? And being able to use Armis and have that one score, have that one visibility and also that one platform that you can query across all of those different companies, has been huge because we just haven't had the ability to say are we vulnerable to X, Y and Z across the board in these different companies? >> You know, it's interesting when you have a lot of different assets and companies, as you mentioned. It kind of increases the complexity and yeah we love the enterprise. You solve complexity by more complexity but that's not the playbook anymore. We want simplicity. We want to have a better solution. So when you take into account, the criticality of these businesses as you're integrating in, in real time and the assets within those business operations you got to keep focused on the right solutions. What has Armis done for you that's been correct and right for you guys? >> Yeah, so being able to see the different like be able to actually drill down into the nitty gritty on what devices are connecting to what. Being able to enforce policies that way, I think has been a huge win that we've been able to see from Armis. It's one of those things where we were able to see north-south traffic. No problem with our typical SIM tools, firewall tools and different logging sources but we haven't been able to see anything east-west and that's where we're going to be most vulnerable. That's where we've been actually found. We found some gaps in our coverage from a pen test perspective where we've found that where we don't have that visibility. Armis has allowed us to get into that communication to better fine tune the rules that we have across devices across sectors, across the data center to properties. Properties of the data center and then also to the cloud. >> Yeah, visibility into the assets is huge. But as you're in operations you got to operationalize these tools. I mean, some people sound like they've got a great sales pitch and all sounds like, "Wait a minute, I got to re-configure my entire operations." At the end of the day, you want to have an easy to use, but effective capability. So you're not taxed either personnel or operations. How easy has it been with Armis to implement from an ease of use, simplicity, plug and play? In other words, how quickly did you get to the time to value? Can you share your thoughts? >> This honestly is the biggest value that we've seen in Armis. I think a, a big kudos goes to the professional services group for getting us stood up being able to explain the tool, be able to dig into it and then get us to that time to value. Honestly, we've only scratched the surface on what Armis can give us which is great because they've given us so much already. So definitely taking that model of let's crawl, walk, run with what we're able to do. But the professional services team has given us so much assistance in getting from one collector to now many collectors. And we're in that deployment phase where we're able to gather more data and find those anomalies that are out there. I again, big props to the, the professional services team. >> Yeah, you know one of we'd add an old expression when you know when the whole democratization happened on the web here comes all the people, you know social media and whatnot now with IoT here comes all the devices. Here comes all the things- >> Yeah. >> Things >> More things are being attached to the network. So Armis has this global asset knowledge base that crowd-sources the asset intelligence. How has that been a game changer for you? And were you shocked when you discovered how many assets they were able to discover and what impact did that have for you? >> We have a large wifi footprint for guests, vendors, contractors that are working on site along with our corporate side, which has a lot of devices on it as well. And being able to see what devices are using what services on there and then be able to fingerprint them easily has been huge. I would say one of the best stories that I can tell is actually with a pen test that we ran recently. We were able to determine what the pen test device was and how it was acting anomalous and then fingerprint that device within five minutes opposed to getting on the phone with probably four or five different groups to figure out what is this device? It's not one of our normal devices. It's not one of our normal builds or anything. We were able to find that device within probably three to five minutes with Armis and the fingerprinting capability. >> Yeah, nothing's going to get by you with these port scans or any kind of activity, so to speak, jumping on the wifi. Great stuff. Anything else you'd like to share about Armis while I got you here? >> Yeah, I would say that something recently, we actually have an open position on our team currently. And one of the most exciting things is being able to share our journey that we've had with Armis over the last year, year and a half, and their eyes light up when they hear the capabilities of what Armis can do, what Armis can offer. And you see a little bit of jealousy of, you know, "Hey I really wish my current organization had that." And it's one of those selling tools that you're able to give to security engineers, security analysts saying, "Here's what you're going to have on the team to be able to do your job, right." So that you don't have to worry about necessarily the normal mundane things. You get to actually go do the cool hunting stuff, which Armis allows you to do. >> Well. Brian, thanks for the time here on this Lightning Talk, appreciate your insight. I'm John Furrier with theCUBE the leader in enterprise tech coverage. Up next in the Lightning Talk Session is Alex Schuchman. He's the CISO of Colgate-Palmolive Thanks for watching.
SUMMARY :
Brian, great to see you. You can't secure what you can't see. into a lot of the IoT that we And what can you see now had the ability to say and the assets within across the data center to properties. to the time to value? being able to explain the tool, on the web here comes all the people, that crowd-sources the asset intelligence. and then be able to fingerprint Yeah, nothing's going to get have on the team to be able He's the CISO of Colgate-Palmolive
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
Alex Schuchman | PERSON | 0.99+ |
Brian | PERSON | 0.99+ |
Brian Galligan | PERSON | 0.99+ |
John Furrier | PERSON | 0.99+ |
four | QUANTITY | 0.99+ |
John | PERSON | 0.99+ |
Armis | ORGANIZATION | 0.99+ |
three | QUANTITY | 0.99+ |
five minutes | QUANTITY | 0.99+ |
Colgate | ORGANIZATION | 0.99+ |
one score | QUANTITY | 0.98+ |
one | QUANTITY | 0.98+ |
five different groups | QUANTITY | 0.97+ |
last year | DATE | 0.97+ |
single number | QUANTITY | 0.97+ |
apples | ORGANIZATION | 0.96+ |
one collector | QUANTITY | 0.96+ |
one platform | QUANTITY | 0.95+ |
Brookfield Properties | ORGANIZATION | 0.93+ |
one things | QUANTITY | 0.9+ |
Armi | PERSON | 0.81+ |
theCUBE | ORGANIZATION | 0.77+ |
Lightning Talk | EVENT | 0.77+ |
and a half | DATE | 0.66+ |
minute | QUANTITY | 0.65+ |
year | QUANTITY | 0.62+ |
Lightning Talk | TITLE | 0.6+ |
those | QUANTITY | 0.5+ |
Palmolive | ORGANIZATION | 0.38+ |
Nadir Izrael, Armis | Manage Risk with the Armis Platform
(upbeat music) >> Today's organizations are overwhelmed by the number of different assets connected to their networks, which now include not only IT devices and assets, but also a lot of unmanaged assets, like cloud, IoT, building management systems, industrial control systems, medical devices, and more. That's not just it, there's more. We're seeing massive volume of threats, and a surge of severe vulnerabilities that put these assets at risk. This is happening every day. And many, including me, think it's only going to get worse. The scale of the problem will accelerate. Security and IT teams are struggling to manage all these vulnerabilities at scale. With the time it takes to exploit a new vulnerability, combined with the lack of visibility into the asset attack surface area, companies are having a hard time addressing the vulnerabilities as quickly as they need. This is today's special CUBE program, where we're going to talk about these problems and how they're solved. Hello, everyone. I'm John Furrier, host of theCUBE. This is a special program called Managing Risk Across Your Extended Attack Surface Area with Armis, new asset intelligence platform. To start things off, let's bring in the co-founder and CTO of Armis, Nadir Izrael. Nadir, great to have you on the program. >> Yeah, thanks for having me. >> Great success with Armis. I want to just roll back and just zoom out and look at, what's the big picture? What are you guys focused on? What's the holy grail? What's the secret sauce? >> So Armis' mission, if you will, is to solve to your point literally one of the holy grails of security teams for the past decade or so, which is, what if you could actually have a complete, unified, authoritative asset inventory of everything, and stressing that word, everything. IT, OT, IoT, everything on kind of the physical space of things, data centers, virtualization, applications, cloud. What if you could have everything mapped out for you so that you can actually operate your organization on top of essentially a map? I like to equate this in a way to organizations and security teams everywhere seem to be running, basically running the battlefield, if you will, of their organization, without an actual map of what's going on, with charts and graphs. So we are here to provide that map in every aspect of the environment, and be able to build on top of that business processes, products, and features that would assist security teams in managing that battlefield. >> So this category, basically, is a cyber asset attack surface management kind of focus, but it really is defined by this extended asset attack surface area. What is that? Can you explain that? >> Yeah, it's a mouthful. I think the CAASM, for short, and Gartner do love their acronyms there, but CAASM, in short, is a way to describe a bit of what I mentioned before, or a slice out of it. It's the whole part around a unified view of the attack surface, where I think where we see things, and kind of where Armis extends to that is really with the extended attack surface. That basically means that idea of, what if you could have it all? What if you could have both a unified view of your environment, but also of every single thing that you have, with a strong emphasis on the completeness of that picture? If I take the map analogy slightly more to the extreme, a map of some of your environment isn't nearly as useful as a map of everything. If you had to, in your own kind of map application, you know, chart a path from New York to whichever your favorite surrounding city, but it only takes you so far, and then you sort of need to do the rest of it on your own, not nearly as effective, and in security terms, I think it really boils down into you can't secure what you can't see. And so from an Armis perspective, it's about seeing everything in order to protect everything. And not only do we discover every connected asset that you have, we provide a risk rating to every single one of them, we provide a criticality rating, and the ability to take action on top of these things. >> Having a map is huge. Everyone wants to know what's in their inventory, right, from a risk management standpoint, also from a vulnerability perspective. So I totally see that, and I can see that being the holy grail, but on the vulnerability side, you got to see everything, and you guys have new stuff around vulnerability management. What's this all about? What kind of gaps are you seeing that you're filling in the vulnerability side, because, okay, I can see everything. Now I got to watch out for threat vectors. >> Yeah, and I'd say a different way of asking this is, okay, vulnerability management has been around for a while. What the hell are you bringing into the mix that's so new and novel and great? So I would say that vulnerability scanners of different sorts have existed for over a decade. And I think that ultimately what Armis brings into the mix today is how do we fill in the gaps in a world where critical infrastructure is in danger of being attacked by nation states these days, where ransomware is an everyday occurrence, and where I think credible, up-to-the-minute, and contextualize vulnerability and risk information is essential. Scanners, or how we've been doing things for the last decade, just aren't enough. I think the three things that Armis excels at and completes the security staff today on the vulnerability management side are scale, reach, and context. Scale, meaning ultimately, and I think this is of no news to any enterprise, environments are huge. They are beyond huge. When most of the solutions that enterprises use today were built, they were built for thousands, or tens of thousands of assets. These days, we measure enterprises in the billions, billions of different assets, especially if you include how applications are structured, containers, cloud, all that, billions and billions of different assets, and I think that, ultimately, when the latest and greatest in catastrophic new vulnerabilities come out, and sadly, that's a monthly occurrence these days. You can't just now wait around for things to kind of scan through the environment, and figure out what's going on there. Real time images of vulnerabilities, real time understanding of what the risk is across that entire massive footprint is essential to be able to do things, and if you don't, then lots and lots of teams of people are tasked with doing this day in, day out, in order to accomplish the task. The second thing, I think, is the reach. Scanners can't go everywhere. They don't really deal well with environments that are a mixed IT/OT, for instance, like some of our clients deal with. They can't really deal with areas that aren't classic IT. And in general, these days over 70% of assets are in fact of the unmanaged variety, if you will. So combining different approaches from an Armis standpoint of both passive and active, we reach a tremendous scale, I think, within the environment, and ability to provide or reach that is complete. What if you could have vulnerability management, cover a hundred percent of your environment, and in a very effective manner, and in a very scalable manner? And the last thing really is context. And that's a big deal here. I think that most vulnerability management programs hinge on asset context, on the ability to understand, what are the assets I'm dealing with? And more importantly, what is the criticality of these assets, so I can better prioritize and manage the entire process along the way? So with these things in mind, that's what Armis has basically pulled out is a vulnerability management process. What if we could collect all the vulnerability information from your entire environment, and give you a map of that, on top of that map of assets? Connect every single vulnerability and finding to the relevant assets, and give you a real way to manage that automatically, and in a way that prevents teams of people from having to do a lot of grunt work in the process. >> Yeah, it's like building a search engine, almost. You got the behavioral, contextual. You got to understand what's going on in the environment, and then you got to have the context to what it means relative to the environment. And this is the criticality piece you mentioned, this is a huge differentiator in my mind. I want to unpack that. Understanding what's going on, and then what to pay attention to, it's a data problem. You got that kind of search and cataloging of the assets, and then you got the contextualization of it, but then what alarms do I pay attention to? What is the vulnerability? This is the context. This is a huge deal, because your businesses, your operation's going to have some important pieces, but also it changes on agility. So how do you guys do that? That's, I think, a key piece. >> Yeah, that's a really good question. So asset criticality is a key piece in being able to prioritize the operation. The reason is really simple, and I'll take an example we're all very, very familiar with, and it's been beaten to death, but it's still a good example, which is Log4j, or Log4Shell. When that came out, hundreds of people in large organizations started mapping the entire environment on which applications have what aspect of Log4j. Now, one of the key things there is that when you're doing that exercise for the first time, there are literally millions of systems in a typical enterprise that have Log4j in them, but asset criticality and the application and business context are key here, because some of these different assets that have Log4j are part of your critical business function and your critical business applications, and they deserve immediate attention. Some of them, or some Git server of some developer somewhere, don't warrant quite the same attention or criticality as others. Armis helps by providing the underlying asset map as a built-in aspect of the process. It maps the relationships and dependencies for you. It pulls together and clusters together. What applications does each asset serve? So I might be looking at a server and saying, okay, this server, it supports my ERP system. It supports my production applications to be able to serve my customers. It serves maybe my .com website. Understanding what applications each asset serves and every dependency along the way, meaning that endpoint, that server, but also the load balancers are supported, and the firewalls, and every aspect along the way, that's the bread and butter of the relationship mapping that Armis puts into place to be able to do that, and we also allow users to tweak, add information, connect us with their CMDB or anywhere else where they put this in, but once the information is in, that can serve vulnerability management. It can serve other security functions as well. But in the context of vulnerability management, it creates a much more streamlined process for being able to do the basics. Some critical applications, I want to know exactly what all the critical vulnerabilities that apply to them are. Some business applications, I just want to be able to put SLAs on, that this must be solved within a week, this must be solved within a month, and be able to actually automatically track all of these in a world that is very, very complex inside of an operation or an enterprise. >> We're going to hear from some of your customers later, but I want to just get your thoughts on, anecdotally, what do you hear from? You're the CTO, co-founder, you're actually going into the big accounts. When you roll this out, what are they saying to you? What are some of the comments? Oh my God, this is amazing. Thank you so much. >> Well, of course. Of course. >> Share some of the comments. >> Well, first of all, of course, that's what they're saying. They're saying we're great. Of course, always, but more specifically, I think this solves a huge gap for them. They are used to tools coming in and discovering vulnerabilities for them, but really close to nothing being able to streamline the truly complex and scalable process of being able to manage vulnerabilities within the environment. Not only that, the integration-led, designer-led deployment and the fact that we are a completely agent-less SaaS platform are extremely important for them. These are times where if something isn't easily deployable for an enterprise, its value is next to nothing. I think that enterprises have come to realize that if something isn't a one click deployment across the environment, it's almost not worth the effort these days, because environments are so complex that you can't fully realize the value any other way. So from an Armis standpoint, the fact that we can deploy with a few clicks, the fact that we immediately provide that value, the fact that we're agent-less, in the sense that we don't need to go around installing a footprint within the environment, and for clients who already have Armis, the fact that it's a flip of a switch, just turn it on, are extreme. I think that the fact, in particular, that Armis can be deployed. the vulnerability management can be deployed on top of the existing vulnerability scanner with a simple one-click integration is huge for them. And I think all of these together are what contribute to them saying how great this is. But yeah, that's it. >> The agent listing is huge. What's the alternative? What does it look like if they're going to go the other route, slow to deploy, have meetings, launch it in the environment? What's it look like? >> I think anything these days that touches an endpoint with an agent goes through a huge round of approvals before anything goes into an environment. Same goes, by the way, for additional scanners. No one wants to hear about additional scanners. They've already gone through the effort with some of the biggest tools out there to punch holes through firewalls, to install scanners in different ways. They don't want yet another scanner, or yet another agent. Armis rides on top of the existing infrastructure, the existing agents, the existing scanners. You don't need to do a thing. It just deploys on top of it, and that's really what makes this so easy and seamless. >> Talk about Armis research. Can you talk about, what's that about? What's going on there? What are you guys doing? How do you guys stay relevant for your customers? >> For sure. So one of the, I've made a lot of bold claims throughout, I think, the entire Q and A here, but one of the biggest magic components, if you will, to Armis that kind of help explain what all these magic components are, are really something that we call our collective asset knowledge base. And it's really the source of our power. Think of it as a giant collective intelligent that keeps learning from all of the different environments combined that Armis is deployed at. Essentially, if we see something in one environment, we can translate it immediately into all environments. So anyone who joins this or uses the product joins this collective intelligence in essence. What does that mean? It means that Armis learns about vulnerabilities from other environments. A new Log4j comes out, for instance. It's enough that, in some environments, Armis is able to see it from scanners, or from agents, or from SBOMs, or anything that basically provides information about Log4j, and Armis immediately infers or creates enrichment rules that act across the entire tenant base, or the entire client base of Armis. So very quick response to industry events, whenever something comes out, again, the results are immediate, very up to the minute, very up to the hour, but also I'd say that Armis does its own proactive asset research. We have a huge data set at our disposal, a lot of willing and able clients, and also a lot of partners within the industry that Armis leverages, but our own research is into interesting aspects within the environment. We do our own proactive research into things like TLStorm, which is kind of a bit of a bridging research and vulnerabilities between cyber physical aspect. So on the one hand, the cyber space and kind of virtual environments, but on the other hand, the actual physical space, vulnerabilities, and things like UPSs, or industrial equipment, or things like that. But I will say that also, Armis targets its research along different paths that we feel are underserved. We started a few years back research into firmwares, different types of real time operating systems. We came out with things like URGENT/11, which was research into, on the one hand, operating systems that run on two billion different devices worldwide, on the other hand, in the 40 years it existed, only 13 vulnerabilities were ever exposed or revealed about that operating system. Either it's the most secure operating system in the world, or it's just not gone through enough rigor and enough research in doing this. The type of active research we do is to complement a lot of the research going on in the industry, serve our clients better, but also provide kind of inroads, I think, for the industry to be better at what they do. >> Awesome, Nadir, thanks for sharing the insights. Great to see the research. You got to be at the cutting edge. You got to investigate, be ready for a moment's notice on all aspects of the operating environment, down to the hardware, down to the packet level, down to the any vulnerability, be ready for it. Great job. Thanks for sharing. Appreciate it. >> Absolutely. >> In a moment, Tim Everson's going to join us. He's the CSO of Kalahari Resorts and Conventions. He'll be joining me next. You're watching theCUBE, the leader in high tech coverage. I'm John Furrier. Thanks for watching. (upbeat music)
SUMMARY :
With the time it takes to What's the holy grail? in every aspect of the environment, management kind of focus, and the ability to take and I can see that being the holy grail, and manage the entire and cataloging of the assets, and every dependency along the way, What are some of the comments? Well, of course. and the fact that we are What's the alternative? of the biggest tools out there What are you guys doing? from all of the different on all aspects of the He's the CSO of Kalahari
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
Nadir Izrael | PERSON | 0.99+ |
Tim Everson | PERSON | 0.99+ |
New York | LOCATION | 0.99+ |
John Furrier | PERSON | 0.99+ |
thousands | QUANTITY | 0.99+ |
John Furrier | PERSON | 0.99+ |
Nadir | PERSON | 0.99+ |
billions | QUANTITY | 0.99+ |
Kalahari Resorts and Conventions | ORGANIZATION | 0.99+ |
Armis | ORGANIZATION | 0.99+ |
today | DATE | 0.99+ |
40 years | QUANTITY | 0.99+ |
first time | QUANTITY | 0.99+ |
Today | DATE | 0.99+ |
Gartner | ORGANIZATION | 0.99+ |
each asset | QUANTITY | 0.98+ |
second thing | QUANTITY | 0.98+ |
one click | QUANTITY | 0.98+ |
13 vulnerabilities | QUANTITY | 0.98+ |
a week | QUANTITY | 0.98+ |
over 70% | QUANTITY | 0.98+ |
millions of systems | QUANTITY | 0.98+ |
one | QUANTITY | 0.98+ |
two billion different devices | QUANTITY | 0.97+ |
a month | QUANTITY | 0.97+ |
one-click | QUANTITY | 0.97+ |
both | QUANTITY | 0.96+ |
Log4j | TITLE | 0.96+ |
hundred percent | QUANTITY | 0.96+ |
over a decade | QUANTITY | 0.95+ |
tens of thousands | QUANTITY | 0.94+ |
one environment | QUANTITY | 0.94+ |
Log4Shell | TITLE | 0.93+ |
Managing Risk Across Your Extended Attack Surface Area | TITLE | 0.91+ |
SBOMs | ORGANIZATION | 0.89+ |
past decade | DATE | 0.88+ |
three | QUANTITY | 0.86+ |
hundreds of people | QUANTITY | 0.84+ |
CUBE | TITLE | 0.84+ |
single | QUANTITY | 0.82+ |
last decade | DATE | 0.81+ |
CAASM | TITLE | 0.75+ |
CMDB | TITLE | 0.74+ |
billions of different assets | QUANTITY | 0.72+ |
CAASM | ORGANIZATION | 0.66+ |
URGENT | ORGANIZATION | 0.65+ |
single vulnerability | QUANTITY | 0.65+ |
TLStorm | ORGANIZATION | 0.65+ |
Armis' | ORGANIZATION | 0.64+ |
Git | TITLE | 0.64+ |
11 | TITLE | 0.63+ |
a few years | DATE | 0.61+ |
CTO | PERSON | 0.57+ |
the holy grails | QUANTITY | 0.55+ |
assets | QUANTITY | 0.55+ |
lots | QUANTITY | 0.51+ |
clicks | QUANTITY | 0.5+ |
Nadir Izrael, Armis | Managing Risk with the Armis Platform
(upbeat music) >> Today's organizations are overwhelmed by the number of different assets connected to their networks, which now include not only IT devices and assets, but also a lot of unmanaged assets, like cloud, IoT, building management systems, industrial control systems, medical devices, and more. That's not just it, there's more. We're seeing massive volume of threats, and a surge of severe vulnerabilities that put these assets at risk. This is happening every day. And many, including me, think it's only going to get worse. The scale of the problem will accelerate. Security and IT teams are struggling to manage all these vulnerabilities at scale. With the time it takes to exploit a new vulnerability, combined with the lack of visibility into the asset attack surface area, companies are having a hard time addressing the vulnerabilities as quickly as they need. This is today's special CUBE program, where we're going to talk about these problems and how they're solved. Hello, everyone. I'm John Furrier, host of theCUBE. This is a special program called Managing Risk Across Your Extended Attack Surface Area with Armis, new asset intelligence platform. To start things off, let's bring in the co-founder and CTO of Armis, Nadir Izrael. Nadir, great to have you on the program. >> Yeah, thanks for having me. >> Great success with Armis. I want to just roll back and just zoom out and look at, what's the big picture? What are you guys focused on? What's the holy grail? What's the secret sauce? >> So Armis' mission, if you will, is to solve to your point literally one of the holy grails of security teams for the past decade or so, which is, what if you could actually have a complete, unified, authoritative asset inventory of everything, and stressing that word, everything. IT, OT, IoT, everything on kind of the physical space of things, data centers, virtualization, applications, cloud. What if you could have everything mapped out for you so that you can actually operate your organization on top of essentially a map? I like to equate this in a way to organizations and security teams everywhere seem to be running, basically running the battlefield, if you will, of their organization, without an actual map of what's going on, with charts and graphs. So we are here to provide that map in every aspect of the environment, and be able to build on top of that business processes, products, and features that would assist security teams in managing that battlefield. >> So this category, basically, is a cyber asset attack surface management kind of focus, but it really is defined by this extended asset attack surface area. What is that? Can you explain that? >> Yeah, it's a mouthful. I think the CAASM, for short, and Gartner do love their acronyms there, but CAASM, in short, is a way to describe a bit of what I mentioned before, or a slice out of it. It's the whole part around a unified view of the attack surface, where I think where we see things, and kind of where Armis extends to that is really with the extended attack surface. That basically means that idea of, what if you could have it all? What if you could have both a unified view of your environment, but also of every single thing that you have, with a strong emphasis on the completeness of that picture? If I take the map analogy slightly more to the extreme, a map of some of your environment isn't nearly as useful as a map of everything. If you had to, in your own kind of map application, you know, chart a path from New York to whichever your favorite surrounding city, but it only takes you so far, and then you sort of need to do the rest of it on your own, not nearly as effective, and in security terms, I think it really boils down into you can't secure what you can't see. And so from an Armis perspective, it's about seeing everything in order to protect everything. And not only do we discover every connected asset that you have, we provide a risk rating to every single one of them, we provide a criticality rating, and the ability to take action on top of these things. >> Having a map is huge. Everyone wants to know what's in their inventory, right, from a risk management standpoint, also from a vulnerability perspective. So I totally see that, and I can see that being the holy grail, but on the vulnerability side, you got to see everything, and you guys have new stuff around vulnerability management. What's this all about? What kind of gaps are you seeing that you're filling in the vulnerability side, because, okay, I can see everything. Now I got to watch out for threat vectors. >> Yeah, and I'd say a different way of asking this is, okay, vulnerability management has been around for a while. What the hell are you bringing into the mix that's so new and novel and great? So I would say that vulnerability scanners of different sorts have existed for over a decade. And I think that ultimately what Armis brings into the mix today is how do we fill in the gaps in a world where critical infrastructure is in danger of being attacked by nation states these days, where ransomware is an everyday occurrence, and where I think credible, up-to-the-minute, and contextualize vulnerability and risk information is essential. Scanners, or how we've been doing things for the last decade, just aren't enough. I think the three things that Armis excels at and completes the security staff today on the vulnerability management side are scale, reach, and context. Scale, meaning ultimately, and I think this is of no news to any enterprise, environments are huge. They are beyond huge. When most of the solutions that enterprises use today were built, they were built for thousands, or tens of thousands of assets. These days, we measure enterprises in the billions, billions of different assets, especially if you include how applications are structured, containers, cloud, all that, billions and billions of different assets, and I think that, ultimately, when the latest and greatest in catastrophic new vulnerabilities come out, and sadly, that's a monthly occurrence these days. You can't just now wait around for things to kind of scan through the environment, and figure out what's going on there. Real time images of vulnerabilities, real time understanding of what the risk is across that entire massive footprint is essential to be able to do things, and if you don't, then lots and lots of teams of people are tasked with doing this day in, day out, in order to accomplish the task. The second thing, I think, is the reach. Scanners can't go everywhere. They don't really deal well with environments that are a mixed IT/OT, for instance, like some of our clients deal with. They can't really deal with areas that aren't classic IT. And in general, these days over 70% of assets are in fact of the unmanaged variety, if you will. So combining different approaches from an Armis standpoint of both passive and active, we reach a tremendous scale, I think, within the environment, and ability to provide or reach that is complete. What if you could have vulnerability management, cover a hundred percent of your environment, and in a very effective manner, and in a very scalable manner? And the last thing really is context. And that's a big deal here. I think that most vulnerability management programs hinge on asset context, on the ability to understand, what are the assets I'm dealing with? And more importantly, what is the criticality of these assets, so I can better prioritize and manage the entire process along the way? So with these things in mind, that's what Armis has basically pulled out is a vulnerability management process. What if we could collect all the vulnerability information from your entire environment, and give you a map of that, on top of that map of assets? Connect every single vulnerability and finding to the relevant assets, and give you a real way to manage that automatically, and in a way that prevents teams of people from having to do a lot of grunt work in the process. >> Yeah, it's like building a search engine, almost. You got the behavioral, contextual. You got to understand what's going on in the environment, and then you got to have the context to what it means relative to the environment. And this is the criticality piece you mentioned, this is a huge differentiator in my mind. I want to unpack that. Understanding what's going on, and then what to pay attention to, it's a data problem. You got that kind of search and cataloging of the assets, and then you got the contextualization of it, but then what alarms do I pay attention to? What is the vulnerability? This is the context. This is a huge deal, because your businesses, your operation's going to have some important pieces, but also it changes on agility. So how do you guys do that? That's, I think, a key piece. >> Yeah, that's a really good question. So asset criticality is a key piece in being able to prioritize the operation. The reason is really simple, and I'll take an example we're all very, very familiar with, and it's been beaten to death, but it's still a good example, which is Log4j, or Log4Shell. When that came out, hundreds of people in large organizations started mapping the entire environment on which applications have what aspect of Log4j. Now, one of the key things there is that when you're doing that exercise for the first time, there are literally millions of systems in a typical enterprise that have Log4j in them, but asset criticality and the application and business context are key here, because some of these different assets that have Log4j are part of your critical business function and your critical business applications, and they deserve immediate attention. Some of them, or some Git server of some developer somewhere, don't warrant quite the same attention or criticality as others. Armis helps by providing the underlying asset map as a built-in aspect of the process. It maps the relationships and dependencies for you. It pulls together and clusters together. What applications does each asset serve? So I might be looking at a server and saying, okay, this server, it supports my ERP system. It supports my production applications to be able to serve my customers. It serves maybe my .com website. Understanding what applications each asset serves and every dependency along the way, meaning that endpoint, that server, but also the load balancers are supported, and the firewalls, and every aspect along the way, that's the bread and butter of the relationship mapping that Armis puts into place to be able to do that, and we also allow users to tweak, add information, connect us with their CMDB or anywhere else where they put this in, but once the information is in, that can serve vulnerability management. It can serve other security functions as well. But in the context of vulnerability management, it creates a much more streamlined process for being able to do the basics. Some critical applications, I want to know exactly what all the critical vulnerabilities that apply to them are. Some business applications, I just want to be able to put SLAs on, that this must be solved within a week, this must be solved within a month, and be able to actually automatically track all of these in a world that is very, very complex inside of an operation or an enterprise. >> We're going to hear from some of your customers later, but I want to just get your thoughts on, anecdotally, what do you hear from? You're the CTO, co-founder, you're actually going into the big accounts. When you roll this out, what are they saying to you? What are some of the comments? Oh my God, this is amazing. Thank you so much. >> Well, of course. Of course. >> Share some of the comments. >> Well, first of all, of course, that's what they're saying. They're saying we're great. Of course, always, but more specifically, I think this solves a huge gap for them. They are used to tools coming in and discovering vulnerabilities for them, but really close to nothing being able to streamline the truly complex and scalable process of being able to manage vulnerabilities within the environment. Not only that, the integration-led, designer-led deployment and the fact that we are a completely agent-less SaaS platform are extremely important for them. These are times where if something isn't easily deployable for an enterprise, its value is next to nothing. I think that enterprises have come to realize that if something isn't a one click deployment across the environment, it's almost not worth the effort these days, because environments are so complex that you can't fully realize the value any other way. So from an Armis standpoint, the fact that we can deploy with a few clicks, the fact that we immediately provide that value, the fact that we're agent-less, in the sense that we don't need to go around installing a footprint within the environment, and for clients who already have Armis, the fact that it's a flip of a switch, just turn it on, are extreme. I think that the fact, in particular, that Armis can be deployed. the vulnerability management can be deployed on top of the existing vulnerability scanner with a simple one-click integration is huge for them. And I think all of these together are what contribute to them saying how great this is. But yeah, that's it. >> The agent listing is huge. What's the alternative? What does it look like if they're going to go the other route, slow to deploy, have meetings, launch it in the environment? What's it look like? >> I think anything these days that touches an endpoint with an agent goes through a huge round of approvals before anything goes into an environment. Same goes, by the way, for additional scanners. No one wants to hear about additional scanners. They've already gone through the effort with some of the biggest tools out there to punch holes through firewalls, to install scanners in different ways. They don't want yet another scanner, or yet another agent. Armis rides on top of the existing infrastructure, the existing agents, the existing scanners. You don't need to do a thing. It just deploys on top of it, and that's really what makes this so easy and seamless. >> Talk about Armis research. Can you talk about, what's that about? What's going on there? What are you guys doing? How do you guys stay relevant for your customers? >> For sure. So one of the, I've made a lot of bold claims throughout, I think, the entire Q and A here, but one of the biggest magic components, if you will, to Armis that kind of help explain what all these magic components are, are really something that we call our collective asset knowledge base. And it's really the source of our power. Think of it as a giant collective intelligent that keeps learning from all of the different environments combined that Armis is deployed at. Essentially, if we see something in one environment, we can translate it immediately into all environments. So anyone who joins this or uses the product joins this collective intelligence in essence. What does that mean? It means that Armis learns about vulnerabilities from other environments. A new Log4j comes out, for instance. It's enough that, in some environments, Armis is able to see it from scanners, or from agents, or from SBOMs, or anything that basically provides information about Log4j, and Armis immediately infers or creates enrichment rules that act across the entire tenant base, or the entire client base of Armis. So very quick response to industry events, whenever something comes out, again, the results are immediate, very up to the minute, very up to the hour, but also I'd say that Armis does its own proactive asset research. We have a huge data set at our disposal, a lot of willing and able clients, and also a lot of partners within the industry that Armis leverages, but our own research is into interesting aspects within the environment. We do our own proactive research into things like TLStorm, which is kind of a bit of a bridging research and vulnerabilities between cyber physical aspect. So on the one hand, the cyber space and kind of virtual environments, but on the other hand, the actual physical space, vulnerabilities, and things like UPSs, or industrial equipment, or things like that. But I will say that also, Armis targets its research along different paths that we feel are underserved. We started a few years back research into firmwares, different types of real time operating systems. We came out with things like URGENT/11, which was research into, on the one hand, operating systems that run on two billion different devices worldwide, on the other hand, in the 40 years it existed, only 13 vulnerabilities were ever exposed or revealed about that operating system. Either it's the most secure operating system in the world, or it's just not gone through enough rigor and enough research in doing this. The type of active research we do is to complement a lot of the research going on in the industry, serve our clients better, but also provide kind of inroads, I think, for the industry to be better at what they do. >> Awesome, Nadir, thanks for sharing the insights. Great to see the research. You got to be at the cutting edge. You got to investigate, be ready for a moment's notice on all aspects of the operating environment, down to the hardware, down to the packet level, down to the any vulnerability, be ready for it. Great job. Thanks for sharing. Appreciate it. >> Absolutely. >> In a moment, Tim Everson's going to join us. He's the CSO of Kalahari Resorts and Conventions. He'll be joining me next. You're watching theCUBE, the leader in high tech coverage. I'm John Furrier. Thanks for watching. (upbeat music)
SUMMARY :
With the time it takes to What's the holy grail? in every aspect of the environment, management kind of focus, and the ability to take and I can see that being the holy grail, and manage the entire and cataloging of the assets, and every dependency along the way, What are some of the comments? Well, of course. and the fact that we are What's the alternative? of the biggest tools out there What are you guys doing? from all of the different on all aspects of the He's the CSO of Kalahari
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
Nadir Izrael | PERSON | 0.99+ |
Tim Everson | PERSON | 0.99+ |
New York | LOCATION | 0.99+ |
thousands | QUANTITY | 0.99+ |
John Furrier | PERSON | 0.99+ |
John Furrier | PERSON | 0.99+ |
Nadir | PERSON | 0.99+ |
billions | QUANTITY | 0.99+ |
Kalahari Resorts and Conventions | ORGANIZATION | 0.99+ |
Armis | ORGANIZATION | 0.99+ |
today | DATE | 0.99+ |
40 years | QUANTITY | 0.99+ |
first time | QUANTITY | 0.99+ |
Today | DATE | 0.99+ |
Gartner | ORGANIZATION | 0.99+ |
each asset | QUANTITY | 0.98+ |
second thing | QUANTITY | 0.98+ |
one click | QUANTITY | 0.98+ |
13 vulnerabilities | QUANTITY | 0.98+ |
a week | QUANTITY | 0.98+ |
over 70% | QUANTITY | 0.98+ |
millions of systems | QUANTITY | 0.98+ |
one | QUANTITY | 0.98+ |
two billion different devices | QUANTITY | 0.97+ |
a month | QUANTITY | 0.97+ |
one-click | QUANTITY | 0.97+ |
both | QUANTITY | 0.96+ |
Log4j | TITLE | 0.96+ |
hundred percent | QUANTITY | 0.96+ |
over a decade | QUANTITY | 0.95+ |
tens of thousands | QUANTITY | 0.94+ |
one environment | QUANTITY | 0.94+ |
Log4Shell | TITLE | 0.93+ |
Managing Risk Across Your Extended Attack Surface Area | TITLE | 0.91+ |
SBOMs | ORGANIZATION | 0.89+ |
past decade | DATE | 0.88+ |
three | QUANTITY | 0.86+ |
hundreds of people | QUANTITY | 0.84+ |
CUBE | TITLE | 0.84+ |
single | QUANTITY | 0.82+ |
last decade | DATE | 0.81+ |
CAASM | TITLE | 0.75+ |
CMDB | TITLE | 0.74+ |
billions of different assets | QUANTITY | 0.72+ |
CAASM | ORGANIZATION | 0.66+ |
URGENT | ORGANIZATION | 0.65+ |
single vulnerability | QUANTITY | 0.65+ |
TLStorm | ORGANIZATION | 0.65+ |
Armis' | ORGANIZATION | 0.64+ |
Git | TITLE | 0.64+ |
11 | TITLE | 0.63+ |
a few years | DATE | 0.61+ |
CTO | PERSON | 0.57+ |
the holy grails | QUANTITY | 0.55+ |
assets | QUANTITY | 0.55+ |
lots | QUANTITY | 0.51+ |
clicks | QUANTITY | 0.5+ |
Armis | PERSON | 0.49+ |
Alex Schuchman, Armis | Managing Risk with the Armis Platform
>>Hello, Ron. Welcome back to the manage risk across your extended attack service area with Armas asset intelligence platform. I'm Sean furier host we're here at the CSO perspective, Alex Chuck bin, who is the CSO of Colgate Colgate Palm mall of company. Alex, thanks for coming on. >>Thanks for having >>Me, you know, unified visibility across the enterprise surface area is about knowing what you gotta protect. You can't protect what you can't see. Tell me more about how you guys are able to centralize your view with network assets with Armas. >>Yeah, I think the, the most important part of any security program is really visibility. And, and that's one of, kind of the building blocks. When you're building a security program, you need to understand what's in your environment. What's what you control, what is being introduced new into the environment. And that's really what any solution that gives you full visibility to your infrastructure, to your environment, to all the assets that are there, that that's really one of your bread and butter pieces to your security program. >>What's been the impact on your business? >>You know, I, I think from, from an it point of view, running the security program, you know, our key thing is really enabling the business to do their job better. So if we can give them visibility into all the assets that are available in their individual environments, and we're doing that in an automated fashion with no manual collection, you know, that's yet another thing that they don't have to worry about. And then we're delivering because really it is an enabler for the business. And then they can focus really on what their job is, which is to, to deliver product. >>Yeah. And a lot of changes in their network. You got infrastructure, you got OT devices, OT devices. So vulnerability management becomes more important. It's been around for a while, but it's not just it devices anymore. There are gaps in vulnerability across the OT network. What can you tell us about Colgate's use of Armas as vulnerability management? What can you, can you see now what you couldn't you see before? Can you share your thoughts on this? >>Yeah, I, I think what's really interesting about the, the kind of manufacturing environments today is if you look back a number of years, most of the manufacturing equipment was really disconnected from the internet. It was really running in silos. So it was very easy to protect equipment that, that isn't internet connected. You could put a firewall, you could segment it off. And it was, it was really on an island on its own. Nowadays you have a lot of IOT devices. You have a lot of internet connected devices, sensors providing information to multiple different suppliers or vendor solutions. And you have to really then open up your ecosystem more, which of course means you have to change your security posture and you really have to embrace. If there's a vulnerability with one of those suppliers, then how do you mitigate the risk associated to vulnerability? Armas really helps us get a lot of information so that we can then make a decision with our business teams. >>That whole operational aspect of criticality is huge. How on the assets knowing what's what's key? How has that changed your, the, the security workload for you guys? >>Yeah, for us, I mean, it, it's all about being efficient. If we can have the, the visibility across our manufacturing environments, then, then my team can easily consume that information. You know, if we spend a lot of time trying to digest the information, trying to process it, trying to prioritize it, that, that, that really hurts our efficiency as, as a team where as a function, what we really like is being able to use technology to help us do that work. We're, we're not an it shop. We're a manufacturing shop, but we're a very technical shop so that we like to drive everything through automation and not be a bottleneck for any of the, the actions that take place. >>You know, the old expression is the juice worth. The squeeze. It comes up a lot when people are buying tools around vulnerability management and point, all this stuff. So SAS solution is key with no agents to deploy. They have that talk about how you operationalize Armas in your environment, how quickly did it AC achieve time to value, take us through that, that consumption of the product. And, and, and what was the experience like? >>Yeah, I I'll definitely say a in, in the security ecosystem that that's one of the, the biggest promises you hear across the industry. And when, when we started with Armas, we started with a very small deployment and we wanted to make sure if, if it was really worth the lift to your point, we implemented the, the first set of plants very quickly, actually, even quicker than we had put in our project plan, which is, is not typical for implementing complex security solutions. And then we were so successful with that. We expanded to cover more of our manufacturing plants, and we were able to get really true visibility across our entire manufacturing organization in the first year with the ability to also say that we extended that, that information, that visibility to our manufacturing organization, and they could also consume it just as easily as we could. >>That's awesome. How many assets did you guys discover? Just curious on the numbers? >>Oh, that, that's the really interesting part, you know, before we started this project, we would've had to do a, a manual audit of, of our plants, which is typical in, in our industry. You know, when, when we started this project and, and we put in estimates, we really, really didn't have a great handle on what we were gonna find. And what's really nice about the Arma solution is it it's truly giving you full visibility. So you're actually seeing, besides the servers and the PLCs and all the equipment that you're familiar with, you're also connecting it to your wireless access points. You're connecting it to see any of those IOT devices as well. And then you're really getting full visibility through all the integrations that they offer. You're amazed how many devices you're actually seeing across your entire ecosystem. >>It's like Google maps for your infrastructure. You get little street view. You wanna look at it, you get the, you know, fake tree in there, whatever, but it gives you the picture that's key, >>Correct. And with a nice visualization and an easy search engine, similar to your, your Google analogy, you know, everything is, is, is really at your fingertips. If you wanna find something, you just go to the search bar, click a couple entries and, and boom, you get your, your list of the associated devices or the, the associated locations devices. >>Well, I appreciate your time. I know you're super busy at CSIG a lot of your plate. Thanks for coming on sharing. Appreciate it. >>No problem, John. Thanks for having me. >>Okay. In a moment, Brian Inman, a sales engineer at Armas will be joining me. You're watching the cube, the leader in high tech coverage. Thanks for watching.
SUMMARY :
Hello, Ron. Welcome back to the manage risk across your extended attack service area with Armas asset intelligence Tell me more about how you guys are able to centralize your And that's really what any solution that gives you full visibility you know, our key thing is really enabling the business to Can you share your thoughts on this? And you have to really then open up your ecosystem How on the assets knowing You know, if we spend a lot of time trying to digest the information, They have that talk about how you operationalize Armas in that that's one of the, the biggest promises you hear across the How many assets did you guys discover? Oh, that, that's the really interesting part, you know, before we started this You wanna look at it, you get the, If you wanna find something, you just go to the search bar, click a couple I know you're super busy at CSIG a lot of your plate. Thanks for watching.
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
Ron | PERSON | 0.99+ |
Alex Schuchman | PERSON | 0.99+ |
Brian Inman | PERSON | 0.99+ |
John | PERSON | 0.99+ |
Alex | PERSON | 0.99+ |
Alex Chuck bin | PERSON | 0.99+ |
Armas | ORGANIZATION | 0.99+ |
Sean furier | PERSON | 0.99+ |
Colgate | ORGANIZATION | 0.99+ |
first set | QUANTITY | 0.98+ |
Google maps | TITLE | 0.97+ |
one | QUANTITY | 0.97+ |
today | DATE | 0.97+ |
Armis | ORGANIZATION | 0.97+ |
first year | QUANTITY | 0.96+ |
ORGANIZATION | 0.96+ | |
CSIG | ORGANIZATION | 0.94+ |
Colgate Colgate Palm | ORGANIZATION | 0.92+ |
couple entries | QUANTITY | 0.6+ |
SAS | ORGANIZATION | 0.51+ |
Armas | TITLE | 0.5+ |
years | QUANTITY | 0.46+ |
Vincent Danen and Luke Hinds, Red Hat | Managing Risk In The Digital Supply Chain
(upbeat music) >> Welcome to theCUBE. I'm Dave Nicholson, and this is part of the continuing conversation about Managing Risk in the Digital Supply Chain. I have with me today Vincent Danen, vice president of product security from Red Hat and Luke Hines security engineering lead from the office of the CTO at Red Hat. Gentlemen, welcome to theCUBE. >> Thank you. >> Great to be here. >> So let's just start out and dive right into this, Vincent, what is the software or digital supply chain? What are we talking about? Yeah, that's a good question. Software supply chain is basically the software that an end user would get from a vendor or in our case, we're talking about open source, so upstream. It is the software that comes in that is part of your package, operating system, applications. It could be something that you get from one vendor, multiple vendors. So we look at in the example of Red Hat, we are one part of the customer's software supply chain. >> So it's interesting that it's coming in from different areas. Do we have a sense for the ratio of kind of commercial software versus open source software that makes up an enterprise today? >> I think that's a really hard thing to answer and I think every enterprise or every company would have a little bit different. Depends if you have an open source vendor that you choose, you may get a significant amount of software from them. Certainly you're not going to get it all. As an example, Red Hat provides thousands of open source packages. We certainly can't provide all of them. There are millions that are out there. So when you're looking at a specific application that you're building, chances are, you could be running that on a managed platform or an enterprise supply platform, but there are going to be packages that you're going to be obtaining from other sources in other communities as well in order to power your applications. >> So, Luke, that sounds like a kind of a vague situation we're looking at in terms of where all of our software is coming from. So what do we need to know about our software supply chain in that context? What do we need to understand? Before we even get anywhere near the idea of securing it, what are some of the issues that arise from that? >> Yeah, so Vincent's touchpoint is a very wide range in ecosystem, multiple sources when we're talking about open source. So essentially awareness is key really. I think a lot of people are really not aware of the sources that they're drawing from to create their own supply chain. So there's multiple supply chains. You can be somebody like Red Hat that the provide software, and then people will leverage Red Hats for their own supply chain. And then you have the cloud provider and they have their own source of software. So I think that the key thing is the awareness of how much you rely upon that ecosystem before we look at the security of the supply chain. It's really understanding your supply chain. >> And just to follow up on that. So can you... I'm sort of checking my own level of understanding on this subject. When you talk about open source code, you're talking about a code base that is often maintained essentially by volunteers, isn't that correct? >> A mix of volunteers and paid professionals where a company has an interest in the open source project, but predominantly I would say it's... Well, I'm not entirely sure, but volunteers make up a substantial part of the ecosystem that is for sure. So it's a mix really. Some people do it because they enjoy writing software. They want to share software. Other people also enjoy working software, but they're in the position that a company pays for them to work on that software. So it's a mix of both. >> Vincent, give us a reminder of reminder of why this is important from a little bit of a higher level. Step back from the data center view of things, from the IT view of things, just from a societal perspective, Vincent, what happens when we don't secure our digital supply chain? What are the things that are put at risk? >> Okay, well, there's a significant number of things that are placed at risk, the security of the enterprise itself. So your own customer data, your own internal corporate data is place at risk if there were a supply chain breach. But further to that for a software provider, and I think that in a lot of cases, most companies today are software providers or software developers. You actually put your own customers at risk as well, not just their data, but their actual... The things that they're working on, any workloads that they may have, an order that they might place as an example. So there's a number of areas where you want to have the security of that supply chain and the software components that you have figured out. You want to be on top of that because there is that risk that trickles down when it comes to an event. I mean, we've seen that with breaches earlier this year, one company is breached multiple companies end up being breached as a result of that. So it's really important. I think we all have a part to play in that I always view it as it's not just about the company itself. So I mean, speaking from a Red Hat perspective, I don't look at it as we're just securing Red Hat, we're securing our customers, and then we're also doing that for their customers as well, because they're writing software that's running on the software that we're providing to them. So there is this trickle down effect that comes, and so I think that every link in that chain, I mean, it's wonderful that it's called a supply chain. It's only as strong as its weakest link. So our view is how do we strengthen every link in that chain? And we're one part of it, but we're kind of looking a little broader, what can we do upstream and how can we help our customers to ensure the security of their part in that supply chain? >> Yeah, I want to talk about that in a broad sense, but let's see if we can get a little bit more specific in terms of what some of the chains look like because it's not just really one chain when you think about it, there's the idea of inherent flaws that can be caught and then there are the things that bad actors might be doing to leverage those flaws. So you've got all of these different things that are converging. So first and Vincent, if you want to toss this to Luke back and forth, it's up to you guys. What about this issue of inherent flaws in code? We referenced this idea of the maintainer community. What are best practices for locking that down to make sure that there aren't inherent flaws or security risks? >> I'll take a stab at it, and then I'll let Luke follow up with maybe some of the technologies that Red Hat provides. And again, speaking to Red Hat as part of that chain. When we're talking about inherent risk, there's a vulnerability that's present upstream. We pull that software to Red Hat. We package it as a component of one of the pieces of software that we provide to our customers. It's our responsibility to pay attention to those upstream potential vulnerabilities, potential risks, and correct them in our code. So that might be taking a patch from upstream, applying it to our software, might be grabbing the latest version from upstream, whatever the case might be, but it's our responsibility to provide that protection for that software to actually remediate that risk, and then our customers can then install the update and apply the mitigation themselves. If we take a look at it from, when we're looking at multiple suppliers where you'd asked earlier about, what part of it is Red Hat and what part of it is self-service open source? When you look at that, the work that Red Hat's doing there as a commercial provider of open source and end user for that little bit that they're going to grab themselves, that Red Hat doesn't provide, it's going to have to do all of those things as well. They're going to have to pay attention to that risk from upstream. They're going to have to pay attention to any potential vulnerabilities and pull that in to figure out, do I need to patch? Where do I need to patch it? And that's something we didn't really touch on was an inventory of the software that you have in place. I mean, you don't know that you need to fix something. You don't even know that it's running. So, I mean, there's a lot of considerations there where you have to pay attention to a lot of sources. Certainly there's metadata, automation, all of these things that make it easier, but it doesn't absolve us of the responsibility across the board to pay attention to these things, whether you're grabbing it from upstream directly or from the vendor. And it's the vendor's responsibility to then be paying attention to things upstream. >> Yeah, so Luke, I want you to kind of riff on that from the perspective that let's just assume that Vincent was just primarily talking about the idea that, okay, we've established that this code is solid and we've got gold copy of it and we know it's okay. There aren't inherent problems in the code as far as we can tell. Well, that's fine. I'm a developer. I go out to pull code and to use. How do I know if it's not been tampered with? How do I know if it's in fact the code that was validated during this process before? What do you do about that? >> So there's several methods there, but I just like to loop back to that point, because I think this is really interesting around, so if you look at a software supply chain, this is a mix of humans and machines, and both have flaws, probably humans a bit more. And a supply chain, you have developers. You have code reviewers, you have your systems administrators that set up the systems, and then you have your machine actors. So you've got your build systems, the various machines that are part of that supply chain. Now the humans, there's a as an attack factor there 'cause typically they will have some sort of identity, which they leverage for access to the supply chain. So quite often a developer's identity can be compromised. So a lot of the time people will have a corporate account that gives them some sort of single sign on access to multiple systems. So the developers are coming and this could be somebody in the community as well. Their account is compromised, then they're able to easily backdoor systems. So that's one aspect. And then there is machines as well. There's the whole premise of machines software not being up to date. So when the latest nasty vulnerability is released, machines are updated, then the machines have their flaws. They can be exploited. So I would say it's not just a technical problem. There is a humanistic element to this as well around protecting your supply chain. And I would say a really good perspective to carry when you're looking to, how do I secure my supply chain is treat it like you would a production system. So what do I mean by that? When we put something into production and we've got this very long legacy of treating it with a very strict security context around who can access that people, okay. How much it's upgraded and it's patched? And we seem to not have this same perception around our supply chain and our build systems, the integrity of those, the access of those, the policy around the access and so forth. So that's one giveaway that I would say is a real key focus that you should have is treat it like a production system. Be very mindful about what you're bringing in, who can access it because it is the keys to the kingdom, because if somebody compromises your supply chain, your build systems and so forth, they can compromise the whole chain because the chain is only as strong as the weakest link. So that's what I draw upon it. And around the verifications, there is multiple technologies that you can leverage. So Red Hat, we've got a very robust sign in system that we use so that you can be sure that the packages that we get you have non-repudiation that they've been produced by Red Hat. When you update your system, that's automatically looked after. And there are other systems as well, there's other new technologies that are starting to get a foothold around the provenance of aspects of your build system. So when you're pulling in from these multiple sources of open source communities, you can have some provenance around what you're putting in as well. And yeah, I don't want to bite share too much on the technologies, but there's some exciting stuff starting to happen there as well. >> So let's look at an example of something, because I think it's important to understand all of these different aspects. Recently, I think actually still in the news, we found that some logging software distributed by Apache that's widely used in people's websites to gather information about... To help from a security perspective and to help developers improve things that are going on in websites. A vulnerability was discovered. I guess, first Alibaba, some folks were reported it directly to some folks at Apache and the Apache Organization. And then of all people, some folks from Minecraft mentioned it in a blog. That seems like a crazy way to find out about something that's a critical flaw. Now we're looking at this right now with hindsight. So with hindsight, what could we have done to not be in the circumstances that we're in right now? Vincent, I'll toss that to you first, but again, if Luke is more appropriate, let us know. >> No, it's a great question, and it's a hard question. >> How did you let this happen, Vincent? How did you let this happen? >> It wasn't me, I promise. (Dave laughs) >> What I mean, it's a challenging question I mean, and there's a number of areas where we focused on a lot of what we perceived as critical software. So it comes to web server applications, DNS, a number of the kind of the critical infrastructure that powers the internet. Right or wrong. Do we look at logging software as a critical piece of that? Well, maybe, maybe we should, right? Logging is definitely important as part of an incident response or just an awareness of what's going on. So, I mean, yeah, it probably should have been considered critical software, but I mean, it's open source, right? So there's a number of different logging applications. I imagine now we're scrutinizing those a little bit more, but looking beforehand, how do you determine what's critical until an event like this happens, and it's unfortunate that it happens. And I like to think of these as learning opportunities, and certainly not just for Red Hat, but for this (talking over each other) >> Certainly this is not... Yeah, this is not an indictment of our entire industry. We are all in this together and learning every day. It just highlights how complex the situation is that we're dealing with, right? >> It really is. And I mean, a lot of what we're looking at now is how do we get tools into the hands of developers who can catch some of these things earlier. And there's a lot of commercial offerings, there's a lot of open source tools that are available and being produced that are going to help with these sorts of situations moving forward. But I mean, all the tools on the planet aren't going to help if they're not being used. So, I mean, there has to be an education and an incentive for these developers, particularly, maybe in some upstream communities where they are labors of love and they're passionate projects they're not sponsored or backed by a corporation who's paying for these tools, to be able to use some of them and move that forward. I think that looking at things now, there is work to be done. Obviously there's always going to be work to be done. Not all of these tools, and we have to recognize this, they're not all perfect. They're not going to catch everything. These tools could have been... I mean, I don't know if they were running these tools or not, they could have been, and the tool simply could not have picked them up. So part of it is the proactive part. We talk a lot about shift left and moving these things earlier into the development process and that's great, and we should do it. It certainly should never be seen as a silver bullet or a replacement for a good response. And I think the really important thing to highlight with respect to this, and I mean, this touches on the supply chain issue as well, companies, especially those who never maybe saw themselves as a software development company really have to figure out and understand how to do appropriate response. Part of that is awareness, what do you have installed? Part of it is sources of information. Like how do I find out about a new vulnerability or a potential vulnerability? And then it's just the speed to respond. We know that a number of companies they have, maybe it's a Patch Tuesday, maybe it's a patch 26th of the month, maybe it's patch day of the quarter, we have to learn how to respond to these things quickly so that we can apply these mitigations and these fixes as quickly as possible to them protect ourselves and protect the end users or customers that we have, or to keep the kids from using some backdoors in Minecraft is the word. >> (laughs) Yeah. Look, this is an immensely important subject. To wrap us up on this, Luke, I'd like you to pretend that you just got into an elevator in a moderately tall building, and you have 60 seconds to share with me someone who already trusts you, you don't have to convince me of your credentials or anything. I trust you. What tools specifically do you need me to be running, tools and processes. You've got 60 seconds to say, Dave, if you're not doing these things right now, you're unnecessarily vulnerable. So ready, and go, Luke. >> So automatically update all packages. Always stay up-to-date so that when an issue does hit, you're not having to go back 10 versions and work your way forward. That's the key thing. Ensure that everything you pull in, you're not going to have 100%, but have a very strict requirement that there is non-repudiation, is signed content, so you can verify that it's not being tampered with. For your developers that are producing code, run static, dynamic analysis, API fuzzes, all of these sorts of tools. They will find some vulnerabilities for you. Be part of communities. Be part of communities, help chop the wood and carry the water because the log for Jay, the thing is that was found because it was in the open. If it wasn't any open, it wouldn't have been found. And I've been in this business for a long time. Software developers will always write bugs. I do. Some of them will be security bugs. That's never going to change. So it's not about stopping something that's inevitable. It's about being prepared to react accordingly in our right and correct manner when it does happen so that you can mitigate against those risks. >> Well, we're here on the 35th floor. That was amazing. Thank you, Luke. Vincent, you were in the elevator also listening in on this conversation. Did we miss anything? >> No, I mean, the only thing I'll say is that it's really helpful to partner with an enterprise open source provider, be it Red Hat or anybody else. I don't want to toot our own horn. They do a lot of that work on your behalf that you don't have to do. A lot of the things that Luke was talking about, those providers do, so you don't have to. And that's where you.. I liked that you talked about, hey, you don't have to convince me that I'm trusted, or that I trust you. Trust those vendors. They're literally here to do a lot of that heavy lifting for you and trust the process. Yeah, it's a very, very good point. And I know that sometimes it's hard to get to that point where you are the trusted advisor. Both of you certainly are. And with that, I would like to thank you very much for an interesting conversation. Gentlemen, let's keep in touch. You're always welcome on theCUBE. Luke, second time, getting a chance to talk to you on theCUBE personally. Fantastic. With that, I would like to thank everyone for joining this very special series on theCUBE. Managing risk in the digital supply chain is a critical topic to keep on top of. Thanks for tuning into theCUBE. We'll be back soon. I'm Dave Nicholson saying, thanks again. (upbeat music)
SUMMARY :
Managing Risk in the Digital Supply Chain. that you get from one So it's interesting that it's coming in but there are going to be packages in that context? that they're drawing from to And just to follow up on that. So it's a mix of both. What are the things that are put at risk? that you have figured out. of the chains look like for that software to I go out to pull code and to use. is the keys to the kingdom, and to help developers improve and it's a hard question. It wasn't me, I promise. that powers the internet. that we're dealing with, right? that are going to help pretend that you just so that you can mitigate Vincent, you were in the And I know that sometimes it's hard to get
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
Luke | PERSON | 0.99+ |
Dave Nicholson | PERSON | 0.99+ |
Apache | ORGANIZATION | 0.99+ |
Vincent | PERSON | 0.99+ |
Vincent Danen | PERSON | 0.99+ |
Red Hat | ORGANIZATION | 0.99+ |
Alibaba | ORGANIZATION | 0.99+ |
100% | QUANTITY | 0.99+ |
60 seconds | QUANTITY | 0.99+ |
Minecraft | TITLE | 0.99+ |
Dave | PERSON | 0.99+ |
Luke Hinds | PERSON | 0.99+ |
Luke Hines | PERSON | 0.99+ |
10 versions | QUANTITY | 0.99+ |
thousands | QUANTITY | 0.99+ |
millions | QUANTITY | 0.99+ |
Jay | PERSON | 0.99+ |
35th floor | QUANTITY | 0.99+ |
Both | QUANTITY | 0.99+ |
second time | QUANTITY | 0.99+ |
first | QUANTITY | 0.99+ |
both | QUANTITY | 0.98+ |
today | DATE | 0.98+ |
one aspect | QUANTITY | 0.98+ |
Red Hat | TITLE | 0.98+ |
Apache Organization | ORGANIZATION | 0.98+ |
Red Hats | TITLE | 0.97+ |
one | QUANTITY | 0.97+ |
theCUBE | ORGANIZATION | 0.96+ |
one vendor | QUANTITY | 0.96+ |
Red Hat | TITLE | 0.96+ |
single | QUANTITY | 0.94+ |
earlier this year | DATE | 0.94+ |
one company | QUANTITY | 0.94+ |
one giveaway | QUANTITY | 0.91+ |
one chain | QUANTITY | 0.88+ |
one part | QUANTITY | 0.88+ |
Tuesday | DATE | 0.82+ |
open source packages | QUANTITY | 0.7+ |
Chain | TITLE | 0.67+ |
Red | ORGANIZATION | 0.64+ |
CTO | ORGANIZATION | 0.52+ |
Hat | TITLE | 0.52+ |
26th | QUANTITY | 0.51+ |
Andrea Hall & Andrew Block, Red Hat | Managing Risk In The Digital Supply Chain
(upbeat music) >> Okay, we're here talking about how you can better understand and manage the risks associated with the digital supply chain. How in this day and age where software comes from so many different places and sources throughout the ecosystem, how can organizations manage the risks associated with our dependence on software? And with me now are two great guests, Andrea Hall, who is a specialist solution architect and project manager for security and compliance at Red Hat. She's going to focus on public sector. And Andrew Block who's a distinguished architect at Red Hat Consulting, folks welcome. >> Welcome >> Thank you. Thanks for having us. >> You're very welcome. Andrea, let's start with you. Let's talk about regulations. What exists today that we should be aware of that organizations should be paying attention to? >> Oh sure, so the thing that comes to mind first being in the US is the presidential executive order on cybersecurity that came out a few months ago. Organizations are really paying attention to that. And in the US, it's having a ripple effect with policy, but we're also seeing policy considerations pop up in other countries, Australia and England. The supply chain is a big focus right now, of course, but we see these changes coming down the road as more and more government organizations are trying to secure their critical infrastructure. >> Is there kind of a leadership, or probably in other words, is somebody saying seeing what the UK does and say, okay, we're going to follow that template? Or is it just a variety and a mish mash with no sort of consolidation? How is that sort of playing out? >> I see a lot of organizations kind of basing their requirements on (indistinct) However, each organization has its own nuances. Each agency has its own nuances to how it wants them implemented. >> Andrew, maybe you could chime in here. What are you seeing when you talk to customers that are tuned into this issue? >> You know, as Andrea had just mentioned having that north star in terms of regulations is so fundamentally great for them because many of them especially in regulate industries, look to these regulations on how they apply their own policies. So at least it has some guidance on how to move forward because as we all know the secure software supply chain is getting news every day and how they react to it is something that I know all their leaders are asking themselves, especially those IT leaders. >> Andrea, when I talk to practitioners, sometimes they're frustrated. They understand they have to comply. They know new regulations are coming out, but sometimes it's hard for them to keep up. It would be helpful if you're sitting across the table from somebody who's frustrated and they ask you, what are your expectations? What are the trends in regulations? How do you see the current regulations evolving to specifically accommodate the digital supply chain and the security exposures and corollary requirements there? >> We see a lot of organizations struggling in the sense of trying to understand what the policy actually wants. Definitions are still a little bit vague, but implementation is also difficult because sometimes organizations will add more tools to their toolkit, adding a layer of complexity there. Really automation has to be pulled in. That's key to implementing this instead of adding more workload and more burden to your folks. It's really important for these organizations to pull stakeholders in the organization together. So the IT leaders bring together the developers, the security operations sit at the same table, talk about whether or not what needs to be implemented or what's proposed to be implemented, will affect the mission or in any way or disrupt operations. It's important for everybody to be on the same page so it doesn't slow anything down as you're trying to roll it out. >> And one of the things here is that we're seeing a lot of change with these new regulations and with a lot of organizations, any type of change is scary. And that is one area that they're looking for guidance not only in the tooling, but also how they apply it in the organization. >> I'll add on. >> Please. >> I'll add onto that and say, organizations really need to take into account the people side of things too. People need to understand what the impact is to the organization, so that they don't try to find the loopholes, they're buying into what needs to be done. They understand the why behind it. You for example, if you walk into your house, you normally close the door behind you. Security needs to be seen as that, as well, that's the culture and it's the habit. And it's ingrained in the fabric of the organization to live this way, not just implement the tools to do it. >> Right, and the number of doors you have in your infrastructure are a lot more than just a couple. Andrew mentioned sort of guidance and governments are obviously taking a more active role. I mean, sometimes I'm a cynic. I mean, the president Biden signs an executive order, but swipe of a pen doesn't really give us enough to go on. Do you think Andrea, that we're going to see new guidance from governments in the very near future? What are you expecting? >> I expect to see more conversations happening. I know that agencies who developed the policies are pulling together stakeholders and getting input. But I do see in the not too distant future, that mandates will be rolling out, yes. >> Well, so Andrew of course, Andrea, if you have a thought on this as well, but how do you see organizations dealing with adopting these new policies. >> Slowly, don't boil the ocean is one thing I tell a lot to every one of them, because a lot of these tooling, a lot of these concepts are foreign to them, brand new. How they adopt those and how they implement them, needs to be done in a very agile fashion, very slow and prescriptive. Go ahead and try to find one area of improvement and go ahead and work upon it and build upon it. Because not only does that normally make your organization more successful and secure, but also helps your organization just from a more out standpoint. One thing that you need to emphasize is that don't blame anyone. 'Cause a lot of times when you're going through this, you're reassessing your own supply chain. You might find where you could see improvements that need to be done. Don't blame things that may have occurred in the past. See how you can benefit from these lessons learned in the future. >> It's interesting you say that the blame game, I mean it used to be that failure meant you get fired and that's obviously has changed. As many have said, you know you're going to have incidents. It's how you respond to those incidents. What you learn from them. Do you have Andrew, any insights from specifically working with customers on securing their software supply chain? What can you tell us about what leading practitioners are doing today? >> They're going in and not only assessing what their software components consist of. Using tools like an SBOM, a software bill of materials, understand where all the components of their ecosystem and their lineage comes from. We're hearing almost every single day, new vulnerabilities that are being introduced in various software packages. By having that understanding of what is in your ecosystem, you can then better understand how to mitigate those concerns moving forward. >> Andrea, Andrew was just saying, one of the things is you don't just dive in. You've got to be careful. There's going to be ripple effects is what I'm inferring, but at the same time, there's a mandate to move quickly. Are there things that could accelerate the adoption of regulation or even the creation of regulations and that guidance in your view? What could accelerate this? >> As far as accelerating it goes, I think it's having those conversations proactively with the stakeholders in your organization and understanding the environment like Andrew said. Go ahead and get that baseline. And just know that whatever changes you make are maybe going to be audited down the road, because as we were moving towards this kind of third-party verification, that you're actually implementing things in order to do business with another organization. The importance of that, if organizations see that gravity to this, I think they will try to speed things up. I think that if organizations and the people in those organizations understand that why, that I talked about earlier and they understand how things like solar winds or things like the oil disruption that happened earlier this year. The personal effect to cyber events will help your organization move forward. Again, everybody's bought into the concept, everybody's working towards the same goals and they understand that why behind it. >> In addition to that, having tooling available, that makes it easy for them. You have a lot of individuals who this is all foreign, providing that base level tooling that aligns to a lot of the regulations that might be applicable within their real realm and their domain, makes it easier for them to start to complying and taking less burden off of them to be able to be successful. >> So it's a hard problem because Andrew, how do you deal with sort of the comment more tools, okay. But I look at that the Optiv map, if you've seen that. It makes your eyes cross. You've got so many tools, so much fragmentation, you're introducing new tools. Can automation help that? Is there hope for consolidation of that tools portfolio? >> Right now, this space is very emerging. It's very emerging, it's very fluid to be honest, 'cause there is actually mandates only a year or two old. But as they come over the course of time, however, I do see these types of tooling starting to consolidate where right now it seems like every vendor has a tool that tries to address this. It's being able to have the people work together, have more regulations that will come out that will allow us to start to redefine and solidify on certain tools like ISO standards. There are certain ones that I mentioned on as balance previously, there's now a ISO standard on SBOM there wasn't previously. So as more and more of these regulations come out, it makes it easier to provide that recommended set of tooling that organizations can start leveraging instead of vendor A, vendor B. >> Andrea, I said this before I was a cynic, but will give you the last word, give us some hope. I mean, obviously public policy is very important. A partnership between governments and industry, both the practitioners, the organizations that are buying these tools, as well as the technology industry got to work together in an ecosystem. Give us some hope. >> The hope I think will come from realizing that as you're doing this, as you are implementing these changes, you're in a sense trying to prevent those future incidents from happening. There's some assurance that you're doing everything that you can do here. It's a situation, it can be daunting, I'll put it that way. It can be really daunting for organizations, but just know that organizations like Red Hat are doing what we can to help you down the road. >> And really it's just continuing this whole shifting left mentality. The top of supply chain is just one component, but the introducing dev sec ops security at the beginning, that really will make the organizations become successful because this is not just a technology problem, It's a people issue as well. And being able to kind of package them all up together will help organizations as a whole. >> Yeah, so that's a really important point. You hear that term shift left. For years, people say, hey, you can't just bolt security on, as an afterthought, that's problematic. And that's the answer to that problem, right? Is shifting left meaning designing it in at the point of code, infrastructure as code, dev sec ops. That's where it starts, right? >> Exactly, being able to have security at the forefront and then have everything afterwards. Propagate from your security mindset. >> Excellent, okay, Andrea, Andrew, thanks so much for coming to the program today. >> Thank you for having us. >> Very welcome, thanks for watching. This is Dave Vellante for The Cube. Your a global leader in enterprise tech coverage. (soft music)
SUMMARY :
how can organizations manage the risks Thanks for having us. that organizations should that comes to mind first to how it wants them implemented. What are you seeing when and how they react to it is something What are the trends in regulations? more burden to your folks. And one of the things fabric of the organization from governments in the very near future? But I do see in the but how do you see organizations dealing that need to be done. say that the blame game, how to mitigate those of regulations and that if organizations see that gravity to this, to be able to be successful. But I look at that the Optiv have more regulations that will come out but will give you the last that you can do here. And being able to kind of And that's the answer have security at the forefront to the program today. This is Dave Vellante for The Cube.
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
Andrea | PERSON | 0.99+ |
Andrew | PERSON | 0.99+ |
Andrew Block | PERSON | 0.99+ |
Dave Vellante | PERSON | 0.99+ |
Andrea Hall | PERSON | 0.99+ |
Red Hat | ORGANIZATION | 0.99+ |
US | LOCATION | 0.99+ |
one | QUANTITY | 0.99+ |
Red Hat Consulting | ORGANIZATION | 0.99+ |
today | DATE | 0.99+ |
a year | QUANTITY | 0.99+ |
England | LOCATION | 0.98+ |
two | QUANTITY | 0.98+ |
one component | QUANTITY | 0.98+ |
Australia | LOCATION | 0.98+ |
both | QUANTITY | 0.98+ |
each organization | QUANTITY | 0.97+ |
Each agency | QUANTITY | 0.97+ |
first | QUANTITY | 0.97+ |
Biden | PERSON | 0.96+ |
One thing | QUANTITY | 0.96+ |
one area | QUANTITY | 0.96+ |
two great guests | QUANTITY | 0.94+ |
SBOM | ORGANIZATION | 0.94+ |
one thing | QUANTITY | 0.91+ |
earlier this year | DATE | 0.88+ |
few months ago | DATE | 0.88+ |
The Cube | ORGANIZATION | 0.81+ |
UK | ORGANIZATION | 0.72+ |
single day | QUANTITY | 0.72+ |
years | QUANTITY | 0.72+ |
president | PERSON | 0.64+ |
couple | QUANTITY | 0.63+ |
SBOM | TITLE | 0.54+ |
Optiv | ORGANIZATION | 0.5+ |
ISO | TITLE | 0.43+ |
Kirsten Newcomer, Red Hat | Managing Risk In The Digital Supply Chain
(upbeat music) >> Hello everyone, my name is Dave Vellante, and we're digging into the many facets of the software supply chain and how to better manage digital risk. I'd like to introduce Kirsten Newcomer, who is the Director of Cloud and DevSecOps Strategy at Red Hat. Hello Kirsten, welcome. >> Hello Dave, great to be here with you today. >> Let's dive right in. What technologies and practices should we be thinking about that can help improve the security posture within the software supply chain? >> So I think the most important thing for folks to think about really is adopting DevSecOps. And while organizations talk about DevSecOps, and many folks have adopted DevOps, they tend to forget the security part of DevSecOps. And so for me, DevSecOps is both DevSec, how do I shift security left into my supply chain, and SecOps which is a better understood and more common piece of the puzzle, but then closing that loop between what issues are discovered in production and feeding that back to the development team to ensure that we're really addressing that supply chain. >> Yeah I heard a stat. I don't know what the source is, I don't know if it's true, but it probably is that around 50% of the organizations in North America, don't even have a SecOps team. Now of course that probably includes a lot of smaller organizations, but the SecOps team, they're not doing DevSecOps, but so what are organizations doing for supply chain security today? >> Yeah, I think the most common practice, that people have adopted is vulnerability scanning. And so they will do that as part of their development process. They might do it at one particular point, they might do it at more than one point. But one of the challenges that, we see first of all, is that, that's the only security gate that they've integrated into their supply chain, into their pipeline. So they may be scanning code that they get externally, they may be scanning their own code. But the second challenge is that the results take so much work to triage. This is static vulnerability scanning. You get information that is not in full context, because you don't know whether a vulnerability is truly exploitable, unless you know how exposed that particular part of the code is to the internet, for example, or to other aspects. And so it's just a real challenge for organizations, who are only looking at static vulnerability data, to figure out what the right steps to take are to manage those. And there's no way we're going to wind up with zero vulnerabilities, in the code that we're all working with today. Things just move too quickly. >> Is that idea of vulnerability scanning, is it almost like sampling where you may or may not find the weakest link? >> I would say that it's more comprehensive than that. The vulnerability scanners that are available, are generally pretty strong, but they are, again, if it's a static environment, a lot of them rely on NVD database, which typically it's going to give you the worst case scenario, and by nature can't account for things like, was the software that you're scanning built with controls, mitigations built in. It's just going to tell you, this is the package, and this is the known vulnerabilities associated with that package. It's not going to tell you whether there were compiler time flags, that may be mitigated that vulnerability. And so it's almost overwhelming for organizations, to prioritize that information, and really understand it in context. And so when I think about the closed loop feedback, you really want not just that static scan, but also analysis that takes into account, the configuration of the application, and the runtime environment and any mitigations that might be present there. >> I see, thank you for that. So, given that this digital risk and software supply chains are now front and center, we read about them all the time now, how do you think organizations are responding? What's the future of software supply chain going to look like? >> That's a great one. So I think organizations are scrambling. We've certainly at Red Hat, We've seen an increase in questions, about Red Hat's own supply chain security, and we've got lots of information that we can share and make available. But I think also we're starting to see, this strong increased interest, in security bill of materials. So I actually started working with, automation and standards around security bill of materials, a number of years ago. I participated in The Linux Foundation, SPDX project. There are other projects like CycloneDX. But I think all organizations are going to need to, those of us who deliver software, we're going to need to provide S-bombs and consumers of our software should be looking for S-bombs, to help them understand, to build transparency across the projects. And to facilitate that automation, you can leverage the data, in a software package list, to get a quick view of vulnerabilities. Again, you don't have that runtime context yet, but it saves you that step, perhaps of having to do the initial scanning. And then there are additional things that folks are looking at. Attested pipelines is going to be key, for building your custom software. As you pull the code in and your developers build their solutions, their applications, being able to vet the steps in your pipeline, and attest that nothing has happened in that pipeline, is really going to be key. >> So the software bill of materials is going to give you, a granular picture of your software, and then what the chain of, providence if you will or? >> Well, an S-bomb depending on the format, an S-bomb absolutely can provide a chain of providence. But another thing when we think about it, from the security angles, so there's the providence, where did this come from? Who provided it to me? But also with that bill of materials, that list of packages, you can leverage tooling, that will give you information about vulnerability information about those packages. At Red Hat we don't think that vulnerability info should be included in the S-bomb, because vulnerability data changes everyday. But, it saves you a step potentially. Then you don't necessarily have to be so concerned about doing the scan, you can pull data about known vulnerabilities for those packages without a scan. Similarly the attestation in the pipeline, that's about things like ensuring that, the code that you pull into your pipeline is signed. Signatures are in many ways of more important piece for defining providence and getting trust. >> Got it. So I was talking to Asiso the other day, and was asking her okay, what are your main challenges, kind of the standard analyst questions, if you will. She said look, I got great people, but I just don't have enough depth of talent, to handle, the challenges I'm always sort of playing catch up. That leads one to the conclusion, okay, automation is potentially an answer to address that problem, but the same time, people have said to me, sometimes we put too much faith in automation. some say okay, hey Kirsten help me square the circle. I want to automate because I lack the talent, but it's not, it's not sufficient. What are your thoughts on automation? >> So I think in the world we're in today, especially with cloud native applications, you can't manage without automation, because things are moving too quickly. So I think the way that you assess whether automation is meeting your goals becomes critical. And so looking for external guidance, such as the NIST's Secure Software Development Framework, that can help. But again, when we come back, I think, look for an opinionated position from the vendors, from the folks you're working with, from your advisors, on what are the appropriate set of gates. And we've talked about vulnerability scanning, but analyzing the configed data for your apps it's just as important. And so I think we have to work together as an industry, to figure out what are the key security gates, how do we audit the automation, so that I can validate that automation and be comfortable, that it is actually meeting the needs. But I don't see how we move forward without automation. >> Excellent. Thank you. We were forced into digital, without a lot of thought. Some folks, it's a spectrum, some organizations are better shape than others, but many had to just dive right in without a lot of strategy. And now people have sat back and said, okay, let's be more planful, more thoughtful. So as you, and then of course, you've got, the supply chain hacks, et cetera. How do you think the whole narrative and the strategy is going to change? How should it change the way in which we create, maintain, consume softwares as both organizations and individuals? >> Yeah. So again, I think there's going to be, and there's already, need request for more transparency, from software vendors. This is a place where S-bombs play a role, but there's also a lot of conversation out there about zero trust. So what does that mean in, you have to have a relationship with your vendor, that provides transparency, so that you can assess the level of trust. You also have to, in your organization, determine to your point earlier about people with skills and automation. How do you trust, but verify? This is not just with your vendor, but also with your internal supply chain. So trust and verify remains key. That's been a concept that's been around for a while. Cloud native doesn't change that, but it may change the tools that we use. And we may also decide what are our trust boundaries. Are they where are we comfortable trusting? Where do we think that zero trust is more applicable place, a more applicable frame to apply? But I do think back to the automation piece, and again, it is hard for everybody to keep up. I think we have to break down silos, we have to ensure that teams are talking across those silos, so that we can leverage each other's skills. And we need to think about managing everything as code. What I like about the everything is code including security, is it does create auditability in new ways. If you're managing your infrastructure, and get Ops like approach your security policies, with a get Ops like approach, it provides visibility and auditability, and it enables your dev team to participate in new ways. >> So when you're talking about zero trust I think, okay, I can't trust users, I got to trust the verified users, machines, employees, my software, my partners. >> Yap >> Every possible connection point. >> Absolutely. And this is where both attestation and identity become key. So being able to, I mean, the SolarWinds team has done a really interesting set of things with their supply chain, after they were, in response to the hack they were dealing with. They're now using Tekton CD chains, to ensure that they have, attested every step in their supply chain process, and that they can replicate that with automation. So they're doing a combination of, yep. We've got humans who need to interact with the chain, and then we can validate every step in that chain. And then workload identity, is a key thing for us to think about too. So how do we assert identity for the workloads that are being deployed to the cloud and verify whether that's with SPIFFE SPIRE, or related projects verify, that the workload is the one that we meant to deploy and also runtime behavioral analysis. I know we've been talking about supply chain, but again, I think we have to do this closed loop. You can't just think about shifting security left. And I know you mentioned earlier, a lot of teams don't have SecOps, but there are solutions available, that help assess the behavior and runtime, and that information can be fed back to the app dev team, to help them adjust and verify and validate. Where do I need to tighten my security? >> Am glad you brought up the SolarWinds to Kirsten what they're doing. And as I remember after 911, everyone was afraid to fly, but it was probably the safest time in history to fly. And so same analogy here. SolarWinds probably has learned more about this and its reputation took a huge hit. But if you had to compare, what SolarWinds has learned and applied, at the speed at which they've done it with maybe, some other software suppliers, you might find that they've actually done a better job. It's just, unfortunately, that something hit that we never saw before. To me it was Stuxnet, like we'd never seen anything like this before, and then boom, we've entered a whole new era. I'll give you the last word Kirsten. >> No just to agree with you. And I think, again, as an industry, it's pushed us all to think harder and more carefully about where do we need to improve? What tools do we need to build to help ourselves? Again, S-bombs have been around, for a good 10 years or so, but they are enjoying a resurgence of importance signing, image signing, manifest signing. That's been around for ages, but we haven't made it easy to integrate that into the supply chain, and that's work that's happening today. Similarly that attestation of a supply chain, of a pipeline that's happening. So I think as a industry, we've all recognized, that we need to step up, and there's a lot of creative energy going into improving in this space. >> Excellent Kirsten Newcomer, thanks so much for your perspectives. Excellent conversation. >> My pleasure, thanks so much. >> You're welcome. And you're watching theCUBE, the leader in tech coverage. (soft music)
SUMMARY :
and how to better manage digital risk. Hello Dave, great to that can help improve the security posture and more common piece of the puzzle, that around 50% of the that particular part of the code It's not going to tell you going to look like? And to facilitate that automation, the code that you pull into but the same time, people have said to me, that it is actually meeting the needs. and the strategy is going to change? But I do think back to the to trust the verified users, that the workload is the to Kirsten what they're doing. No just to agree with you. thanks so much for your perspectives. the leader in tech coverage.
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
Kirsten | PERSON | 0.99+ |
Dave Vellante | PERSON | 0.99+ |
Kirsten Newcomer | PERSON | 0.99+ |
Dave | PERSON | 0.99+ |
NIST | ORGANIZATION | 0.99+ |
one | QUANTITY | 0.99+ |
SolarWinds | ORGANIZATION | 0.99+ |
second challenge | QUANTITY | 0.99+ |
Red Hat | ORGANIZATION | 0.99+ |
both | QUANTITY | 0.99+ |
Tekton | ORGANIZATION | 0.99+ |
North America | LOCATION | 0.99+ |
10 years | QUANTITY | 0.99+ |
DevSecOps | TITLE | 0.99+ |
Kir | PERSON | 0.99+ |
more than one point | QUANTITY | 0.98+ |
around 50% | QUANTITY | 0.98+ |
today | DATE | 0.97+ |
sten Newcomer | PERSON | 0.97+ |
Stuxnet | PERSON | 0.96+ |
first | QUANTITY | 0.96+ |
DevSec | TITLE | 0.95+ |
Secure Software Development Framework | TITLE | 0.93+ |
SecOps | TITLE | 0.9+ |
point | QUANTITY | 0.89+ |
zero vulnerabilities | QUANTITY | 0.88+ |
zero trust | QUANTITY | 0.87+ |
Asiso | ORGANIZATION | 0.85+ |
of years ago | DATE | 0.73+ |
911 | OTHER | 0.7+ |
DevOps | TITLE | 0.67+ |
CycloneDX | TITLE | 0.66+ |
Ops | ORGANIZATION | 0.65+ |
SPIFFE SPIRE | TITLE | 0.65+ |
DevSecOps | ORGANIZATION | 0.63+ |
theCUBE | ORGANIZATION | 0.61+ |
SPDX | TITLE | 0.41+ |
Linux | ORGANIZATION | 0.21+ |
Richard A. Clarke, National Security & Cyber Risk Expert | Qualys Security Conference 2019
>> Announcer: From Las Vegas, it's theCUBE. Covering Qualys Security Conference 2019, brought to you by Qualys. >> Hey welcome back everybody, Jeff Frick here with theCUBE, we're in Las Vegas at the Bellagio, at the Qualys Security Conference, pretty amazing, it's been going on for 19 years, we heard in the keynote. It's our first time here, and we're excited to have our first guest, he was a keynote earlier this morning, the author of nine books, Richard Clarke, National Security and Cyber Risk expert, and author most recently of "The Fifth Domain." Dick, great to see you. >> Great to be with you. >> Absolutely. So you've been in this space for a very long time. >> I started doing cybersecurity in about 1996 or 1997. >> So early days. And preparing for this, I've watched some of your other stuff, and one of the things you said early on was before there was really nothing to buy. How ironic to think about that, that first there was a firewall, and basic kind of threat protection. Compare and contrast that to walking into RSA, which will be in a couple of months in Moscone, 50,000 people, more vendors than I can count on one hand, now there's too much stuff to buy. Do you look at this evolution? What's your take? And from a perspective of the CIO and the people responsible for protecting us, how should they work through this morass? >> Well, the CIO and the CFO, got used to thinking cyber security costs a little bit, 'cause you can only buy, this is 1997, you can only buy antivirus, firewall, and maybe, in 1997, you could buy an intrusion detection system. Didn't do anything, it just went "beep," but you could buy that too. So you had three things in 1997. And so that resulted in the IT budget having to take a tiny little bit of it, and put it aside for security, maybe 2%, 3% of the budget. Well, now, if you're only spending 2 or 3% of your IT budget on security, somebody owns your company, and it's not you (laughs). >> And that's 2 or 3% of the IT budget, that's not the whole budget. >> No, that's the IT budget. What we found in researching the book, is that secure companies, and there are some, there's companies that don't get hacked, or they get hacked, but the hack gets in, immediately contained, identified, quarantined. The damage is done, but it's easily repaired. Companies that are like that, the resilient companies, are spending 8%, 10%, we found companies at 12 and 17%, of their IT budget on security, and to your point, how many devices do you have to buy? You look at the floor at any of these RSA Conventions, Black Hat, or something, now there are 2000 companies at RSA, and they're all selling something, but their marketing message is all the same. So pity the poor CSO as she goes around trying to figure out, "Well, do I want to talk to that company? "What does it do?" We found that the big banks, and the big corporations, that are secure, have not three, anymore, but 75, 80, different, discreet cybersecurity products on their network, most of it software, some of it hardware. But if you've got 80 products, that's probably 60 vendors, and so you got to, for yourself, there's the big challenge, for a CSO, she's got to figure out, "What are the best products? "How do they integrate? "What are my priorities?" And, that's a tough task, I understand why a lot of the people want to outsource it, because it's daunting, especially for the small and medium-size business, you got to outsource it. >> Right, right. So the good news is, there's a silver lining. So traditionally, and you've talked about this, we talk about it all the time too, there's people that have been hacked and know it, and people that have been hacked and just don't know it yet, and the statistics are all over the map, anywhere you grab it, it used to be hundreds of days before intrusions were detected. Kind of the silver lining in your message is, with proper investments, with proper diligence and governance, you can be in that group, some they're trying to get in all the time, but you can actually stop it, you can actually contain it, you can actually minimize the damage. >> What we're saying is, used to be two kinds of companies, those that are hacked and knew it, and those that are hacked that don't, that didn't know it. Now there's a third kind of company. The company that's stopping the hack successfully, and the average, I think, is a 175 days to figure it out, now it's 175 minutes, or less. The attack gets in, there's all the five or six stages, of what's called "the attack killchain," and gets out very, very quickly. Human beings watching glass, looking at alerts, are not going to detect that and respond in time, it's got to be automated. Everybody says they got AI, but some people really do (laughs), and machine learning is absolutely necessary, to detect things out of the sea of data, 75 different kinds of devices giving you data, all of them alarming, and trying to figure out what's going on, and figure out in time, to stop that attack, quarantine it, you got to move very, very quickly, so you've got to trust machine learning and AI, you got to let them do some of the work. >> It's so funny 'cause people still are peeved when they get a false positive from their credit card company, and it's like (laughs), do you realize how many of those things are going through the system before one elevates to the level that you are actually getting an alert? >> So the problem has always been reducing the number of false positives, and identifying which are the real risks, and prioritizing, and humans can't do that anymore. >> Right, right, there's just too much data. So let's shift gears a little bit about in terms of how this has changed, and again, we hear about it over and over, right, the hacker used to be some malicious kid living in his mom's basement, being mischievous, maybe, actually doing some damage, or stealing a little money. Now it's government-funded, it's state attacks, for much more significant threats, and much more significant opportunities, targets of opportunity. You've made some interesting comments in some of your prior stuff, what's the role of the government? What's the role of the government helping businesses? What's the role of business? And then it also begs the question, all these multinational business, they don't even necessarily just exist in one place, but now, I've got to defend myself against a nation state, with, arguably, unlimited resources, that they can assign to this task. How should corporate CIOs be thinking about that, and what is the role, do you think, of the government? >> Let's say you're right. 20 years ago we actually used to see the number of cyber attacks go up on a Friday night and a Saturday night, because it was boys in their mother's basement who couldn't get a date, you know, and they were down there having fun with the computer. Now, it's not individuals who are doing the attacks. It is, as you say, nation states. It's the Russian Army, Russian Intelligence, Russian Military Intelligence, the GRU. The North Korean Army is funding its development of nuclear weapons by hacking companies and stealing money, all over the world, including central banks, in some cases. So, yeah, the threat has changed, and obviously, a nation state is going to be far more capable of attacking, military is going to be far more capable of attacking, so, CISOs say to me, "I'm being attacked by a foreign military, "isn't that the role of the Pentagon "to defend Americans, American companies?" And General Keith Alexander, who used to run Cyber Command, talks about, if a Russian bomber goes overhead, and drops a bomb on your plant, you expect the United States Air Force to intercept that Russian bomber, that's why you pay your taxes, assuming you pay taxes. What's the difference? General Alexander says, whether that's a Russian bomber attacking your plant, or a Russian cyber attack, attacking your plant, and he says, therefore, people should assume the Pentagon will protect them from foreign militaries. That sounds nice. There's a real ring of truth to that, right? But it doesn't work. I mean, how could the Pentagon defend your regional bank? How could the Pentagon defend the telephone company, or a retail store? It can't. It can barely defend itself, and they're not doing a great job of that either, defending the federal government. So, do you really want the Pentagon putting sensors on your network? Looking at your data? No, you don't. Moreover, they can't. They don't have enough people, they don't have enough skills. At the end of the day, whatever the analogy is about how the Defense Department should defend us from foreign military attack, they can't. And they shouldn't, by the way, in my view. The conclusion that that gets you to, is you got to defend yourself, and you can, right now, if you use the technology that exists. The government has a role, sure. It can provide you warnings, it can provide the community with intelligence, it can fund development and stuff, can train people, but it cannot defend your network, you have to defend your network. >> And you have municipalities, I think it's Atlanta, is the one that keeps getting hit, there's-- >> Well Louisiana, just the other night, the whole state of Louisiana government unplugged from the internet, because it was being hit by a ransomware attack. The whole city of Baltimore's been down, the whole city of Atlanta, as you said. There's a real problem here, because people, many of them are paying the ransom, and they pay the ransom, and they get their network back right away. People ask me, "Can I trust these criminals?" Well you can trust them to give you your network back, because they have a reputation to maintain. Think about that. This whole thing about ransomware depends on their reputation, the bad guys' reputation. If they get a reputation for not giving you your network back when you pay, no one's ever going to pay, so they do give it back, and sometimes that's a lot quicker, and a lot cheaper, than saying no and rebuilding your network. But if we give them the money, what are they doing with it? Yeah, they're buying Ferraris to drive round the streets of Moscow, but some of that money is going back into R&D, so they can develop more effective attacks. >> So it's an interesting take, right, so most people, I think, would say that the cybersecurity war is completely always going to be kind of cat and mouse, whack-a-mole, that the bad guys are always a little step ahead, and you're always trying to catch up, just the way the innovation cycle works. You specifically say no, that's not necessarily always true, that there are specific things you can do to, not necessarily have an impenetrable wall, but to really minimize the impact and neutralize these threats, like a super white blood cell, if you will. So what are those things that companies should be doing, to better increase their probability, their chance, of, I don't know, blocking-- >> Depends on the size of the company. >> Absorbing. >> Depends on the size of the company. But I think whether you're a small-to-medium business, or you're an enterprise, you begin in the same place. And I do this with all of my consulting contracts, I sit down with the leadership of the company individually, and I ask every one of them, "What are you worried about? "What could happen? "What could a bad guy do to you "that matters to your company?" 'Cause what matters to one company may not matter to another company. And you can't spend your entire budget defending the network, so let's figure out exactly what risk we're worried about, and what risk we're just kind of willing to tolerate. And then, we can design security around that, and sometimes that security will be outsourced, to a managed security provider. A lot of it means getting into the cloud, because if you're in Amazon or Microsoft's cloud, you've got some security automatically built in, they've got thousands of people doing the security of the cloud, and if your server's in your basement, good luck. (laughs) >> So, as you look forward, now you said you finished the book earlier in the year, it gets published, and it's out, and that's great, but as you said, it's a fast-moving train, and the spaces develops. 10 years from now, we don't want to look at 10 years from now, it's way too long. But as you look forward the next couple, two, three years, what are you keeping an eye on, that's going to be, again, another sea change of both challenge and opportunity in this space? >> The three technologies we talk about in the book, for the three-year time horizon, 'cause I can't get beyond three years, more machine learning on the defense, but also more machine learning on the offense, and where does that balance work out? To whose advantage? Secondly, quantum computing, which, we don't know how rapidly quantum computing will come onto the market, but we do know it's a risk for some people, in that it might break encryption, if the bad guys get their hands on the quantum computer, so that's a worry. But one I think most immediately, is 5G. What 5G allows people to do, is connect millions of things, at high speed, to the internet. And a lot of those things that will be connected are not defended right now, and are outside firewalls, and don't have end-point protection, and aren't really built into networks on a secure network. So I worry about 5G empowering the Internet of Things, and doing what we call expanding the attack surface, I worry about that. >> Right, Richard, well thank you for taking a few minutes, and congrats on the book, and I'm sure within a couple of years the gears will start turning and you'll put pen to paper and kick another one out for us. >> Number 10. >> All right. He's Richard, I'm Jeff, you're watching theCUBE, we're at the Qualys Security Conference at the Bellagio in Las Vegas, thanks for watching, we'll see you next time. (upbeat music)
SUMMARY :
brought to you by Qualys. at the Qualys Security Conference, So you've been in this space for a very long time. and one of the things you said early on And so that resulted in the IT budget having to take And that's 2 or 3% of the IT budget, and so you got to, for yourself, and the statistics are all over the map, and the average, I think, is a 175 days to figure it out, So the problem has always been reducing the number and what is the role, do you think, of the government? and you can, right now, the whole city of Atlanta, as you said. that the bad guys are always a little step ahead, of the company. "What could a bad guy do to you and the spaces develops. but also more machine learning on the offense, and congrats on the book, at the Bellagio in Las Vegas,
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
Microsoft | ORGANIZATION | 0.99+ |
2 | QUANTITY | 0.99+ |
United States Air Force | ORGANIZATION | 0.99+ |
Jeff Frick | PERSON | 0.99+ |
Richard | PERSON | 0.99+ |
1997 | DATE | 0.99+ |
Jeff | PERSON | 0.99+ |
Richard Clarke | PERSON | 0.99+ |
10% | QUANTITY | 0.99+ |
12 | QUANTITY | 0.99+ |
8% | QUANTITY | 0.99+ |
Amazon | ORGANIZATION | 0.99+ |
Richard A. Clarke | PERSON | 0.99+ |
Pentagon | ORGANIZATION | 0.99+ |
175 days | QUANTITY | 0.99+ |
175 minutes | QUANTITY | 0.99+ |
60 vendors | QUANTITY | 0.99+ |
Moscow | LOCATION | 0.99+ |
Las Vegas | LOCATION | 0.99+ |
Qualys | ORGANIZATION | 0.99+ |
2% | QUANTITY | 0.99+ |
Atlanta | LOCATION | 0.99+ |
five | QUANTITY | 0.99+ |
North Korean Army | ORGANIZATION | 0.99+ |
19 years | QUANTITY | 0.99+ |
Moscone | LOCATION | 0.99+ |
80 products | QUANTITY | 0.99+ |
three years | QUANTITY | 0.99+ |
two kinds | QUANTITY | 0.99+ |
17% | QUANTITY | 0.99+ |
Baltimore | LOCATION | 0.99+ |
first time | QUANTITY | 0.99+ |
Friday night | DATE | 0.99+ |
3% | QUANTITY | 0.99+ |
three technologies | QUANTITY | 0.99+ |
three-year | QUANTITY | 0.99+ |
50,000 people | QUANTITY | 0.99+ |
Defense Department | ORGANIZATION | 0.99+ |
Saturday night | DATE | 0.99+ |
75 | QUANTITY | 0.99+ |
The Fifth Domain | TITLE | 0.99+ |
Alexander | PERSON | 0.99+ |
two | QUANTITY | 0.99+ |
2000 companies | QUANTITY | 0.99+ |
GRU | ORGANIZATION | 0.99+ |
Russian Army | ORGANIZATION | 0.99+ |
Keith Alexander | PERSON | 0.99+ |
80 | QUANTITY | 0.99+ |
millions | QUANTITY | 0.99+ |
first guest | QUANTITY | 0.99+ |
nine books | QUANTITY | 0.99+ |
RSA | ORGANIZATION | 0.98+ |
third kind | QUANTITY | 0.98+ |
both | QUANTITY | 0.98+ |
Russian Intelligence | ORGANIZATION | 0.98+ |
Russian Military Intelligence | ORGANIZATION | 0.98+ |
Russian | OTHER | 0.98+ |
six st | QUANTITY | 0.98+ |
three | QUANTITY | 0.98+ |
Ferraris | ORGANIZATION | 0.98+ |
Qualys Security Conference | EVENT | 0.97+ |
10 years | QUANTITY | 0.97+ |
20 years ago | DATE | 0.97+ |
hundreds of days | QUANTITY | 0.97+ |
General | PERSON | 0.97+ |
one | QUANTITY | 0.96+ |
1996 | DATE | 0.96+ |
three things | QUANTITY | 0.96+ |
American | OTHER | 0.96+ |
Louisiana | LOCATION | 0.96+ |
one place | QUANTITY | 0.95+ |
first | QUANTITY | 0.95+ |
Qualys Security Conference 2019 | EVENT | 0.95+ |
75 different kinds of devices | QUANTITY | 0.95+ |
theCUBE | ORGANIZATION | 0.94+ |
Dick | PERSON | 0.93+ |
thousands of people | QUANTITY | 0.93+ |
Bellagio | LOCATION | 0.93+ |
one company | QUANTITY | 0.92+ |
Bart Murphy, York Risk Servcies | ServiceNow Knowledge16
>> Mine from Las Vegas. It's the cute covering knowledge sixteen brought to you by service. Now carry your host, Dave Alon and Jeff Rick. >> Welcome back to knowledge. Sixteen. Everybody, This is the Cube. Silicon Angles, flagship product. We go out to the events. We extract the signal from the noise Bart Murphy is. Here's the CTO of York Risk Services group. Mark. Good to see again. Good to see you. But thank you for having me. So what's been going on this week? Busy week. What you been doing this week has >> been busy. I've been doing a couple different things. One on the CIA decisions track, you know, collaborated on with those folks and getting some sessions in from service now and then on the partner side. You know, talking to customers, checking out and enjoying the the key notes on seeing what's new on the platform. Very exciting. >> Did you see Secretary Gates last night? We were, unfortunately, >> got pulled out for a call, So I >> think that's the >> one thing I did miss. You >> want to call me on that? One of things, he said, which I want to ask you about a former CEO. See XO now? Hey, said that consensus management don't bother now speaking to watch the CEO's as the CEO, yeah, it's a >> challenge. I think you know, there's there's one component that you have to devise, a strategy that you know a sound, and you have to have some resolve to help sell it. So I see that component of it. But the other is to sell that vision and get other people bought it. So, you know, I think there is a and consensus component from that, certainly from the executive team. And then you have to go sell it to your organization as well. And I think that truly doesn't come from just talking about the vision or the business case. It's from actually delivering the software and delivering the services and doing in an incremental basis that allows them to see and gain value from that, that that's what you build your credibility up on. And I think then that's what helps sell it. >> So you've gone through a few changes personally, your company. So take us through the care works acquisition. Sure, so >> careless family companies was required by your Chris Services Group S O. We're now part of a larger organization and national organization, Although care works itself had a few of the companies that had national footprint, a majority of them were primarily based in Ohio. So strategically great fit a great company. I moved into the corporate CTO roll about Oh, a year, year and a half after the acquisition, and I've been really trying to build out the entire enterprise strategy from a night perspective because they just they had procured a lot of acquired a lot of companies over a two to three year time span. And so we need to really invest a lot of time on what the future state of it is going to look like. >> So it's interesting gone from CEO to CTO. People talk coming to Cuba to talk about the role of the CIA. He'LL talk about all the time, and there'd been someone put forth the notion that the CEO eventually is going to have to choose a path, technical path or business path. You know, maybe both at different times. Do you subscribe to that, or do you see the CEO role is continuing on a CZ? We've known it. Yeah, >> we don't have a separate CIA and CTO I oversee the including operations. To me from a title perspective, I just want to have the organization view that that role is part of innovation. We have a chief innovation officer as well, but from a technology perspective, I think it's very difficult to run operations if you don't have a good grass for the technology in the platform. So regardless of the roller or title that they gave me, I think it's more about what are you managing on? And I don't want to ever be broken up between sort of SETI role that may be more focused on newer technology projects and then a CIA on Lee based on building our run methods. I want to make sure that those organizations are always combined because you're going to build much better software if you also have to support it. We also want to make sure that the automation is in place so that we have our support organization in mind when we actually deploy new platforms, new applications, new systems. >> So you see yourself as a software company. >> You know we do. We're in the wrist services business, so we are, ah, services provider, two carriers to large self insured Teo Large Claims organization. So we see ourselves. A lot of what we do is differentiated by our technology. Whether that's, you know, better business process, outsourcing functions or ability to do Bill review faster, more accurately. So our CEO definitely sees us as a technology company, and that's why there's a lot of investment in time being put into sort of build out what that future state of it is going to look like. >> What what do you do with service now? These days? How did the acquisition affect that and where you had it? >> Well, so we just went live with Yorker Services Group on service now is Platform on Geneva, and that's actually a separate production instance that we have with care work. So we deployed the care works instance in early two thousand eleven, late two thousand ten in that time frame, and there were, you know, there's a ton of customization a lot, you know, very solid platform for that family of companies with the York. There's a much larger scope that we wanted to address so very lucky again to be in that situation because I had an opportunity to start a redo and any time that you worked on a platform and you do it for a few years and then you get a chance to actually build again. So we really took more of an enterprise. I till out of the box type of approach s O that it could be flexible enough to manage across the entire enterprise, including all the acquired companies that we plan to pull onto the platform. And then that gives us time to figure out what was really the best out of our other platform that we want to, you know, retrofit back in. But the main reason I did that is to make sure that we could get some benefit out of the platform now and work and migrate into the business. Shared services functions within York that I think we're going to benefit very, very much from the new platform. >> So you've got a mulligan of sorts a little bit. >> Yeah, I got lucky on that on a little bit of the mulligan. And, you know, again, it's all about trying to make sure that we can come in and we just went live. You know, we're gonna have our challenges, like with any organizational change management solution, even just on the same side. But the cadence in which we're putting out releases to actually improve and bring on other shared services functions, I think, is where we will gain the majority of buying. >> So this notion here talked about a lot of this conference. The single cmd b yeah, is that something that you're able to achieve or working toward? Are you there? And absolutely, it's the goal. >> I mean, I don't know if you ever achieve it. I think it does take a lot of time. So the goal is to have everything in one platform for all of our companies across the board and to help facilitate automation, whether it's with GRC with the new security product that's coming out, which is, you know, something we're looking to get deployed in. Q three Q. Three Q For hopefully sooner rather than later. I just see there's a bunch of play on the automation orchestration side as it relates to tying in and tying an audit. Tien and Security on then also looking at business shared services and you know that's a whole different world of figuring out how can we help them? And we have ah operations service and are actually part of our next release. So I'll be very interested to see. You know, they do a lot of things manually like everybody does. He'LL be very keen to see how they see the platform and what they're going to come up with us, a strategy long term for them. >> So are you mentioned a couple times that York's made a number of acquisitions your company included, and don't give twenty four looking statements? Obviously, they're going to keep rolling up more things. But if you could speak to using service now as a vehicle to better integrate acquisitions, yeah, because for a lot of companies, that's a strategy. >> Yes, so and I actually have a strategy around that leveraging the platform is one of the main reasons that want to get it in now so that it could eventually build that. My whole goal there is the Leverage Performance Analytics on the way that I envisioned. Using that is, in many of the companies that we acquire, they will operate still, stand alone from a night perspective for some period of time. You know, whether that's six months, three months, two years until we can fully integrate him, whether it's network, you know, systems consolidation you name it. It takes a long time. It's not something that we have solved. So part of it is to be able to do modeling using Performance Analytics by pulling in the data so I can get them now onto this cloud platform because they don't need to be on network. I can have them operating their work within that platform for a period of a baseline period of time. And I could start to model that using Performance Analytics to say, How would that impact our enterprise? That's allies. Does it help our enterprise? That's always. Does it degrade our enterprise? That's the lace. Are they staffed appropriately to actually meet our enterprise? That's the lace and what our enterprises slaves. Once we start collecting all this data based on how we're staffed and how we're going to, you know, fund that transaction. So, >> Bart, if I understood it correctly, you have the dual role CEO slash CTO. Okay, is that there's the CSO report into you are he does. I saw Also he >> does. And so and that's ah, new rule that we established about a little less than a year ago. There was ah VP of corporate security. But we didn't have a chief information security officer s. So I we're not got a very season, see so and working not only as an internal what we do internally. Also within our tech company as well. We started cybersecurity practice. So everything we do, we try to make sure that we can actually support our technology investments from an enterprise perspective and be able to self serve ourselves as an enterprise. So very excited about that. That's why we're getting to the security components and some other products that we think will integrate extremely well into service. Now >> let's talk about that a little bit. I want to put forth the premise. You tell me, feel free to tell me the premise doesn't hold water. But it seems to us that there's been a shift in thinking about security from we'LL focus on you know, defense, defense, defense to one of you know we're going to get infiltrated. It's all about how we respond and I as the sea xo Whatever. See so CEO Seo, I can help lead that response. It's mechanism, but it's a team sport. Is that a valid premise? >> I think it's valid. I think you know, I think it's a little it is driving some change v f ear. But, you know, I think that, you know, is certainly from an external perspective can protect yourself pretty well. You know, a lot of the breaches were actually curve, and some of the cases were internal or through third party partners. So I think there's been a lot of additional due diligence being put on organization, especially as a service organization. We work with a lot of large insurance carriers as an example. So we are getting hit with a lot more requests and a lot more sort of assessments on what our controls are in that space. So we need to be mature, and that's based no matter what, since again, we're providing services to clients in this space, and we're collecting a good amount of claim data and bill data and medical data. So I'm not as going out staying okay, just when it's gonna happen and how we handle breach. If that's the case, I'm trying to figure out what are the ways that we can proactively manage our environment and be able to respond in a much faster fashion to isolate an issue as quickly as possible, which is why I'm really excited about the automation and security component within service now because properly integrated with similar tools that we have. There's a lot that the system conduce that a human can't get too fast enough that will actually shut down to manage that risk extremely well. >> Do you believe that the board level? There's sort of open and transparent communication that that it's not about If Wade get infiltrated, its we have been infiltrated and we will continue to be infiltrated. That discussion occur. >> I think, yeah, the board level. They're certainly more aware, and not just from their participation in our board for the companies that they run themselves, because many of these folks come from companies that their run themselves. So I think there's certainly an awareness I think they're demanding and wanting to have more concrete plans on what your corporate security strategy is going to be. So we've produced a three year plan on what that is and presented that our committee and are starting to communicate that all the way up, you know, through our CEO. So I think there's more awareness I I think that for whatever reason, people think that it hasn't been working on this for some time, but they have S o. You know, there's a lot of good things that we've already done and already put in place that people just need to be made aware of it and get up to speed if you will. And then there's. Here's what we're doing to invest in trying to stop future things or to be more proactive or tow, have better control. Is better auto practices this type of >> what's the right regime for a cyber security? In other words, who should be responsible for should be a single tech group? We Should it be a wider group. What responsibility? >> And no, it's it's it's It's by committee. So our committee included, you know, our general counsel, our CEO, our chief human resource officer, our CEO. So it it's a joint effort. Certainly there's a large component of it because many of it is about your defenses in your ability to manage and maintain and keep your data secure. But security is a company wide initiative. You know everything from training all the way down the associate level to not, you know, click on bad email links, right that no matter what you do and what type of in a virus you have and you're still going to get some of those fishing emails and some of those ransomware emails in those type of components. So there's a whole education put component that goes all the way down to the associate level. If that's not understood by the management over those groups, then you know how is it going to actually be distilled down and supported? So it's a complete company effort when it comes to corporate security. >> And how about >> the business lines? Because our research shows that a lot of organizations don't you don't even have the specifically answer for your organization. Just in your experience is the CEO and the CEO. If it seems as though a lot of businesses don't understand the value of their data or the value of their I p, and as a result, don't really know how to protect it, is that something that is challenging for organism >> Asians? I think it is least when I've talked to other clients potentially, I think less today than it was even five years ago. We certainly know the value of our data. I mean, there's been too many breaches in the large breaches in the past three years to not be aware. I have had that question asked ofyou on, even for a business perspective, understand the exposure. So you know they what is that? Hundred fifty hundred twenty five dollars per claim? Potentially on the data side. So people even put metrics around. It's you, Khun. Quickly go through and established what you think your overall exposure is from a dollar perspective and that starts toe. You know, open eyes when you have millions of claims, are even more millions of bills. >> And that's your business. So you would think you have a better understanding everything most. But so for those who don't how should they go about achieving that knowledge? That awareness, >> They should find someone that, you know, maybe some type of trusted advisor. You know, whether they need to hire a consulting company whether they need to go and just converse with another AA group like a CEO group and ask Hey, have you guys done this before? There's a ton of collaboration at that level where people are asking, Hey, how did you guys come up with your security road map on What did that >> look like? Because Because the value then drives your investment decisions, right, because that's the other thing is kind of like insurance. When is enough enough, You could always been Mohr, but at some point you're gonna have diminishing returns relative to the value. But you've gotta have a basis to set a budget. So I would imagine the value of the data, the value of the risk, whether its >> value brand right, so outside of the hard costs of potentially, you know, getting credit rating or those type of components. You know, there's there's the brand discussion, and I think that's somewhat invaluable. So, you know, budgets are just over. Go spend what you want, but there's certainly a lot of awareness that money needs to be spent that area. It needs to be spent wisely, but there hasn't been an issue as to either one. We're coming up with wild budgets for security but explaining what we're doing and why, and how cost effectively we're doing. It has been very well >> in thinking about how you communicate to the board Yeah, about cyber security. What would be the top two or three things that you would recommend that a C XO should have on his or her checklist? >> One is, you know, understanding all your end point, so understanding everything that's in your network. And it's an easy to say, but it's a very hard thing to do, especially when you have external facing applications. And you have a lot of different networks, so understanding your scope of devices and understand. You know, that way you could understand, to start to collect and fill up that C M G B and understand. Okay, if I have a patch that wasn't applied, how many devices were impacted? You know, how quickly can I get those remediated s so that you know, I think understanding the technical scope of your organization is important because it's very difficult to understand your risks, you know, rating if you will. If you don't understand the tools you have in place and where your potential holes maybe, ah, and then understanding you know your core data. So you know what is in your data that would potentially create a potential risk, even a financial risk? Certainly we go through all the insurance process, right? And even insurance now for cyber liability insurance. You know, the forms for five years ago were much different than the forms that are being filled out today. Much different. A lot more detail, a lot more drill down. So even just going through that process alone drives you to actually go and collect all this information that I'm talking about today, you know, so understanding your internal environment in understanding you know, those endpoints understanding the scope of your data management. And then I think it's around developing a sound strategy that is not just short term but short term and long term, with investments not just in tools, but also processes training those components. >> Did you look a tte security and responding to security is part of, ah, business continuity, as opposed to sort of a bespoke initiative. It is, There's business >> continuity and d are both have components of security, but it is truly what a way to ensure that you're you stay in business, right, and and And if people don't view it that way, then there's a lot of organizations that have been either crippled, not necessary put out of business but impacted extremely large. You know, financial impact with unmanaged breaches that actually went on way too long, right? And they weren't able to detect it, you know? So I think that there's a component there where you have to really think about what's the scope of the work, what the scope of the risk and how much do we need to invest? >> And you see service now. And I'm spending so much time in security this week because I'm excited about what I saw on Monday at the financial analyst meeting and who, talking to folks about this very important topic, you see, service now is playing a role in solving this problem. >> I do because we're a big user of GRC. So we already went down the audit route with service now years ago s Oh, this is just another extension I see of not just audit controls but being more proactive on the security side. And so, since all of our information is in this platform anyhow, we have a ton of opportunity toe automate and manage a lot of the things that again could have potentially gone unnoticed for a period of time simply because a manpower or logs if you ever had a review logs from some of these devices. I mean, trying to find the needle in the haystack is very difficult. So tools are extremely important in this space. Humans cannot meet this challenge alone at all. >> You just make a tad cloud. You wish, right? Awesome. Bart, this is I'LL give you the last word so that your impressions on knowledge sixteen. >> I'm excited, You know, the way it's grown again The way that they're really being purposeful about how they're building out their platform and truly trying to solve the enterprise problems to me is just it shows a very strategic, well thought out plan by service now. And as customers, you know and partners, you know, that's that's what you want to see from a company. So for me, I'm just very pleased where the platforms going. It's exciting how much they've grown. But the way that they've been able to invest in the right things, I feel and truly integrate things into the platform, even acquisitions that they had on and truly make it part of the platform versus and add on, I think, is really differentiating them from a lot of products that have grown in a similar matter but become unwieldy to manage because they're just pieced together. So I'm very, very excited, >> Fantastic. The cube securing knowledge for our audience that Bart, you have full of a lot of knowledge and really appreciate you coming on the Cuban and sharing. >> Yeah, appreciate it. Nice seeing you guys. >> All right, Keep it right there, everybody. We'LL be back with our next guests right after this. We're live knowledge. Sixteen from the Mandalay Bay Hotel in Las Vegas, right back. >> Every once in a while.
SUMMARY :
sixteen brought to you by service. But thank you for having me. track, you know, collaborated on with those folks and getting some sessions in from service now You One of things, he said, which I want to ask you about a former CEO. that that's what you build your credibility up on. So you've gone through a few changes personally, your company. I moved into the corporate CTO roll about Do you subscribe to that, or do you see the CEO role is continuing So regardless of the roller or title that they gave me, I think it's more about what are you managing Whether that's, you know, better business process, outsourcing functions or ability out of our other platform that we want to, you know, retrofit back in. And, you know, again, it's all about trying to make sure that we can come in and we just went live. Are you there? security product that's coming out, which is, you know, something we're looking to get deployed in. So are you mentioned a couple times that York's made a number of acquisitions your company included, how we're going to, you know, fund that transaction. is that there's the CSO report into you are he does. And so and that's ah, new rule that we established about a little security from we'LL focus on you know, defense, defense, defense to one of you I think you know, I think it's a little it is driving Do you believe that the board level? are starting to communicate that all the way up, you know, through our CEO. We Should it be a wider group. So our committee included, you know, you don't even have the specifically answer for your organization. You know, open eyes when you have millions of So you would think you have a better understanding everything most. Hey, how did you guys come up with your security road map on What did that Because Because the value then drives your investment decisions, you know, getting credit rating or those type of components. in thinking about how you communicate to the board Yeah, about cyber security. And it's an easy to say, but it's a very hard thing to do, especially when you have external facing applications. Did you look a tte security and responding to security is part of, So I think that there's a component there where you have to really think about what's And you see service now. a manpower or logs if you ever had a review logs from some of these devices. Bart, this is I'LL give you the last word so that your impressions on knowledge sixteen. And as customers, you know and partners, you know, The cube securing knowledge for our audience that Bart, you have full of Nice seeing you guys. Sixteen from the Mandalay Bay Hotel in Las Vegas, right back.
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
Dave Alon | PERSON | 0.99+ |
Ohio | LOCATION | 0.99+ |
Bart Murphy | PERSON | 0.99+ |
Jeff Rick | PERSON | 0.99+ |
six months | QUANTITY | 0.99+ |
Monday | DATE | 0.99+ |
Yorker Services Group | ORGANIZATION | 0.99+ |
CIA | ORGANIZATION | 0.99+ |
three months | QUANTITY | 0.99+ |
Las Vegas | LOCATION | 0.99+ |
two years | QUANTITY | 0.99+ |
Bart | PERSON | 0.99+ |
One | QUANTITY | 0.99+ |
two carriers | QUANTITY | 0.99+ |
twenty four | QUANTITY | 0.99+ |
both | QUANTITY | 0.99+ |
Cuba | LOCATION | 0.99+ |
Mark | PERSON | 0.99+ |
five years ago | DATE | 0.99+ |
last night | DATE | 0.99+ |
three year | QUANTITY | 0.99+ |
this week | DATE | 0.98+ |
today | DATE | 0.98+ |
GRC | ORGANIZATION | 0.98+ |
Gates | PERSON | 0.98+ |
one component | QUANTITY | 0.98+ |
a year | QUANTITY | 0.98+ |
Wade | PERSON | 0.98+ |
one | QUANTITY | 0.98+ |
Sixteen | QUANTITY | 0.98+ |
Performance Analytics | TITLE | 0.98+ |
York | LOCATION | 0.97+ |
Chris Services Group S O. | ORGANIZATION | 0.97+ |
one platform | QUANTITY | 0.96+ |
three things | QUANTITY | 0.96+ |
sixteen | QUANTITY | 0.96+ |
York Risk Services | ORGANIZATION | 0.95+ |
Silicon Angles | ORGANIZATION | 0.95+ |
single | QUANTITY | 0.94+ |
Teo Large Claims | ORGANIZATION | 0.94+ |
Seo | PERSON | 0.93+ |
year and a half | QUANTITY | 0.93+ |
XO | PERSON | 0.93+ |
Hundred fifty hundred twenty five dollars per | QUANTITY | 0.9+ |
years ago | DATE | 0.9+ |
Geneva | LOCATION | 0.84+ |
Mandalay Bay Hotel | ORGANIZATION | 0.83+ |
York | ORGANIZATION | 0.82+ |
Bill | PERSON | 0.8+ |
millions of claims | QUANTITY | 0.8+ |
Secretary | PERSON | 0.8+ |
less than | DATE | 0.79+ |
millions of bills | QUANTITY | 0.79+ |
a year ago | DATE | 0.78+ |
Khun | PERSON | 0.78+ |
York Risk | ORGANIZATION | 0.77+ |
CEO | PERSON | 0.74+ |
single tech group | QUANTITY | 0.73+ |
past three years | DATE | 0.73+ |
Tien | ORGANIZATION | 0.73+ |
dual | QUANTITY | 0.71+ |
Mohr | PERSON | 0.7+ |
SETI | ORGANIZATION | 0.69+ |
early two thousand eleven | DATE | 0.69+ |
two thousand ten | QUANTITY | 0.67+ |
CTO | ORGANIZATION | 0.64+ |
ServiceNow | ORGANIZATION | 0.63+ |
two | QUANTITY | 0.62+ |
Q three | OTHER | 0.6+ |
top two | QUANTITY | 0.6+ |
knowledge | QUANTITY | 0.6+ |
CTO | PERSON | 0.53+ |
Lee | LOCATION | 0.53+ |
couple | QUANTITY | 0.5+ |
Cuban | OTHER | 0.46+ |
Asians | PERSON | 0.39+ |
C | PERSON | 0.35+ |
SiliconANGLE Report: Reporters Notebook with Adrian Cockcroft | AWS re:Invent 2022
(soft techno upbeat music) >> Hi there. Welcome back to Las Vegas. This is Dave Villante with Paul Gillon. Reinvent day one and a half. We started last night, Monday, theCUBE after dark. Now we're going wall to wall. Today. Today was of course the big keynote, Adam Selipsky, kind of the baton now handing, you know, last year when he did his keynote, he was very new. He was sort of still getting his feet wet and finding his guru swing. Settling in a little bit more this year, learning a lot more, getting deeper into the tech, but of course, sharing the love with other leaders like Peter DeSantis. Tomorrow's going to be Swamy in the keynote. Adrian Cockcroft is here. Former AWS, former network Netflix CTO, currently an analyst. You got your own firm now. You're out there. Great to see you again. Thanks for coming on theCUBE. >> Yeah, thanks. >> We heard you on at Super Cloud, you gave some really good insights there back in August. So now as an outsider, you come in obviously, you got to be impressed with the size and the ecosystem and the energy. Of course. What were your thoughts on, you know what you've seen so far, today's keynotes, last night Peter DeSantis, what stood out to you? >> Yeah, I think it's great to be back at Reinvent again. We're kind of pretty much back to where we were before the pandemic sort of shut it down. This is a little, it's almost as big as the, the largest one that we had before. And everyone's turned up. It just feels like we're back. So that's really good to see. And it's a slightly different style. I think there were was more sort of video production things happening. I think in this keynote, more storytelling. I'm not sure it really all stitched together very well. Right. Some of the stories like, how does that follow that? So there were a few things there and some of there were spelling mistakes on the slides, you know that ELT instead of ETL and they spelled ZFS wrong and something. So it just seemed like there was, I'm not quite sure just maybe a few things were sort of rushed at the last minute. >> Not really AWS like, was it? It's kind of remind the Patriots Paul, you know Bill Belichick's teams are fumbling all over the place. >> That's right. That's right. >> Part of it may be, I mean the sort of the market. They have a leader in marketing right now but they're going to have a CMO. So that's sort of maybe as lack of a single threaded leader for this thing. Everything's being shared around a bit more. So maybe, I mean, it's all fixable and it's mine. This is minor stuff. I'm just sort of looking at it and going there's a few things that looked like they were not quite as good as they could have been in the way it was put together. Right? >> But I mean, you're taking a, you know a year of not doing Reinvent. Yeah. Being isolated. You know, we've certainly seen it with theCUBE. It's like, okay, it's not like riding a bike. You know, things that, you know you got to kind of relearn the muscle memories. It's more like golf than is bicycle riding. >> Well I've done AWS keynotes myself. And they are pretty much scrambled. It looks nice, but there's a lot of scrambling leading up to when it actually goes. Right? And sometimes you can, you sometimes see a little kind of the edges of that, and sometimes it's much more polished. But you know, overall it's pretty good. I think Peter DeSantis keynote yesterday was a lot of really good meat there. There was some nice presentations, and some great announcements there. And today I was, I thought I was a little disappointed with some of the, I thought they could have been more. I think the way Andy Jesse did it, he crammed more announcements into his keynote, and Adam seems to be taking sort of a bit more of a measured approach. There were a few things he picked up on and then I'm expecting more to be spread throughout the rest of the day. >> This was more poetic. Right? He took the universe as the analogy for data, the ocean for security. Right? The Antarctic was sort of. >> Yeah. It looked pretty, >> yeah. >> But I'm not sure that was like, we're not here really to watch nature videos >> As analysts and journalists, You're like, come on. >> Yeah, >> Give it the meat >> That was kind the thing, yeah, >> It has always been the AWS has always been Reinvent has always been a shock at our approach. 100, 150 announcements. And they're really, that kind of pressure seems to be off them now. Their position at the top of the market seems to be unshakeable. There's no clear competition that's creeping up behind them. So how does that affect the messaging you think that AWS brings to market when it doesn't really have to prove that it's a leader anymore? It can go after maybe more of the niche markets or fix the stuff that's a little broken more fine tuning than grandiose statements. >> I think so AWS for a long time was so far out that they basically said, "We don't think about the competition, we are listen to the customers." And that was always the statement that works as long as you're always in the lead, right? Because you are introducing the new idea to the customer. Nobody else got there first. So that was the case. But in a few areas they aren't leading. Right? You could argue in machine learning, not necessarily leading in sustainability. They're not leading and they don't want to talk about some of these areas and-- >> Database. I mean arguably, >> They're pretty strong there, but the areas when you are behind, it's like they kind of know how to play offense. But when you're playing defense, it's a different set of game. You're playing a different game and it's hard to be good at both. I think and I'm not sure that they're really used to following somebody into a market and making a success of that. So there's something, it's a little harder. Do you see what I mean? >> I get opinion on this. So when I say database, David Foyer was two years ago, predicted AWS is going to have to converge somehow. They have no choice. And they sort of touched on that today, right? Eliminating ETL, that's one thing. But Aurora to Redshift. >> Yeah. >> You know, end to end. I'm not sure it's totally, they're fully end to end >> That's a really good, that is an excellent piece of work, because there's a lot of work that it eliminates. There's are clear pain points, but then you've got sort of the competing thing, is like the MongoDB and it's like, it's just a way with one database keeps it simple. >> Snowflake, >> Or you've got on Snowflake maybe you've got all these 20 different things you're trying to integrate at AWS, but it's kind of like you have a bag of Lego bricks. It's my favorite analogy, right? You want a toy for Christmas, you want a toy formula one racing car since that seems to be the theme, right? >> Okay. Do you want the fully built model that you can play with right now? Or do you want the Lego version that you have to spend three days building. Right? And AWS is the Lego technique thing. You have to spend some time building it, but once you've built it, you can evolve it, and you'll still be playing those are still good bricks years later. Whereas that prebuilt to probably broken gathering dust, right? So there's something about having an vulnerable architecture which is harder to get into, but more durable in the long term. And so AWS tends to play the long game in many ways. And that's one of the elements that they do that and that's good, but it makes it hard to consume for enterprise buyers that are used to getting it with a bow on top. And here's the solution. You know? >> And Paul, that was always Andy Chassy's answer to when we would ask him, you know, all these primitives you're going to make it simpler. You see the primitives give us the advantage to turn on a dime in the marketplace. And that's true. >> Yeah. So you're saying, you know, you take all these things together and you wrap it up, and you put a snowflake on top, and now you've got a simple thing or a Mongo or Mongo atlas or whatever. So you've got these layered platforms now which are making it simpler to consume, but now you're kind of, you know, you're all stuck in that ecosystem, you know, so it's like what layer of abstractions do you want to tie yourself to, right? >> The data bricks coming at it from more of an open source approach. But it's similar. >> We're seeing Amazon direct more into vertical markets. They spotlighted what Goldman Sachs is doing on their platform. They've got a variety of platforms that are supposedly targeted custom built for vertical markets. How do successful do you see that play being? Is this something that the customers you think are looking for, a fully integrated Amazon solution? >> I think so. There's usually if you look at, you know the MongoDB or data stacks, or the other sort of or elastic, you know, they've got the specific solution with the people that really are developing the core technology, there's open source equivalent version. The AWS is running, and it's usually maybe they've got a price advantage or it's, you know there's some data integration in there or it's somehow easier to integrate but it's not stopping those companies from growing. And what it's doing is it's endorsing that platform. So if you look at the collection of databases that have been around over the last few years, now you've got basically Elastic Mongo and Cassandra, you know the data stacks as being endorsed by the cloud vendors. These are winners. They're going to be around for a very long time. You can build yourself on that architecture. But what happened to Couch base and you know, a few of the other ones, you know, they don't really fit. Like how you going to bait? If you are now becoming an also ran, because you didn't get cloned by the cloud vendor. So the customers are going is that a safe place to be, right? >> But isn't it, don't they want to encourage those partners though in the name of building the marketplace ecosystem? >> Yeah. >> This is huge. >> But certainly the platform, yeah, the platform encourages people to do more. And there's always room around the edge. But the mainstream customers like that really like spending the good money, are looking for something that's got a long term life to it. Right? They're looking for a long commitment to that technology and that it's going to be invested in and grow. And the fact that the cloud providers are adopting and particularly AWS is adopting some of these technologies means that is a very long term commitment. You can base, you know, you can bet your future architecture on that for a decade probably. >> So they have to pick winners. >> Yeah. So it's sort of picking winners. And then if you're the open source company that's now got AWS turning up, you have to then leverage it and use that as a way to grow the market. And I think Mongo have done an excellent job of that. I mean, they're top level sponsors of Reinvent, and they're out there messaging that and doing a good job of showing people how to layer on top of AWS and make it a win-win both sides. >> So ever since we've been in the business, you hear the narrative hardware's going to die. It's just, you know, it's commodity and there's some truth to that. But hardware's actually driving good gross margins for the Cisco's of the world. Storage companies have always made good margins. Servers maybe not so much, 'cause Intel sucked all the margin out of it. But let's face it, AWS makes most of its money. We know on compute, it's got 25 plus percent operating margins depending on the seasonality there. What do you think happens long term to the infrastructure layer discussion? Okay, commodity cloud, you know, we talk about super cloud. Do you think that AWS, and the other cloud vendors that infrastructure, IS gets commoditized and they have to go up market or you see that continuing I mean history would say that still good margins in hardware. What are your thoughts on that? >> It's not commoditizing, it's becoming more specific. We've got all these accelerators and custom chips now, and this is something, this almost goes back. I mean, I was with some micro systems 20,30 years ago and we developed our own chips and HP developed their own chips and SGI mips, right? We were like, the architectures were all squabbling of who had the best processor chips and it took years to get chips that worked. Now if you make a chip and it doesn't work immediately, you screwed up somewhere right? It's become the technology of building these immensely complicated powerful chips that has become commoditized. So the cost of building a custom chip, is now getting to the point where Apple and Amazon, your Apple laptop has got full custom chips your phone, your iPhone, whatever and you're getting Google making custom chips and we've got Nvidia now getting into CPUs as well as GPUs. So we're seeing that the ability to build a custom chip, is becoming something that everyone is leveraging. And the cost of doing that is coming down to startups are doing it. So we're going to see many, many more, much more innovation I think, and this is like Intel and AMD are, you know they've got the compatibility legacy, but of the most powerful, most interesting new things I think are going to be custom. And we're seeing that with Graviton three particular in the three E that was announced last night with like 30, 40% whatever it was, more performance for HPC workloads. And that's, you know, the HPC market is going to have to deal with cloud. I mean they are starting to, and I was at Supercomputing a few weeks ago and they are tiptoeing around the edge of cloud, but those supercomputers are water cold. They are monsters. I mean you go around supercomputing, there are plumbing vendors on the booth. >> Of course. Yeah. >> Right? And they're highly concentrated systems, and that's really the only difference, is like, is it water cooler or echo? The rest of the technology stack is pretty much off the shelf stuff with a few tweets software. >> You point about, you know, the chips and what AWS is doing. The Annapurna acquisition. >> Yeah. >> They're on a dramatically different curve now. I think it comes down to, again, David Floyd's premise, really comes down to volume. The arm wafer volumes are 10 x those of X 86, volume always wins. And the economics of semis. >> That kind of got us there. But now there's also a risk five coming along if you, in terms of licensing is becoming one of the bottlenecks. Like if the cost of building a chip is really low, then it comes down to licensing costs and do you want to pay the arm license And the risk five is an open source chip set which some people are starting to use for things. So your dis controller may have a risk five in it, for example, nowadays, those kinds of things. So I think that's kind of the the dynamic that's playing out. There's a lot of innovation in hardware to come in the next few years. There's a thing called CXL compute express link which is going to be really interesting. I think that's probably two years out, before we start seeing it for real. But it lets you put glue together entire rack in a very flexible way. So just, and that's the entire industry coming together around a single standard, the whole industry except for Amazon, in fact just about. >> Well, but maybe I think eventually they'll get there. Don't use system on a chip CXL. >> I have no idea whether I have no knowledge about whether going to do anything CXL. >> Presuming I'm not trying to tap anything confidential. It just makes sense that they would do a system on chip. It makes sense that they would do something like CXL. Why not adopt the standard, if it's going to be as the cost. >> Yeah. And so that was one of the things out of zip computing. The other thing is the low latency networking with the elastic fabric adapter EFA and the extensions to that that were announced last night. They doubled the throughput. So you get twice the capacity on the nitro chip. And then the other thing was this, this is a bit technical, but this scalable datagram protocol that they've got which basically says, if I want to send a message, a packet from one machine to another machine, instead of sending it over one wire, I consider it over 16 wires in parallel. And I will just flood the network with all the packets and they can arrive in any order. This is why it isn't done normally. TCP is in order, the packets come in order they're supposed to, but this is fully flooding them around with its own fast retry and then they get reassembled at the other end. So they're not just using this now for HPC workloads. They've turned it on for TCP for just without any change to your application. If you are trying to move a large piece of data between two machines, and you're just pushing it down a network, a single connection, it takes it from five gigabits per second to 25 gigabits per second. A five x speed up, with a protocol tweak that's run by the Nitro, this is super interesting. >> Probably want to get all that AIML that stuff is going on. >> Well, the AIML stuff is leveraging it underneath, but this is for everybody. Like you're just copying data around, right? And you're limited, "Hey this is going to get there five times faster, pushing a big enough chunk of data around." So this is turning on gradually as the nitro five comes out, and you have to enable it at the instance level. But it's a super interesting announcement from last night. >> So the bottom line bumper sticker on commoditization is what? >> I don't think so. I mean what's the APIs? Your arm compatible, your Intel X 86 compatible or your maybe risk five one day compatible in the cloud. And those are the APIs, right? That's the commodity level. And the software is now, the software ecosystem is super portable across those as we're seeing with Apple moving from Intel to it's really not an issue, right? The software and the tooling is all there to do that. But underneath that, we're going to see an arms race between the top providers as they all try and develop faster chips for doing more specific things. We've got cranium for training, that instance has they announced it last year with 800 gigabits going out of a single instance, 800 gigabits or no, but this year they doubled it. Yeah. So 1.6 terabytes out of a single machine, right? That's insane, right? But what you're doing is you're putting together hundreds or thousands of those to solve the big machine learning training problems. These super, these enormous clusters that they're being formed for doing these massive problems. And there is a market now, for these incredibly large supercomputer clusters built for doing AI. That's all bandwidth limited. >> And you think about the timeframe from design to tape out. >> Yeah. >> Is just getting compressed It's relative. >> It is. >> Six is going the other way >> The tooling is all there. Yeah. >> Fantastic. Adrian, always a pleasure to have you on. Thanks so much. >> Yeah. >> Really appreciate it. >> Yeah, thank you. >> Thank you Paul. >> Cheers. All right. Keep it right there everybody. Don't forget, go to thecube.net, you'll see all these videos. Go to siliconangle.com, We've got features with Adam Selipsky, we got my breaking analysis, we have another feature with MongoDB's, Dev Ittycheria, Ali Ghodsi, as well Frank Sluman tomorrow. So check that out. Keep it right there. You're watching theCUBE, the leader in enterprise and emerging tech, right back. (soft techno upbeat music)
SUMMARY :
Great to see you again. and the ecosystem and the energy. Some of the stories like, It's kind of remind the That's right. I mean the sort of the market. the muscle memories. kind of the edges of that, the analogy for data, As analysts and journalists, So how does that affect the messaging always in the lead, right? I mean arguably, and it's hard to be good at both. But Aurora to Redshift. You know, end to end. of the competing thing, but it's kind of like you And AWS is the Lego technique thing. to when we would ask him, you know, and you put a snowflake on top, from more of an open source approach. the customers you think a few of the other ones, you know, and that it's going to and doing a good job of showing people and the other cloud vendors the HPC market is going to Yeah. and that's really the only difference, the chips and what AWS is doing. And the economics of semis. So just, and that's the entire industry Well, but maybe I think I have no idea whether if it's going to be as the cost. and the extensions to that AIML that stuff is going on. and you have to enable And the software is now, And you think about the timeframe Is just getting compressed Yeah. Adrian, always a pleasure to have you on. the leader in enterprise
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
Adam Selipsky | PERSON | 0.99+ |
David Floyd | PERSON | 0.99+ |
Peter DeSantis | PERSON | 0.99+ |
Paul | PERSON | 0.99+ |
Ali Ghodsi | PERSON | 0.99+ |
Adrian Cockcroft | PERSON | 0.99+ |
AWS | ORGANIZATION | 0.99+ |
Frank Sluman | PERSON | 0.99+ |
Paul Gillon | PERSON | 0.99+ |
Amazon | ORGANIZATION | 0.99+ |
Apple | ORGANIZATION | 0.99+ |
Andy Chassy | PERSON | 0.99+ |
Las Vegas | LOCATION | 0.99+ |
Adam | PERSON | 0.99+ |
Dev Ittycheria | PERSON | 0.99+ |
Andy Jesse | PERSON | 0.99+ |
Dave Villante | PERSON | 0.99+ |
August | DATE | 0.99+ |
two machines | QUANTITY | 0.99+ |
Bill Belichick | PERSON | 0.99+ |
10 | QUANTITY | 0.99+ |
Cisco | ORGANIZATION | 0.99+ |
today | DATE | 0.99+ |
last year | DATE | 0.99+ |
1.6 terabytes | QUANTITY | 0.99+ |
AMD | ORGANIZATION | 0.99+ |
Goldman Sachs | ORGANIZATION | 0.99+ |
hundreds | QUANTITY | 0.99+ |
one machine | QUANTITY | 0.99+ |
three days | QUANTITY | 0.99+ |
Adrian | PERSON | 0.99+ |
800 gigabits | QUANTITY | 0.99+ |
Today | DATE | 0.99+ |
iPhone | COMMERCIAL_ITEM | 0.99+ |
David Foyer | PERSON | 0.99+ |
two years | QUANTITY | 0.99+ |
ORGANIZATION | 0.99+ | |
yesterday | DATE | 0.99+ |
this year | DATE | 0.99+ |
Snowflake | TITLE | 0.99+ |
Nvidia | ORGANIZATION | 0.99+ |
five times | QUANTITY | 0.99+ |
one | QUANTITY | 0.99+ |
Netflix | ORGANIZATION | 0.99+ |
thecube.net | OTHER | 0.99+ |
Intel | ORGANIZATION | 0.99+ |
five | QUANTITY | 0.99+ |
both sides | QUANTITY | 0.99+ |
Mongo | ORGANIZATION | 0.99+ |
Christmas | EVENT | 0.99+ |
last night | DATE | 0.99+ |
HP | ORGANIZATION | 0.98+ |
25 plus percent | QUANTITY | 0.98+ |
thousands | QUANTITY | 0.98+ |
20,30 years ago | DATE | 0.98+ |
pandemic | EVENT | 0.98+ |
both | QUANTITY | 0.98+ |
two years ago | DATE | 0.98+ |
twice | QUANTITY | 0.98+ |
tomorrow | DATE | 0.98+ |
X 86 | COMMERCIAL_ITEM | 0.98+ |
Antarctic | LOCATION | 0.98+ |
Patriots | ORGANIZATION | 0.98+ |
siliconangle.com | OTHER | 0.97+ |
Satish Puranam & Rebecca Riss, Ford | KubeCon + CloudNativeCon NA 2022
(bright music) (crowd talking indistinctly in the background) >> Hey guys, welcome back to Detroit, Michigan. theCUBE is live at KubeCon + CloudNativeCon 2022. You might notice something really unique here. Lisa Martin with our newest co-host of theCUBE, Savannah Peterson! Savannah, it's great to see you. >> It's so good to be here with you (laughs). >> I know, I know. We have a great segment coming up. I always love talking couple things, cars, one, two, with companies that have been around for a hundred plus years and how they've actually transformed. >> Oh yeah. >> Ford is here. You have a great story about how you, about Ford. >> Ford brought me to Detroit the first time. I was here at the North American International Auto Show. Some of you may be familiar, and the fine folks from Ford brought me out to commentate just like this, as they were announcing the Ford Bronco. >> Satish: Oh wow. >> Which I am still lusting after. >> You don't have one yet? >> For the record. No, I don't. My next car's got to be an EV. Although, ironically, there's a Ford EV right behind us here on set today. >> I know, I know. >> Which we were both just contemplating before we went live. >> It's really shiny. >> We're going to have to go check it out. >> I have to check it out. Yep, we'll do that. Yeah. Well, please welcome our two guests from Ford, Satish Puranam, is here, The Technical Leader at Cloud and Rebecca Risk, Principal Architect, developer relations. We are so excited to have you guys on the program. >> Clearly. >> Thanks for joining us. (all laugh) >> Thank you for having us. >> I love you're Ford enthusiasts! Yeah, that's awesome. >> I drive a Ford. >> Oh, awesome! Thank you. >> I can only say that's one car company here. >> That's great. >> Yes, yes. >> Great! Thank you a lot. >> Thank you for your business! >> Absolutely. (all laugh) >> So, Satish, talk to us a little bit about- I mean I think of Cloud as a car company but it seems like it's a technology company that makes cars. >> Yes. Talk to us about Ford as a Cloud first, technology driven company, and then we're going to talk about what you're doing with Red Hat and Boston University. >> Yeah, I'm like everything that all these cars that you're seeing, beautiful right behind us it's all built on, around, and with technology, right? So there's so much code goes into these cars these days, it's probably, it's mind boggling to think that probably your iPhones might be having less code as opposed to these cars. Everything from control systems, everything is code. We don't do any more clay models. Everything is done digital, 3D, virtual reality and all that stuff. So all that takes code, all of that takes technology. And we have been in that journey for the last- since 2016 when we started our first mobile app and all that stuff. And of late we have been like, heavily invested in Google. Moving a lot of these experiences, data acquisition systems AI/ML modeling for like all the autonomous cars. It's all technology and like from the day it is conceived, to the day it is marketed, to the day when you show up for a servicing, and hopefully soon how you can buy and you know, provide feedback to us, is all technology that drives all of this stuff. So it's amazing for us to see everything that we go and immerse ourselves in the technology. There is a real life thing that we can see what we all do for it, right? So- >> Yes, we're only sorry that our audience can't actually see the car, >> Yep. >> but we'll get some B-roll for you later on. Rebecca, talk a little bit about your role. Here we are at KubeCon, Savannah and I and John were talking when we went live this morning, that this is huge. That the show floor is massive, a lot bigger than last year. The collaboration and the spirit of the community is not only alive and well, as we heard in the keynote this morning, it's thriving. >> Yeah. >> Talk about developer relations at Ford and what you are helping to drive in your role. >> Yeah, so my team is all about helping developers work faster with different platforms that my team curates and produces, so that our developers don't have to deal with all of the details of setting up their environments to actually code. And we have really great people, kind of the top software developers in the company, are part of my team to produce those products that other people can use, and accelerate their development. And we have a great relationship with the developers in the company and outside with the different vendor relationships that we have, to make sure that we're always producing the next platform with the next tech stack that our developers will want to continue to use to produce the really great products that we are all about making at Ford. >> Let's dig in there a little bit because I'm curious and I suspect you both had something to do with it. How did you approach your Cloud Native transformation and how do you evaluate new technologies for the team? >> It's sometimes- many a times I would say it's like dogfooding and like experimentation. >> Yeah. Isn't anything in innovation a lot of- >> Yeah, a lot of experimentation. We started our, as I said, the Cloud Native journey back in 2016 with Cloud Foundry and things, technologies around that. Soon realized, that there was like a lot of buzz around that time. Twelve-Factor was a thing, Stateless was a thing. And then all those Stateful needs to drive the Stateless. So where do we do that thing? And the next logical iteration was Kubernetes was bursting upon the scene at that time. So we started doing a lot of experimentation. >> Like the Kool-Aid man, burst on the Kubernetes scene- >> Exactly right. >> Through the wall. >> So, the question is like, why can't we do? I think we were like crazy enough to say that Kubernetes people are talking about our serverless or Twelve-Factor on Kubernetes. We are crazy enough to do Stateful on Kubernetes and we've been doing it successfully for five years. So it's a lot about experimentation. I think good chunk of experiments that we do do not yield the results that we get, but many a times, some of them are like Gangbusters. Like, other aspects that we've been doing of late is like partnering with Becky and rest of the organization, right? Because they are the people who are like closest to the developers. We are somewhat behind the scenes doing some things but it is Becky and the rest of the architecture teams who are actually front and center with the customers, right? So it is the collaborative effort that we've been working through past few years that has been really really been useful and coming around and helping us to make some of these products really beautiful. >> Yeah, well you make a lot of beautiful products. I think we've all, I think we've all seen them. Something that I think is really interesting and part of why I was so excited for this interview, and kind of nudged John out, was because you've been- Ford has been investing in technology in a committed way for decades and I don't think most people are aware of that. When I originally came out to Dearborn, I learned that you've had a head of VR who happens to be a female. For what it's worth, Elizabeth, who's been running VR for you for two and a half decades, for 25 years. >> Satish: Yep. >> That is an impressive commitment. What is that like from a culture perspective inside of Ford? What is the attitude around innovation and technology? >> So I've been a long time Ford employee. I just celebrated my 29th year. >> Oh, wow! >> Congratulations! >> Wow, congrats! That's a huge deal. >> Yeah, it's a huge deal. I'm so proud of my career and all that Ford has brought to me and it's just a testament. I have many colleagues like me who've been there for their whole career or have done other things and come to Ford and then spent another 20 years with us because we foster the culture that makes you want to stay. We have development programs to allow you to upscale and change your role and learn new things and play with the new technologies that people are interested in doing and really make an impact to our community of developers at Ford or the company itself and the results that we're delivering. So to have that, you know, culture for so many years that people really love to work. They love to work with the people that they're working with. They love to stay engaged and they love the fact that you can have many different careers within the same umbrella, which we call the "blue oval". And that's really why I've been there for so long. I think I probably had 13 very unique and different jobs along the way. It's as if I left, and you know shopped around my skills elsewhere. But I didn't ever have to leave the company. It's been fabulous. >> The cultural change and adoption of- embracing modern technology- Cloud Native automotive software is impressive because a lot of historied companies, you guys have been there a long time, have challenges with that because it's really hard to get an entire moving, you'll call it the blue oval, to change and adapt- >> Savannah: I love that. >> and be willing to experiment. So that that is impressive. Talk about, you go by Becky, so I'll call you Becky, >> Rebecca/Becky: Yeah. >> The developer culture in terms of the developers really being the center of the nucleus of influencing the direction in which the company's going. I imagine that they probably are fairly influential. >> Yeah, so I had a very- one of the unique positions I held was a culture change for our department, Information Technology in 2016. >> Satish: Yeah. >> As the teacher was involved with moving us to the cloud, I was responsible- >> You are the transformation team! This is beautiful. I love this. We've got the right people on the show. >> Yeah, we do. >> I was responsible for changing the culture to orient our employees to pay attention to what do we want to create for tomorrow? What are the kind of skills we need to trust each other to move quickly. And that was completely unique. >> Satish: Yeah. >> Like I had men in the trenches delivering software before that, and then plucked out because they wanted someone, you know who had authentic experience with our development team to be that voice. And it was such a great investment that Ford continues to do is invest in our culture transformation. Because with each step forward that we do, we have to refine what our priorities are. And you do that through culture transformation and culture management. And that's been, I think really, the key to our successful pivots that we've made over the last six years that we've been able to continue to refine and hone where we really want to go through that culture movement. >> Absolutely. I think if I could add another- >> Please. >> spotlight to it is like the biggest thing about Ford has been among various startup-like culture, right? So the idea is that we encourage people to think outside the box, right? >> Savannah: Or outside the oval? >> Right! (laughs) >> Lisa: Outside the oval, yes! >> Absolutely! Right. >> So the question is like, you can experiment with various things, new technologies and you will get all the leadership support to go along with it. I think that is very important too and like we can be in the trenches and talk about all of these nice little things but who the heck would've thought that, you know Kubernetes was announced in 2015, in late 2016, we have early dev Kubernetes clusters already running. 2017, we are live with workloads on Kubernetes! >> Savannah: Early adopters over here. >> Yeah. >> Yeah. >> I'm like all of this thing doesn't happen without lot of foresight and support from the leadership, but it's also the grassroot efforts that is encouraged all along to be on the front end of all of these things and try different things. Some of them may not work >> Savannah: Right. >> But that's okay. But how do we know we are doing something, if you're not failing? We have to fail in order to do something, right? >> Lisa: I always say- >> So I think that's been a great thing that is encouraged very often and otherwise I would not be doing, I've done a whole bunch of stuff at Ford. Without that kind of ability to support and have an appetite for, some of those things would not have been here at all. >> I always say failure is not a bad F-word. >> Satish: Yep. >> Savannah: I love that. >> But what you're talking about there is kind of like driving this hot wheel of experimentation. You have to have the right culture and the mindset- >> Satish: Absolutely. >> to do that. Try fail, move on, learn, iterate, go. >> Satish: Correct. >> You guys have a great partnership with Red Hat and Boston University. You're speaking about that later today. >> Satish: Yes. >> Unpack that for us. What, from a technical perspective, what are you doing and what's it resulting in? >> Yeah, I think the biggest thing is Becky was talking about as during this transformation journey, is lot has changed in very small amount of time. So we traditionally been like, "Hey, here's a spreadsheet of things I need you to deliver for me" to "Here is a catalog of things, you can get it today and be successful with it". That is frightening to several of our developers. The goal, one of the things that we've been working with Q By Example, Red Hat and all the thing, is that how can we lower the bar for the developers, right? Kubernetes is great. It's also a wall of YAML. >> It's extremely complex, number one complaint. >> The question is how can I zero on? I'm like, if we go back think like when we talk about in cars with human-machine interfaces, which parts do I need to know? Here's the steering wheel, here's the gas pedal, or here's the brake. As long as you know these two, three different things you should be fairly be okay to drive those things, right? So the idea of some of the things with enablementing we are trying to do is like reduce that barrier, right? Reduce- lower the bar so that more people can participate in it. >> One of the ways that you did that was Q By Example, right, QBE? >> Satish: Yes, Yes. >> Can you tell us a little bit more about that as you finish this answer? >> Yeah, I think the biggest thing with Q By Example is like Q By Example gives you the small bite-sized things about Kubernetes, right? >> Savannah: Great place to start. >> But what we wanted to do is that we wanted to reinforce that learning by turning into a real world living example app. We took part info, we said, Hey, what does it look like? How do I make sure that it is highly available? How do I make sure that it is secure? Here is an example YAML of it that you can literally verbatim copy and paste into your editor and click run and then you will get an instant gratification feedback loop >> I was going to say, yeah, they feel like you're learning too! >> Yes. Right. So the idea would be is like, and then instead of giving you just a boring prose text to read, we actually drop links to relevant blog posts saying that, hey you can just go there. And that has been inspirational in terms of like and reinforcing the learning. So that has been where we started working with the Boston University, Red Hat and the community around all of that stuff. >> Talk a little bit about, Becky, about some of the business outcomes. You mentioned things like upskilling the workforce which is really nice to hear that there's such a big focus on it. But I imagine too, there's more participation in the community, but also from an end customer perspective. Obviously, everything Ford's doing is to serve the end customers >> Becky: Right. How does this help the end customer have that experience that they really, these days, demand with patience being something that, I think, is gone because of the pandemic? >> Right? Right. So one of the things that my team does is we create the platforms that help Accelerate developers be successful and it helps educate them more quickly on appropriate use of the platforms and helps them by adopting the platforms to be more secure which inherently lead to the better results for our end customers because their data is secure because the products that they have are well created and they're tested thoroughly. So we catch all those things earlier in the cycle by using these platforms that we help curate and produce. And that's really important because, like you had mentioned, this steep learning curve associated with Kubernetes, right? >> Savannah: Yeah. >> So my team is able to kind of help with that abstraction so that we solve kind of the higher complex problems for them so that developers can move faster and then we focus our education on what's important for them. We use things like Q By Example, as a source instead of creating that content ourselves, right? We are able to point them to that. So it's great that there's that community and we're definitely involved with that. But that's so important to help our developers be successful in moving as quickly as they want and not having 20,000 people solve the same problems. >> Satish: (chuckles) Yeah. >> Each individually- >> Savannah: you don't need to! >> and sometimes differently. >> Savannah: We're stronger together, you know? >> Exactly. >> The water level rises together and Ford is definitely a company that illustrates that by example. >> Yeah, I'm like, we can't make a better round wheel right? >> Yeah! So, we have to build upon what we have already been built ahead of us. And I think a lot of it is also about how can we give back and participate in the community, right? So I think that is paramount for us as like, here we are in Detroit so we're trying to recruit and show people that you know, everything that we do is not just old car and sheet metal >> Savannah: Combustion. >> and everything and right? There's a lot of tech goes and sometimes it is really, really cool to do that. And biggest thing for us is like how can we involve our community of developers sooner, earlier, faster without actually encumbering them and saying that, hey here is a book, go master it. We'll talk two months later. So I think that has been another journey. I think that has been a biggest uphill challenge for us is that how can we actually democratize all of these things for everybody. >> Yeah. Well no one better to try than you I would suspect. >> We can only try and hope everything turns out well, right? >> You know, as long as there's room for the bumpers on the lane for if you fail. >> Exactly. >> It sounds like you're driving the program in the right direction. Closing question for you, what's next? Is electric the future? Is Kubernetes the future? What's Ford all in on right now, looking forward? (crowd murmuring in the background) >> Data is the king, right? >> Savannah: Oh, okay, yes! >> Data is a new currency. We use that for several things to improve the cars improve the quality of autonomous driving Is Level 5 driving here? Maybe will be here soon, we'll see. But we are all working towards it, right? So machine learning, AI feedback. How do you actually post sale experience for example? So all of these are all areas that we are working to. We are, may not be getting like Kubernetes in a car but we are putting Kubernetes in plants. Like you order a Marquis or you order a Bronco, you see that here. Here's where in the assembly line your car is. It's taking pictures. It's actually taking pictures on Kubernetes platform. >> That's pretty cool. >> And it is tweeting for you on the Twitter and the social media platform. So there's a lot of that. So it is real and we are doing it. We need more help. A lot of the community efforts that we are seeing and a lot of the innovation that is happening on the floor here, it's phenomenal. The question is how we can incorporate those things into our workflows. >> Yeah, well you have the right audience for that here. You also have the right attitude, >> Exactly. >> the right appetite, and the right foundation. Becky, last question for you. Top three takeaways from your talk today. If you're talking to the developer community you want to inspire: Come work for us! What would you say? >> If you're ready to invest in yourself and upskill and be part of something that is pretty remarkable, come work for us! We have many, many different technical career paths that you can follow. We invest in our employees. When you master something, it's time for you to move on. We have career growth for you. It's been a wonderful gift to me and my family and I encourage everyone to check us out careers.ford.com or stop by our booth if you're happen to be here in person. >> Satish: Absolutely! >> We have our curated job openings that are specific for this community, available. >> Satish: Absolutely. >> Love it. Perfect close. Nailed pitch there. I'm sure you're all going to check out their job page. (all laugh) >> Exactly! And what you talked about, the developer experience, the customer experience are inextricably linked and you guys are really focused on that. Congratulations on all the work that you've done. We got to go get a selfie with that car girl. >> Yes, we do. >> Absolutely. >> We got to show them, we got to show the audience what it looks like on the inside too. We'll do a little IG video. (Lisa laughs) >> Absolutely. >> We will show you that for our guests and my cohost, Savannah Peterson. Lisa Martin here live in Detroit with theCUBE at KubeCon and CloudNativeCon 2022. The one and only John Furrier, who you know gets FOMO, is going to be back with me next. So stick around. (all laugh) (bright music)
SUMMARY :
it's great to see you. It's so good to be We have a great segment coming up. You have a great story Some of you may be For the record. Which we were both just I have to check it out. Thanks for joining us. I love you're Ford Thank you. I can only say that's Thank you a lot. (all laugh) So, Satish, talk to Talk to us about Ford as a Cloud first, to the day when you show of the community is not and what you are helping don't have to deal with all of the details something to do with it. a times I would say it's in innovation a lot of- a lot of buzz around that time. So it is the collaborative Something that I think is What is the attitude around So I've been a long time Ford employee. That's a huge deal. So to have that, you know, culture So that that is impressive. of influencing the direction one of the unique positions You are the transformation What are the kind of skills we need that Ford continues to do is I think Absolutely! So the question is that is encouraged all along to be on the We have to fail in order Without that kind of ability to support I always say failure and the mindset- to do that. You're speaking about that later today. what are you doing and and all the thing, is that It's extremely complex, So the idea of some of the things it that you can literally and the community around in the community, but also from is gone because of the pandemic? So one of the things so that we solve kind of a company that illustrates and show people that really cool to do that. try than you I would suspect. for the bumpers on the in the right direction. areas that we are working to. and a lot of the innovation You also have the right attitude, and the right foundation. that you can follow. that are specific for to check out their job page. and you guys are really focused on that. We got to show them, we is going to be back with me next.
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
Elizabeth | PERSON | 0.99+ |
Rebecca | PERSON | 0.99+ |
2016 | DATE | 0.99+ |
Satish | PERSON | 0.99+ |
Lisa Martin | PERSON | 0.99+ |
Becky | PERSON | 0.99+ |
13 | QUANTITY | 0.99+ |
Ford | ORGANIZATION | 0.99+ |
Lisa | PERSON | 0.99+ |
Savannah Peterson | PERSON | 0.99+ |
Red Hat | ORGANIZATION | 0.99+ |
Savannah | PERSON | 0.99+ |
2015 | DATE | 0.99+ |
Detroit | LOCATION | 0.99+ |
John Furrier | PERSON | 0.99+ |
Rebecca Risk | PERSON | 0.99+ |
John | PERSON | 0.99+ |
Satish Puranam | PERSON | 0.99+ |
Rebecca Riss | PERSON | 0.99+ |
Boston University | ORGANIZATION | 0.99+ |
25 years | QUANTITY | 0.99+ |
five years | QUANTITY | 0.99+ |
2017 | DATE | 0.99+ |
two guests | QUANTITY | 0.99+ |
iPhones | COMMERCIAL_ITEM | 0.99+ |
careers.ford.com | OTHER | 0.99+ |
last year | DATE | 0.99+ |
29th year | QUANTITY | 0.99+ |
20,000 people | QUANTITY | 0.99+ |
KubeCon | EVENT | 0.99+ |
Detroit, Michigan | LOCATION | 0.99+ |
two | QUANTITY | 0.99+ |
20 years | QUANTITY | 0.99+ |
ORGANIZATION | 0.99+ | |
two months later | DATE | 0.99+ |
One | QUANTITY | 0.99+ |
Each | QUANTITY | 0.98+ |
Cloud | ORGANIZATION | 0.98+ |
late 2016 | DATE | 0.98+ |
Kubernetes | TITLE | 0.98+ |
Deepak Rangaraj, Dell technologies
>>The cybersecurity landscape continues to be one characterized by a series of point tools designed to do a very specific job, often pretty well, but the mosaic of tooling is grown over the years causing complexity in driving up costs and increasing exposures. So the game of Whackamole continues. Moreover, the way organizations approach security is changing quite dramatically. The cloud, while offering so many advantages, has also created new complexities. The shared responsibility model redefines what the cloud provider secures, for example, the S three bucket and what the customer is responsible for eg properly configuring the bucket. You know, this is all well and good, but because virtually no organization of any size can go all in on a single cloud, that shared responsibility model now spans multiple clouds and with different protocols. Now that of course includes on-prem and edge deployments, making things even more complex. Moreover, the DevOps team is being asked to be the point of execution to implement many aspects of an organization's security strategy. >>This extends to securing the runtime, the platform, and even now containers which can end up anywhere. There's a real need for consolidation in the security industry, and that's part of the answer. We've seen this both in terms of mergers and acquisitions as well as platform plays that cover more and more ground. But the diversity of alternatives and infrastructure implementations continues to boggle the mind with more and more entry points for the attackers. This includes sophisticated supply chain attacks that make it even more difficult to understand how to secure components of a system and how secure those components actually are. The number one challenge CISOs face in today's complex world is lack of talent to address these challenges. And I'm not saying that SecOps pros are not talented. They are. There just aren't enough of them to go around and the adversary is also talented and very creative and there are more and more of them every day. >>Now, one of the very important roles that a technology vendor can play is to take mundane infrastructure security tasks off the plates of SEC off teams. Specifically we're talking about shifting much of the heavy lifting around securing servers, storage, networking, and other infrastructure and their components onto the technology vendor via r and d and other best practices like supply chain management. And that's what we're here to talk about. Welcome to the second part in our series, A Blueprint for Trusted Infrastructure Made Possible by Dell Technologies and produced by the Cube. My name is Dave Ante and I'm your host now. Previously we looked at what trusted infrastructure means and the role that storage and data protection play in the equation. In this part two of the series, we explore the changing nature of technology infrastructure, how the industry generally in Dell specifically, are adapting to these changes and what is being done to proactively address threats that are increasingly stressing security teams. >>Now today, we continue the discussion and look more deeply into servers networking and hyper-converged infrastructure to better understand the critical aspects of how one company Dell is securing these elements so that dev sec op teams can focus on the myriad new attack vectors and challenges that they faced. First up is Deepak rang Garage Power Edge security product manager at Dell Technologies. And after that we're gonna bring on Mahesh Nagar oim, who was consultant in the networking product management area at Dell. And finally, we're close with Jerome West, who is the product management security lead for HCI hyperconverged infrastructure and converged infrastructure at Dell. Thanks for joining us today. We're thrilled to have you here and hope you enjoy the program. Deepak Arage shoes powered security product manager at Dell Technologies. Deepak, great to have you on the program. Thank you. >>Thank you for having me. >>So we're going through the infrastructure stack and in part one of this series we looked at the landscape overall and how cyber has changed and specifically how Dell thinks about data protection in, in security in a manner that both secures infrastructure and minimizes organizational friction. We also hit on the storage part of the portfolio. So now we want to dig into servers. So my first question is, what are the critical aspects of securing server infrastructure that our audience should be aware of? >>Sure. So if you look at compute in general, right, it has rapidly evolved over the past couple of years, especially with trends toward software defined data centers and with also organizations having to deal with hybrid environments where they have private clouds, public cloud locations, remote offices, and also remote workers. So on top of this, there's also an increase in the complexity of the supply chain itself, right? There are companies who are dealing with hundreds of suppliers as part of their supply chain. So all of this complexity provides a lot of opportunity for attackers because it's expanding the threat surface of what can be attacked, and attacks are becoming more frequent, more severe and more sophisticated. And this has also triggered around in the regulatory and mandates around the security needs. >>And these regulations are not just in the government sector, right? So it extends to critical infrastructure and eventually it also get into the private sector. In addition to this, organizations are also looking at their own internal compliance mandates. And this could be based on the industry in which they're operating in, or it could be their own security postures. And this is the landscape in which servers they're operating today. And given that servers are the foundational blocks of the data center, it becomes extremely important to protect them. And given how complex the modern server platforms are, it's also extremely difficult and it takes a lot of effort. And this means protecting everything from the supply chain to the manufacturing and then eventually the assuring the hardware and software integrity of the platforms and also the operations. And there are very few companies that go to the lens that Dell does in order to secure the server. We truly believe in the notion and the security mentality that, you know, security should enable our customers to go focus on their business and proactively innovate on their business and it should not be a burden to them. And we heavily invest to make that possible for our customers. >>So this is really important because the premise that I set up at the beginning of this was really that I, as of security pro, I'm not a security pro, but if I were, I wouldn't want to be doing all this infrastructure stuff because I now have all these new things I gotta deal with. I want a company like Dell who has the resources to build that security in to deal with the supply chain to ensure the providence, et cetera. So I'm glad you you, you hit on that, but so given what you just said, what does cybersecurity resilience mean from a server perspective? For example, are there specific principles that Dell adheres to that are non-negotiable? Let's say, how does Dell ensure that its customers can trust your server infrastructure? >>Yeah, like when, when it comes to security at Dell, right? It's ingrained in our product, so that's the best way to put it. And security is nonnegotiable, right? It's never an afterthought where we come up with a design and then later on figure out how to go make it secure, right? Our security development life cycle, the products are being designed to counter these threats right from the big. And in addition to that, we are also testing and evaluating these products continuously to identify vulnerabilities. We also have external third party audits which supplement this process. And in addition to this, Dell makes the commitment that we will rapidly respond to any mitigations and vulnerability, any vulnerabilities and exposures found out in the field and provide mitigations and patches for in attacking manner. So this security principle is also built into our server life cycle, right? Every phase of it. >>So we want our products to provide cutting edge capabilities when it comes to security. So as part of that, we are constantly evaluating what our security model is done. We are building on it and continuously improving it. So till a few years ago, our model was primarily based on the N framework of protect, detect and rigor. And it's still aligns really well to that framework, but over the past couple of years we have seen how computers evolved, how the threads have evolved, and we have also seen the regulatory trends and we recognize the fact that the best security strategy for the modern world is a zero trust approach. And so now when we are building our infrastructure and tools and offerings for customers, first and foremost, they're cyber resilient, right? What we mean by that is they're capable of anticipating threats, withstanding attacks and rapidly recurring from attacks and also adapting to the adverse conditions in which they're deployed. The process of designing these capabilities and identifying these capabilities however, is done through the zero press framework. And that's very important because now we are also anticipating how our customers will end up using these capabilities at there and to enable their own zero trust IT environments and IT zero trusts deployments. We have completely adapted our security approach to make it easier for customers to work with us no matter where they are in their journey towards zero trust option. >>So thank you for that. You mentioned the, this framework, you talked about zero trust. When I think about n I think as well about layered approaches. And when I think about zero trust, I think about if you, if you don't have access to it, you're not getting access, you've gotta earn that, that access and you've got layers and then you still assume that bad guys are gonna get in. So you've gotta detect that and you've gotta response. So server infrastructure security is so fundamental. So my question is, what is Dell providing specifically to, for example, detect anomalies and breaches from unauthorized activity? How do you enable fast and easy or facile recovery from malicious incidents? >>Right? What is that is exactly right, right? Breachers are bound to happen. And given how complex our current environment is, it's extremely distributed and extremely connected, right? Data and users are no longer contained with an offices where we can set up a perimeter firewall and say, Yeah, everything within that is good. We can trust everything within it. That's no longer true. The best approach to protect data and infrastructure in the current world is to use a zero trust approach, which uses the principles. Nothing is ever trusted, right? Nothing is trusted implicitly. You're constantly verifying every single user, every single device, and every single access in your system at every single level of your ID environment. And this is the principles that we use on power Edge, right? But with an increased focus on providing granular controls and checks based on the principles of these privileged access. >>So the idea is that service first and foremost need to make sure that the threats never enter and they're rejected at the point of entry. But we recognize breaches are going to occur and if they do, they need to be minimized such that the sphere of damage cost by attacker is minimized. So they're not able to move from one part of the network to something else laterally or escalate their privileges and cause more damage, right? So the impact radius for instance, has to be radius. And this is done through features like automated detection capabilities and automation, automated remediation capabilities. So some examples are as part of our end to end boot resilience process, we have what they call a system lockdown, right? We can lock down the configuration of the system and lock on the form versions and all changes to the system. And we have capabilities which automatically detect any drift from that lockdown configuration and we can figure out if the drift was caused to authorized changes or unauthorized changes. >>And if it is an unauthorize change can log it, generate security alerts, and we even have capabilities to automatically roll the firm where, and always versions back to a known good version and also the configurations, right? And this becomes extremely important because as part of zero trust, we need to respond to these things at machine speed and we cannot do it at a human speed. And having these automated capabilities is a big deal when achieving that zero trust strategy. And in addition to this, we also have chassis inclusion detection where if the chassis, the box, the several box is opened up, it logs alerts, and you can figure out even later if there's an AC power cycle, you can go look at the logs to see that the box is opened up and figure out if there was a, like a known authorized access or some malicious actor opening and chain something in your system. >>Great, thank you for that lot. Lot of detail and and appreciate that. I want to go somewhere else now cuz Dell has a renowned supply chain reputation. So what about securing the, the supply chain and the server bill of materials? What does Dell specifically do to track the providence of components it uses in its systems so that when the systems arrive, a customer can be a hundred percent certain that that system hasn't been compromised, >>Right? And we've talked about how complex the modern supply chain is, right? And that's no different for service. We have hundreds of confidence on the server and a lot of these form where in order to be configured and run and this former competence could be coming from third parties suppliers. So now the complexity that we are dealing with like was the end to end approach. And that's where Dell pays a lot of attention into assuring the security approach approaching. And it starts all the way from sourcing competence, right? And then through the design and then even the manufacturing process where we are wetting the personnel leather factories and wetting the factories itself. And the factories also have physical controls, physical security controls built into them and even shipping, right? We have GPS tagging of packages. So all of this is built to ensure supply chain security. >>But a critical aspect of this is also making sure that the systems which are built in the factories are delivered to the customers without any changes or any tapper. And we have a feature called the secure component verification, which is capable of doing this. What the feature does this, when the system gets built in a factory, it generates an inventory of all the competence in the system and it creates a cryptographic certificate based on the signatures presented to this by the competence. And this certificate is stored separately and sent to the customers separately from the system itself. So once the customers receive the system at their end, they can run out to, it generates an inventory of the competence on the system at their end and then compare it to the golden certificate to make sure nothing was changed. And if any changes are detected, we can figure out if there's an authorized change or unauthorize change. >>Again, authorized changes could be like, you know, upgrades to the drives or memory and ized changes could be any sort of temper. So that's the supply chain aspect of it. And bill of metal use is also an important aspect to galing security, right? And we provide a software bill of materials, which is basically a list of ingredients of all the software pieces in the platform. So what it allows our customers to do is quickly take a look at all the different pieces and compare it to the vulnerability database and see if any of the vulner, which have been discovered out in the wild affected platform. So that's a quick way of figuring out if the platform has any known vulnerabilities and it has not been patched. >>Excellent. That's really good. My last question is, I wonder if you, you know, give us the sort of summary from your perspective, what are the key strengths of Dell server portfolio from a security standpoint? I'm really interested in, you know, the uniqueness and the strong suit that Dell brings to the table, >>Right? Yeah. We have talked enough about the complexity of the environment and how zero risk is necessary for the modern ID environment, right? And this is integral to Dell powered service. And as part of that like you know, security starts with the supply chain. We already talked about the second component verification, which is a beneath feature that Dell platforms have. And on top of it we also have a silicon place platform mode of trust. So this is a key which is programmed into the silicon on the black service during manufacturing and can never be changed after. And this immutable key is what forms the anchor for creating the chain of trust that is used to verify everything in the platform from the hardware and software integrity to the boot, all pieces of it, right? In addition to that, we also have a host of data protection features. >>Whether it is protecting data at risk in news or inflight, we have self encrypting drives, which provides scalable and flexible encryption options. And this couple with external key management provides really good protection for your data address. External key management is important because you know, somebody could physically steam the server, walk away, but then the keys are not stored on the server, it stood separately. So that provides your action layer of security. And we also have dual layer encryption where you can compliment the hardware encryption on the secure encrypted drives with software level encryption. Inion to this we have identity and access management features like multifactor authentication, single sign on roles, scope and time based access controls, all of which are critical to enable that granular control and checks for zero trust approach. So I would say like, you know, if you look at the Dell feature set, it's pretty comprehensive and we also have the flexibility built in to meet the needs of all customers no matter where they fall in the spectrum of, you know, risk tolerance and security sensitivity. And we also have the capabilities to meet all the regulatory requirements and compliance requirements. So in a nutshell, I would say that, you know, Dell Power Service cyber resident infrastructure helps accelerate zero tested option for customers. >>Got it. So you've really thought this through all the various things that that you would do to sort of make sure that your server infrastructure is secure, not compromised, that your supply chain is secure so that your customers can focus on some of the other things that they have to worry about, which are numerous. Thanks Deepak, appreciate you coming on the cube and participating in the program. >>Thank you for having >>You're welcome. In a moment I'll be back to dig into the networking portion of the infrastructure. Stay with us for more coverage of a blueprint for trusted infrastructure and collaboration with Dell Technologies on the cube. Your leader in enterprise and emerging tech coverage.
SUMMARY :
So the game of Whackamole continues. But the diversity of alternatives and infrastructure implementations continues to how the industry generally in Dell specifically, are adapting to Deepak, great to have you on the program. We also hit on the storage part of the portfolio. So all of this complexity provides a lot of opportunity for attackers because it's expanding of the data center, it becomes extremely important to protect them. in to deal with the supply chain to ensure the providence, et cetera. And in addition to that, we are also testing and evaluating how the threads have evolved, and we have also seen the regulatory trends and And when I think about zero trust, I think about if And this is the principles that we use on power Edge, part of our end to end boot resilience process, we have what they call a system And in addition to this, we also have chassis inclusion detection where if What does Dell specifically do to track the So now the complexity that we are dealing with like was And this certificate is stored separately and sent to the customers So that's the supply chain aspect of it. the uniqueness and the strong suit that Dell brings to the table, from the hardware and software integrity to the boot, all pieces of it, And we also have dual layer encryption where you of the other things that they have to worry about, which are numerous. In a moment I'll be back to dig into the networking portion of the infrastructure.
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
Deepak | PERSON | 0.99+ |
Dell | ORGANIZATION | 0.99+ |
Jerome West | PERSON | 0.99+ |
Deepak Rangaraj | PERSON | 0.99+ |
Dave Ante | PERSON | 0.99+ |
second part | QUANTITY | 0.99+ |
First | QUANTITY | 0.99+ |
first question | QUANTITY | 0.99+ |
Deepak Arage | PERSON | 0.99+ |
Dell Technologies | ORGANIZATION | 0.99+ |
second component | QUANTITY | 0.99+ |
A Blueprint for Trusted Infrastructure Made Possible | TITLE | 0.99+ |
today | DATE | 0.99+ |
one | QUANTITY | 0.99+ |
Dell Technologies | ORGANIZATION | 0.98+ |
both | QUANTITY | 0.98+ |
hundreds | QUANTITY | 0.98+ |
hundred percent | QUANTITY | 0.98+ |
Mahesh Nagar | PERSON | 0.98+ |
zero trust | QUANTITY | 0.98+ |
single cloud | QUANTITY | 0.96+ |
every single device | QUANTITY | 0.94+ |
one part | QUANTITY | 0.94+ |
first | QUANTITY | 0.94+ |
every single access | QUANTITY | 0.92+ |
every single user | QUANTITY | 0.92+ |
Cube | ORGANIZATION | 0.92+ |
zero risk | QUANTITY | 0.9+ |
Whackamole | TITLE | 0.88+ |
zero | QUANTITY | 0.82+ |
past couple of years | DATE | 0.81+ |
a few years ago | DATE | 0.76+ |
every single level | QUANTITY | 0.74+ |
single | QUANTITY | 0.68+ |
Power | COMMERCIAL_ITEM | 0.66+ |
part one | OTHER | 0.65+ |
HCI | ORGANIZATION | 0.61+ |
SecOps | TITLE | 0.58+ |
confidence | QUANTITY | 0.57+ |
SEC | ORGANIZATION | 0.55+ |
part two | QUANTITY | 0.54+ |
suppliers | QUANTITY | 0.54+ |
point | QUANTITY | 0.53+ |
DevOps | ORGANIZATION | 0.52+ |
Blueprint for Trusted Insfrastructure Episode 2 Full Episode 10-4 V2
>>The cybersecurity landscape continues to be one characterized by a series of point tools designed to do a very specific job, often pretty well, but the mosaic of tooling is grown over the years causing complexity in driving up costs and increasing exposures. So the game of Whackamole continues. Moreover, the way organizations approach security is changing quite dramatically. The cloud, while offering so many advantages, has also created new complexities. The shared responsibility model redefines what the cloud provider secures, for example, the S three bucket and what the customer is responsible for eg properly configuring the bucket. You know, this is all well and good, but because virtually no organization of any size can go all in on a single cloud, that shared responsibility model now spans multiple clouds and with different protocols. Now that of course includes on-prem and edge deployments, making things even more complex. Moreover, the DevOps team is being asked to be the point of execution to implement many aspects of an organization's security strategy. >>This extends to securing the runtime, the platform, and even now containers which can end up anywhere. There's a real need for consolidation in the security industry, and that's part of the answer. We've seen this both in terms of mergers and acquisitions as well as platform plays that cover more and more ground. But the diversity of alternatives and infrastructure implementations continues to boggle the mind with more and more entry points for the attackers. This includes sophisticated supply chain attacks that make it even more difficult to understand how to secure components of a system and how secure those components actually are. The number one challenge CISOs face in today's complex world is lack of talent to address these challenges. And I'm not saying that SecOps pros are not talented, They are. There just aren't enough of them to go around and the adversary is also talented and very creative, and there are more and more of them every day. >>Now, one of the very important roles that a technology vendor can play is to take mundane infrastructure security tasks off the plates of SEC off teams. Specifically we're talking about shifting much of the heavy lifting around securing servers, storage, networking, and other infrastructure and their components onto the technology vendor via r and d and other best practices like supply chain management. And that's what we're here to talk about. Welcome to the second part in our series, A Blueprint for Trusted Infrastructure Made Possible by Dell Technologies and produced by the Cube. My name is Dave Ante and I'm your host now. Previously we looked at what trusted infrastructure means and the role that storage and data protection play in the equation. In this part two of the series, we explore the changing nature of technology infrastructure, how the industry generally in Dell specifically, are adapting to these changes and what is being done to proactively address threats that are increasingly stressing security teams. >>Now today, we continue the discussion and look more deeply into servers networking and hyper-converged infrastructure to better understand the critical aspects of how one company Dell is securing these elements so that dev sec op teams can focus on the myriad new attack vectors and challenges that they faced. First up is Deepak rang Garage Power Edge security product manager at Dell Technologies. And after that we're gonna bring on Mahesh Nagar oim, who was consultant in the networking product management area at Dell. And finally, we're close with Jerome West, who is the product management security lead for HCI hyperconverged infrastructure and converged infrastructure at Dell. Thanks for joining us today. We're thrilled to have you here and hope you enjoy the program. Deepak Arage shoes powered security product manager at Dell Technologies. Deepak, great to have you on the program. Thank you. >>Thank you for having me. >>So we're going through the infrastructure stack and in part one of this series we looked at the landscape overall and how cyber has changed and specifically how Dell thinks about data protection in, in security in a manner that both secures infrastructure and minimizes organizational friction. We also hit on the storage part of the portfolio. So now we want to dig into servers. So my first question is, what are the critical aspects of securing server infrastructure that our audience should be aware of? >>Sure. So if you look at compute in general, right, it has rapidly evolved over the past couple of years, especially with trends toward software defined data centers and with also organizations having to deal with hybrid environments where they have private clouds, public cloud locations, remote offices, and also remote workers. So on top of this, there's also an increase in the complexity of the supply chain itself, right? There are companies who are dealing with hundreds of suppliers as part of their supply chain. So all of this complexity provides a lot of opportunity for attackers because it's expanding the threat surface of what can be attacked, and attacks are becoming more frequent, more severe and more sophisticated. And this has also triggered around in the regulatory and mandates around the security needs. >>And these regulations are not just in the government sector, right? So it extends to critical infrastructure and eventually it also get into the private sector. In addition to this, organizations are also looking at their own internal compliance mandates. And this could be based on the industry in which they're operating in, or it could be their own security postures. And this is the landscape in which servers they're operating today. And given that servers are the foundational blocks of the data center, it becomes extremely important to protect them. And given how complex the modern server platforms are, it's also extremely difficult and it takes a lot of effort. And this means protecting everything from the supply chain to the manufacturing and then eventually the assuring the hardware and software integrity of the platforms and also the operations. And there are very few companies that go to the lens that Dell does in order to secure the server. We truly believe in the notion and the security mentality that, you know, security should enable our customers to go focus on their business and proactively innovate on their business and it should not be a burden to them. And we heavily invest to make that possible for our customers. >>So this is really important because the premise that I set up at the beginning of this was really that I, as of security pro, I'm not a security pro, but if I were, I wouldn't want to be doing all this infrastructure stuff because I now have all these new things I gotta deal with. I want a company like Dell who has the resources to build that security in to deal with the supply chain to ensure the providence, et cetera. So I'm glad you you, you hit on that, but so given what you just said, what does cybersecurity resilience mean from a server perspective? For example, are there specific principles that Dell adheres to that are non-negotiable? Let's say, how does Dell ensure that its customers can trust your server infrastructure? >>Yeah, like when, when it comes to security at Dell, right? It's ingrained in our product, so that's the best way to put it. And security is nonnegotiable, right? It's never an afterthought where we come up with a design and then later on figure out how to go make it secure, right? Our security development life cycle, the products are being designed to counter these threats right from the big. And in addition to that, we are also testing and evaluating these products continuously to identify vulnerabilities. We also have external third party audits which supplement this process. And in addition to this, Dell makes the commitment that we will rapidly respond to any mitigations and vulnerability, any vulnerabilities and exposures found out in the field and provide mitigations and patches for in attacking manner. So this security principle is also built into our server life cycle, right? Every phase of it. >>So we want our products to provide cutting edge capabilities when it comes to security. So as part of that, we are constantly evaluating what our security model is done. We are building on it and continuously improving it. So till a few years ago, our model was primarily based on the N framework of protect, detect and rigor. And it's still aligns really well to that framework, but over the past couple of years, we have seen how computers evolved, how the threads have evolved, and we have also seen the regulatory trends and we recognize the fact that the best security strategy for the modern world is a zero trust approach. And so now when we are building our infrastructure and tools and offerings for customers, first and foremost, they're cyber resilient, right? What we mean by that is they're capable of anticipating threats, withstanding attacks and rapidly recurring from attacks and also adapting to the adverse conditions in which they're deployed. The process of designing these capabilities and identifying these capabilities however, is done through the zero press framework. And that's very important because now we are also anticipating how our customers will end up using these capabilities at there and to enable their own zero trust IT environments and IT zero trusts deployments. We have completely adapted our security approach to make it easier for customers to work with us no matter where they are in their journey towards zero trust option. >>So thank you for that. You mentioned the, this framework, you talked about zero trust. When I think about n I think as well about layered approaches. And when I think about zero trust, I think about if you, if you don't have access to it, you're not getting access, you've gotta earn that, that access and you've got layers and then you still assume that bad guys are gonna get in. So you've gotta detect that and you've gotta response. So server infrastructure security is so fundamental. So my question is, what is Dell providing specifically to, for example, detect anomalies and breaches from unauthorized activity? How do you enable fast and easy or facile recovery from malicious incidents, >>Right? What is that is exactly right, right? Breachers are bound to happen and given how complex our current environment is, it's extremely distributed and extremely connected, right? Data and users are no longer contained with an offices where we can set up a perimeter firewall and say, Yeah, everything within that is good. We can trust everything within it. That's no longer true. The best approach to protect data and infrastructure in the current world is to use a zero trust approach, which uses the principles. Nothing is ever trusted, right? Nothing is trusted implicitly. You're constantly verifying every single user, every single device, and every single access in your system at every single level of your ID environment. And this is the principles that we use on power Edge, right? But with an increased focus on providing granular controls and checks based on the principles of these privileged access. >>So the idea is that service first and foremost need to make sure that the threats never enter and they're rejected at the point of entry, but we recognize breaches are going to occur and if they do, they need to be minimized such that the sphere of damage cost by attacker is minimized so they're not able to move from one part of the network to something else laterally or escalate their privileges and cause more damage, right? So the impact radius for instance, has to be radius. And this is done through features like automated detection capabilities and automation, automated remediation capabilities. So some examples are as part of our end to end boot resilience process, we have what they call a system lockdown, right? We can lock down the configuration of the system and lock on the form versions and all changes to the system. And we have capabilities which automatically detect any drift from that lockdown configuration and we can figure out if the drift was caused to authorized changes or unauthorized changes. >>And if it is an unauthorize change can log it, generate security alerts, and we even have capabilities to automatically roll the firm where, and always versions back to a known good version and also the configurations, right? And this becomes extremely important because as part of zero trust, we need to respond to these things at machine speed and we cannot do it at a human speed. And having these automated capabilities is a big deal when achieving that zero trust strategy. And in addition to this, we also have chassis inclusion detection where if the chassis, the box, the several box is opened up, it logs alerts, and you can figure out even later if there's an AC power cycle, you can go look at the logs to see that the box is opened up and figure out if there was a, like a known authorized access or some malicious actor opening and chain something in your system. >>Great, thank you for that lot. Lot of detail and and appreciate that. I want to go somewhere else now cuz Dell has a renowned supply chain reputation. So what about securing the, the supply chain and the server bill of materials? What does Dell specifically do to track the providence of components it uses in its systems so that when the systems arrive, a customer can be a hundred percent certain that that system hasn't been compromised, >>Right? And we've talked about how complex the modern supply chain is, right? And that's no different for service. We have hundreds of confidence on the server and a lot of these form where in order to be configured and run and this former competence could be coming from third parties suppliers. So now the complexity that we are dealing with like was the end to end approach and that's where Dell pays a lot of attention into assuring the security approach approaching and it starts all the way from sourcing competence, right? And then through the design and then even the manufacturing process where we are wetting the personnel leather factories and wetting the factories itself. And the factories also have physical controls, physical security controls built into them and even shipping, right? We have GPS tagging of packages. So all of this is built to ensure supply chain security. >>But a critical aspect of this is also making sure that the systems which are built in the factories are delivered to the customers without any changes or any tapper. And we have a feature called the secure component verification, which is capable of doing this. What the feature does this, when the system gets built in a factory, it generates an inventory of all the competence in the system and it creates a cryptographic certificate based on the signatures presented to this by the competence. And this certificate is stored separately and sent to the customers separately from the system itself. So once the customers receive the system at their end, they can run out to, it generates an inventory of the competence on the system at their end and then compare it to the golden certificate to make sure nothing was changed. And if any changes are detected, we can figure out if there's an authorized change or unauthorize change. >>Again, authorized changes could be like, you know, upgrades to the drives or memory and ized changes could be any sort of temper. So that's the supply chain aspect of it and bill of metal use is also an important aspect to galing security, right? And we provide a software bill of materials, which is basically a list of ingredients of all the software pieces in the platform. So what it allows our customers to do is quickly take a look at all the different pieces and compare it to the vulnerability database and see if any of the vulner which have been discovered out in the wild affected platform. So that's a quick way of figuring out if the platform has any known vulnerabilities and it has not been patched. >>Excellent. That's really good. My last question is, I wonder if you, you know, give us the sort of summary from your perspective, what are the key strengths of Dell server portfolio from a security standpoint? I'm really interested in, you know, the uniqueness and the strong suit that Dell brings to the table, >>Right? Yeah. We have talked enough about the complexity of the environment and how zero risk is necessary for the modern ID environment, right? And this is integral to Dell powered service. And as part of that like you know, security starts with the supply chain. We already talked about the second component verification, which is a beneath feature that Dell platforms have. And on top of it we also have a silicon place platform mode of trust. So this is a key which is programmed into the silicon on the black service during manufacturing and can never be changed after. And this immutable key is what forms the anchor for creating the chain of trust that is used to verify everything in the platform from the hardware and software integrity to the boot, all pieces of it, right? In addition to that, we also have a host of data protection features. >>Whether it is protecting data at risk in news or inflight, we have self encrypting drives which provides scalable and flexible encryption options. And this couple with external key management provides really good protection for your data address. External key management is important because you know, somebody could physically steam the server walk away, but then the keys are not stored on the server, it stood separately. So that provides your action layer of security. And we also have dual layer encryption where you can compliment the hardware encryption on the secure encrypted drives with software level encryption. Inion to this we have identity and access management features like multifactor authentication, single sign on roles, scope and time based access controls, all of which are critical to enable that granular control and checks for zero trust approach. So I would say like, you know, if you look at the Dell feature set, it's pretty comprehensive and we also have the flexibility built in to meet the needs of all customers no matter where they fall in the spectrum of, you know, risk tolerance and security sensitivity. And we also have the capabilities to meet all the regulatory requirements and compliance requirements. So in a nutshell, I would say that you know, Dell Power Service cyber resident infrastructure helps accelerate zero tested option for customers. >>Got it. So you've really thought this through all the various things that that you would do to sort of make sure that your server infrastructure is secure, not compromised, that your supply chain is secure so that your customers can focus on some of the other things that they have to worry about, which are numerous. Thanks Deepak, appreciate you coming on the cube and participating in the program. >>Thank you for having >>You're welcome. In a moment I'll be back to dig into the networking portion of the infrastructure. Stay with us for more coverage of a blueprint for trusted infrastructure and collaboration with Dell Technologies on the cube, your leader in enterprise and emerging tech coverage. We're back with a blueprint for trusted infrastructure and partnership with Dell Technologies in the cube. And we're here with Mahesh Nager, who is a consultant in the area of networking product management at Dell Technologies. Mahesh, welcome, good to see you. >>Hey, good morning Dell's, nice to meet, meet to you as well. >>Hey, so we've been digging into all the parts of the infrastructure stack and now we're gonna look at the all important networking components. Mahesh, when we think about networking in today's environment, we think about the core data center and we're connecting out to various locations including the cloud and both the near and the far edge. So the question is from Dell's perspective, what's unique and challenging about securing network infrastructure that we should know about? >>Yeah, so few years ago IT security and an enterprise was primarily putting a wrapper around data center out because it was constrained to an infrastructure owned and operated by the enterprise for the most part. So putting a rapid around it like a parameter or a firewall was a sufficient response because you could basically control the environment and data small enough control today with the distributed data, intelligent software, different systems, multi-cloud environment and asset service delivery, you know, the infrastructure for the modern era changes the way to secure the network infrastructure In today's, you know, data driven world, it operates everywhere and data has created and accessed everywhere so far from, you know, the centralized monolithic data centers of the past. The biggest challenge is how do we build the network infrastructure of the modern era that are intelligent with automation enabling maximum flexibility and business agility without any compromise on the security. We believe that in this data era, the security transformation must accompany digital transformation. >>Yeah, that's very good. You talked about a couple of things there. Data by its very nature is distributed. There is no perimeter anymore, so you can't just, as you say, put a rapper around it. I like the way you phrase that. So when you think about cyber security resilience from a networking perspective, how do you define that? In other words, what are the basic principles that you adhere to when thinking about securing network infrastructure for your customers? >>So our belief is that cybersecurity and cybersecurity resilience, they need to be holistic, they need to be integrated, scalable, one that span the entire enterprise and with a co and objective and policy implementation. So cybersecurity needs to span across all the devices and running across any application, whether the application resets on the cloud or anywhere else in the infrastructure. From a networking standpoint, what does it mean? It's again, the same principles, right? You know, in order to prevent the threat actors from accessing changing best destroy or stealing sensitive data, this definition holds good for networking as well. So if you look at it from a networking perspective, it's the ability to protect from and withstand attacks on the networking systems as we continue to evolve. This will also include the ability to adapt and recover from these attacks, which is what cyber resilience aspect is all about. So cybersecurity best practices, as you know, is continuously changing the landscape primarily because the cyber threats also continue to evolve. >>Yeah, got it. So I like that. So it's gotta be integrated, it's gotta be scalable, it's gotta be comprehensive, comprehensive and adaptable. You're saying it can't be static, >>Right? Right. So I think, you know, you had a second part of a question, you know, that says what do we, you know, what are the basic principles? You know, when you think about securing network infrastructure, when you're looking at securing the network infrastructure, it revolves around core security capability of the devices that form the network. And what are these security capabilities? These are access control, software integrity and vulnerability response. When you look at access control, it's to ensure that only the authenticated users are able to access the platform and they're able to access only the kind of the assets that they're authorized to based on their user level. Now accessing a network platform like a switch or a rotor for example, is typically used for say, configuration and management of the networking switch. So user access is based on say roles for that matter in a role based access control, whether you are a security admin or a network admin or a storage admin. >>And it's imperative that logging is enable because any of the change to the configuration is actually logged and monitored as that. Talking about software's integrity, it's the ability to ensure that the software that's running on the system has not been compromised. And, and you know, this is important because it could actually, you know, get hold of the system and you know, you could get UND desire results in terms of say validation of the images. It's, it needs to be done through say digital signature. So, so it's important that when you're talking about say, software integrity, a, you are ensuring that the platform is not compromised, you know, is not compromised and be that any upgrades, you know, that happens to the platform is happening through say validated signature. >>Okay. And now, now you've now, so there's access control, software integrity, and I think you, you've got a third element which is i I think response, but please continue. >>Yeah, so you know, the third one is about civil notability. So we follow the same process that's been followed by the rest of the products within the Dell product family. That's to report or identify, you know, any kind of a vulnerability that's being addressed by the Dell product security incident response team. So the networking portfolio is no different, you know, it follows the same process for identification for tri and for resolution of these vulnerabilities. And these are addressed either through patches or through new reasons via networking software. >>Yeah, got it. Okay. So I mean, you didn't say zero trust, but when you were talking about access control, you're really talking about access to only those assets that people are authorized to access. I know zero trust sometimes is a buzzword, but, but you I think gave it, you know, some clarity there. Software integrity, it's about assurance validation, your digital signature you mentioned and, and that there's been no compromise. And then how you respond to incidents in a standard way that can fit into a security framework. So outstanding description, thank you for that. But then the next question is, how does Dell networking fit into the construct of what we've been talking about Dell trusted infrastructure? >>Okay, so networking is the key element in the Dell trusted infrastructure. It provides the interconnect between the service and the storage world. And you know, it's part of any data center configuration for a trusted infrastructure. The network needs to have access control in place where only the authorized nels are able to make change to the network configuration and logging off any of those changes is also done through the logging capabilities. Additionally, we should also ensure that the configuration should provide network isolation between say the management network and the data traffic network because they need to be separate and distinct from each other. And furthermore, even if you look at the data traffic network and now you have things like segmentation isolated segments and via VRF or, or some micro segmentation via partners, this allows various level of security for each of those segments. So it's important you know, that, that the network infrastructure has the ability, you know, to provide all this, this services from a Dell networking security perspective, right? >>You know, there are multiple layer of defense, you know, both at the edge and in the network in this hardware and in the software and essentially, you know, a set of rules and a configuration that's designed to sort of protect the integrity, confidentiality, and accessibility of the network assets. So each network security layer, it implements policies and controls as I said, you know, including send network segmentation. We do have capabilities sources, centralized management automation and capability and scalability for that matter. Now you add all of these things, you know, with the open networking standards or software, different principles and you essentially, you know, reach to the point where you know, you're looking at zero trust network access, which is essentially sort of a building block for increased cloud adoption. If you look at say that you know the different pillars of a zero trust architecture, you know, if you look at the device aspect, you know, we do have support for security for example, we do have say trust platform in a trusted platform models tpms on certain offer products and you know, the physical security know plain, simple old one love port enable from a user trust perspective, we know it's all done via access control days via role based access control and say capability in order to provide say remote authentication or things like say sticky Mac or Mac learning limit and so on. >>If you look at say a transport and decision trust layer, these are essentially, you know, how do you access, you know, this switch, you know, is it by plain hotel net or is it like secure ssh, right? And you know, when a host communicates, you know, to the switch, we do have things like self-signed or is certificate authority based certification. And one of the important aspect is, you know, in terms of, you know, the routing protocol, the routing protocol, say for example BGP for example, we do have the capability to support MD five authentication between the b g peers so that there is no, you know, manages attack, you know, to the network where the routing table is compromised. And the other aspect is about second control plane is here, you know, you know, it's, it's typical that if you don't have a control plane here, you know, it could be flooded and you know, you know, the switch could be compromised by city denial service attacks. >>From an application test perspective, as I mentioned, you know, we do have, you know, the application specific security rules where you could actually define, you know, the specific security rules based on the specific applications, you know, that are running within the system. And I did talk about, say the digital signature and the cryptographic check that we do for authentication and for, I mean rather for the authenticity and the validation of, you know, of the image and the BS and so on and so forth. Finally, you know, the data trust, we are looking at, you know, the network separation, you know, the network separation could happen or VRF plain old wheel Ls, you know, which can bring about sales multi 10 aspects. We talk about some microsegmentation as it applies to nsx for example. The other aspect is, you know, we do have, with our own smart fabric services that's enabled in a fabric, we have a concept of c cluster security. So all of this, you know, the different pillars, they sort of make up for the zero trust infrastructure for the networking assets of an infrastructure. >>Yeah. So thank you for that. There's a, there's a lot to unpack there. You know, one of the premise, the premise really of this, this, this, this segment that we're setting up in this series is really that everything you just mentioned, or a lot of things you just mentioned used to be the responsibility of the security team. And, and the premise that we're putting forth is that because security teams are so stretched thin, you, you gotta shift the vendor community. Dell specifically is shifting a lot of those tasks to their own r and d and taking care of a lot of that. So, cuz scop teams got a lot of other stuff to, to worry about. So my question relates to things like automation, which can help and scalability, what about those topics as it relates to networking infrastructure? >>Okay, our >>Portfolio, it enables state of the automation software, you know, that enables simplifying of the design. So for example, we do have, you know, you know the fabric design center, you know, a tool that automates the design of the fabric and you know, from a deployment and you know, the management of the network infrastructure that are simplicities, you know, using like Ansible s for Sonic for example are, you know, for a better sit and tell story. You know, we do have smart fabric services that can automate the entire fabric, you know, for a storage solution or for, you know, for one of the workloads for example. Now we do help reduce the complexity by closely integrating the management of the physical and the virtual networking infrastructure. And again, you know, we have those capabilities using Sonic or Smart Traffic services. If you look at Sonic for example, right? >>It delivers automated intent based secure containerized network and it has the ability to provide some network visibility and Avan has and, and all of these things are actually valid, you know, for a modern networking infrastructure. So now if you look at Sonic, you know, it's, you know, the usage of those tools, you know, that are available, you know, within the Sonic no is not restricted, you know, just to the data center infrastructure is, it's a unified no, you know, that's well applicable beyond the data center, you know, right up to the edge. Now if you look at our north from a smart traffic OS 10 perspective, you know, as I mentioned, we do have smart traffic services which essentially, you know, simplifies the deployment day zero, I mean rather day one, day two deployment expansion plans and the lifecycle management of our conversion infrastructure and hyper and hyper conversion infrastructure solutions. And finally, in order to enable say, zero touch deployment, we do have, you know, a VP solution with our SD van capability. So these are, you know, ways by which we bring down the complexity by, you know, enhancing the automation capability using, you know, a singular loss that can expand from a data center now right to the edge. >>Great, thank you for that. Last question real quick, just pitch me, what can you summarize from your point of view, what's the strength of the Dell networking portfolio? >>Okay, so from a Dell networking portfolio, we support capabilities at multiple layers. As I mentioned, we're talking about the physical security for examples, say disabling of the unused interface. Sticky Mac and trusted platform modules are the things that to go after. And when you're talking about say secure boot for example, it delivers the authenticity and the integrity of the OS 10 images at the startup. And Secure Boot also protects the startup configuration so that, you know, the startup configuration file is not compromised. And Secure port also enables the workload of prediction, for example, that is at another aspect of software image integrity validation, you know, wherein the image is data for the digital signature, you know, prior to any upgrade process. And if you are looking at secure access control, we do have things like role based access control, SSH to the switches, control plane access control that pre do tags and say access control from multifactor authentication. >>We do have various tech ads for entry control to the network and things like CSE and PRV support, you know, from a federal perspective we do have say logging wherein, you know, any event, any auditing capabilities can be possible by say looking at the clog service, you know, which are pretty much in our transmitter from the devices overts for example, and last we talked about say network segment, you know, say network separation and you know, these, you know, separation, you know, ensures that are, that is, you know, a contained say segment, you know, for a specific purpose or for the specific zone and, you know, just can be implemented by a, a micro segmentation, you know, just a plain old wheel or using virtual route of framework VR for example. >>A lot there. I mean I think frankly, you know, my takeaway is you guys do the heavy lifting in a very complicated topic. So thank you so much for, for coming on the cube and explaining that in in quite some depth. Really appreciate it. >>Thank you indeed. >>Oh, you're very welcome. Okay, in a moment I'll be back to dig into the hyper-converged infrastructure part of the portfolio and look at how when you enter the world of software defined where you're controlling servers and storage and networks via software led system, you could be sure that your infrastructure is trusted and secure. You're watching a blueprint for trusted infrastructure made possible by Dell Technologies and collaboration with the cube, your leader in enterprise and emerging tech coverage, your own west product management security lead at for HCI at Dell Technologies hyper-converged infrastructure. Jerome, welcome. >>Thank you Dave. >>Hey Jerome, in this series of blueprint for trusted infrastructure, we've been digging into the different parts of the infrastructure stack, including storage servers and networking, and now we want to cover hyperconverged infrastructure. So my first question is, what's unique about HCI that presents specific security challenges? What do we need to know? >>So what's unique about hyper-converge infrastructure is the breadth of the security challenge. We can't simply focus on a single type of IT system. So like a server or storage system or a virtualization piece of software, software. I mean HCI is all of those things. So luckily we have excellent partners like VMware, Microsoft, and internal partners like the Dell Power Edge team, the Dell storage team, the Dell networking team, and on and on. These partnerships in these collaborations are what make us successful from a security standpoint. So let me give you an example to illustrate. In the recent past we're seeing growing scope and sophistication in supply chain attacks. This mean an attacker is going to attack your software supply chain upstream so that hopefully a piece of code, malicious code that wasn't identified early in the software supply chain is distributed like a large player, like a VMware or Microsoft or a Dell. So to confront this kind of sophisticated hard to defeat problem, we need short term solutions and we need long term solutions as well. >>So for the short term solution, the obvious thing to do is to patch the vulnerability. The complexity is for our HCI portfolio. We build our software on VMware, so we would have to consume a patch that VMware would produce and provide it to our customers in a timely manner. Luckily VX rail's engineering team has co engineered a release process with VMware that significantly shortens our development life cycle so that VMware would produce a patch and within 14 days we will integrate our own code with the VMware release we will have tested and validated the update and we will give an update to our customers within 14 days of that VMware release. That as a result of this kind of rapid development process, VHA had over 40 releases of software updates last year for a longer term solution. We're partnering with VMware and others to develop a software bill of materials. We work with VMware to consume their software manifest, including their upstream vendors and their open source providers to have a comprehensive list of software components. Then we aren't caught off guard by an unforeseen vulnerability and we're more able to easily detect where the software problem lies so that we can quickly address it. So these are the kind of relationships and solutions that we can co engineer with effective collaborations with our, with our partners. >>Great, thank you for that. That description. So if I had to define what cybersecurity resilience means to HCI or converged infrastructure, and to me my takeaway was you gotta have a short term instant patch solution and then you gotta do an integration in a very short time, you know, two weeks to then have that integration done. And then longer term you have to have a software bill of materials so that you can ensure the providence of all the components help us. Is that a right way to think about cybersecurity resilience? Do you have, you know, a additives to that definition? >>I do. I really think that's site cybersecurity and resilience for hci because like I said, it has sort of unprecedented breadth across our portfolio. It's not a single thing, it's a bit of everything. So really the strength or the secret sauce is to combine all the solutions that our partner develops while integrating them with our own layer. So let me, let me give you an example. So hci, it's a, basically taking a software abstraction of hardware functionality and implementing it into something called the virtualized layer. It's basically the virtual virtualizing hardware functionality, like say a storage controller, you could implement it in hardware, but for hci, for example, in our VX rail portfolio, we, our Vxl product, we integrated it into a product called vsan, which is provided by our partner VMware. So that portfolio of strength is still, you know, through our, through our partnerships. >>So what we do, we integrate these, these security functionality and features in into our product. So our partnership grows to our ecosystem through products like VMware, products like nsx, Horizon, Carbon Black and vSphere. All of them integrate seamlessly with VMware and we also leverage VMware's software, part software partnerships on top of that. So for example, VX supports multifactor authentication through vSphere integration with something called Active Directory Federation services for adfs. So there's a lot of providers that support adfs including Microsoft Azure. So now we can support a wide array of identity providers such as Off Zero or I mentioned Azure or Active Directory through that partnership. So we can leverage all of our partners partnerships as well. So there's sort of a second layer. So being able to secure all of that, that provides a lot of options and flexibility for our customers. So basically to summarize my my answer, we consume all of the security advantages of our partners, but we also expand on them to make a product that is comprehensively secured at multiple layers from the hardware layer that's provided by Dell through Power Edge to the hyper-converged software that we build ourselves to the virtualization layer that we get through our partnerships with Microsoft and VMware. >>Great, I mean that's super helpful. You've mentioned nsx, Horizon, Carbon Black, all the, you know, the VMware component OTH zero, which the developers are gonna love. You got Azure identity, so it's really an ecosystem. So you may have actually answered my next question, but I'm gonna ask it anyway cuz you've got this software defined environment and you're managing servers and networking and storage with this software led approach, how do you ensure that the entire system is secure end to end? >>That's a really great question. So the, the answer is we do testing and validation as part of the engineering process. It's not just bolted on at the end. So when we do, for example, VxRail is the market's only co engineered solution with VMware, other vendors sell VMware as a hyper converged solution, but we actually include security as part of the co-engineering process with VMware. So it's considered when VMware builds their code and their process dovetails with ours because we have a secure development life cycle, which other products might talk about in their discussions with you that we integrate into our engineering life cycle. So because we follow the same framework, all of the, all of the codes should interoperate from a security standpoint. And so when we do our final validation testing when we do a software release, we're already halfway there in ensuring that all these features will give the customers what we promised. >>That's great. All right, let's, let's close pitch me, what would you say is the strong suit summarize the, the strengths of the Dell hyper-converged infrastructure and converged infrastructure portfolio specifically from a security perspective? Jerome? >>So I talked about how hyper hyper-converged infrastructure simplifies security management because basically you're gonna take all of these features that are abstracted in in hardware, they're now abstracted in the virtualization layer. Now you can manage them from a single point of view, whether it would be, say, you know, in for VX rail would be b be center, for example. So by abstracting all this, you make it very easy to manage security and highly flexible because now you don't have limitations around a single vendor. You have a multiple array of choices and partnerships to select. So I would say that is the, the key to making it to hci. Now, what makes Dell the market leader in HCI is not only do we have that functionality, but we also make it exceptionally useful to you because it's co engineered, it's not bolted on. So I gave the example of spo, I gave the example of how we, we modify our software release process with VMware to make it very responsive. >>A couple of other features that we have specific just to HCI are digitally signed LCM updates. This is an example of a feature that we have that's only exclusive to Dell that's not done through a partnership. So we digitally signed our software updates so the user can be sure that the, the update that they're installing into their system is an authentic and unmodified product. So we give it a Dell signature that's invalidated prior to installation. So not only do we consume the features that others develop in a seamless and fully validated way, but we also bolt on our own a specific HCI security features that work with all the other partnerships and give the user an exceptional security experience. So for, for example, the benefit to the customer is you don't have to create a complicated security framework that's hard for your users to use and it's hard for your system administrators to manage it all comes in a package. So it, it can be all managed through vCenter, for example, or, and then the specific hyper, hyper-converged functions can be managed through VxRail manager or through STDC manager. So there's very few pains of glass that the, the administrator or user ever has to worry about. It's all self contained and manageable. >>That makes a lot of sense. So you've got your own infrastructure, you're applying your best practices to that, like the digital signatures, you've got your ecosystem, you're doing co-engineering with the ecosystems, delivering security in a package, minimizing the complexity at the infrastructure level. The reason Jerome, this is so important is because SecOps teams, you know, they gotta deal with cloud security, they gotta deal with multiple clouds. Now they have their shared responsibility model going across multiple cl. They got all this other stuff that they have to worry, they gotta secure the containers and the run time and and, and, and, and the platform and so forth. So they're being asked to do other things. If they have to worry about all the things that you just mentioned, they'll never get, you know, the, the securities is gonna get worse. So what my takeaway is, you're removing that infrastructure piece and saying, Okay guys, you now can focus on those other things that is not necessarily Dell's, you know, domain, but you, you know, you can work with other partners to and your own teams to really nail that. Is that a fair summary? >>I think that is a fair summary because absolutely the worst thing you can do from a security perspective is provide a feature that's so unusable that the administrator disables it or other key security features. So when I work with my partners to define, to define and develop a new security feature, the thing I keep foremost in mind is, will this be something our users want to use and our administrators want to administer? Because if it's not, if it's something that's too difficult or onerous or complex, then I try to find ways to make it more user friendly and practical. And this is a challenge sometimes because we are, our products operate in highly regulated environments and sometimes they have to have certain rules and certain configurations that aren't the most user friendly or management friendly. So I, I put a lot of effort into thinking about how can we make this feature useful while still complying with all the regulations that we have to comply with. And by the way, we're very successful in a highly regulated space. We sell a lot of VxRail, for example, into the Department of Defense and banks and, and other highly regulated environments and we're very successful there. >>Excellent. Okay, Jerome, thanks. We're gonna leave it there for now. I'd love to have you back to talk about the progress that you're making down the road. Things always, you know, advance in the tech industry and so would appreciate that. >>I would look forward to it. Thank you very much, Dave. >>You're really welcome. In a moment I'll be back to summarize the program and offer some resources that can help you on your journey to secure your enterprise infrastructure. I wanna thank our guests for their contributions in helping us understand how investments by a company like Dell can both reduce the need for dev sec up teams to worry about some of the more fundamental security issues around infrastructure and have greater confidence in the quality providence and data protection designed in to core infrastructure like servers, storage, networking, and hyper-converged systems. You know, at the end of the day, whether your workloads are in the cloud, on prem or at the edge, you are responsible for your own security. But vendor r and d and vendor process must play an important role in easing the burden faced by security devs and operation teams. And on behalf of the cube production content and social teams as well as Dell Technologies, we want to thank you for watching a blueprint for trusted infrastructure. Remember part one of this series as well as all the videos associated with this program and of course today's program are available on demand@thecube.net with additional coverage@siliconangle.com. And you can go to dell.com/security solutions dell.com/security solutions to learn more about Dell's approach to securing infrastructure. And there's tons of additional resources that can help you on your journey. This is Dave Valante for the Cube, your leader in enterprise and emerging tech coverage. We'll see you next time.
SUMMARY :
So the game of Whackamole continues. But the diversity of alternatives and infrastructure implementations continues to how the industry generally in Dell specifically, are adapting to We're thrilled to have you here and hope you enjoy the program. We also hit on the storage part of the portfolio. So all of this complexity provides a lot of opportunity for attackers because it's expanding and the security mentality that, you know, security should enable our customers to go focus So I'm glad you you, you hit on that, but so given what you just said, what And in addition to this, Dell makes the commitment that we will rapidly how the threads have evolved, and we have also seen the regulatory trends and So thank you for that. And this is the principles that we use on power Edge, So the idea is that service first and foremost the chassis, the box, the several box is opened up, it logs alerts, and you can figure Great, thank you for that lot. So now the complexity that we are dealing with like was So once the customers receive the system at their end, do is quickly take a look at all the different pieces and compare it to the vulnerability you know, give us the sort of summary from your perspective, what are the key strengths of And as part of that like you know, security starts with the supply chain. And we also have dual layer encryption where you of the other things that they have to worry about, which are numerous. Technologies on the cube, your leader in enterprise and emerging tech coverage. So the question is from Dell's perspective, what's unique and to secure the network infrastructure In today's, you know, data driven world, it operates I like the way you phrase that. So if you look at it from a networking perspective, it's the ability to protect So I like that. kind of the assets that they're authorized to based on their user level. And it's imperative that logging is enable because any of the change to and I think you, you've got a third element which is i I think response, So the networking portfolio is no different, you know, it follows the same process for identification for tri and And then how you respond to incidents in a standard way has the ability, you know, to provide all this, this services from a Dell networking security You know, there are multiple layer of defense, you know, both at the edge and in the network in And one of the important aspect is, you know, in terms of, you know, the routing protocol, the specific security rules based on the specific applications, you know, that are running within the system. really that everything you just mentioned, or a lot of things you just mentioned used to be the responsibility design of the fabric and you know, from a deployment and you know, the management of the network and all of these things are actually valid, you know, for a modern networking infrastructure. just pitch me, what can you summarize from your point of view, is data for the digital signature, you know, prior to any upgrade process. can be possible by say looking at the clog service, you know, I mean I think frankly, you know, my takeaway is you of the portfolio and look at how when you enter the world of software defined where you're controlling different parts of the infrastructure stack, including storage servers this kind of sophisticated hard to defeat problem, we need short term So for the short term solution, the obvious thing to do is to patch bill of materials so that you can ensure the providence of all the components help So really the strength or the secret sauce is to combine all the So our partnership grows to our ecosystem through products like VMware, you know, the VMware component OTH zero, which the developers are gonna love. life cycle, which other products might talk about in their discussions with you that we integrate into All right, let's, let's close pitch me, what would you say is the strong suit summarize So I gave the example of spo, I gave the example of how So for, for example, the benefit to the customer is you The reason Jerome, this is so important is because SecOps teams, you know, they gotta deal with cloud security, And by the way, we're very successful in a highly regulated space. I'd love to have you back to talk about the progress that you're making down the Thank you very much, Dave. in the quality providence and data protection designed in to core infrastructure like
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
Jerome | PERSON | 0.99+ |
Dave | PERSON | 0.99+ |
Microsoft | ORGANIZATION | 0.99+ |
Dave Valante | PERSON | 0.99+ |
Deepak | PERSON | 0.99+ |
Dell Technologies | ORGANIZATION | 0.99+ |
Mahesh Nager | PERSON | 0.99+ |
Dell | ORGANIZATION | 0.99+ |
Jerome West | PERSON | 0.99+ |
Mahesh | PERSON | 0.99+ |
Dell Technologies | ORGANIZATION | 0.99+ |
demand@thecube.net | OTHER | 0.99+ |
Department of Defense | ORGANIZATION | 0.99+ |
Dave Ante | PERSON | 0.99+ |
second part | QUANTITY | 0.99+ |
first question | QUANTITY | 0.99+ |
VX rail | ORGANIZATION | 0.99+ |
First | QUANTITY | 0.99+ |
two weeks | QUANTITY | 0.99+ |
last year | DATE | 0.99+ |
Deepak Arage | PERSON | 0.99+ |
14 days | QUANTITY | 0.99+ |
second component | QUANTITY | 0.99+ |
second layer | QUANTITY | 0.99+ |
one | QUANTITY | 0.99+ |
today | DATE | 0.99+ |
A Blueprint for Trusted Infrastructure Made Possible | TITLE | 0.99+ |
hundreds | QUANTITY | 0.99+ |
one part | QUANTITY | 0.99+ |
both | QUANTITY | 0.98+ |
VMware | ORGANIZATION | 0.98+ |
VHA | ORGANIZATION | 0.98+ |
coverage@siliconangle.com | OTHER | 0.98+ |
hundred percent | QUANTITY | 0.98+ |
each | QUANTITY | 0.98+ |
vSphere | TITLE | 0.98+ |
dell.com/security | OTHER | 0.98+ |
Armis Closing Thoughts
(lively electronic music) >> Hello, everyone, welcome to the Closing Statement. This program, produced by theCUBE, is called Managing Your Risk Across the Extended Attack Surface with Armis Asset Intelligence Platform. You heard a lot about Armis vulnerability management from the CTO and the Co founder. They have big time customers, testimonials, offering them all up and a big demo to show you how easy their agent list program works and how easy it is to get time to value. It looks like they got a lot of traction with big time customers which is great for the industry to keep pushing ahead with these new security capabilities. This is a big problem that they solve. Having visibility into the entire asset base kind of on this discovery basis brings a Google Maps vibe to lay out all the assets and then understand the context of those. This has kind of given new kind of visibilities to take better action to understand what to protect and when to protect it. Critical assets versus non-critical. Which alerts to look at, what not to. All the data is there on a dashboard so this should help security professionals and operations teams be faster, smarter, more efficient, and enable their developers to develop the best solutions. This is a win for security owners, and managers, and operators, and developers, and you got a great company like ARMIS bringing on a great solution with this new platform. Let's see how it does. They have a bold customer base, and a strong management team, and great technology. This is a keep special program, John Furrier host. Thanks for watching. If you want a deeper dive into the subject, go check out their website armis.com/avm, you can just get a solution brief on all their material, and there's plenty of people to talk to. Thanks for watching. (lively electronic music)
SUMMARY :
and how easy it is to get time to value.
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
Armis | ORGANIZATION | 0.99+ |
John Furrier | PERSON | 0.99+ |
ARMIS | ORGANIZATION | 0.99+ |
armis.com/avm | OTHER | 0.96+ |
theCUBE | ORGANIZATION | 0.96+ |
Google Maps | TITLE | 0.94+ |
CTO | ORGANIZATION | 0.92+ |
Risk | TITLE | 0.5+ |
Armis | TITLE | 0.5+ |
Debby Briggs & Tyler Cohen Wood | CUBE Conversation
(upbeat music) >> Welcome to this Cube Conversation about women in tech and women in cybersecurity, two things I'm very passionate about. Lisa Martin here, with two guests, Debbie Briggs joins us, the Area Vice President, and Chief Security Officer at NETSCOUT, and Tyler Cohen Wood is here as well, the Founder and CEO of MyConnectedHealth. Ladies, it's an honor to have you on the program. I'm excited to talk to you. >> Thank you so much for having us. >> Completely agree. Tyler and I talked a couple of minutes last week and she has a lot to offer to this. >> I know, I was looking at both of your backgrounds. Very impressive. Tyler, starting with you. I see that you are a nationally recognized Cybersecurity Intelligence, National Security Expert, and former Director of Cyber Risk Management for AT&T. And I also saw that you just won a Top 50 Women in Tech Influencers to Follow for 2021 Award. Congratulations, that's amazing. I would love to know way back in the day, how did you even first become interested in tech? >> Well, it was kind of inevitable that I would go into something like tech because as a kid, I was kind of nerdy. I was obsessed with "Star Trek". I would catalog my "Star Trek" tapes by Stardate. I was just really into it. But when I was in college, I mean, it was the late 90's. Cybersecurity just really wasn't a thing. So I went into music and I worked for a radio station. I loved it, but the format of the radio station changed and I wanted to do something different. And I thought, well, computers. I'll move to San Francisco, and I'm sure I can get a job, 'cause they were hiring anyone with a brain, 'cause it was really the dot com boom. And that's really how I got into it. It was just kind of one of those things. (laughs) >> Did you have, was it like network connection, going from music to tech is quite a jump? >> It's a huge jump. It was, but you know, I was young. I was still fresh out of school. I was really interested in learning and I really wanted to get involved in cyber in some capacity, because I became really fascinated with it. So it was just kind of one of those things, that just sort of happened. >> What an interesting talk about a zig-zaggy path. That's a very, very interesting one. And I have to talk about music with you later. That would be interesting. And Debbie, you also have, as Tyler does, 20 years plus experience in cybersecurity. You've been with NETSCOUT since '04. Were you always interested in tech? Did you study engineering or computer science in school, Debbie? >> Yeah, so I think my interest in tech, just like Tyler started at a very young age. I was always interested in how things worked and how people worked. And some day over a drink, I will tell you some funny stories about things I took apart in my parents house, to figure out how it worked. (Lisa and Tyler laughing) They still don't know it. So I guess I- >> I love that. >> I just love that putting it back together, but I took a more traditional route than Tyler did. I do have a degree in Computer Science, went to school a little bit earlier than Tyler. What I would say is, when I was in college, the Computer Science Center was in the basement of the library and we had these really tiny windows and they sort of hit you in the dark. And I think it was my senior year and I went, "I don't want to sit in a room by myself and write code all day and talk to no one." So, you know, I'm a senior and I'm like, "Okay, I got to, this is not, I did not want to write code all day." And so I happened to fall into a great company and moved onto PCs. And from there went to messaging, to networking and into that, I fell into cybersecurity. So I took that more traditional route and I think I've done every job in IT, except for programming, which is what I really got my degree in. >> But you realized early on, you know, "I don't quite think this is for me." And that's an important thing for anybody in any career, to really listen to your gut. It's telling you something. I love how you both got into cybersecurity, which is now, especially in the last 18 months, with what we've seen with the threat landscape, such an incredible opportunity for anyone. But I'd like to know there's not a lot of women in tech, as we know we've been talking about this for a long time now. We've got maybe a quarter of women at the technology roles are filled by women. Tyler, talk to me about some of the challenges that you faced along your journey to get where you are today. >> Well, I mean, you know, like I said, when I started, it was like 1999, 2000. And there were even less women in cybersecurity and in these tech roles than there are now. And you know, it was difficult because, you know, I remember at my first job, I was so interested in learning about Unix and I would learn everything, I read everything about it. And I ended up getting promoted over all of my male colleagues. And you know, it was really awkward because there was the assumption, they would just say things like, "Oh, well you got that because you're a woman." And that was not the case, but it's that type of stereotyping, you know, that we've had to deal with in this industry. Now I do believe that is changing. And I've seen a lot of evidence of that. We're getting there, but we're not there yet. >> And I agree. I agree completely with what Tyler said. You know, when I started, you were the only woman in the room, you got promoted over your male counterparts. You know, I would say even 10 years ago, you know, someone was like, "Well, you could go for any CISCO role and you'd get the job because you're a woman." And I've had to go and say, "No, I might get an interview because I'm a woman, but you don't get the job just because, you know, you check a box." You know, some of that is still out there, but Tyler you're right, things are changing. I think, you know, three things that we all need to focus in on to continue to move us forward and get more women into tech is the first thing is we have to start younger. I think by high school, a lot of girls and young women have been turned off by technology. So maybe, we need to start in the middle school and ensuring that we've got young girls interested. The second thing is, is we have to have mentors. And I always say, if you're in the security industry, you have to turn around and help the next person out. And if that person is a woman, that's great, but we have to mentor others. And it can be young girls, it could be young gentlemen, but we need to mentor that next group up. And you know, if you're in the position to offer internships during the summer, we don't have to stay to the traditional role and go, "Oh, let me hire just intern from the you know IT, they're getting degrees in IT." You can get creative. And my best worker right now was an intern that worked for me, was an intern for me six years ago. And she has a degree in Finance, so nontraditional route into cyber security. And the third thing I think we need to do is, is there things the industry could do to change things and make things, I don't want to say even 'cause they're not uneven, but for example, I forget what survey it was, but if a woman reads a job description and I can do half of it, I'm not going to apply because I don't feel I'll qualify, where men, on the other hand, if they can do three out of ten they'll apply. So do we need to look at the way we write job descriptions, and use different words, you know, rather than must have these skills. You know, sort of leave it a little bit open, like here are the skills we'd like you to have, or have, you know, a handful of the following. So soften some of those job descriptions. And the second thing is once we get women in, we have to be a little bit more, I'll say inclusive. So, if you're a high tech company, look at, you know, your sales organization. When you go to big shows, do you pay more attention to men on the floor than women on the floor? If you have a sales event where you get different customers together, is it a golf outing or is it something that's maybe a little bit more inclusive than just male? So those are the three things I think as an industry we have to focus in on, start younger, get them, you know, work on mentorships specifically in cyber, and the third thing is, look at some of the things that we're doing, as companies both in our HR and sales practices. >> That's a great, that last piece of advice, Debbie is fantastic. That's one that I hadn't thought about, but you're right. If a job description is written, for must have all of these things and a woman that goes, "I only got three out of the ten. I'm not going to even get past, you know, the recruiter here." How can we write things differently? I also loved your idea of bringing in people with diverse backgrounds. I've been in marketing for 16 years and I've met very few people that actually have marketing degrees, a lot of people. So you get that diversity of thought. Tyler, what are some of your thoughts about how we can help expand the role of women in technology? Do you agree with some of the things that Debbie said? >> I love what Debbie said. I agree 100%. And I started laughing because I was thinking about all the golf outings that I've been on and I don't play golf. (all laughing) I think that there is an untapped resource because there's a lot of women who are now interested in changing their careers and that's a big pool of people. And I think that making it more accessible and making it so that people understand what the different cyber security or cyber jobs are, because a lot of people just assume that it's coding, or it's, you know, working on AI, but that's not necessarily true. I mean, there's so many different avenues. There's marketing, there's forensics, there's incident response. I mean, I could go on and on and on. And oftentimes if people don't know that these types of jobs exist, they're not even going to look for them. So making that more well-known, what the different types of opportunities are to people, I think that that would help kind of open more doors. >> And that goes along beautifully with what Debbie was talking about with respect to mentorship. And I would even add sponsorship in there, but becoming a sponsor of a younger female, who's maybe considering tech or is already in tech to help her navigate the career. Look for the other opportunities. Tyler, as you mentioned, there's a lot to cybersecurity, that is beyond coding and AI for example. So maybe getting the awareness out there more. Did either of you have sponsors when you were early in your career? Are you a sponsor now? Debbie, let's start with you. >> So, I'll answer your first question. I guess I was really fortunate that my first job out of college, I had an internship and I happened to have a female boss. And so, although we may not have called it sponsorship or mentor, she taught me and showed me that, you know, women can be leaders. And she always believed in us and always pushed us to do things beyond what we may have thought we were capable of. Throughout the years, someone once told me that we should all have our own personal board of directors. You know, a group of people that when we're making a decision, that may be life-changing or we're unsure, rather than just having one mentor, having a group of people that you, that you know, they don't have to be in cybersecurity. Yeah, I want someone that's on my board of directors that maybe, is a specialist in cybersecurity, but having other executives in other companies, that can also give you that perspective. You know, so I've always had a personal board of directors. I think I've had three or four different mentors. Some of them, I went out and found. Some of them I have joined organizations that have been fortunate enough to become not only a mentor, but a mentee. And I've kept those relationships up over three or four years. And all those people are now on my personal board of directors, that, you know, if I have a life-changing question, I've got a group of people that I can go back on. >> That is brilliant advice. I love that having a... Isn't that great Tyler? Having a personal- >> Yes Yes! >> Board of directors, especially as we look at cybersecurity and the cybersecurity skills gap Tyler has been, I think it's in its 5th year now, which is there's so much opportunity. What we saw in the threat landscape in the last 18, 19 months during the pandemic was this explosion and the attack surface, ransomware becoming a word that even my mom knows these days. What do you advise Tyler for, you talked about really making people much more aware of all of the opportunities within cyber, but when you think about how you would get women interested in cybersecurity specifically, what are some of the key pieces of advice you would offer? >> Well, again, I think I love the board of directors. I love that. That is brilliant, but I really think that it is about finding mentors, and it is about doing the research, and really asking questions. Because if you reach out to someone on LinkedIn, you know, they may just not respond, but chances are some someone will and, you know, most people in this community are very willing to help. And, you know, I found that to be great. I mean, I've got my board of directors too. I realize that now. (Debbie laughs) But I also like to help other people as well, that are just kind of entering into the field or if they're changing their careers. And it's not necessarily just women, it's people that are interested in getting into an aspect of this industry. And this is a industry where, you know, you can jump from this, to this, to this, to this. I mean, I think that I've had six different major career shifts still within the cybersecurity realm. So, just because you start off doing one thing doesn't mean that that's what you're going to do forever. There're so many different areas. And it's really interesting. I think about my 11 year old niece and she may very well have a job someday, that doesn't even exist right now. That's how quickly cyber and everything connected is moving. And if you think about it, we are connected, there is a cyber component to every single thing that we do, and that's going to continue to expand and continue to grow. And we need more people to be interested, and to want to get into these careers. And I think also it's important for younger girls to let them know these careers are really fun and they're extremely rewarding. And I mean, I hate to use this as an incentive, but there's also a lot of money that can be made too, and that's an incentive to get, you know, women and girls into these careers as well. >> And Tyler, I think you're right. In addition to that, you're always going to have a job. And I think cyber is a great career for someone that are lifelong learners, because like you said, your 11 year old niece, the job, when she graduates from college, she may have, probably doesn't even exist today. And so I think you have to be a lifelong learner. I think one of the things that people may not be aware of is, you know, for women who may have gone the non-traditional route and got degrees later in life, or took time off to raise children and want to come back to work, cyber security is something that, you know, doesn't have to be a nine to five job. I have, it happens to be a gentlemen on my team, who has to get kids on the bus and off the bus. And so we figured out how, you know, he gets up and he works for a couple hours, puts kids on the bus, is in the office. And then he gets the kids off. And once they've had dinner and gone to bed, he puts in a couple more hours. And I think, you know, people need to be aware of, there is some flexibility, there is flexibility in cyber jobs. I mean, it's not a nine to five job, it's not like banking. Well, if you were teller, and your hours are when the bank is open, cyber is 7/24 and jobs can be flexible. And I think people need to be aware of that. >> I agree on the flexibility front, and people also need to be flexible themselves. I do want to ask you both, we're getting low on time, but I've got to ask you, how do you get the confidence, to be, like you said, back in the day, in the room, maybe the only female and I've been in that as well, even in marketing, product marketing years ago. How do you get the confidence to continue moving forward? Even as someone says, "You're only here because you're a female." Tyler, what's your advice to help young women and young men as well fight any sort of challenges that are coming their way? >> I had a mentor when I first moved to the Defense Intelligence Agency, I had an Office Chief and she said to me, "Tyler, you're a Senior Intelligence Officer, you always take a seat at the table. Do not let anyone tell you that you cannot have a seat at the table." And you know, that was good advice. And I think confidence is great. But courage is something that's much more important, because courage is what leads up to confidence. And you really have to believe in yourself and do things that you know are right for you, not because you think it's going to make other people happy. And I think, you know, as women, it's really finding that courage to be brave and to be strong and to be willing to stand out, you know, alone on something, because it's what you care about and what you believe in. And that's really what helps kind of motivate me. >> I love that courage. Debbie, what are your thoughts? >> (laughs) So I was going to say, this is going to be really hard to believe, but when I was 16 years old, I was so shy that if I went to a restaurant and someone served me stone cold food, I wouldn't say a word. I would just eat it. If I bought something in a store and I didn't like it, I'd refuse, I just couldn't bring myself to go to that customer service desk and return it. And my first job in high school, was it a fast food place. And I worked for a gentleman who was a little bit of a tyrant, but you know, I learned how to get a backbone very quickly. And I would have to say now looking back, he was probably my first mentor without even trying to do that. He mentored me on how to believe in myself and how to stand up for what's right. So, Tyler, I completely agree with you. And you know, that's something that people think when they get a mentorship, sometimes it's someone going to mentor them on, you know, something tactical, something they want to know how to do, but sometimes what you need to be mentored in, could be, "How do I believe in myself?" Or "How do I find the courage to be that the only female in the room?" And I think that is where some of that mentorship comes from and, you know, I think, you know, if we go back to mentoring at the middle school, there's lots of opportunities, career fairs, the first robotically, get the middle school level, gives all of us an opportunity to sort of mentor girls at that level. And for all the guys out there who have daughters, this is, you know, how to... It's not like you can get a parenting checklist, "Teach my kid courage." And Tyler, I love that word, but I think that's something that we all need to aspire to bring out in others. >> I love that. I love that. >> Okay with that, I think I love both of your stories, are zig-zaggy in certain ways, one in a more direct cybersecurity path, Debbie with yours. Tyler, yours, very different coming from the music industry. But you both have such great advice. It's really, I would say, I'm going to add that, open your mind to be open to, you can do anything. As Tyler said, there's a very great possibility that right now the job that your niece who's 11 is going to get in the next 10 years, doesn't exist yet. How exciting is that? To have the opportunity to be open-minded enough and flexible enough to say, "I'm going to try that." And I'm going to learn from my mentors, whether it's a fast food cook, which I wouldn't think would be a direct mentor, and recognizing years later, "Wow, what an impact that person had on me, having the courage to do what I have." And so I would ask you like each one more question in terms of just your inspiration for what you're currently doing. Debbie, as the leader of security for NETSCOUT, what inspires you to continue in your current role and seek more? >> So, I'm a lifelong learner. So, I love to learn cybersecurity. You know, every day is a different day. So, it's definitely the ability to continue to learn and to do new things. But the second thing is, is I think I've always been, I don't want to call it a fixer-upper because cybersecurity isn't a fixer-upper, I'm just always wanted to improve upon things. If I've seen something that I think can do better, or a product that could have something new or better in it, you know, that's what excites me is to give people that feedback and to improve on what we've had out there. You know, you had mentioned, we've got this block of jobs that we can't fill. We have to give feedback and how we get the tools and what we have today smarter, so that if there are less of us, we're working smarter and not harder. And so if there is some low-level tasks that we could put back into tools, and talk to vendors and have them do this for us, that's how I think we start to get our way sort of out of the hole. Tyler, any thoughts on that? >> I again, I love that answer. I mean, I think for me, you know, I do like, it's that problem solving thing too. But for me it's also about, it's about compassion. And when I see, you know, a story of some child that's been involved in some kind of cyber bullying attack, or a company that has been broken into, I want to do whatever I can to help people, and to teach people to really protect themselves, so that they feel empowered and they're not afraid of cyber security. So for me, it's also really that drive to really make a difference and really help people. >> And you've both done, I'm sure, so much of that made such a big difference in many communities in which you're involved. I thank you so much for sharing your journeys with me on the program today, and giving such great pointed advice to young men and women, and even some of the older men and women out there that might be kind of struggling about, where do I go next? Your advice is brilliant, ladies. Thank you so much. It's been a pleasure talking with you. >> Thank you. >> Thank you. >> For Debbie Briggs and Tyler Cohen Wood, I'm Lisa Martin. You've been watching this Cube Conversation. (upbeat music)
SUMMARY :
have you on the program. and she has a lot to offer to this. And I also saw that you just won And I thought, well, computers. It was, but you know, I was young. And I have to talk about I will tell you some funny stories And I think it was my I love how you both got into And you know, it was difficult because, I think, you know, you know, the recruiter here." And I think that making it more accessible And I would even add sponsorship in there, that can also give you that perspective. I love that having a... but when you think about how and that's an incentive to get, you know, And I think, you know, I do want to ask you both, And I think, you know, as women, I love that courage. And you know, that's something that I love that. And so I would ask you that feedback and to improve I mean, I think for me, you know, I thank you so much for For Debbie Briggs and Tyler Cohen Wood,
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
Debbie | PERSON | 0.99+ |
Tyler | PERSON | 0.99+ |
Lisa Martin | PERSON | 0.99+ |
Debbie Briggs | PERSON | 0.99+ |
Tyler Cohen Wood | PERSON | 0.99+ |
San Francisco | LOCATION | 0.99+ |
Star Trek | TITLE | 0.99+ |
three | QUANTITY | 0.99+ |
1999 | DATE | 0.99+ |
Star Trek | TITLE | 0.99+ |
NETSCOUT | ORGANIZATION | 0.99+ |
2000 | DATE | 0.99+ |
Debby Briggs | PERSON | 0.99+ |
16 years | QUANTITY | 0.99+ |
two guests | QUANTITY | 0.99+ |
100% | QUANTITY | 0.99+ |
20 years | QUANTITY | 0.99+ |
11 | QUANTITY | 0.99+ |
MyConnectedHealth | ORGANIZATION | 0.99+ |
5th year | QUANTITY | 0.99+ |
Lisa | PERSON | 0.99+ |
first question | QUANTITY | 0.99+ |
Defense Intelligence Agency | ORGANIZATION | 0.99+ |
both | QUANTITY | 0.99+ |
AT&T. | ORGANIZATION | 0.99+ |
ten | QUANTITY | 0.99+ |
nine | QUANTITY | 0.99+ |
late 90's | DATE | 0.99+ |
CISCO | ORGANIZATION | 0.99+ |
first job | QUANTITY | 0.99+ |
ORGANIZATION | 0.99+ | |
six years ago | DATE | 0.99+ |
today | DATE | 0.99+ |
second thing | QUANTITY | 0.99+ |
first mentor | QUANTITY | 0.98+ |
last week | DATE | 0.98+ |
Stardate | ORGANIZATION | 0.98+ |
11 year old | QUANTITY | 0.98+ |
three things | QUANTITY | 0.97+ |
one | QUANTITY | 0.97+ |
10 years ago | DATE | 0.97+ |
two things | QUANTITY | 0.97+ |
first | QUANTITY | 0.97+ |
third thing | QUANTITY | 0.95+ |
one mentor | QUANTITY | 0.95+ |
Debby Briggs & Tyler Cohen Wood | CUBE Conversation, October 2021
(upbeat music) >> Welcome to this Cube Conversation about women in tech and women in cybersecurity, two things I'm very passionate about. Lisa Martin here, with two guests, Debbie Briggs joins us, the Area Vice President, and Chief Security Officer at NETSCOUT, and Tyler Cohen Wood is here as well, the Founder and CEO of MyConnectedHealth. Ladies, it's an honor to have you on the program. I'm excited to talk to you. >> Thank you so much for having us. >> Completely agree. Tyler and I talked a couple of minutes last week and she has a lot to offer to this. >> I know, I was looking at both of your backgrounds. Very impressive. Tyler, starting with you. I see that you are a nationally recognized Cybersecurity Intelligence, National Security Expert, and former Director of Cyber Risk Management for AT&T. And I also saw that you just won a Top 50 Women in Tech Influencers to Follow for 2021 Award. Congratulations, that's amazing. I would love to know way back in the day, how did you even first become interested in tech? >> Well, it was kind of inevitable that I would go into something like tech because as a kid, I was kind of nerdy. I was obsessed with "Star Trek". I would catalog my "Star Trek" tapes by Stardate. I was just really into it. But when I was in college, I mean, it was the late 90's. Cybersecurity just really wasn't a thing. So I went into music and I worked for a radio station. I loved it, but the format of the radio station changed and I wanted to do something different. And I thought, well, computers. I'll move to San Francisco, and I'm sure I can get a job, 'cause they were hiring anyone with a brain, 'cause it was really the dot com boom. And that's really how I got into it. It was just kind of one of those things. (laughs) >> Did you have, was it like network connection, going from music to tech is quite a jump? >> It's a huge jump. It was, but you know, I was young. I was still fresh out of school. I was really interested in learning and I really wanted to get involved in cyber in some capacity, because I became really fascinated with it. So it was just kind of one of those things, that just sort of happened. >> What an interesting talk about a zig-zaggy path. That's a very, very interesting one. And I have to talk about music with you later. That would be interesting. And Debbie, you also have, as Tyler does, 20 years plus experience in cybersecurity. You've been with NETSCOUT since '04. Were you always interested in tech? Did you study engineering or computer science in school, Debbie? >> Yeah, so I think my interest in tech, just like Tyler started at a very young age. I was always interested in how things worked and how people worked. And some day over a drink, I will tell you some funny stories about things I took apart in my parents house, to figure out how it worked. (Lisa and Tyler laughing) They still don't know it. So I guess I- >> I love that. >> I just love that putting it back together, but I took a more traditional route than Tyler did. I do have a degree in Computer Science, went to school a little bit earlier than Tyler. What I would say is, when I was in college, the Computer Science Center was in the basement of the library and we had these really tiny windows and they sort of hit you in the dark. And I think it was my senior year and I went, "I don't want to sit in a room by myself and write code all day and talk to no one." So, you know, I'm a senior and I'm like, "Okay, I got to, this is not, I did not want to write code all day." And so I happened to fall into a great company and moved onto PCs. And from there went to messaging, to networking and into that, I fell into cybersecurity. So I took that more traditional route and I think I've done every job in IT, except for programming, which is what I really got my degree in. >> But you realized early on, you know, "I don't quite think this is for me." And that's an important thing for anybody in any career, to really listen to your gut. It's telling you something. I love how you both got into cybersecurity, which is now, especially in the last 18 months, with what we've seen with the threat landscape, such an incredible opportunity for anyone. But I'd like to know there's not a lot of women in tech, as we know we've been talking about this for a long time now. We've got maybe a quarter of women at the technology roles are filled by women. Tyler, talk to me about some of the challenges that you faced along your journey to get where you are today. >> Well, I mean, you know, like I said, when I started, it was like 1999, 2000. And there were even less women in cybersecurity and in these tech roles than there are now. And you know, it was difficult because, you know, I remember at my first job, I was so interested in learning about Unix and I would learn everything, I read everything about it. And I ended up getting promoted over all of my male colleagues. And you know, it was really awkward because there was the assumption, they would just say things like, "Oh, well you got that because you're a woman." And that was not the case, but it's that type of stereotyping, you know, that we've had to deal with in this industry. Now I do believe that is changing. And I've seen a lot of evidence of that. We're getting there, but we're not there yet. >> And I agree. I agree completely with what Tyler said. You know, when I started, you were the only woman in the room, you got promoted over your male counterparts. You know, I would say even 10 years ago, you know, someone was like, "Well, you could go for any CISCO role and you'd get the job because you're a woman." And I've had to go and say, "No, I might get an interview because I'm a woman, but you don't get the job just because, you know, you check a box." You know, some of that is still out there, but Tyler you're right, things are changing. I think, you know, three things that we all need to focus in on to continue to move us forward and get more women into tech is the first thing is we have to start younger. I think by high school, a lot of girls and young women have been turned off by technology. So maybe, we need to start in the middle school and ensuring that we've got young girls interested. The second thing is, is we have to have mentors. And I always say, if you're in the security industry, you have to turn around and help the next person out. And if that person is a woman, that's great, but we have to mentor others. And it can be young girls, it could be young gentlemen, but we need to mentor that next group up. And you know, if you're in the position to offer internships during the summer, we don't have to stay to the traditional role and go, "Oh, let me hire just intern from the you know IT, they're getting degrees in IT." You can get creative. And my best worker right now was an intern that worked for me, was an intern for me six years ago. And she has a degree in Finance, so nontraditional route into cyber security. And the third thing I think we need to do is, is there things the industry could do to change things and make things, I don't want to say even 'cause they're not uneven, but for example, I forget what survey it was, but if a woman reads a job description and I can do half of it, I'm not going to apply because I don't feel I'll qualify, where men, on the other hand, if they can do three out of ten they'll apply. So do we need to look at the way we write job descriptions, and use different words, you know, rather than must have these skills. You know, sort of leave it a little bit open, like here are the skills we'd like you to have, or have, you know, a handful of the following. So soften some of those job descriptions. And the second thing is once we get women in, we have to be a little bit more, I'll say inclusive. So, if you're a high tech company, look at, you know, your sales organization. When you go to big shows, do you pay more attention to men on the floor than women on the floor? If you have a sales event where you get different customers together, is it a golf outing or is it something that's maybe a little bit more inclusive than just male? So those are the three things I think as an industry we have to focus in on, start younger, get them, you know, work on mentorships specifically in cyber, and the third thing is, look at some of the things that we're doing, as companies both in our HR and sales practices. >> That's a great, that last piece of advice, Debbie is fantastic. That's one that I hadn't thought about, but you're right. If a job description is written, for must have all of these things and a woman that goes, "I only got three out of the ten. I'm not going to even get past, you know, the recruiter here." How can we write things differently? I also loved your idea of bringing in people with diverse backgrounds. I've been in marketing for 16 years and I've met very few people that actually have marketing degrees, a lot of people. So you get that diversity of thought. Tyler, what are some of your thoughts about how we can help expand the role of women in technology? Do you agree with some of the things that Debbie said? >> I love what Debbie said. I agree 100%. And I started laughing because I was thinking about all the golf outings that I've been on and I don't play golf. (all laughing) I think that there is an untapped resource because there's a lot of women who are now interested in changing their careers and that's a big pool of people. And I think that making it more accessible and making it so that people understand what the different cyber security or cyber jobs are, because a lot of people just assume that it's coding, or it's, you know, working on AI, but that's not necessarily true. I mean, there's so many different avenues. There's marketing, there's forensics, there's incident response. I mean, I could go on and on and on. And oftentimes if people don't know that these types of jobs exist, they're not even going to look for them. So making that more well-known, what the different types of opportunities are to people, I think that that would help kind of open more doors. >> And that goes along beautifully with what Debbie was talking about with respect to mentorship. And I would even add sponsorship in there, but becoming a sponsor of a younger female, who's maybe considering tech or is already in tech to help her navigate the career. Look for the other opportunities. Tyler, as you mentioned, there's a lot to cybersecurity, that is beyond coding and AI for example. So maybe getting the awareness out there more. Did either of you have sponsors when you were early in your career? Are you a sponsor now? Debbie, let's start with you. >> So, I'll answer your first question. I guess I was really fortunate that my first job out of college, I had an internship and I happened to have a female boss. And so, although we may not have called it sponsorship or mentor, she taught me and showed me that, you know, women can be leaders. And she always believed in us and always pushed us to do things beyond what we may have thought we were capable of. Throughout the years, someone once told me that we should all have our own personal board of directors. You know, a group of people that when we're making a decision, that may be life-changing or we're unsure, rather than just having one mentor, having a group of people that you, that you know, they don't have to be in cybersecurity. Yeah, I want someone that's on my board of directors that maybe, is a specialist in cybersecurity, but having other executives in other companies, that can also give you that perspective. You know, so I've always had a personal board of directors. I think I've had three or four different mentors. Some of them, I went out and found. Some of them I have joined organizations that have been fortunate enough to become not only a mentor, but a mentee. And I've kept those relationships up over three or four years. And all those people are now on my personal board of directors, that, you know, if I have a life-changing question, I've got a group of people that I can go back on. >> That is brilliant advice. I love that having a... Isn't that great Tyler? Having a personal- >> Yes Yes! >> Board of directors, especially as we look at cybersecurity and the cybersecurity skills gap Tyler has been, I think it's in its 5th year now, which is there's so much opportunity. What we saw in the threat landscape in the last 18, 19 months during the pandemic was this explosion and the attack surface, ransomware becoming a word that even my mom knows these days. What do you advise Tyler for, you talked about really making people much more aware of all of the opportunities within cyber, but when you think about how you would get women interested in cybersecurity specifically, what are some of the key pieces of advice you would offer? >> Well, again, I think I love the board of directors. I love that. That is brilliant, but I really think that it is about finding mentors, and it is about doing the research, and really asking questions. Because if you reach out to someone on LinkedIn, you know, they may just not respond, but chances are some someone will and, you know, most people in this community are very willing to help. And, you know, I found that to be great. I mean, I've got my board of directors too. I realize that now. (Debbie laughs) But I also like to help other people as well, that are just kind of entering into the field or if they're changing their careers. And it's not necessarily just women, it's people that are interested in getting into an aspect of this industry. And this is a industry where, you know, you can jump from this, to this, to this, to this. I mean, I think that I've had six different major career shifts still within the cybersecurity realm. So, just because you start off doing one thing doesn't mean that that's what you're going to do forever. There're so many different areas. And it's really interesting. I think about my 11 year old niece and she may very well have a job someday, that doesn't even exist right now. That's how quickly cyber and everything connected is moving. And if you think about it, we are connected, there is a cyber component to every single thing that we do, and that's going to continue to expand and continue to grow. And we need more people to be interested, and to want to get into these careers. And I think also it's important for younger girls to let them know these careers are really fun and they're extremely rewarding. And I mean, I hate to use this as an incentive, but there's also a lot of money that can be made too, and that's an incentive to get, you know, women and girls into these careers as well. >> And Tyler, I think you're right. In addition to that, you're always going to have a job. And I think cyber is a great career for someone that are lifelong learners, because like you said, your 11 year old niece, the job, when she graduates from college, she may have, probably doesn't even exist today. And so I think you have to be a lifelong learner. I think one of the things that people may not be aware of is, you know, for women who may have gone the non-traditional route and got degrees later in life, or took time off to raise children and want to come back to work, cyber security is something that, you know, doesn't have to be a nine to five job. I have, it happens to be a gentlemen on my team, who has to get kids on the bus and off the bus. And so we figured out how, you know, he gets up and he works for a couple hours, puts kids on the bus, is in the office. And then he gets the kids off. And once they've had dinner and gone to bed, he puts in a couple more hours. And I think, you know, people need to be aware of, there is some flexibility, there is flexibility in cyber jobs. I mean, it's not a nine to five job, it's not like banking. Well, if you were teller, and your hours are when the bank is open, cyber is 7/24 and jobs can be flexible. And I think people need to be aware of that. >> I agree on the flexibility front, and people also need to be flexible themselves. I do want to ask you both, we're getting low on time, but I've got to ask you, how do you get the confidence, to be, like you said, back in the day, in the room, maybe the only female and I've been in that as well, even in marketing, product marketing years ago. How do you get the confidence to continue moving forward? Even as someone says, "You're only here because you're a female." Tyler, what's your advice to help young women and young men as well fight any sort of challenges that are coming their way? >> I had a mentor when I first moved to the Defense Intelligence Agency, I had an Office Chief and she said to me, "Tyler, you're a Senior Intelligence Officer, you always take a seat at the table. Do not let anyone tell you that you cannot have a seat at the table." And you know, that was good advice. And I think confidence is great. But courage is something that's much more important, because courage is what leads up to confidence. And you really have to believe in yourself and do things that you know are right for you, not because you think it's going to make other people happy. And I think, you know, as women, it's really finding that courage to be brave and to be strong and to be willing to stand out, you know, alone on something, because it's what you care about and what you believe in. And that's really what helps kind of motivate me. >> I love that courage. Debbie, what are your thoughts? >> (laughs) So I was going to say, this is going to be really hard to believe, but when I was 16 years old, I was so shy that if I went to a restaurant and someone served me stone cold food, I wouldn't say a word. I would just eat it. If I bought something in a store and I didn't like it, I'd refuse, I just couldn't bring myself to go to that customer service desk and return it. And my first job in high school, was it a fast food place. And I worked for a gentleman who was a little bit of a tyrant, but you know, I learned how to get a backbone very quickly. And I would have to say now looking back, he was probably my first mentor without even trying to do that. He mentored me on how to believe in myself and how to stand up for what's right. So, Tyler, I completely agree with you. And you know, that's something that people think when they get a mentorship, sometimes it's someone going to mentor them on, you know, something tactical, something they want to know how to do, but sometimes what you need to be mentored in, could be, "How do I believe in myself?" Or "How do I find the courage to be that the only female in the room?" And I think that is where some of that mentorship comes from and, you know, I think, you know, if we go back to mentoring at the middle school, there's lots of opportunities, career fairs, the first robotically, get the middle school level, gives all of us an opportunity to sort of mentor girls at that level. And for all the guys out there who have daughters, this is, you know, how to... It's not like you can get a parenting checklist, "Teach my kid courage." And Tyler, I love that word, but I think that's something that we all need to aspire to bring out in others. >> I love that. I love that. >> Okay with that, I think I love both of your stories, are zig-zaggy in certain ways, one in a more direct cybersecurity path, Debbie with yours. Tyler, yours, very different coming from the music industry. But you both have such great advice. It's really, I would say, I'm going to add that, open your mind to be open to, you can do anything. As Tyler said, there's a very great possibility that right now the job that your niece who's 11 is going to get in the next 10 years, doesn't exist yet. How exciting is that? To have the opportunity to be open-minded enough and flexible enough to say, "I'm going to try that." And I'm going to learn from my mentors, whether it's a fast food cook, which I wouldn't think would be a direct mentor, and recognizing years later, "Wow, what an impact that person had on me, having the courage to do what I have." And so I would ask you like each one more question in terms of just your inspiration for what you're currently doing. Debbie, as the leader of security for NETSCOUT, what inspires you to continue in your current role and seek more? >> So, I'm a lifelong learner. So, I love to learn cybersecurity. You know, every day is a different day. So, it's definitely the ability to continue to learn and to do new things. But the second thing is, is I think I've always been, I don't want to call it a fixer-upper because cybersecurity isn't a fixer-upper, I'm just always wanted to improve upon things. If I've seen something that I think can do better, or a product that could have something new or better in it, you know, that's what excites me is to give people that feedback and to improve on what we've had out there. You know, you had mentioned, we've got this block of jobs that we can't fill. We have to give feedback and how we get the tools and what we have today smarter, so that if there are less of us, we're working smarter and not harder. And so if there is some low-level tasks that we could put back into tools, and talk to vendors and have them do this for us, that's how I think we start to get our way sort of out of the hole. Tyler, any thoughts on that? >> I again, I love that answer. I mean, I think for me, you know, I do like, it's that problem solving thing too. But for me it's also about, it's about compassion. And when I see, you know, a story of some child that's been involved in some kind of cyber bullying attack, or a company that has been broken into, I want to do whatever I can to help people, and to teach people to really protect themselves, so that they feel empowered and they're not afraid of cyber security. So for me, it's also really that drive to really make a difference and really help people. >> And you've both done, I'm sure, so much of that made such a big difference in many communities in which you're involved. I thank you so much for sharing your journeys with me on the program today, and giving such great pointed advice to young men and women, and even some of the older men and women out there that might be kind of struggling about, where do I go next? Your advice is brilliant, ladies. Thank you so much. It's been a pleasure talking with you. >> Thank you. >> Thank you. >> For Debbie Briggs and Tyler Cohen Wood, I'm Lisa Martin. You've been watching this Cube Conversation. (upbeat music)
SUMMARY :
have you on the program. and she has a lot to offer to this. And I also saw that you just won And I thought, well, computers. It was, but you know, I was young. And I have to talk about I will tell you some funny stories And I think it was my I love how you both got into And you know, it was difficult because, I think, you know, you know, the recruiter here." And I think that making it more accessible And I would even add sponsorship in there, that can also give you that perspective. I love that having a... but when you think about how and that's an incentive to get, you know, And I think, you know, I do want to ask you both, And I think, you know, as women, I love that courage. And you know, that's something that I love that. And so I would ask you that feedback and to improve I mean, I think for me, you know, I thank you so much for For Debbie Briggs and Tyler Cohen Wood,
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
Debbie | PERSON | 0.99+ |
Tyler | PERSON | 0.99+ |
Lisa Martin | PERSON | 0.99+ |
Debbie Briggs | PERSON | 0.99+ |
Tyler Cohen Wood | PERSON | 0.99+ |
October 2021 | DATE | 0.99+ |
San Francisco | LOCATION | 0.99+ |
Star Trek | TITLE | 0.99+ |
three | QUANTITY | 0.99+ |
1999 | DATE | 0.99+ |
Star Trek | TITLE | 0.99+ |
Debby Briggs | PERSON | 0.99+ |
NETSCOUT | ORGANIZATION | 0.99+ |
2000 | DATE | 0.99+ |
16 years | QUANTITY | 0.99+ |
two guests | QUANTITY | 0.99+ |
100% | QUANTITY | 0.99+ |
20 years | QUANTITY | 0.99+ |
11 | QUANTITY | 0.99+ |
MyConnectedHealth | ORGANIZATION | 0.99+ |
5th year | QUANTITY | 0.99+ |
Lisa | PERSON | 0.99+ |
first question | QUANTITY | 0.99+ |
Defense Intelligence Agency | ORGANIZATION | 0.99+ |
both | QUANTITY | 0.99+ |
AT&T. | ORGANIZATION | 0.99+ |
ten | QUANTITY | 0.99+ |
nine | QUANTITY | 0.99+ |
late 90's | DATE | 0.99+ |
CISCO | ORGANIZATION | 0.99+ |
first job | QUANTITY | 0.99+ |
ORGANIZATION | 0.99+ | |
six years ago | DATE | 0.99+ |
today | DATE | 0.99+ |
second thing | QUANTITY | 0.99+ |
first mentor | QUANTITY | 0.98+ |
last week | DATE | 0.98+ |
Stardate | ORGANIZATION | 0.98+ |
11 year old | QUANTITY | 0.98+ |
three things | QUANTITY | 0.97+ |
one | QUANTITY | 0.97+ |
10 years ago | DATE | 0.97+ |
two things | QUANTITY | 0.97+ |
first | QUANTITY | 0.97+ |
third thing | QUANTITY | 0.95+ |
Sam Werner, IBM and Brent Compton, Red Hat | KubeCon + CloudNativeCon NA 2020
>>from around the globe. It's the Cube with coverage of Yukon and Cloud. Native Con North America. 2020. Virtual Brought to You by Red Hat, The Cloud, Native Computing Foundation and Ecosystem Partners. Hey, welcome back, everybody. Jeffrey here with the Cube coming to you from our Palo Alto studios with our ongoing coverage of Q. Khan Cloud, Native Con 2020 North America. Of course, it's virtual like everything else is in 2020 but we're excited to be back. It's a terrific show, and we're excited our next guest. So let's introduce him. And we've got Sam Warner, the VP of offering manager and business line executive for storage for IBM. Sam. Great to see you. >>Great to be here. >>And also joining us is Brent Compton. He's a senior director of data services for Redhead. Great. See you, Brent. >>Thank you. >>So let's let's jump into it. Cloud Native. Everything's about cloud native. Everything's about containers. Everything is about kind of container ization and flexibility. But then there's this thing in the back and called storage. We actually have toe keep this stuff and record this stuff and have data protection for this stuff in business resiliency love to jump into it, so lets you know where does storage fit within a container world? And how is the growth of containers and the adoption containers really had you rethink the way that you think about storage and how clients you think about stories saying, Let's start with you >>e mean, it's a great question. And first off, I'm really excited about another cube con. Uh, we did Europe now, uh, doing North America so very excited to be, you know, seeing all the you know, all the news and all the people talking about the advancements around kubernetes. And we're very excited about it now. You asked a very good question. Important question. We're seeing an acceleration of digital transformation, and the people that are going through this digital transformation are using containers to now modernize the rest of their infrastructure. The interesting thing about it, though, is those initiatives are being driven out of the application teams. The business lines in an organization, and a lot of them don't understand that there's a lot of complexity to this storage piece here. So the storage teams I talked to are all of a sudden getting these initiatives thrown on them or a kind of halfway their strategy. And they're scratching their heads, trying to figure out now how they can support these applications with persistent storage. Because that's not where containers started. They started with micro services, and now now they're in a quandary. They have to deliver a certain S L. A to their customers, and they're trying to figure out how they do it in this new environment, which in a lot of cases, has been designed outside of their scope. So they're seeing issues with data protection. Some of the kind of core things that they've been dealing with for years are now. They're now having to solve all over again. So that's what we're working on helping them with reinventing how storage is deployed to help them deliver the same level of security, availability and everything they have in the past. Uh, in these new environments, >>right? So, yeah, e say you've been involved in this for a long time. You know, you've worked in hyper converge. You've worked in big data. You know, the evolution of big data continues to change, as ultimately we want to get people the information to make good decisions, but we've gone through a lot of integrations over the years. So how is it different? You know? Now how is it different with containers? What can we finally do you as a as an architect that we couldn't do before? >>Infrastructure is code. That's, I think, one of the fundamental differences of the storage admin of yesteryear versus storage admin of today today, Azaz Sam mentioned As people are developing and deploying applications, those applications need to dynamically provisioned the infrastructure dynamically provisioned what they need from compute dynamically provisioned what they need from storage dynamically provisioned network paths and so that that that element of infrastructure is code. A dynamically provisioned infrastructure is very different from well from yesterday, when applications or teams needed to. Well, when they needed storage, they would you know, they would file a ticket and typically wait. Now they make an a p A. Now they make an A p. I call and storage is dynamically provisioned and provided to their application. >>But what what I think hard to understand for the layman. And maybe it's just me, right? I It's very easy to understand dynamic infrastructure around, um compute right, I'm Pepsi. I'm running it out for the Super Bowl. I need I know how much people are gonna hit by hit my site and it's kind of easy to understand. Dynamic provisioning around networking again for the same example. What's less easy to understand its dynamic provisioning for storage? It's one thing to say, you know, there's a there's a pool of storage resource is that I'm going to dynamically provisioned for this particular after this particular moment. But one of the whole things about the dynamic is not only is it available when you need it, but I could make it big, and conversely, I could make it smaller go away. I get that for servers, and I kind of get that for networking, supporting an application and that example I just talked about. But we can't It doesn't go away a lot of the time for storage, right? That's important data that's maybe feeding another process. There's all kinds of rules and regulations, So when you talk about dynamic infrastructure for storage, it makes a lot of sense for grabbing some to provision for some new application. But it's >>hard to >>understand in terms of true dynamics in terms of either scaling down or scaling up or turning off when I don't particularly need that much capacity or even that application right now, how does it work within storage versus No, just servers or I'm grabbing them and then I'm putting it back in the pool. >>Let me start on this one, and then I'm gonna hand it off to Brent. Um, you know, let's not forget, by the way, that enterprises have very significant investments in infrastructure and they're able to deliver six nines of availability on their storage. And they have d are worked out in all of their security, encryption, everything. It's already in place, and they're sure that they can deliver on their SLS. So they want to start with that. You have to leverage that investment. So first of all, you have to figure out how to automate that into the environment, that existing sand, and that's where things like uh, a P I s the container storage interface CS I drivers come in. IBM provides that across your entire portfolio, allowing you to integrate your storage into a kubernetes environment into an open shipped environment so that it can be automated, but you have to go beyond that and be able to extend that environment, then into other infrastructure, for example, into a public cloud. So with the IBM flash system, family with our spectrum virtualized software were actually able to deploy that storage layer not only on Prem on our award winning a race, but we can also do it in the cloud. So we allow you to take your existing infrastructure investments and integrate that into your communities environment and using things like danceable, fully automated environment. I'll get into data protection before we're done talking. But I do want Brent to talk a bit about how container native storage comes into that next as well. On how you can start building out new environments for, uh, for your applications. >>Yeah, What the two of you are alluding to is effectively kubernetes services layer, which is not storage. It consumes storage from the infrastructure, Assam said. Just because people deploy Kubernetes cluster doesn't mean that they go out and get an entirely new infrastructure for that. If they're deploying their kubernetes cluster on premises, they have servers. If they're deploying their kubernetes cluster on AWS or an azure on G C P. They have infrastructure there. Uh, what the two of you are alluding to is that services layer, which is independent of storage that can dynamically provisioned, provide data protection services. As I mentioned, we have good stuff to talk about their relative to data protection services for kubernetes clusters. But that's it's the abstraction layer or data services layer that sits on top of storage, which is different. So the basics of storage underneath in the infrastructure, you know, remain the same, Jeff. But the how that storage is provisioned and this abstraction layer of services which sits on top of the storage storage might be IBM flash system array storage, maybe E m c sand storage, maybe a W S E B s. That's the storage infrastructure. But this abstraction layer that sits on top this data services layer is what allows for the dynamic interaction of applications with the underlying storage infrastructure. >>And then again, just for people that aren't completely tuned in, Then what's the benefit to the application developer provider distributor with that type of an infrastructure behind And what can they do that they just couldn't do before? >>Well, I mean Look, we're, uh, e I mean, we're trying to solve the same problem over and over again, right? It's always about helping application developers build applications more quickly helps them be more agile. I t is always trying to keep up with the application developer and always struggles to. In fact, that's where the emergency cloud really came from. Just trying to keep up with the developer eso by giving them that automation. It gives them the ability to provision storage in real time, of course, without having open a ticket like friends said. But really, the Holy Grail here is getting to a developed once and deploy anywhere model. That's what they're trying to get to. So having an automated storage layer allows them to do that and ensure that they have access to storage and data, no matter where their application gets it >>right, Right, that pesky little detail. When I have to develop that up, it does have to sit somewhere and and I don't think storage really has gotten enough of of the bright light, really in kind of this app centric, developer centric world, we talk all the time about having compute available and and software defined networking. But you know, having this software defined storage that lives comfortably in this container world is pretty is pretty interesting. In a great development, I want to shift gears a >>little bit. Just one thing. Go >>ahead, >>plus one to Sam's comments. There all the application developer wants, they want an A P I and they want the same a p I to provision the storage regardless of where their app is running. The rest of the details they usually don't care about. Sure. They wanted to perform what not give him an A p I and make it the same regardless of where they're running the app. >>Because not only do they want to perform, they probably just presume performance, right? I mean, that's the other thing is that the best in class quickly becomes presumed baseline in a very short short period of time. So you've got to just you just got to just deliver the goods, right? They're gonna get frustrated and not be productive. But I wanted to shift gears up a little bit and talk about some of the macro trends. Right? We're here towards the end of 2020. Obviously, Cove It had a huge impact on business and a lot of different ways. And it's really evolved from March, this light switch moment. Everybody work from home, too. Now, this kind of extended time, that's probably gonna go on for a while. I'm just curious some of the things that you've seen with your customers not so much at the beginning, because that was that was a special and short period of time. But mawr, as we've extended and and are looking to, um, probably extended this for a while, you know, What is the impact of this increased work from home increase attack surface? You know, some of these macro things that we're seeing that cove it has caused and any other kind of macro trends beyond just this container ization that you guys were seeing impacting your world. Start with you, Sam. >>You know, I don't think it's actually changed what people were going to do or the strategy. What I've seen it do is accelerate things and maybe changed the way they're getting their, uh and so they're actually a lot of enterprises were running into challenges more quickly than they thought they would. And so they're coming to us and asking us to help them. Saw them, for example, backing up their data and these container environments as you move mission critical applications that maybe we're gonna move more slowly. They're realizing that as they've moved them, they can't get the level of data protection they need. And that's why actually we just announced it at the end of October. Updates to our modern data protection portfolio. It now is containerized. It could be deployed very easily in an automated fashion, but on top of that, it integrates down into the A P. I layer down into CSE drivers and allows you to do container where snapshots of your applications so you could do operational recovery. If there's some sort of an event you can recover from that you can do D R. And you can even use it for data migration. So we're helping them accelerate. So the biggest I think requests I'm getting from our customers, and how can you help us accelerate? And how can you help us fix these problems that we went running into as we tried to accelerate our digital transformation? >>Brent, Anyone that you wanna highlight? >>Mm. Okay. Ironically, one of my team was just speaking with one of the cruise lines, um, two days ago. We all know what's happened them. So if we just use them as an example, I'm clearly our customers need to do things differently now. So plus one to Sam's statement about acceleration on I would add another word to that which is agility, you know, frankly, they're having to do things in ways they never envisioned 10 months ago. So there need to cut cycle times to deploy effectively new ways of how they transact business has resulted in accelerated poll for these types of infrastructure is code technologies. >>That's great. The one that jumped in my mind. Sam, is you were talking. We've we've had a lot of conversations. Obvious security always comes up on baking security and is is a theme. But ransomware as a specific type of security threat and the fact that these guys not only wanna lock up your data, but they want to go in and find the backup copies and and you know and really mess you up so it sounds like that's even more important to have the safe. And we're hearing, you know, all these conversations about air gaps and dynamic air gaps and, you know, can we get air gaps and some of these infrastructure set up so that we can, you know, put put those backups? Um, and recovery data sets in a safe place so that if we have a ransomware issue, getting back online is a really, really important thing, and it seems to just be increasing every day. We're seeing things, you know, if you can actually break the law sometimes if you if you pay the ransom because where these people operate, there's all kind of weird stuff that's coming out of. Ransomware is a very specific, you know, kind of type of security threat that even elevates, you know, kind of business continuity and resiliency on a whole nother level for this one particular risk factor. When if you're seeing some of that as well, >>it's a great point. In fact, it's clearly an industry that was resilient to a pandemic because we've seen it increase things. Is organized crime at this point, right? This isn't the old days of hackers, you know, playing around this is organized crime and it is accelerating. And that's one thing. I'm really glad you brought up. It's an area we've been really focused on across our whole portfolio. Of course, IBM tape offers the best most of the actual riel air gapping, physical air gapping We could take a cartridge offline. But beyond that we offer you the ability to dio you know, different types of logical air gaps, whether it's to a cloud we support. In fact, we just announced Now the spectrum protect. We have support for Google Cloud. We already supported AWS Azure IBM Cloud. So we give you the ability to do logical air gapping off to those different cloud environments. We give you the ability to use worm capability so you can put your backups in a vault that can't be changed. So we give you lots of different ways to do it. In our high end enterprise storage, we offer something called Safeguarded copy where we'll actually take data off line that could be recovered almost instantly. Something very unique to our storage that gives you, for the most mission critical applications. The fastest path recovery. One of things we've seen is some of our customers have done a great job creating a copy. But when the event actually happens, they find is gonna take too long to recover the data and they end up having to pay the ransom anyway. So you really have to think through an Indian strategy on we're able to help customers do a kind of health checks of their environment and figure out the right strategy. We have some offerings to help come in and do that for our customers. >>Shift gears a little bit, uh, were unanswerable fest earlier this year and a lot of talk about automation. Obviously, answer was part of the Red Hat family, which is part of the IBM family. But, you know, we're seeing Mawr and Mawr conversations about automation about, you know, moving the mundane and the air prone and all the things that we shouldn't be doing as people and letting people doom or high value stuff. When if you could talk a little bit about the role of automation, that the kind of development of automation and how you're seeing that, you know, impact your deployments, >>right? You want to take that one first? >>Yeah, sure. Um, s o the first is, um when you think about individual kubernetes clusters. There's a level of automation that's required there. I mean, that's the fundamental. I mean, back to the infrastructure is code that's inherently. That's automation. To effectively declare the state of what you want your application, your cluster to be, and that's the essence of kubernetes. You declare what the state is, and then you pass that declaration to kubernetes, and it makes it so. So there's the kubernetes level automation. But then there's, You know what happens for larger enterprises when you have, you know, tens or hundreds of kubernetes clusters. Eso That's an area of Jeff you mentioned answerable. Now that's an area of with, you know, the work, the red hats doing the community for multi cluster management, actually in the community and together with IBM for automating the management of multiple clusters. And last thing I'll touch on here is that's particularly important as you go to the edge. I mean, this is all well and good when you're talking about, you know, safe raised floor data center environments. But what happens when you're tens or hundreds or even thousands of kubernetes clusters are running in an oil field somewhere? Automation becomes not only nice to have, but it's fundamental to the operation. >>Yeah, but let me just add onto that real quick. You know, it's funny, because actually, in this cove it era, you're starting to see that same requirement in the data center in the core data center. In fact, I would say that because there's less bodies now in the data center, more people working remotely. The automation in need for automation is actually actually accelerating as well. So I think what you said is actually true for the core data center now as well, >>right? So I wanna give you guys the last word before before we close the segment. Um, I'm gonna start with you, Brent. Really, From a perspective of big data and you've been involved again in big data for a long time. As you look back, it kind of the data warehouse era. And then we had kind of this whole rage with the Hadoop era, and, you know, we just continue to get more and more sophisticated with big data processes and applications. But at the end of the day, still about getting the right data to the right person at the right time to do something about it. I wonder if if you can, you know, kind of reflect over that journey and where we are now in terms of this mission of getting, you know, the right data to the right person at the right time so they could make the right decision. >>I think I'll close with accessibility. Um, that Z these days, we you know, the data scientists and data engineers that we work with. The key problem that they have is is accessibility and sharing of data. I mean, this has been wonderfully manifest. In fact, we did some work with the province of Ontario. You could look that stop hashtag house my flattening eso the work with them to get a pool of data. Scientists in the community in the province of Ontario, Canada, toe work together toe understand how to track co vid cases s such so that government could make intelligent responses and policy based on based on the fax so that that need highlights the accessibility that's required from today's, you know, yesteryear. It was maybe, uh, smaller groups of individual data scientists working in silos. Now it's people across industry as manifest by that That need accessibility as well as agility. They need to be able to spin up an environment that will allow them to in this case, um, to develop and deploy inference models using shared data sets without going through years of design. So accessibility on back to the back to the the acceleration and agility that Sam talked about. So I'll close with those words >>That's great. And the consistent with the democratization of two is another word that we're here, you know, over and over again in terms of, you know, getting it out of the hands of the data scientists and getting it into the hands of the people who are making frontline business decisions every day. And Sam for you, for your clothes. I love for you Thio reflect on kind of the changing environment in terms of your requirements for the types of workloads that you now are, you know, looking to support. So it's not just taking care of the data center and relatively straightforward stuff. But you've got hybrid. You've got multi cloud, not to mention all the media, the developments in the media between tape and obviously flash, um, spinning, spinning drives. But you know, really, We've seen this huge thing with flash. But now, with cloud and the increased kind of autumn autonomy ization of of units to be able to apply big batches in small batches to particular workloads across all these different requirements. When if you could just share a little bit about how you guys are thinking about, you know, modernizing storage and moving storage forward. What are some of your what are some of your your priorities? What are you looking forward to, uh, to be able to deliver, You know, basically the stuff underneath all these other applications. I mean, applications basically is data whether you I and some in some computer on top. You guys something underneath the whole package? >>Yeah. Yeah. You know, first of all, you know, back toe what Brent was saying, Uh, data could be the most valuable asset of an enterprise. You could give an enterprising, incredible, uh, competitive advantage as an incumbent if you could take advantage of that data using modern analytics and a I. So it could be your greatest asset. And it can also be the biggest inhibitor to digital transformation. If you don't figure out how to build a new type of modern infrastructure to support access to that data and support these new deployment models of your application. So you have to think that through. And that's not just for your big data, which the big data, of course, is extremely important and growing at incredible pace. All this unstructured data, You also have to think about your mission critical applications. We see a lot of people going through their transformation and modernization of S a p with move toe s four Hana. They have to think about how that fits into a multi cloud environment. They need to think about the life cycle of their data is they go into these new modern environments. And, yes, tape is still a very vibrant part of that deployment. So what we're working on an IBM has always been a leader in software defined storage. We have an incredible portfolio of capabilities. We're working on modernizing that software to help you automate your infrastructure. And sure, you can deliver enterprise class sls. There's no nobody's going to alleviate the requirements of having, you know, near perfect availability. You don't because you're moving into a kubernetes environment. Get a break on your downtime. So we're able to give that riel enterprise class support for doing that. One of the things we just announced that the end of October was we've containerized our spectrum scale client, allowing you now toe automate the deployment of your cluster file system through communities. So you'll see more and more of that. We're offering you leading modern native protection for kubernetes will be the first to integrate with OCP and open ship container storage for data protection. And our flashes from family will continue to be on the leading edge of the curve around answerable automation and C s I integration with who are already so we'll continue to focus on that and ensure that you could take advantage of our world class storage products in your new modern environment. And, of course, giving you that portability between on from in any cloud that you choose to run in >>exciting times. No, no shortage of job security for you, gentlemen, that's for sure. All right, Well, Brent, Sam, thanks for taking a few minutes and, uh, is great to catch up. And again. Congratulations on the success. Thank you. Thank you. Thank you. Alrighty, Sammy's Brent. I'm Jeff, You're watching the cubes. Continuing coverage of Q. Khan Cloud, Native Con North America 2020. Thanks for watching. We'll see you next time.
SUMMARY :
Jeffrey here with the Cube coming to you from our Palo Alto studios with our ongoing coverage of And also joining us is Brent Compton. to jump into it, so lets you know where does storage fit within a container to be, you know, seeing all the you know, all the news and What can we finally do you as a as an architect Well, when they needed storage, they would you But one of the whole things about the dynamic is not only is it available when you need how does it work within storage versus No, just servers or I'm grabbing them and then I'm putting it back in the pool. So we allow you to take your existing infrastructure investments Yeah, What the two of you are alluding to is effectively kubernetes services layer, But really, the Holy Grail here is getting to a developed once and deploy anywhere But you know, having this software defined storage Just one thing. The rest of the details they usually don't care about. and are looking to, um, probably extended this for a while, you know, What is the impact of this increased So the biggest I think requests I'm getting from our customers, and how can you help us accelerate? on I would add another word to that which is agility, you know, frankly, they're having to do things And we're hearing, you know, all these conversations about air gaps and dynamic air gaps and, you know, But beyond that we offer you the ability to dio you know, different types of logical air gaps, that the kind of development of automation and how you're seeing that, you know, impact your deployments, To effectively declare the state of what you want your application, So I think what you said is actually true for the core data center of getting, you know, the right data to the right person at the right time so they could make the right decision. we you know, the data scientists and data engineers that we work with. the types of workloads that you now are, you know, looking to support. that software to help you automate your infrastructure. We'll see you next time.
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
Sam | PERSON | 0.99+ |
Red Hat | ORGANIZATION | 0.99+ |
IBM | ORGANIZATION | 0.99+ |
Brent Compton | PERSON | 0.99+ |
Sam Warner | PERSON | 0.99+ |
Jeff | PERSON | 0.99+ |
Brent | PERSON | 0.99+ |
Native Computing Foundation | ORGANIZATION | 0.99+ |
Redhead | ORGANIZATION | 0.99+ |
yesterday | DATE | 0.99+ |
Sam Werner | PERSON | 0.99+ |
Jeffrey | PERSON | 0.99+ |
Europe | LOCATION | 0.99+ |
Sammy | PERSON | 0.99+ |
2020 | DATE | 0.99+ |
two | QUANTITY | 0.99+ |
Ecosystem Partners | ORGANIZATION | 0.99+ |
hundreds | QUANTITY | 0.99+ |
The Cloud | ORGANIZATION | 0.99+ |
tens | QUANTITY | 0.99+ |
Super Bowl | EVENT | 0.99+ |
AWS | ORGANIZATION | 0.99+ |
today | DATE | 0.99+ |
North America | LOCATION | 0.99+ |
10 months ago | DATE | 0.99+ |
Mawr | PERSON | 0.99+ |
end of 2020 | DATE | 0.99+ |
two days ago | DATE | 0.99+ |
Q. Khan | PERSON | 0.99+ |
Pepsi | ORGANIZATION | 0.99+ |
March | DATE | 0.98+ |
Palo Alto | LOCATION | 0.98+ |
Azaz Sam | PERSON | 0.98+ |
first | QUANTITY | 0.98+ |
Assam | PERSON | 0.98+ |
KubeCon | EVENT | 0.97+ |
one | QUANTITY | 0.97+ |
CloudNativeCon | EVENT | 0.97+ |
Ontario | LOCATION | 0.96+ |
end of October | DATE | 0.96+ |
One | QUANTITY | 0.96+ |
one thing | QUANTITY | 0.95+ |
earlier this year | DATE | 0.95+ |
Thio | PERSON | 0.92+ |
six nines | QUANTITY | 0.91+ |
Cloud | ORGANIZATION | 0.9+ |
Q. Khan | PERSON | 0.89+ |
Ontario, Canada | LOCATION | 0.87+ |
NA 2020 | EVENT | 0.85+ |
thousands of kubernetes | QUANTITY | 0.84+ |
cove | ORGANIZATION | 0.82+ |
G C P. | TITLE | 0.8+ |
kubernetes | QUANTITY | 0.8+ |
John F Thompson V1 FOR REVIEW
>> Narrator: From around the globe. It's theCUBE covering space in cybersecurity symposium 2020 hosted by Cal Poly. >> Hello, everyone. Welcome to the space and cybersecurity symposium, 2020 hosted by Cal Poly where the intersection of space and security are coming together. I'm John Furrier, your host with theCUBE here in California. I want to welcome our featured guest, Lieutenant General, John F. Thompson with the United States Space Force approach to cybersecurity. That's the topic of this session. And of course he's the commander of the space and missile system center in Los Angeles Air Force Base. Also heading up Space Force. General, thank you for coming on. I really appreciate to you kicking this off. Welcome to the symposium. >> Hey, so thank you very much, John, for that very kind introduction. Also very much thank you to Cal Poly for this opportunity to speak to this audience today. Also a special shout out to one of the organizers, Dustin Debrun, for all of his work, helping get us to this point. Ladies and gentlemen as a John mentioned, I'm JT Thompson. I lead the 6,000 men and women of the United States Space Force's Space and Missile System Center, which is headquartered here at Los Angeles Air Force Base and El Segundo. If you're not quite sure where that's at, it's about a mile and a half from LAX. This is our main operating location, but we do have a number of other operating locations around the country. We're about 500 people at Kirtland Air Force Base in Albuquerque, New Mexico, and an about another 500 people on the front range of the Rockies between Colorado Springs and Denver plus a smattering of other much smaller operating locations nationwide. We're responsible for acquiring, developing and sustaining the United States Space Force's, critical space assets. That includes the satellites in the space layer and also on the ground layer our ground segments to operate those satellites. And we also are in charge of procuring launch services for the US Space Force and a number of our critical mission partners across the Department of Defense and the intelligence community. Just as a couple of examples of some of the things we do, if you're unfamiliar with our work we developed and currently sustain the 31 satellite GPS constellation that satellite constellation, while originally intended to help with global navigation, those GPS signals have provided trillions of dollars in unanticipated value to the global economy over the past three decades. GPS is everywhere. I think everybody realizes that. Agriculture, banking, the stock market, the airline industry, separate and distinct navigation systems. It's really pervasive across both capabilities for our Department of Defense and capabilities for our economy and individuals, billions of individuals across our country and the planet. Some of the other work we do for instance, in the communications sector, secure communications satellites that we designed and build that link America's sons and daughters serving in the military around the world and really enable real time support and comms for our deployed forces. And those of our allies. We also acquire infrared missile warning satellites that monitor the planet for missile launches that provide advanced warning to the US Homeland and to our allies in case some of those missile launches are nefarious. On a note, that's probably a lot closer to home, maybe a lot closer to home than many of us want to think about here in the state of California. In 2018, SMC jumped through a bunch of red tape and bureaucracy to partner with the US Forest Service during two of the largest wildfires in the state's history, the Camp and Woolsey fires in Northern California. As those fires spread out of control, we created processes on the fly to share data from our missile warning satellites. Those are satellites that are systems that are purpose built to see heat sources from thousands of miles above the planet. And we collaborated with the US Forest Service so that firefighters on the ground could track those fires more in real time and better forecast fires and where they were spreading, thereby saving lives and property by identifying hotspots and flareups for firefighters. That data that we were able to working with our contractors pass to the US Forest Service and authorities here in California, was passed in less than an hour as it was collected to get it into the hands of the emergency responders, the first responders as quickly as possible and doing that in an hour greatly surpassed what was available from some of the other assets in the airborne and ground-based fire spotters. It was really instrumental in fighting those fires and stopping their spread. We've continued that involvement in recent years, using multiple systems to support firefighters across the Western US this fall, as they battled numerous wildfires that unfortunately continue. Working together with the US Forest Service and with other partners we'd like to think that we've made a difference here, but there's still a lot more work to go. And I think that we should always be asking ourselves what else can space data be used for and how can we more rapidly get that space data to stakeholders so that they can use it for purposes of good, if you will. How else can we protect our nation? How else can we protect our friends and allies? I think a major component of the discussion that we will have throughout this conference is that the space landscape has changed rapidly and continues to change rapidly. Just over the past few years, John and I were talking before we went live here and 80 nations now have space programs. Nearly 80 space faring nations on the planet. If you just look at one mission area that the Department of Defense is interested in, and that's small launch, there are currently over 100 different small launch companies within the US industrial base vying for commercial DoD and civil payload capabilities, mostly to lower earth orbit. It's truly a remarkable time. If you factor in those things like artificial intelligence and machine learning, where we're revolutionizing really, the ways that we generate process and use data. It's really remarkable. In 2016, so if you think about this four years ago, NASA estimated that there were 28 terabytes of information transiting their space network each day. And that was four years ago. Obviously we've got a lot of desire to work with a lot of the people in the audience in this conference, we need to work with big thinkers, like many of you to answer questions on how best we apply data analytics to extract value and meaning from that data. We need new generations of thinkers to help apply cutting edge theories of data mining, cyber behaviorism, and Internet of Things 2.0, it's just truly a remarkable time to be in the space business and the cyber aspects of the space business are truly, truly daunting and important to all of us. Integrating cyber security into our space systems, both commercial and government is a mandate. it's no longer just a nice to have as the US Space Force and Department of the Air Force leadership has said many times over the past couple of years, space is becoming congested and contested. And that contested aspect means that we've got to focus on cyber security in the same way that the banking industry and cyber commerce focus on cybersecurity day in and day out. The value of the data and services provided is really directly tied to the integrity and availability of that data and services from the space layer, from the ground control segments associated with it. And this value is not just military, it's also economic and it's not just American, it's also a value for the entire world, particularly our allies, as we all depend upon space and space systems. Your neighbors and friends here in California that are employed at the space and missile system center work with network defenders. We work with our commercial contractors and our systems developers, our international allies and partners to try and build as secure and resilient systems as we can from the ground up that keep the global comments of space free and open for exploration and for commerce as John and I were talking earlier, before we came online, there's an aspect of cybersecurity for space systems, especially for some of our legacy systems, that's more, how do we bolt this on? Cause we fielded those space systems a number of years ago, and the challenges of cybersecurity in the space domain have grown. So we have a part that we have to worry about, bolting it on, but then we have to worry about building it in as we field new systems and build in a flexibility that realizes that the cyber threat or the cybersecurity landscape will evolve over time. It's not just going to be stagnant. There will always be new vulnerabilities and new threat vectors that we all have to look at. Look, as Secretary Barrett, who is our secretary of the air force likes to say most Americans use space before they have their first cup of coffee in the morning. The American way of life really depends on space. And as part of the United States Space Force, we work with defense leaders, our Congress joint, and international military teammates and industry to ensure American leadership in space. I really thank you for this opportunity to address the audience today, John, and thanks so much to Cal Poly for letting me be one of the speakers at this event. I've really looked forward to this for several months. And so with that, I look forward to your questions as we kind of move along here. >> General, thank you very much for those awesome introductory statement. For the folks watching on the stream, Brigadier General Carthan's going to be in the chat, answering any questions, feel free to chat away. He's the vice commander of Space and Missile System Center, he'll be available. A couple of comments from your keynote before I get to my questions. Cause it just jumped into my head. You mentioned the benefits of say space with the fires in California. We're living that here. That's really realtime. That's a benefit. You also mentioned the ability for more people launching payloads into space. I'm only imagined Moore's law smaller, faster, cheaper applies to rockets too. So I'm imagining you have the benefits of space and you have now more potential objects flying out sanctioned and maybe unsanctioned. So is it going to be more rules around that? This is an interesting question cause it's exciting Space Force, but for all the good there is potentially bad out there. >> Yeah. So John, I think the basics of your question is as space becomes more congested and contested, is there a need for more international norms of how satellites fly in space? What kind of basic features satellites have to perhaps de orbit themselves? What kind of basic protections should all satellites be afforded as part of a peaceful global commons of space? I think those are all fantastic questions. And I know that US and many allied policy makers are looking very, very hard at those kinds of questions in terms of what are the norms of behavior and how we field, and field as the military term. But how we populate using civil or commercial terms that space layer at different altitudes, lower earth orbit, mid earth orbit, geosynchronous earth orbit, different kinds of orbits, what the kind of mission areas we accomplished from space. That's all things that need to be definitely taken into account as the place gets a little bit, not a little bit as the place gets increasingly more popular day in and day out. >> I'm super excited for Space Force. I know that a new generation of young folks are really interested in it's an emerging, changing great space. The focus here at this conference is space and cybersecurity, the intersection. I'd like to get your thoughts on the approach that a space force is taking to cybersecurity and how it impacts our national goals here in the United States. >> Yeah. So that's a great question John, let me talk about it in two basic ways. At number one is an and I know some people in the audience, this might make them a little bit uncomfortable, but I have to talk about the threat. And then relative to that threat, I really have to talk about the importance of cyber and specifically cyber security, as it relates to that threat. The threats that we face really represented a new era of warfare and that new era of warfare involves both space and cyber. We've seen a lot of action in recent months from certain countries, notably China and Russia that have threatened what I referred to earlier as the peaceful global commons of space. For example, it threw many unclassified sources and media sources. Everybody should understand that the Russians have been testing on orbit anti-satellite capabilities. It's been very clear if you were following just the week before last, the Department of Defense released its 2020 military and security developments involving the People's Republic of China. And it was very clear that China is developing ASATs, electronic jammers, directed energy weapons, and most relevant to today's discussion, offensive cyber capabilities. There are kinetic threats that are very, very easy to see, but a cyber attack against a critical command and control site or against a particular spacecraft could be just as devastating to the system and our war fighters in the case of GPS and important to note that that GPS system also impacts many civilians who are dependent on those systems from a first response perspective and emergency services, a cyber attack against a ground control site could cause operators to lose control of a spacecraft or an attacker could feed spoofed data to assist them to mislead operators so that they sent emergency services personnel to the wrong address. Attacks on spacecraft on orbit, whether directly via a network intrusion or enabled through malware introduced during the system's production while we're building the satellite can cripple or corrupt the data. Denial-of-service type attacks on our global networks obviously would disrupt our data flow and interfere with ongoing operations and satellite control. If GPS went down, I hesitate to say it this way, cause we might elicit some screams from the audience. But if GPS went down a Starbucks, wouldn't be able to handle your mobile order, Uber drivers wouldn't be able to find you. And Domino's certainly wouldn't be able to get there in 30 minutes or less. So with a little bit of tongue in cheek there from a military operations perspective, it's dead serious. We have become accustomed in the commercial world to threats like ransomware and malware. And those things have unfortunately become commonplace in commercial terrestrial networks and computer systems. However, what we're seeing is that our adversaries with the increased competition in space these same techniques are being retooled, if you will, to use against our national security space systems day in and day out. As I said, during my opening remarks on the importance of cyber, the value of these systems is directly tied to their integrity. If commanders in the field, firefighters in California or baristas in Starbucks, can't trust the data they're receiving, then that really harms their decision making capabilities. One of the big trends we've recently seen is the move towards proliferated LEO constellations, obviously Space X's Starlink on the commercial side and on the military side, the work that DARPA and my organization SMC are doing on Blackjack and Casino, as well as some space transport layer constellation work that the space development agency is designing are all really, really important types of mesh network systems that will revolutionaries how we plan and field war fighting systems and commercial communications and internet providing systems. But they're also heavily reliant on cybersecurity. We've got to make sure that they are secured to avoid an accident or international damage. Loss of control of these constellations really could be catastrophic from both a mission perspective or from a satellites tumbling out of low earth orbit perspective. Another trend is introductions in artificial intelligence and machine learning, onboard spacecraft are at the edge. Our satellites are really not so much hardware systems with a little software anymore in the commercial sector and in the defense sector, they're basically flying boxes full of software. And we need to ensure that data that we're getting out of those flying boxes full of software are helping us base our decisions on accurate data and algorithms, governing the right actions and that those systems are impervious to the extent possible to nefarious modifications. So in summation, cybersecurity is a vital element of everything in our national security space goals. And I would argue for our national goals, writ large, including economic and information dimensions, the Space Force leadership at all levels from some of the brand new second lieutenants that general Raymond swore in to the space force this morning, ceremonially from the air force associations, airspace and cyberspace conference to the various highest levels, General Raymond, General DT Thompson, myself, and a number of other senior leaders in this enterprise. We've got to make sure that we're all working together to keep cyber security at the forefront of our space systems cause they absolutely depend on it. >> You mentioned hardware, software threats, opportunities, challenges. I want to ask you because you got me thinking of the minute they're around infrastructure. We've heard critical infrastructure, grids here on earth. You're talking about critical infrastructure, a redefinition of what critical infrastructure is, an extension of what we have. So I'd love to get your thoughts about Space Force's view of that critical infrastructure vis-a-vis the threat vectors, because the term threat vectors has been kicked around in the cyberspace. Oh you have threat vectors. They're always increasing the surface area. If the surface area is from space, it's an unlimited service area. So you got different vectors. So you've got new critical infrastructure developing real time, really fast. And you got an expanded threat vector landscape. Putting that in perspective for the folks that aren't really inside the ropes on these critical issues. How would you explain this and how would you talk about those two things? >> So I tell you, just like, I'm sure people in the security side or the cybersecurity side of the business in the banking industry feel, they feel like it's all possible threat vectors represent a dramatic and protect potentially existential threat to all of the dollars that they have in the banking system, to the financial sector. On the Department of Defense side, we've got to have sort of the same mindset. That threat vector from, to, and through space against critical space systems, ground segments, the launch enterprise, or transportation to orbit and the various different domains within space itself. Like I mentioned before, LEO, MEO and GEO based satellites with different orbits, all of the different mission areas that are accomplished from space that I mentioned earlier, some that I did mention like a weather tactical or wide band communications, various new features of space control. All of those are things that we have to worry about from a cyber security threat perspective. And it's a daunting challenge right now. >> Yeah, that's awesome. And one of the things we've been falling on the hardware side on the ground is the supply chain. We've seen, malware being, really put in a really obscure hardware. Who manufactures it? Is it being outsourced? Obviously government has restrictions, but with the private sector, you mentioned China and the US kind of working together across these peaceful areas. But you got to look at the supply chain. How does the supply chain in the security aspect impact the mission of the US space Force? >> Yeah. Yeah. So how about another, just in terms of an example, another kind of California based historical example. The very first US Satellite, Explorer 1, was built by the jet propulsion laboratory folks, not far from here in El Segundo, up in Pasadena, that satellite, when it was first built in the late 50s weighing a little bit, over 30 pounds. And I'm sure that each and every part was custom made and definitely made by US companies. Fast forward to today. The global supply chain is so tightly coupled, and frankly many industries are so specialized, almost specialized regionally around the planet. We focus every day to guarantee the integrity of every component that we put in our space systems is absolutely critical to the operations of those satellites and we're dependent upon them, but it becomes more difficult and more difficult to understand the heritage, if you will, of some of the parts that are used, the thousands of parts that are used in some of our satellites that are literally school bus sized. The space industry, especially national security space sector is relatively small compared to other commercial industries. And we're moving towards using more and more parts from non US companies. Cybersecurity and cyber awareness have to be baked in from the beginning if we're going to be using parts that maybe we don't necessarily understand 100% like an Explorer one, the lineage of that particular part. The environmental difficulties in space are well known. The radiation environment, the temperature extremes, the vacuum, those require specialized component. And the US military is not the only customer in that space. In fact, we're definitely not the dominant customer in space anymore. All those factors require us along with our other government partners and many different commercial space organizations to keep a very close eye on our supply chains, from a quality perspective, a security perspective and availability. There's open source reporting on supply training intrusions from many different breaches of commercial retailers to the infectious spread of compromised patches, if you will. And our adversaries are aware of these techniques. As I mentioned earlier, with other forms of attack, considering our supply chains and development networks really becomes fair game for our adversaries. So we have to take that threat seriously. Between the government and industry sectors here in the US. We're also working with our industry partners to enact stronger defenses and assess our own vulnerabilities. Last fall, we completed an extensive review of all of our major contracts here at Space and Missile System Center to determine the levels of cyber security requirements we've implemented across our portfolio. And it sounds really kind of businessy geeky, if you will. Hey, we looked at our contracts to make sure that we had the right clauses in our contracts to address cybersecurity as dynamically as we possibly could. And so we found ourselves having to add new language to our contracts, to require system developers, to implement some more advanced protective measures in this evolving cyber security environment. So that data handling and supply chain protections from contract inception to launch and operations were taken into account. Cyber security really is a key performance parameter for us now. Performance of the system, It's as important as cost, it's as important as schedule, because if we deliver the perfect system on time and on cost, it can perform that missile warning or that communications mission perfectly, but it's not cyber secure. If it's doesn't have cyber protections built into it, or the ability to implement mitigations against cyber threats, then we've essentially fielded a shoe box in space that doesn't do the CA the war fighter or the nation any good. Supply chain risk management is a major challenge for us. We're doing a lot to coordinate with our industry partners. We're all facing it head on to try and build secure and trusted components that keep our confidence as leaders, firefighters, and baristas as the case may be. But it is a challenge. And we're trying to rise to that challenge. >> This is so exciting this new area, because it really touches everything. Talk about geeking out on the tech, the hardware, the systems but also you put your kind of MBA hat on you go, what's the ROI of extra development and how things get built. Because the always the exciting thing for space geeks is like, if you're building cool stuff, it's exciting, but you still have to build. And cybersecurity has proven that security has to be baked in from the beginning and be thought as a system architecture. So you're still building things, which means you got to acquire things, you got to acquire parts, you got acquire build software and sustain it. How is security impacting the acquisition and the sustainment of these systems for space? >> Yeah. From initial development, through planning for the acquisition, design, development, our production fielding and sustainment, it impacts all aspects of the life cycle, John. We simply, especially from the concept of baking in cybersecurity, we can't wait until something is built and then try and figure out how to make it cyber secure. So we've moved way further towards working side by side with our system developers to strengthen cybersecurity from the very beginning of a systems development, cyber security, and the resilience associated with it really have to be treated as a key system attribute. As I mentioned earlier, equivalent with data rates or other metrics of performance. We like to talk in the space world about mission assurance and mission assurance has always sort of taken us as we technically geek out. Mission assurance has always taken us to the will this system work in space. Can it work in a vacuum? Can it work in as it transfers through the Van Allen radiation belt or through the Southern hemisphere's electromagnetic anomaly? Will it work out in space? And now from a resiliency perspective, yeah, it has to work in space. It's got to be functional in space, but it's also got to be resistant to these cybersecurity threats. It's not just, I think a General D.T Thompson quoted this term. It's not just widget assurance anymore. It's mission assurance. How does that satellite operator that ground control segment operate while under attack? So let me break your question a little bit, just for purposes of discussion into really two parts, cybersecurity, for systems that are new and cybersecurity for systems that are in sustainment are kind of old and legacy. Obviously there's cyber vulnerabilities that threatened both, and we really have to employ different strategies for defensive of each one. For new systems. We're desperately trying to implement across the Department of Defense and particularly in the space world, a kind of a dev sec ops methodology and practice to delivering software faster and with greater security for our space systems. Here at SMC, we have a program called enterprise ground services, which is a toolkit, basically a collection of tools for common command and control of different satellite systems, EGS as we call it has an integrated suite for defensive cyber capabilities. Network operators can use these tools to gain unprecedented insight to data flows and to monitor space network traffic for anomalies or other potential indicators of a bad behavior, malicious behavior, if you will, it's rudimentary at this point, but because we're using DevSecOps and that incremental development approach, as we scale it, it just becomes more and more capable. Every product increment that we feel. Here at LA Air Force Base, we have the United Space Force's West Coast Software Factory, which we've dubbed the Kobayashi Maru. They're using those agile DevOps software development practices to deliver a space awareness software to the combined space operations center. Affectionately called the CSpock that CSpock is just on the road from Cal Poly there in San Luis Obispo at Vandenberg Air Force Base. They've so securely linked the sea Spock with other space operation centers around the planet, our allies, Australia, Canada, and the UK. We're partnering with all of them to enable secure and enhanced combined space operations. So lots of new stuff going on as we bake in new development capabilities for our space systems. But as I mentioned earlier, we've got large constellations of satellites on orbit right now. Some of them are well in excess of a decade or more or old on orbit. And so the design aspects of those satellites are several decades old. But we still have to worry about them cause they're critical to our space capabilities. We've been working with an air force material command organization called CROWS, which stands for the Cyber Resiliency Office for Weapon Systems to assess all of those legacy platforms from a cyber security perspective and develop defensive strategies and potential hardware and software upgrades to those systems to better enable them to live through this increasingly cybersecurity concerned era that we currently live in. Our industry partners have been critical to both of those different avenues. Both new systems and legacy systems. We're working closely with them to defend and upgrade national assets and develop the capabilities to do similar with new national assets coming online. The vulnerabilities of our space systems really kind of threatened the way we've done business in the past, both militarily and in the case of GPS economically. The impacts of that cybersecurity risk are clear in our acquisition and sustainment processes, but I've got to tell you, as the threat vectors change, as the vulnerabilities change, we've got to be nimble enough, agile enough, to be able to bounce back and forth. We can't just say, many people in the audience are probably familiar with the RMF or the Risk Management Framework approach to reviewing the cyber security of a system. We can't have program managers and engineers just accomplish an RMF on a system. And then, hey, high five, we're all good. It's a journey, not a destination, that's cybersecurity. And it's a constant battle rhythm through our weapon systems lifecycle, not just a single event. >> I want to get to this commercial business needs and your needs on the next question. But before I go there, you mentioned agile. And I see that clearly because when you have accelerated innovation cycles, you've got to be faster. And we saw this in the computer industry, mainframes, mini computers, and then we started getting beyond maybe when the internet hit and PCs came out, you saw the big enterprises, the banks and government start to work with startups. And it used to be a joke in the entrepreneurial circles is that, there's no way if you are a startup you're ever going to get a contract with a big business enterprise. Now that used to be for public sector and certainly for you guys. So as you see startups out there and there's acquisition involved, I'm sure would love to have a contract with Space Force. There's an ROI calculation where if it's in space and you have a sustainment view and it's software, you might have a new kind of business model that could be attractive to startups. Could you share your thoughts on the folks who want to be a supplier to you, whether they're a startup or an existing business that wants to be agile, but they might not be that big company. >> John, that's a fantastic question. We're desperately trying to reach out to those new space advocates, to those startups, to those what we sometimes refer to, within the Department of Defense, those non traditional defense contractors. A couple of things just for thinking purposes on some of the things that we're trying to highlight. Three years ago, we created here at Space and Missile System Center, the Space Enterprise Consortium to provide a platform, a contractual vehicle, really to enable us to rapidly prototype, development of space systems and to collaborate between the US Space Force, traditional defense contractors, non traditional vendors like startups, and even some academic institutions. SPEC, as we call it, Space Enterprise Consortium uses a specialized contracting tool to get contracts awarded quickly. Many in the audience may be familiar with other transaction agreements. And that's what SPEC is based on. And so far in just three years, SPEC has awarded 75 different prototyping contracts worth over $800 million with a 36% reduction in time to award. And because it's a consortium based competition for these kinds of prototyping efforts, the barrier to entry for small and nontraditional, for startups, even for academic institutions to be able to compete for these kinds of prototyping has really lowered. These types of partnerships that we've been working through on spec have really helped us work with smaller companies who might not have the background or expertise in dealing with the government or in working with cyber security for their systems, both our developmental systems and the systems that they're designing and trying to build. We want to provide ways for companies large and small to partner together in support kind of mutually beneficial relationships between all. Recently at the Annual Air Force Association conference that I mentioned earlier, I moderated a panel with several space industry leaders, all from big traditional defense contractors, by the way. And they all stressed the importance of building bridges and partnerships between major contractors in the defense industry and new entrance. And that helps us capture the benefits of speed and agility that come with small companies and startups, as well as the expertise and specialized skill sets of some of those larger contractors that we rely on day in and day out. Advanced cyber security protections and utilization of secure facilities are just a couple of things that I think we could be prioritizing more so in those collaborations. As I mentioned earlier, the SPEC has been very successful in awarding a number of different prototyping contracts and large dollar values. And it's just going to get better. There's over 400 members of the space enterprise consortium, 80% of them are non traditional kinds of vendors. And we just love working with them. Another thing that many people in the audience may be familiar with in terms of our outreach to innovators, if you will, and innovators that include cyber security experts is our space pitch day events. So we held our first event last November in San Francisco, where we awarded over a two day period about $46 million to 30 different companies that had potentially game changing ideas. These were phase two small business innovative research efforts that we awarded with cash on the spot. We're planning on holding our second space pitch day in the spring of 2021. We're planning on doing it right here in Los Angeles, COVID-19 environment permitting. And we think that these are fantastic venues for identifying and working with high-speed startups, and small businesses who are interested in really, truly partnering with the US Air Force. It's, as I said before, it's a really exciting time to be a part of this business. And working with the innovation economy is something that the Department of Defense really needs to do in that the innovation that we used to think was ours. That 80% of the industrial base innovation that came from the Department of Defense, the script has been flipped there. And so now more than 70%, particularly in space innovation comes from the commercial sector, not from the defense business itself. And so that's a tsunami of investment and a tsunami of a capability. And I need to figure out how to get my surfboard out and ride it, you know what I mean? >> Yeah, It's one of those things where the script has been flipped, but it's exciting because it's impacting everything. When you're talking about systems architecture? You're talking about software, you're talking about a business model. You're talking about dev sec opsx from a technical perspective, but now you have a business model innovation. All the theaters are exploding in innovation, technical, business, personnel. This brings up the workforce challenge. You've got the cyber needs for the US Space Force, It's probably great ROI model for new kinds of software development that could be priced into contracts. That's a entrepreneurial innovation, you've got the business model theater, you've got the personnel. How does the industry adopt and change? You guys are clearly driving this. How does the industry adjust to you? >> Yeah. So I think a great way to answer that question is to just talk about the kind of people that we're trying to prioritize in the US Space Force from an acquisition perspective, and in this particular case from a cybersecurity perspective. As I mentioned earlier, it's the most exciting time to be in space programs, really since the days of Apollo. Just to put it in terms that maybe have an impact with the audience. From 1957 until today, approximately 9,000 satellites have been launched from the various space varying countries around the planet. Less than 2000 of those 9,000 are still up on orbit and operational. And yet in the new space regime players like Space X have plans to launch, 12,000 satellites for some of their constellations alone. It really is a remarkable time in terms of innovation and fielding of space capabilities and all of those space capabilities, whether they're commercial, civil, or defense are going to require appropriate cybersecurity protections. It's just a really exciting time to be working in stuff like this. And so folks like the folks in this audience who have a passion about space and a passion about cybersecurity are just the kind of people that we want to work with. Cause we need to make sure our systems are secure and resilient. We need folks that have technical and computing expertise, engineering skills to be able to design cyber secure systems that can detect and mitigate attacks. But we also, as you alluded to, we need people that have that business and business acumen, human networking background, so that we can launch the startups and work with the non traditional businesses. Help to bring them on board help, to secure both their data and our data and make sure our processes and systems are free as much as possible from attack. For preparation, for audience members who are young and maybe thinking about getting into this trade space, you got to be smart on digital networking. You got to understand basic internet protocols, concepts, programming languages, database design. Learn what you can for penetration or vulnerability testing and a risk assessment. I will tell you this, and I don't think he will, I know he will not mind me telling you this, but you got to be a lifelong learner and so two years ago, I'm at home evening and I get a phone call on my cell phone and it's my boss, the commander of Air Force Space command, General, J. Raymond, who is now currently the Chief of Space Operations. And he is on temporary duty, flying overseas. He lands where he's going and first thing he does when he lands is he calls me and he goes JT, while I was traveling, I noticed that there were eBooks available on the commercial airliner I was traveling on and there was an ebook on something called scrumming and agile DevSecOps. And I read it, have you read it? And I said, no, sir. But if you tell me what the title of the book is, I will read it. And so I got to go to my staff meeting, the very next week, the next time we had a staff meeting and tell everybody in the staff meeting, hey, if the four star and the three star can read the book about scrumming, then I'm pretty sure all of you around this table and all our lieutenants and our captains our GS13s, All of our government employees can get smart on the scrumming development process. And interestingly as another side, I had a telephone call with him last year during the holidays, where he was trying to take some leave. And I said, sir, what are you up to today? Are you making eggnog for the event tonight or whatever. And the Chief of Space Operations told me no, I'm trying to teach myself Python. I'm at lesson two, and it's not going so well, but I'm going to figure this out. And so that kind of thing, if the chief of staff or the Chief of Space Operations can prioritize scrumming and Python language and innovation in his daily schedule, then we're definitely looking for other people who can do that. And we'll just say, lower levels of rank throughout our entire space force enterprise. Look, we don't need people that can code a satellite from scratch, but we need to know, we need to have people that have a basic grasp of the programming basics and cybersecurity requirements. And that can turn those things into meaningful actions, obviously in the space domain, things like basic physics and orbital mechanics are also important spaces, not an intuitive domain. So under understanding how things survive on orbit is really critical to making the right design and operational decisions. And I know there's probably a lot, because of this conference. I know there's probably a whole lot of high speed cybersecurity experts out in the audience. And I need those people in the US Space Force. The country is counting on it, but I wouldn't discount having people that are just cyber aware or cyber savvy. I have contracting officers and logisticians and program managers, and they don't have to be high end cybersecurity experts, but they have to be aware enough about it to be able to implement cyber security protections into our space systems. So the skill set is really, really broad. Our adversaries are pouring billions of dollars into designing and fielding offensive and destructive space, cybersecurity weapons. They repeatedly shown really a blatant disregard of safety and international norms for good behavior on orbit. And the cyber security aspects of our space systems is really a key battleground going forward so that we can maintain that. As I mentioned before, peaceful global comments of space, we really need all hands on deck. If you're interested in helping in uniform, if you're interested in helping, not in uniform, but as a government employee, a commercial or civil employee to help us make cyber security more important or more able to be developed for our space systems. And we'd really love to work with you or have you on the team to build that safe and secure future for our space systems. >> Lieutenant General John Thompson, great insight. Thank you for sharing all that awesome stories too, and motivation for the young next generation. The United States Space Force approach to cybersecurity. Really amazing talk, thank you for your time. Final parting question is, as you look out and you have your magic wand, what's your view for the next few years in terms of things that we could accomplish? It's a super exciting time. What do you hope for? >> So first of all, John, thanks to you and thanks to Cal Poly for the invitation and thanks to everybody for their interest in cybersecurity, especially as it relates to space systems, that's here at the conference. There's a quote, and I'll read it here from Bernard Schriever, who was the founder, if you will, a legend in a DoD space, the founder of the Western development division, which was a predecessor organization to Space and Missile System Center, General Schriever, I think captures the essence of how we see the next couple of years. "The world has an ample supply of people "who can always come up with a dozen good reasons "why new ideas will not work and should not be tried, "but the people who produce progress are breed apart. "They have the imagination, "the courage and the persistence to find solutions." And so I think if you're hoping that the next few years of space innovation and cybersecurity innovation are going to be upon a pony ride at the County fair, then perhaps you should look for another line of work, because I think the next few years in space and cybersecurity innovation are going to be more like a rodeo and a very dynamic rodeo as it goes. It is an awesome privilege to be part of this ecosystem. It's really an honor for me to be able to play some small role in the space ecosystem and trying to improve it while I'm trying to improve the chances of the United States of America in a space war fighting environment. And so I thank all of you for participating today and for this little bit of time that you've allowed me to share with you. Thank you. >> Sir, thank you for your leadership and thank you for the time for this awesome event, Space and Cyber Cybersecurity Symposium 2020, I'm John Furrier on behalf of Cal Poly, thanks for watching. (mellow music)
SUMMARY :
Narrator: From around the globe. And of course he's the and Department of the Air Force leadership but for all the good there and field as the military term. and cybersecurity, the intersection. in the case of GPS and important to note of the minute they're and the various different of the US space Force? or the ability to implement mitigations and the sustainment of and in the case of GPS economically. on the folks who want the barrier to entry How does the industry adjust to you? and they don't have to be high and motivation for the hoping that the next few years for the time for this awesome event,
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
Dustin Debrun | PERSON | 0.99+ |
Bernard Schriever | PERSON | 0.99+ |
John | PERSON | 0.99+ |
California | LOCATION | 0.99+ |
JT Thompson | PERSON | 0.99+ |
Cal Poly | ORGANIZATION | 0.99+ |
Department of Defense | ORGANIZATION | 0.99+ |
Pasadena | LOCATION | 0.99+ |
Space Force | ORGANIZATION | 0.99+ |
SMC | ORGANIZATION | 0.99+ |
El Segundo | LOCATION | 0.99+ |
2016 | DATE | 0.99+ |
US Forest Service | ORGANIZATION | 0.99+ |
NASA | ORGANIZATION | 0.99+ |
John Furrier | PERSON | 0.99+ |
Space Enterprise Consortium | ORGANIZATION | 0.99+ |
Department of Defense | ORGANIZATION | 0.99+ |
United Space Force | ORGANIZATION | 0.99+ |
Los Angeles | LOCATION | 0.99+ |
US Forest Service | ORGANIZATION | 0.99+ |
San Luis Obispo | LOCATION | 0.99+ |
United States Space Force | ORGANIZATION | 0.99+ |
US | LOCATION | 0.99+ |
John F. Thompson | PERSON | 0.99+ |
Denver | LOCATION | 0.99+ |
US Space Force | ORGANIZATION | 0.99+ |
LAX | LOCATION | 0.99+ |
United States Space Force | ORGANIZATION | 0.99+ |
28 terabytes | QUANTITY | 0.99+ |
Space and Missile System Center | ORGANIZATION | 0.99+ |
United States Space Force | ORGANIZATION | 0.99+ |
36% | QUANTITY | 0.99+ |
80% | QUANTITY | 0.99+ |
tonight | DATE | 0.99+ |
DARPA | ORGANIZATION | 0.99+ |
Department of Defense | ORGANIZATION | 0.99+ |
2018 | DATE | 0.99+ |
Cal Poly | ORGANIZATION | 0.99+ |
two | QUANTITY | 0.99+ |
US Air Force | ORGANIZATION | 0.99+ |
last year | DATE | 0.99+ |
San Francisco | LOCATION | 0.99+ |
thousands of miles | QUANTITY | 0.99+ |
Space Enterprise Consortium | ORGANIZATION | 0.99+ |
United States | LOCATION | 0.99+ |
less than an hour | QUANTITY | 0.99+ |
Uber | ORGANIZATION | 0.99+ |
three star | QUANTITY | 0.99+ |
John F Thompson | PERSON | 0.99+ |
CROWS | ORGANIZATION | 0.99+ |
Northern California | LOCATION | 0.99+ |
El Segundo | LOCATION | 0.99+ |
West Coast Software Factory | ORGANIZATION | 0.99+ |
more than 70% | QUANTITY | 0.99+ |
two parts | QUANTITY | 0.99+ |
J. Raymond | PERSON | 0.99+ |
GEO | ORGANIZATION | 0.99+ |
over 30 pounds | QUANTITY | 0.99+ |
three years | QUANTITY | 0.99+ |
each day | QUANTITY | 0.99+ |
Colorado Springs | LOCATION | 0.99+ |
billions of dollars | QUANTITY | 0.99+ |
over $800 million | QUANTITY | 0.99+ |
Both | QUANTITY | 0.99+ |
Python | TITLE | 0.99+ |
two things | QUANTITY | 0.99+ |
SPEC | ORGANIZATION | 0.99+ |
Albuquerque | LOCATION | 0.99+ |
Space X | ORGANIZATION | 0.99+ |
MEO | ORGANIZATION | 0.99+ |
trillions of dollars | QUANTITY | 0.99+ |
100% | QUANTITY | 0.99+ |
UNLIST TILL 4/2 - Keep Data Private
>> Paige: Hello everybody and thank you for joining us today for the Virtual Vertica BDC 2020. Today's breakout session is entitled Keep Data Private Prepare and Analyze Without Unencrypting With Voltage SecureData for Vertica. I'm Paige Roberts, Open Source Relations Manager at Vertica, and I'll be your host for this session. Joining me is Rich Gaston, Global Solutions Architect, Security, Risk, and Government at Voltage. And before we begin, I encourage you to submit your questions or comments during the virtual session, you don't have to wait till the end. Just type your question as it occurs to you, or comment, in the question box below the slide and then click Submit. There'll be a Q&A session at the end of the presentation where we'll try to answer as many of your questions as we're able to get to during the time. Any questions that we don't address we'll do our best to answer offline. Now, if you want, you can visit the Vertica Forum to post your questions there after the session. Now, that's going to take the place of the Developer Lounge, and our engineering team is planning to join the Forum, to keep the conversation going. So as a reminder, you can also maximize your screen by clicking the double arrow button, in the lower-right corner of the slides. That'll allow you to see the slides better. And before you ask, yes, this virtual session is being recorded and it will be available to view on-demand this week. We'll send you a notification as soon as it's ready. All right, let's get started. Over to you, Rich. >> Rich: Hey, thank you very much, Paige, and appreciate the opportunity to discuss this topic with the audience. My name is Rich Gaston and I'm a Global Solutions Architect, within the Micro Focus team, and I work on global Data privacy and protection efforts, for many different organizations, looking to take that journey toward breach defense and regulatory compliance, from platforms ranging from mobile to mainframe, everything in between, cloud, you name it, we're there in terms of our solution sets. Vertica is one of our major partners in this space, and I'm very excited to talk with you today about our solutions on the Vertica platform. First, let's talk a little bit about what you're not going to learn today, and that is, on screen you'll see, just part of the mathematics that goes into, the format-preserving encryption algorithm. We are the originators and authors and patent holders on that algorithm. Came out of research from Stanford University, back in the '90s, and we are very proud, to take that out into the market through the NIST standard process, and license that to others. So we are the originators and maintainers, of both standards and athureader in the industry. We try to make this easy and you don't have to learn any of this tough math. Behind this there are also many other layers of technology. They are part of the security, the platform, such as stateless key management. That's a really complex area, and we make it very simple for you. We have very mature and powerful products in that space, that really make your job quite easy, when you want to implement our technology within Vertica. So today, our goal is to make Data protection easy for you, to be able to understand the basics of Voltage Secure Data, you're going to be learning how the Vertica UDx, can help you get started quickly, and we're going to see some examples of how Vertica plus Voltage Secure Data, are going to be working together, in our customer cases out in the field. First, let's take you through a quick introduction to Voltage Secure Data. The business drivers and what's this all about. First of all, we started off with Breach Defense. We see that despite continued investments, in personal perimeter and platform security, Data breaches continue to occur. Voltage Secure Data plus Vertica, provides defense in depth for sensitive Data, and that's a key concept that we're going to be referring to. in the security field defense in depth, is a standard approach to be able to provide, more layers of protection around sensitive assets, such as your Data, and that's exactly what Secure Data is designed to do. Now that we've come through many of these breach examples, and big ticket items, getting the news around breaches and their impact, the business regulators have stepped up, and regulatory compliance, is now a hot topic in Data privacy. Regulations such as GDPR came online in 2018 for the EU. CCPA came online just this year, a couple months ago for California, and is the de-facto standard for the United States now, as organizations are trying to look at, the best practices for providing, regulatory compliance around Data privacy and protection. These gives massive new rights to consumers, but also obligations to organizations, to protect that personal Data. Secure Data Plus Vertica provides, fine grained authorization around sensitive Data, And we're going to show you exactly how that works, within the Vertica platform. At the bottom, you'll see some of the snippets there, of the news articles that just keep racking up, and our goal is to keep you off the news, to keep your company safe, so that you can have the assurance, that even if there is an unintentional, or intentional breach of Data out of the corporation, if it is protected by voltage Secure Data, it will be of no value to those hackers, and then you have no impact, in terms of risk to the organization. What do we mean by defense in depth? Let's take a look first at the encryption types, and the benefits that they provide, and we see our customers implementing, all kinds of different protection mechanisms, within the organization. You could be looking at disk level protection, file system protection, protection on the files themselves. You could protect the entire Database, you could protect our transmissions, as they go from the client to the server via TLS, or other protected tunnels. And then we look at Field-level Encryption, and that's what we're talking about today. That's all the above protections, at the perimeter level at the platform level. Plus, we're giving you granular access control, to your sensitive Data. Our main message is, keep the Data protected for at the earliest possible point, and only access it, when you have a valid business need to do so. That's a really critical aspect as we see Vertica customers, loading terabytes, petabytes of Data, into clusters of Vertica console, Vertica Database being able to give access to that Data, out to a wide variety of end users. We started off with organizations having, four people in an office doing Data science, or analytics, or Data warehousing, or whatever it's called within an organization, and that's now ballooned out, to a new customer coming in and telling us, we're going to have 1000 people accessing it, plus service accounts accessing Vertica, we need to be able to provide fine level access control, and be able to understand what are folks doing with that sensitive Data? And how can we Secure it, the best practices possible. In very simple state, voltage protect Data at rest and in motion. The encryption of Data facilitates compliance, and it reduces your risk of breach. So if you take a look at what we mean by feel level, we could take a name, that name might not just be in US ASCII. Here we have a sort of Latin one extended, example of Harold Potter, and we could take a look at the example protected Data. Notice that we're taking a character set approach, to protecting it, meaning, I've got an alphanumeric option here for the format, that I'm applying to that name. That gives me a mix of alpha and numeric, and plus, I've got some of that Latin one extended alphabet in there as well, and that's really controllable by the end customer. They can have this be just US ASCII, they can have it be numbers for numbers, you can have a wide variety, of different protection mechanisms, including ignoring some characters in the alphabet, in case you want to maintain formatting. We've got all the bells and whistles, that you would ever want, to put on top of format preserving encryption, and we continue to add more to that platform, as we go forward. Taking a look at tax ID, there's an example of numbers for numbers, pretty basic, but it gives us the sort of idea, that we can very quickly and easily keep the Data protected, while maintaining the format. No schema changes are going to be required, when you want to protect that Data. If you look at credit card number, really popular example, and the same concept can be applied to tax ID, often the last four digits will be used in a tax ID, to verify someone's identity. That could be on an automated telephone system, it could be a customer service representative, just trying to validate the security of the customer, and we can keep that Data in the clear for that purpose, while protecting the entire string from breach. Dates are another critical area of concern, for a lot of medical use cases. But we're seeing Date of Birth, being included in a lot of Data privacy conversations, and we can protect dates with dates, they're going to be a valid date, and we have some really nifty tools, to maintain offsets between dates. So again, we've got the real depth of capability, within our encryption, that's not just saying, here's a one size fits all approach, GPS location, customer ID, IP address, all of those kinds of Data strings, can be protected by voltage Secure Data within Vertica. Let's take a look at the UDx basics. So what are we doing, when we add Voltage to Vertica? Vertica stays as is in the center. In fact, if you get the Vertical distribution, you're getting the Secure Data UDx onboard, you just need to enable it, and have Secure Data virtual appliance, that's the box there on the middle right. That's what we come in and add to the mix, as we start to be able to add those capabilities to Vertica. On the left hand side, you'll see that your users, your service accounts, your analytics, are still typically doing Select, Update, Insert, Delete, type of functionality within Vertica. And they're going to come into Vertica's access control layer, they're going to also access those services via SQL, and we simply extend SQL for Vertica. So when you add the UDx, you get additional syntax that we can provide, and we're going to show you examples of that. You can also integrate that with concepts, like Views within Vertica. So that we can say, let's give a view of Data, that gives the Data in the clear, using the UDx to decrypt that Data, and let's give everybody else, access to the raw Data which is protected. Third parties could be brought in, folks like contractors or folks that aren't vetted, as closely as a security team might do, for internal sensitive Data access, could be given access to the Vertical cluster, without risk of them breaching and going into some area, they're not supposed to take a look at. Vertica has excellent control for access, down even to the column level, which is phenomenal, and really provides you with world class security, around the Vertical solution itself. Secure Data adds another layer of protection, like we're mentioning, so that we can have Data protected in use, Data protected at rest, and then we can have the ability, to share that protected Data throughout the organization. And that's really where Secure Data shines, is the ability to protect that Data on mainframe, on mobile, and open systems, in the cloud, everywhere you want to have that Data move to and from Vertica, then you can have Secure Data, integrated with those endpoints as well. That's an additional solution on top, the Secure Data Plus Vertica solution, that is bundled together today for a sales purpose. But we can also have that conversation with you, about those wider Secure Data use cases, we'd be happy to talk to you about that. Security to the virtual appliance, is a lightweight appliance, sits on something like eight cores, 16 gigs of RAM, 100 gig of disk or 200 gig of disk, really a lightweight appliance, you can have one or many. Most customers have four in production, just for redundancy, they don't need them for scale. But we have some customers with 16 or more in production, because they're running such high volumes of transaction load. They're running a lot of web service transactions, and they're running Vertica as well. So we're going to have those virtual appliances, as co-located around the globe, hooked up to all kinds of systems, like Syslog, LDAP, load balancers, we've got a lot of capability within the appliance, to fit into your enterprise IP landscape. So let me get you directly into the neat, of what does the UDx do. If you're technical and you know SQL, this is probably going to be pretty straightforward to you, you'll see the copy command, used widely in Vertica to get Data into Vertica. So let's try to protect that Data when we're ingesting it. Let's grab it from maybe a CSV file, and put it straight into Vertica, but protected on the way and that's what the UDx does. We have Voltage Secure protectors, an added syntax, like I mentioned, to the Vertica SQL. And that allows us to say, we're going to protect the customer first name, using the parameters of hyper alphanumeric. That's our internal lingo of a format, within Secure Data, this part of our API, the API is require very few inputs. The format is the one, that you as a developer will be supplying, and you'll have different ones for maybe SSN, you'll have different formats for street address, but you can reuse a lot of your formats, across a lot of your PII, PHI Data types. Protecting after ingest is also common. So I've got some Data, that's already been put into a staging area, perhaps I've got a landing zone, a sandbox of some sort, now I want to be able to move that, into a different zone in Vertica, different area of the schema, and I want to have that Data protected. We can do that with the update command, and simply again, you'll notice Voltage Secure protect, nothing too wild there, basically the same syntax. We're going to query unprotected Data. How do we search once I've encrypted all my Data? Well, actually, there's a pretty nifty trick to do so. If you want to be able to query unprotected Data, and we have the search string, like a phone number there in this example, simply call Voltage Secure protect on that, now you'll have the cipher text, and you'll be able to search the stored cipher text. Again, we're just format preserving encrypting the Data, and it's just a string, and we can always compare those strings, using standard syntax and SQL. Using views to decrypt Data, again a powerful concept, in terms of how to make this work, within the Vertica Landscape, when you have a lot of different groups of users. Views are very powerful, to be able to point a BI tool, for instance, business intelligence tools, Cognos, Tableau, etc, might be accessing Data from Vertica with simple queries. Well, let's point them to a view that does the hard work, and uses the Vertical nodes, and its horsepower of CPU and RAM, to actually run that Udx, and do the decryption of the Data in use, temporarily in memory, and then throw that away, so that it can't be breached. That's a nice way to keep your users active and working and going forward, with their Data access and Data analytics, while also keeping the Data Secure in the process. And then we might want to export some Data, and push it out to someone in a clear text manner. We've got a third party, needs to take the tax ID along with some Data, to do some processing, all we need to do is call Voltage Secure Access, again, very similar to the protect call, and you're writing the parameter again, and boom, we have decrypted the Data and used again, the Vertical resources of RAM and CPU and horsepower, to do the work. All we're doing with Voltage Secure Data Appliance, is a real simple little key fetch, across a protected tunnel, that's a tiny atomic transaction, gets done very quick, and you're good to go. This is it in terms of the UDx, you have a couple of calls, and one parameter to pass, everything else is config driven, and really, you're up and running very quickly. We can even do demos and samples of this Vertical Udx, using hosted appliances, that we put up for pre sales purposes. So folks want to get up and get a demo going. We could take that Udx, configure it to point to our, appliance sitting on the internet, and within a couple of minutes, we're up and running with some simple use cases. Of course, for on-prem deployment, or deployment in the cloud, you'll want your own appliance in your own crypto district, you have your own security, but it just shows, that we can easily connect to any appliance, and get this working in a matter of minutes. Let's take a look deeper at the voltage plus Vertica solution, and we'll describe some of the use cases and path to success. First of all your steps to, implementing Data-centric security and Vertica. Want to note there on the left hand side, identify sensitive Data. How do we do this? I have one customer, where they look at me and say, Rich, we know exactly what our sensitive Data is, we develop the schema, it's our own App, we have a customer table, we don't need any help in this. We've got other customers that say, Rich, we have a very complex Database environment, with multiple Databases, multiple schemas, thousands of tables, hundreds of thousands of columns, it's really, really complex help, and we don't know what people have been doing exactly, with some of that Data, We've got various teams that share this resource. There, we do have additional tools, I wanted to give a shout out to another microfocus product, which is called Structured Data Manager. It's a great tool that helps you identify sensitive Data, with some really amazing technology under the hood, that can go into a Vertica repository, scan those tables, take a sample of rows or a full table scan, and give you back some really good reports on, we think this is sensitive, let's go confirm it, and move forward with Data protection. So if you need help on that, we've got the tools to do it. Once you identify that sensitive Data, you're going to want to understand, your Data flows and your use cases. Take a look at what analytics you're doing today. What analytics do you want to do, on sensitive Data in the future? Let's start designing our analytics, to work with sensitive Data, and there's some tips and tricks that we can provide, to help you mitigate, any kind of concerns around performance, or any kind of concerns around rewriting your SQL. As you've noted, you can just simply insert our SQL additions, into your code and you're off and running. You want to install and configure the Udx, and secure Data software plants. Well, the UDx is pretty darn simple. The documentation on Vertica is publicly available, you could see how that works, and what you need to configure it, one file here, and you're ready to go. So that's pretty straightforward to process, either grant some access to the Udx, and that's really up to the customer, because there are many different ways, to handle access control in Vertica, we're going to be flexible to fit within your model, of access control and adding the UDx to your mix. Each customer is a little different there, so you might want to talk with us a little bit about, the best practices for your use cases. But in general, that's going to be up and running in just a minute. The security software plants, hardened Linux appliance today, sits on-prem or in the cloud. And you can deploy that. I've seen it done in 15 minutes, but that's what the real tech you had, access to being able to generate a search, and do all this so that, your being able to set the firewall and all the DNS entries, the basically blocking and tackling of a software appliance, you get that done, corporations can take care of that, in just a couple of weeks, they get it all done, because they have wait waiting on other teams, but the software plants are really fast to get stood up, and they're very simple to administer, with our web based GUI. Then finally, you're going to implement your UDx use cases. Once the software appliance is up and running, we can set authentication methods, we could set up the format that you're going to use in Vertica, and then those two start talking together. And it should be going in dev and test in about half a day, and then you're running toward production, in just a matter of days, in most cases. We've got other customers that say, Hey, this is going to be a bigger migration project for us. We might want to split this up into chunks. Let's do the real sensitive and scary Data, like tax ID first, as our sort of toe in the water approach, and then we'll come back and protect other Data elements. That's one way to slice and dice, and implement your solution in a planned manner. Another way is schema based. Let's take a look at this section of the schema, and implement protection on these Data elements. Now let's take a look at the different schema, and we'll repeat the process, so you can iteratively move forward with your deployment. So what's the added value? When you add full Vertica plus voltage? I want to highlight this distinction because, Vertica contains world class security controls, around their Database. I'm an old time DBA from a different product, competing against Vertica in the past, and I'm really aware of the granular access controls, that are provided within various platforms. Vertica would rank at the very top of the list, in terms of being able to give me very tight control, and a lot of different AWS methods, being able to protect the Data, in a lot of different use cases. So Vertica can handle a lot of your Data protection needs, right out of the box. Voltage Secure Data, as we keep mentioning, adds that defense in-Depth, and it's going to enable those, enterprise wide use cases as well. So first off, I mentioned this, the standard of FF1, that is format preserving encryption, we're the authors of it, we continue to maintain that, and we want to emphasize that customers, really ought to be very, very careful, in terms of choosing a NIST standard, when implementing any kind of encryption, within the organization. So 8 ES was one of the first, and Hallmark, benchmark encryption algorithms, and in 2016, we were added to that mix, as FF1 with CS online. If you search NIST, and Voltage Security, you'll see us right there as the author of the standard, and all the processes that went along with that approval. We have centralized policy for key management, authentication, audit and compliance. We can now see that Vertica selected or fetch the key, to be able to protect some Data at this date and time. We can track that and be able to give you audit, and compliance reporting against that Data. You can move protected Data into and out of Vertica. So if we ingest via Kafka, and just via NiFi and Kafka, ingest on stream sets. There are a variety of different ingestion methods, and streaming methods, that can get Data into Vertica. We can integrate secure Data with all of those components. We're very well suited to integrate, with any Hadoop technology or any big Data technology, as we have API's in a variety of languages, bitness and platforms. So we've got that all out of the box, ready to go for you, if you need it. When you're moving Data out of Vertica, you might move it into an open systems platform, you might move it to the cloud, we can also operate and do the decryption there, you're going to get the same plaintext back, and if you protect Data over in the cloud, and move it into Vertica, you're going to be able to decrypt it in Vertica. That's our cross platform promise. We've been delivering on that for many, many years, and we now have many, many endpoints that do that, in production for the world's largest organization. We're going to preserve your Data format, and referential integrity. So if I protect my social security number today, I can protect another batch of Data tomorrow, and that same ciphertext will be generated, when I put that into Vertica, I can have absolute referential integrity on that Data, to be able to allow for analytics to occur, without even decrypting Data in many cases. And we have decrypt access for authorized users only, with the ability to add LDAP authentication authorization, for UDx users. So you can really have a number of different approaches, and flavors of how you implement voltage within Vertica, but what you're getting is the additional ability, to have that confidence, that we've got the Data protected at rest, even if I have a DBA that's not vetted or someone new, or I don't know where this person is from a third party, and being provided access as a DBA level privilege. They could select star from all day long, and they're going to get ciphertext, they're going to have nothing of any value, and if they want to use the UDF to decrypt it, they're going to be tracked and traced, as to their utilization of that. So it allows us to have that control, and additional layer of security on your sensitive Data. This may be required by regulatory agencies, and it's seeming that we're seeing compliance audits, get more and more strict every year. GDPR was kind of funny, because they said in 2016, hey, this is coming, they said in 2018, it's here, and now they're saying in 2020, hey, we're serious about this, and the fines are mounting. And let's give you some examples to kind of, help you understand, that these regulations are real, the fines are real, and your reputational damage can be significant, if you were to be in breach, of a regulatory compliance requirements. We're finding so many different use cases now, popping up around regional protection of Data. I need to protect this Data so that it cannot go offshore. I need to protect this Data, so that people from another region cannot see it. That's all the kind of capability that we have, within secure Data that we can add to Vertica. We have that broad platform support, and I mentioned NiFi and Kafka, those would be on the left hand side, as we start to ingest Data from applications into Vertica. We can have landing zone approaches, where we provide some automated scripting at an OS level, to be able to protect ETL batch transactions coming in. We could protect within the Vertica UDx, as I mentioned, with the copy command, directly using Vertica. Everything inside that dot dash line, is the Vertical Plus Voltage Secure Data combo, that's sold together as a single package. Additionally, we'd love to talk with you, about the stuff that's outside the dash box, because we have dozens and dozens of endpoints, that could protect and access Data, on many different platforms. And this is where you really start to leverage, some of the extensive power of secure Data, to go across platform to handle your web based apps, to handle apps in the cloud, and to handle all of this at scale, with hundreds of thousands of transactions per second, of format preserving encryption. That may not sound like much, but when you take a look at the algorithm, what we're doing on the mathematics side, when you look at everything that goes into that transaction, to me, that's an amazing accomplishment, that we're trying to reach those kinds of levels of scale, and with Vertica, it scales horizontally. So the more nodes you add, the more power you get, the more throughput you're going to get, from voltage secure Data. I want to highlight the next steps, on how we can continue to move forward. Our secure Data team is available to you, to talk about the landscape, your use cases, your Data. We really love the concept that, we've got so many different organizations out there, using secure Data in so many different and unique ways. We have vehicle manufacturers, who are protecting not just the VIN, not just their customer Data, but in fact they're protecting sensor Data from the vehicles, which is sent over the network, down to the home base every 15 minutes, for every vehicle that's on the road, and every vehicle of this customer of ours, since 2017, has included that capability. So now we're talking about, an additional millions and millions of units coming online, as those cars are sold and distributed, and used by customers. That sensor Data is critical to the customer, and they cannot let that be ex-filled in the clear. So they protect that Data with secure Data, and we have a great track record of being able to meet, a variety of different unique requirements, whether it's IoT, whether it's web based Apps, E-commerce, healthcare, all kinds of different industries, we would love to help move the conversations forward, and we do find that it's really a three party discussion, the customer, secure Data experts in some cases, and the Vertica team. We have great enablement within Vertica team, to be able to explain and present, our secure Data solution to you. But we also have that other ability to add other experts in, to keep that conversation going into a broader perspective, of how can I protect my Data across all my platforms, not just in Vertica. I want to give a shout out to our friends at Vertica Academy. They're building out a great demo and training facilities, to be able to help you learn more about these UDx's, and how they're implemented. The Academy, is a terrific reference and resource for your teams, to be able to learn more, about the solution in a self guided way, and then we'd love to have your feedback on that. How can we help you more? What are the topics you'd like to learn more about? How can we look to the future, in protecting unstructured Data? How can we look to the future, of being able to protect Data at scale? What are the requirements that we need to be meeting? Help us through the learning processes, and through feedback to the team, get better, and then we'll help you deliver more solutions, out to those endpoints and protect that Data, so that we're not having Data breach, we're not having regulatory compliance concerns. And then lastly, learn more about the Udx. I mentioned, that all of our content there, is online and available to the public. So vertica.com/secureData , you're going to be able to walk through the basics of the UDX. You're going to see how simple it is to set up, what the UDx syntax looks like, how to grant access to it, and then you'll start to be able to figure out, hey, how can I start to put this, into a PLC in my own environment? Like I mentioned before, we have publicly available hosted appliance, for demo purposes, that we can make available to you, if you want to PLC this. Reach out to us. Let's get a conversation going, and we'll get you the address and get you some instructions, we can have a quick enablement session. We really want to make this accessible to you, and help demystify the concept of encryption, because when you see it as a developer, and you start to get your hands on it and put it to use, you can very quickly see, huh, I could use this in a variety of different cases, and I could use this to protect my Data, without impacting my analytics. Those are some of the really big concerns that folks have, and once we start to get through that learning process, and playing around with it in a PLC way, that we can start to really put it to practice into production, to say, with confidence, we're going to move forward toward Data encryption, and have a very good result, at the end of the day. This is one of the things I find with customers, that's really interesting. Their biggest stress, is not around the timeframe or the resource, it's really around, this is my Data, I have been working on collecting this Data, and making it available in a very high quality way, for many years. This is my job and I'm responsible for this Data, and now you're telling me, you're going to encrypt that Data? It makes me nervous, and that's common, everybody feels that. So we want to have that conversation, and that sort of trial and error process to say, hey, let's get your feet wet with it, and see how you like it in a sandbox environment. Let's now take that into analytics, and take a look at how we can make this, go for a quick 1.0 release, and let's then take a look at, future expansions to that, where we start adding Kafka on the ingest side. We start sending Data off, into other machine learning and analytics platforms, that we might want to utilize outside of Vertica, for certain purposes, in certain industries. Let's take a look at those use cases together, and through that journey, we can really chart a path toward the future, where we can really help you protect that Data, at rest, in use, and keep you safe, from both the hackers and the regulators, and that I think at the end of the day, is really what it's all about, in terms of protecting our Data within Vertica. We're going to have a little couple minutes for Q&A, and we would encourage you to have any questions here, and we'd love to follow up with you more, about any questions you might have, about Vertica Plus Voltage Secure Data. They you very much for your time today.
SUMMARY :
and our engineering team is planning to join the Forum, and our goal is to keep you off the news,
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
Vertica | ORGANIZATION | 0.99+ |
100 gig | QUANTITY | 0.99+ |
16 | QUANTITY | 0.99+ |
16 gigs | QUANTITY | 0.99+ |
200 gig | QUANTITY | 0.99+ |
Paige Roberts | PERSON | 0.99+ |
2016 | DATE | 0.99+ |
Paige | PERSON | 0.99+ |
Rich Gaston | PERSON | 0.99+ |
dozens | QUANTITY | 0.99+ |
2018 | DATE | 0.99+ |
Vertica Academy | ORGANIZATION | 0.99+ |
2020 | DATE | 0.99+ |
SQL | TITLE | 0.99+ |
AWS | ORGANIZATION | 0.99+ |
First | QUANTITY | 0.99+ |
1000 people | QUANTITY | 0.99+ |
Hallmark | ORGANIZATION | 0.99+ |
today | DATE | 0.99+ |
Harold Potter | PERSON | 0.99+ |
Rich | PERSON | 0.99+ |
millions | QUANTITY | 0.99+ |
Stanford University | ORGANIZATION | 0.99+ |
15 minutes | QUANTITY | 0.99+ |
Today | DATE | 0.99+ |
Each customer | QUANTITY | 0.99+ |
one | QUANTITY | 0.99+ |
both | QUANTITY | 0.99+ |
California | LOCATION | 0.99+ |
Kafka | TITLE | 0.99+ |
Vertica | TITLE | 0.99+ |
Latin | OTHER | 0.99+ |
tomorrow | DATE | 0.99+ |
2017 | DATE | 0.99+ |
eight cores | QUANTITY | 0.99+ |
two | QUANTITY | 0.98+ |
GDPR | TITLE | 0.98+ |
first | QUANTITY | 0.98+ |
one customer | QUANTITY | 0.98+ |
Tableau | TITLE | 0.98+ |
United States | LOCATION | 0.97+ |
this week | DATE | 0.97+ |
Vertica | LOCATION | 0.97+ |
4/2 | DATE | 0.97+ |
Linux | TITLE | 0.97+ |
one file | QUANTITY | 0.96+ |
vertica.com/secureData | OTHER | 0.96+ |
four | QUANTITY | 0.95+ |
about half a day | QUANTITY | 0.95+ |
Cognos | TITLE | 0.95+ |
four people | QUANTITY | 0.94+ |
Udx | ORGANIZATION | 0.94+ |
one way | QUANTITY | 0.94+ |
Grant Johnson, Ancestry | Qualys Security Conference 2019
>> Narrator: From Las Vegas, it's theCUBE. Covering Qualys Security Conference 2019. Brought to you by Qualys. >> Hey, welcome back, you ready with Jeff Frick here with theCUBE. We are at the Qualys Security Conference in Las Vegas. This show's been going on, I think, 19 years. This is our first time here. We're excited to be here, and we've got, there's always these people that go between the vendor and the customer and back and forth. We've had it go one way, now we've got somebody who was at Qualys and now is out implementing the technology. We're excited to welcome Grant Johnson. He is the director of Risk and Compliance for Ancestry. Grant, great to see you. >> Thank you for having me, great to be here. >> Yeah, it is always interesting to me and there's always a lot of people at these shows that go back and forth between, and their creating the technology and delivering the technology versus implementing the technology and executing at the customer side. So, you saw an opportunity at Ancestry, what opportunity did you see and why did you make that move? >> Well it's a good question, I was really happy where I was at, I worked for here at Qualys for a long time. But, I had a good colleague of mine from way back just say, hey look, he took over as the chief information security officer at Ancestry and said, "they've got an opportunity here, do you want it?" I said, "hey sure." I mean, it was really kind of a green field. It was the ability to get in on the ground floor, designing the processes, the environment, the people and everything to, what I saw is really a really cool opportunity, they were moving to the cloud. Complete cloud infrastructure which was a few years ago, you know, a little uncommon so it was just and opportunity to learn a lot of different things and kind of be thinking through some different processes and the way to fix it. >> Right, right, so you've been there for a little while now. Over three years, what was the current state and then what was the opportunity to really make some of those changes, as kind of this new initiative with this new see, so? >> No, yeah, we were traditional. You know, a server data center kind of background and everything like that. But with the way the company was starting to go as we were growing it, really just crazy, just at a crazy clip, to where we really couldn't sustain. We wanted to go global, we wanted to move Ancertry out to Europe and to other environments and just see the growth that was going to happen there, and there just wasn't a way that we could do it with the traditional data center model. We're plugging those in all over the place, so the ideas is, we're going to go to a cloud and with going to the cloud, we could really rethink the way that we do security and vulnerability management, and as we went from a more traditional bottle which is, where you scan and tell people to patch and do things like that, to where we can try to start to bake vulnerability management into the process and do a lot of different things. And you know, we've done some pretty cool things that way, I think as a company and, always evolving, always trying to be better and better every day but it was a lot of fun and it's been really kind of a neat ride. >> So, was there a lot of app redesign and a whole bunch of your core infrastructure. Not boxes, but really kind of software infrastructure that had to be redone around a cloud focus so you can scale? >> Yeah. There absolutely was. We really couldn't lift and shift. We really had to take, because we were taking advantage of the cloud environment, if we just lifted and shifted our old infrastructure in there, it wasn't going to take advantage of that cloud expansion like we needed it to. >> Right. >> We needed it to be able to handle it tide, of high tide, low tide, versus those traffic times when we're high and low. So it really took a rewrite. And it was a lot of really neat people coming together. We basically, at the onset of this right when I started in 2016, our chief technology officer got up and said, "we're going to burn the ships." We have not signed the contract for our data center to renew at 18 months. So we have to go to the cloud. And it was really neat to see hundreds of people really come together and really make that happen. I've been involved in the corporate world for a long time in IT. And a lot of those projects fail. And it was really neat to see a big project like that actually get off the ground. >> Right, right. It's funny, the burning the ship analogy is always an interesting one. (grant laughs) Which you know, Arnold Schwarzenegger never had a plan B. (grant laughs) Because if you have plan B, you're going to fall back. So just commit and go forward. >> A lot of truth to that. Right, you're flying without a net, whatever kind of metaphor you want to use on that one. Yeah, but you have to succeed and there is a lot that'll get it done I think, if you just don't have that plan B like you said. >> Right, so talk about kind of where Ancestry now is in terms of being able to roll out apps quicker, in terms of being able to scale much larger, in terms of being able to take advantages of a lot more attack surface area, which probably in the old model was probably not good. Now those are actually new touch points for customers. >> It's a brave new world on a lot of aspects. I mean, to the first part of that, we're just a few days away from cyber Monday. Which is you know, our normal rate clip of transactions is about 10 to 12 transactions a second. >> So still a bump, is cyber Monday still a bump? >> It's still huge for us. >> We have internet at home now. We don't have to go to work to get on the internet to shop. >> You know, crazy enough, it still is. You know, over the course of the week, and kind of starting on Thanksgiving, we scale to have about 250 transactions a second. So that was one of the good parts of the cloud, do you invest and the big iron and in the big piping for your peak times of the year. Or and it sits, your 7-10% utilization during the rest of the year, but you can handle those peaks well. So I mean, we're just getting into the time of year, so that's where our cloud expansion, where a lot of the value for that has come. In terms, of attack surface, yeah, absolutely. Five years ago, I didn't even know what a container was. And we're taking advantage a lot of that technology to be able to move nimbly. You can't spin up a server fast enough to meet the demands of user online clicking things. You really have to go with containers and that also increases what you really need to be able to secure with people and the process and technology and everything like that. >> Right. >> So it's been a challenge. It's been really revitalizing and really, really neat to me to get in there and learn some new things and new stuff like that. >> That's great. So I want to ask you. It may be a little sensitive, not too sensitive but kind of sensitive right. Is with 23 and Me and Ancestry, and DNA registries, et cetera, it's opened up this whole new conversation around cold case and privacy and blah blah blah. I don't want to get into that. That's a whole different conversation, but in terms of your world and in terms of risking compliance, that's a whole different type of a data set I think that probably existed in the early days of Ancestry.com >> Yeah >> Where you're just trying to put your family tree together. So, how does that increased value, increased sensitivity, increased potential opportunity for problems impact the way that you do your job and the way that you structure your compliance systems? >> Boy. Honestly, that is part of the reason why I joined the company. Is that I really kind of saw this opportunity. Kind of be a part of really a new technology that's coming online. I'd have to say. >> Or is it no different than everyone else's personal information and those types of things? Maybe it's just higher profile in the news today. >> Not it all, no. It kind of inherent within our company. We realized that our ability to grow and stay affable or just alive as a business, we pivot on security. And security for us and privacy is at the fore front. And I think one of the key changes that's done for maybe in other companies that I get is, people from our development teams, to our operations teams, to our security department, to our executives. We don't have to sell security to em. They really get it. It's our customer privacy and their data that we're asking people to share their most personal data with us. We can give you a new credit card. Or, you can get a new credit card number issued. We can't give you a new DNA sequence. >> Right. >> So once that's out there, it's out there and it is the utmost to us. And like I said, we don't have to sell security internally, and with that we've gotten a lot of support internally to be able to implement the kind of things that we needed to implement to keep that data as secure as we can. >> Right, well that's nice to hear and probably really nice for you to be able to execute your job that you don't have to sell securities. It is important, important stuff. >> Grant: Yes, that's absolutely true. >> All right, good. So we are jamming through digital transformation. If we talk a year from now, what's on your plate for the next year? >> We just continue to evolve. We're trying to still continue the build in some of those processes that make us better, stronger, faster, as we go through, to respond to threats. And just really kind of handle the global expansion that our company's undergoing right now. Just want to keep the lights on and make sure that nobody even thinks about security when they can do this. I can't speak for them, but I think we really want to lead the world in terms of privacy and customer trust and things like that. So there are a lot of things that I think we've got coming up that we really want to kind of lead the way on. >> Good, good. I think that is a great objective and I think you guys are in a good position to be the shining light to be, kind of guiding in that direction 'cause it's important stuff, really important stuff. >> Yeah, we hope so, we really do. >> Well Grant, nothing but the best to you. Good luck and keep all that stuff locked down. >> Thank you, thank you so much! Thanks for having me. >> He's Grant, I'm Jeff. You're watching theCube. We're at the Qualys Security Conference at the Bellagio in La Vegas. Thanks for watching. We'll see you next time. (upbeat music)
SUMMARY :
Brought to you by Qualys. and now is out implementing the technology. and why did you make that move? you know, a little uncommon and then what was the opportunity to really make and there just wasn't a way that we could do it that had to be redone around a cloud focus so you can scale? We really had to take, We needed it to be able to Which you know, Arnold Schwarzenegger never had a plan B. Yeah, but you have to succeed in terms of being able to roll out apps quicker, I mean, to the first part of that, We don't have to go to work to get on the internet to shop. and that also increases what you really need to be able to and really, really neat to me to get in there and in terms of risking compliance, impact the way that you do your job and the Honestly, that is part of the reason Maybe it's just higher profile in the news today. We realized that our ability to grow and stay affable to be able to implement the kind of things that we needed really nice for you to be able to execute your job So we are jamming through digital transformation. And just really kind of handle the global expansion and I think you guys are in a good position Well Grant, nothing but the best to you. Thanks for having me. We're at the Qualys Security Conference
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
Jeff Frick | PERSON | 0.99+ |
2016 | DATE | 0.99+ |
Grant Johnson | PERSON | 0.99+ |
Europe | LOCATION | 0.99+ |
Jeff | PERSON | 0.99+ |
Arnold Schwarzenegger | PERSON | 0.99+ |
Grant | PERSON | 0.99+ |
Qualys | ORGANIZATION | 0.99+ |
Ancestry | ORGANIZATION | 0.99+ |
La Vegas | LOCATION | 0.99+ |
Las Vegas | LOCATION | 0.99+ |
hundreds of people | QUANTITY | 0.99+ |
18 months | QUANTITY | 0.99+ |
next year | DATE | 0.99+ |
first part | QUANTITY | 0.99+ |
first time | QUANTITY | 0.99+ |
19 years | QUANTITY | 0.98+ |
Qualys Security Conference | EVENT | 0.98+ |
Five years ago | DATE | 0.98+ |
today | DATE | 0.98+ |
one | QUANTITY | 0.97+ |
Thanksgiving | EVENT | 0.96+ |
Over three years | QUANTITY | 0.93+ |
Ancestry.com | ORGANIZATION | 0.93+ |
theCUBE | ORGANIZATION | 0.92+ |
few years ago | DATE | 0.92+ |
about 10 | QUANTITY | 0.92+ |
Qualys Security Conference 2019 | EVENT | 0.91+ |
Bellagio | LOCATION | 0.9+ |
7-10% | QUANTITY | 0.89+ |
about 250 transactions a second | QUANTITY | 0.88+ |
12 transactions a second | QUANTITY | 0.87+ |
DNA | ORGANIZATION | 0.66+ |
Risk and Compliance for Ancestry | ORGANIZATION | 0.65+ |
23 and Me and | ORGANIZATION | 0.64+ |
a year | QUANTITY | 0.49+ |
Monday | EVENT | 0.4+ |
cyber | DATE | 0.35+ |
Monday | ORGANIZATION | 0.29+ |
Survey Shows Containers Won't Kill VMware...Yet
>> from the Silicon Angle Media Office in Boston, Massachusetts. It's the cue now Here's your host Day Volonte >> Hybrid. Welcome to this special edition of Cube Insights. This is the Cubes 10th year at VM World and leading up >> to V M World. >> We wanted to provide some data in some analysis to you all, and we're working with our partners at E. T. R Enterprise Technology Research. We first introduced you to them when IBM consummated the Red Hat acquisition and they provided some data. E T. R is affirmed. That does really detailed and fast ongoing data. They have, ah, large panel of end customers that they talked to about spending intentions, covering virtually every company in the Enterprise. It's it's great stuff. We reached out to them and came up with a number of questions that we wanted to address around Of'em World and VM where, so let me just start by showing you the questions that we ask them to help us with. And we did essentially what I call drill down survey. So we took their existing data sets. They just did a survey. They completed one in July on spending intentions for the second half of the year combined that, with all the time Siri's data that they had. So these are the questions that really are top of mind for I t decision makers in our community. First of all, what's the appetite for VM? We're spending the second half of 2019. We'll share some data on that. There's a second point is there's narrative out there that that containers are going to kill the M. Where, well, is that true? What is the day to say? How about Multi Cloud? It's the hot topic who was best positioned in multi cloud not only within the VM, where ecosystem but overall, obviously, the M, where has designs on multi cloud and is considered an early potential leader? How about NSX when VM wear but nice era? It changed the game on networking, changed their relationship with Cisco. How is Ennis Ex impacting spending on Cisco? Particularly, obviously a networking. The fifth question that we wanted to address is how is public cloud affecting the M where spend we know public cloud is growing faster than on Prem. What's the impact on the M wear? And then finally it was announced in the press that VM wear was going to acquire Pivotal. Why would that be all right? So let's get into it. The first thing that I want to address is the first question in spending intention. So this slide really shows the results of the second half survey. It's 600 >> and >> 93 respondents representing almost $300 billion in spending power. And so it's actually they were asked what you're spending intention intentions For the second half of 2019 you could see 41% of the respondents said they're going to spend Maur, and only 7% said they're gonna spend less. About 45% said >> they gonna hold firm >> small number 5%. So we're gonna add new and only a tiny infant testable. 2% said they were gonna replace the anywhere, so that's pretty good for an incumbent. And essentially it Sze holding serve and maybe doing a little bit. But even better than holding serve on. So So we saw. That is very positive. The next question that we want to address is the narrative of containers will kill the M, where we asked Pat Gelsinger about that on the Cube years ago, he said, Hey, we're gonna use this as a tail wind. We're gonna embrace containers. So the bottom line is there's very little evidence that containers are hurting the M where let alone killing the end. Where this is a portion of the survey, about 461 respondents on you can see that you know, the big big blip early on back in July 27. Dean. Big uptick in spending, and since then it's been relatively stable. But the important point here is the number of shared accounts that we went to essentially container customers and asked them about their VM wear. Spend. I say we eat. TR did. This is what they do on an ongoing basis, and you could see the number of shared accounts back in 17 was only eight. But as you go to the right hand side, the more recent surveys you're talking about 361 shared accounts of the data sample got much bigger. No evidence that the M where is being negatively impacted by containers kind of affirming the assertion of Pat Gelsinger. Let's talk about multi club. I have said that multi cloud to date has largely been a symptom of multi vendor It's cos acquiring Cloud Technologies for specific workloads. Its shadow i t. It's pockets of cloud activity versus a coherent strategy to manage across multiple clouds. True Hybrid Cloud. We're in the early stages, so the data here, in our view, shows that multi cloud really is jump ball. Um, Interestingly, however, Microsoft and Google is showing momentum. So with this slide shows is the cloud spending intentions. And we picked, you know, the top five players there, that air sort of angling around multi cloud ghoul with Antos. Clearly Microsoft coming from its large software estate of V M. Where, of course, which many believer are early favorite Red Hat with the IBM acquisition and Cisco. So what's interesting here is Google and Microsoft clearly have a lot of momentum kind of mind share in the market place, and not a lot of hard core spending going on and multi cloud. Everybody has multi clouds, but in terms of spending on specific products, does like Antos, for instance, from Google, designed for to support multi cloud. That's where in the early stages there, but you can see the sentiment that buyers have around multi cloud Google and Microsoft showing momentum. Interestingly, VM wear Red Hat and Cisco kind of, you know, bunched up as the big enterprise player. So that's why we call a jump. Oh, we see it is wide open. You know, Cisco might surprise some people, but it really doesn't surprise us. Cisco's coming at multi cloud from a position of networking strength of each of these players you know has their strength. Google with Antos Microsoft from its software state Veum, where clearly as the data center operating system red hat with open shift Now with IBM service is capability. And, of course, Sisko coming at it from networking and security. So so hard to conclude you know who wins out of this data but wanted to share that with you just in terms of what customers are thinking around multi cloud. Okay, big conversation in the community around networking generally specifically NSX. When VM wear beats us, go to the punch and acquired nice era. It stated that we want to do to networking in storage what we did for servers. Well, what did the end? Where do the servers they really co opted the marketplace changed the game and really became, you know, these central point of server management, and that's what they want to do with with networking. VM where is trying to de position Cisco as, ah, hardware vendor, Cisco is responding with its own software defined capabilities and is an interesting battle going on. What is the data show? This shows that network networking spend intentions for Cisco, the Red Line and the M Wear the Blue Line. You can see VM where NSX is sort of bouncing around but has very high mindshare. Where Cisco it's showing a holding firm, but a very gradual decline, I've said many times. Cisco very impressive company, 60 plus percent market share. They've held that for a long, long time, despite some of the successes that you've seen you by the likes of a risk juniper and F five et cetera. Cisco has held its dominant share, but nonetheless, it's clear that NSX is impacting Cisco's dominance. Certainly from a marketing standpoint, and you're seeing also, from a spending standpoint that NSX is really challenging Cisco. It'll be very interesting to see how that plays out over time. Okay, next question was okay. What about cloud. How is that affecting VM? Where we see the cloud numbers, we see the growth. What does that mean for VM wear? And you can see here this'll cloud customers of'em were spend about 718 respondents, and you can see the number of shared accounts in the sample is substantial. 3 94 3 79 for 69. It obviously changes by by the frequency that e t. R does these surveys and they do, you know, several times a year, as you can see, but, you know, large sample of shared accounts. And there's no question that Cloud customers continue to shift Maur. They're spending to the public cloud and potentially at the expense of the end, where you can see the gradual decline here and somewhat precipitous decline. VM. We're still very strong. Stock price is doing great, but there's a little question in our mind that long term VM where, despite cleaning up its cloud strategy with first the AWS Partnership and also now partnerships with Google and Microsoft, and of course, I'd be Emma's Well, they were first, but having public cloud partners nonetheless, we see that over time there's a riel tension there. That on Prem is not going to grab the market, share that growth that the cloud has. And that is a challenge for VM, where that we continue to watch finally pivotal. Why would a V M where acquire? Pivotal? Well, first of all, this is why Pivotal is not work. It doesn't have the momentum that it wants in the marketplace. You can see it's it's pretty steep decline over the last couple of years. On Dhe, it's precipitous. Ah, drop in stock price. Essentially, Del and the governance structure of Del Technologies, which course owns VM, wear a large portion of pivotal saying, Look, let's let's roll this back in. Let's give the stock price of boost. The stock went up 70 plus percent of the day that thou went down 800 points. And so this is why the M, where would buy Pivotal? You know, it's a forcing function, we believe, from from Del. It also makes sense, del in its family del technologies that has these software assets VM where is the mother ship of the Del software operation? So why not folded in personally? I think they should do it with some other software assets as well. Secureworks del Bumi, Arcee. All candidates to roll in potentially overtime to Vienna where at least portions of it, anyway. Okay, so let's summarize. What are the key takeaways? What's the appetite for Veum warrants in the second half of 2019? Pretty solid, we'd say. Well, containers kill VM where there's no evidence, certainly in the theater. But there are threats. Think about sass. How many SAS providers are actually running? VM where so, as SAS continues to grow in prominence of that is a potential blind spot for VM. Where that we're watching Who's best position in multi cloud? It's wide open. Microsoft look strong. Google clearly has some momentum. Cisco maybe surprises many, but I think it's not gonna be a winner. Take all we feel is, though there's a lot of opportunities, but number one is going to make the most money. And so it's a very important space that we're watching. House NSX impacting Cisco Spend. It's a battle, but NSX is clearly negatively pressuring, pressuring Cisco. How about Public Cloud? How is that affecting the M we're spend? We think it's slowly eating away at on print on Prem including the end, where I want to share with you a quote from one of the customers that E. T. R talked to its ahead of, ah, retail consumer organisation in North America. A long time I t practitioner says Veum wears everywhere that I've ever been. I've been a customer. Longtime VM were customer hair. She means it's the standard, but it's interesting situation to see what's their next step. How do they keep themselves relevant? I think they're always going to be a need for Veum where, especially because the ability to have the privacy of an extended network is key. However, with the cloud based environment and encrypted data, it's gonna be interesting to see how that all plays out how Veum wear deals with that approach. I think their next strategic steps are going to be crucial. I think that VM where has to be thinking long term. Okay, what do we do about Cloud? Remember VM, where early on tried to get into cloud and with its own public cloud option, became the cloud air. It failed. They got rid of it, cleaned up their cloud strategy. But why did VM where originally want to get into that business because they know that's world of growth is so yes, hybrid and multi cloud gives VM wear a lot of runway. The partnership with Amazon has a lot of momentum. I didn't share that data, but it's very clear that AWS uh Veum, where on AWS has strong momentum. And so that's certainly what the e t. Our data shows nonetheless, long term, you gotta ask what strategic moves will Michael Dell make to secure their position in the public cloud? Okay, lastly, whywould whywould vm will require pivotal. That's a duh. Okay, we gonna stated why So So that's the deal, thanks to our friends at E T. R. Really appreciate them sharing the data enterprise technology research If you wanted this, there's so many cuts on the data, it's it's unbelievable. You can cut it by large companies, small company industry applications and every company on the planet. You can compare companies together. It's really a powerful set of data, but also access tools that they have developed very, very nice, really modern version of survey panels. And so follow up with us. Follow up with them if you want more information and watch us at VM World will be covering these and many other issues that are tent year at VM World. All the key execs are gonna be on practitioners, customers, partners on, of course, analysts and the broader ecosystem technologists and John Ferrier stew Minuteman myself on the entire Cube team will be there to celebrate. So check it out, cube dot net and we'll see you next week. Thanks for watching.
SUMMARY :
It's the cue This is the Cubes 10th What is the day to say? half of 2019 you could see 41% of the respondents said they're going to spend the end, where I want to share with you a quote from one of the customers that E.
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
Microsoft | ORGANIZATION | 0.99+ |
ORGANIZATION | 0.99+ | |
Amazon | ORGANIZATION | 0.99+ |
Cisco | ORGANIZATION | 0.99+ |
NSX | ORGANIZATION | 0.99+ |
IBM | ORGANIZATION | 0.99+ |
July 27 | DATE | 0.99+ |
Pat Gelsinger | PERSON | 0.99+ |
John Ferrier | PERSON | 0.99+ |
Michael Dell | PERSON | 0.99+ |
AWS | ORGANIZATION | 0.99+ |
July | DATE | 0.99+ |
first question | QUANTITY | 0.99+ |
600 | QUANTITY | 0.99+ |
41% | QUANTITY | 0.99+ |
fifth question | QUANTITY | 0.99+ |
800 points | QUANTITY | 0.99+ |
second half | QUANTITY | 0.99+ |
next week | DATE | 0.99+ |
69 | QUANTITY | 0.99+ |
North America | LOCATION | 0.99+ |
second point | QUANTITY | 0.99+ |
first | QUANTITY | 0.99+ |
60 plus percent | QUANTITY | 0.99+ |
Boston, Massachusetts | LOCATION | 0.99+ |
Siri | TITLE | 0.99+ |
one | QUANTITY | 0.99+ |
Vienna | LOCATION | 0.99+ |
VM World | ORGANIZATION | 0.99+ |
SAS | ORGANIZATION | 0.99+ |
E T. R | ORGANIZATION | 0.99+ |
about 718 respondents | QUANTITY | 0.99+ |
First | QUANTITY | 0.98+ |
Sisko | ORGANIZATION | 0.98+ |
2% | QUANTITY | 0.98+ |
Pivotal | ORGANIZATION | 0.98+ |
17 | QUANTITY | 0.98+ |
5% | QUANTITY | 0.98+ |
first thing | QUANTITY | 0.98+ |
almost $300 billion | QUANTITY | 0.97+ |
Red Line | ORGANIZATION | 0.97+ |
70 plus percent | QUANTITY | 0.97+ |
each | QUANTITY | 0.97+ |
five players | QUANTITY | 0.97+ |
about 461 respondents | QUANTITY | 0.97+ |
Silicon Angle Media Office | ORGANIZATION | 0.96+ |
E. T. R Enterprise Technology Research | ORGANIZATION | 0.96+ |
7% | QUANTITY | 0.96+ |
About 45% | QUANTITY | 0.95+ |
eight | QUANTITY | 0.95+ |
Veum | ORGANIZATION | 0.95+ |
VM | ORGANIZATION | 0.95+ |
Del | ORGANIZATION | 0.94+ |
second half of 2019 | DATE | 0.94+ |
Cubes | ORGANIZATION | 0.94+ |
10th year | QUANTITY | 0.94+ |
E T. R. | ORGANIZATION | 0.93+ |
Bob Parr & Sreekar Krishna, KPMG US | MIT CDOIQ 2019
>> from Cambridge, Massachusetts. It's the Cube covering M I T. Chief data officer and information quality Symposium 2019. Brought to you by Silicon Angle Media. >> Welcome back to Cambridge, Massachusetts. Everybody watching the Cuban leader live tech coverage. We here covering the M I t CDO conference M I t CEO Day to wrapping up. Bob Parr is here. He's a partner in principle at KPMG, and he's joined by Streetcar Krishna, who is the managing director of data science. Aye, aye. And innovation at KPMG. Gents, welcome to the Cube. Thank >> thank you. Let's start with your >> roles. So, Bob, where do you focus >> my focus? Ah, within KPMG, we've got three main business lines audit tax, an advisory. And so I'm the advisory chief date officer. So I'm more focused on how we use data competitively in the market. More the offense side of our focus. So, you know, how do we make sure that our teams have the data they need to deliver value? Uh, much as possible working concert with the enterprise? CDO uh, who's more focused on our infrastructure, Our standards, security, privacy and those >> you've focused on making KPMG better A >> supposed exactly clients. OK, >> I also have a second hat, and I also serve financial service is si Dios as well. So Okay, so >> get her out of a dual role. I got sales guys in >> streetcar. What was your role? >> Yeah, You know, I focus a lot on data science, artificial intelligence and overall innovation s o my reaction. I actually represent a centre of >> excellence within KPMG that focuses on the I machine learning natural language processing. And I work with Bob's Division to actually advance the data site off the store because all the eye needs data. And without data, there's no algorithms, So we're focusing a lot on How do we use a I to make data Better think about their equality. Think about data lineage. Think about all of the problems that data has. How can we make it better using algorithms? And I focused a lot on that working with Bob, But no, it's it's customers and internal. I mean, you know, I were a horizontal within the form, So we help customers. We help internal, we focus a lot on the market. >> So, Bob, you mentioned used data offensively. So 10 12 years ago, it was data was a liability. You had to get rid of it. Keep it no longer than you had to, because you're gonna get soon. So email archives came in and obviously thinks flipped after the big data. But so what do you What are you seeing in terms of that shift from From the defense data to the offensive? >> Yeah, and it's it's really you know, when you think about it and let me define sort of offense versus defense. Who on the defense side, historically, that's where most of CEOs have played. That's risk regulatory reporting, privacy, um, even litigation support those types of activities today. Uh, and really, until about a year and 1/2 ago, we really saw most CEOs still really anchored in that I run a forum with a number of studios and financial service is, and every year we get them together and asked him the same set of questions. This was the first year where they said that you know what my primary focus now is. Growth. It's bringing efficiency is trying to generate value on the offensive side. It's not like the regulatory work's going away, certainly in the face of some of the pending privacy regulation. But you know, it's It's a sign that the volume of use cases as the investments in their digital transformations are starting to kick out, as well as the volumes of data that are available. The raw material that's available to them in terms of third party data in terms of the the just the general volumes that that exist that are streaming into the organization and the overall literacy in the business units are creating this, this massive demand. And so they're having to >> respond because of getting a handle on the data they're actually finding. Word is, they're categorizing it there, there, >> yeah, organizing that. That is still still a challenge. Um, I think it's better with when you have a very narrow scope of critical data elements going back to the structure data that we're talking it with the regulatory reporting when you start to get into the three offense, the generating value, getting the customer experience, you know, really exploring. You know that side of it. There's there's a ton of new muscle that has to be built new muscle in terms of data quality, new muscle in terms of um, really more scalable operating model. I think that's a big issue right now with Si Dios is, you know, we've got ah, we're used to that limited swath of CDs and they've got Stewardship Network. That's very labor intensive. A lot of manual processes still, um, and and they have some good basic technology, but it's a lot of its rules based. And when you do you think about those how that constraints going to scale when you have all of this demand. You know, when you look at the customer experience analytics that they want to do when you look at, you know, just a I applied to things like operations. The demand on the focus there is is is gonna start to create a fundamental shift >> this week are one of things that I >> have scene, and maybe it's just my small observation space. But I wonder, if you could comment Is that seems like many CBO's air not directly involved in the aye aye initiatives. Clearly, the chief digital officer is involved, but the CDO zehr kind of, you know, in the background still, you see that? >> That's a fantastic question, and I think this is where we're seeing some off the cutting it change that is happening in the industry. And when Barbara presenter idea that we can often civilly look at data, this is what it is that studios for a long time have become more reactive in their roles. And that is that is starting to come forefront now. So a lot of institutions were working with are asking What's the next generation Roll off a CDO and why are they in the background and why are they not in the foreground? And this is when you become more often they were proactive with data and the digital officers are obviously focused on, you know, the transformation that has to happen. But the studios are their backbone in order to make the transformation. Really. And if the CDO started, think about their data as an asset did as a product did us a service. The judicial officers are right there because those are the real, you know, like the data data they're living so CDO can really become from my back office to really become a business line. We've >> seen taking the reins in machine learning in machine learning projects and cos you work with. Who >> was driving that? Yeah. Great question. So we are seeing, like, you know, different. I would put them in buckets, right? There is no one mortal fits all. We're seeing different generations within the company's. Some off. The ones were just testing out the market. There's two keeping it in their technology space in their back office. Take idea and, you know, in in forward I d let me call them where they are starting to experiment with this. But you see, the mature organizations on the other end of the spectrum, they are integrating action, learning and a I right into the business line because they want to see ex souls having the technology right by their side so they can lead leverage. Aye, aye. And machine learning spot right for the business right there. And that is where we're seeing know some of the new models. Come on. >> I think the big shift from a CDO perspective is using a i to prep data for a That's that's fundamentally where you know, where the data science was distributed. Some of that data science has to come back and free the integration for equality for data prepping because you've got all this data third party and other from customer streaming into the organization. And you know, the work that you're doing around, um, anomaly detection is it transcends developing the rules, doing the profiling, doing the rules. You know, the very manual, the very labor intensive process you've got to get away from that >> is used in order for this to be scale goes and a I to figure out which out goes to apply t >> clean to prepare the data toe, see what algorithms we can use. So it's basically what we're calling a eye for data rather than just data leading into a I. So it's I mean, you know, you developed a technology for one off our clients and pretty large financial service. They were getting closer, like 1,000,000,000 data points every day. And there was no way manually, you could go through the same quality controls and all of those processes. So we automated it through algorithms, and these algorithms are learning the behavior of data as they flow into the organization, and they're able to proactively tell their problems are starting very much. And this is the new face that we see in in the industry, you cannot scale the traditional data governance using manual processes, we have to go to the next generation where a i natural language processing and think about on structure data, right? I mean, that is, like 90% off. The organization is unstructured data, and we have not talked about data quality. We have not talked about data governance. For a lot of these sources of information, now is the time. Hey, I can do it. >> And I think that raised a great question. If you look at unstructured and a lot of the data sources, as you start to take more of an offensive stance will be unstructured. And the data quality, what it means to apply data quality isn't the the profiling and the rules generation the way you would with standard data. So the teams, the skills that CEOs have in their organizations, have to change. You have to start to, and, you know, it's a great example where, you know, you guys were ingesting documents and there was handwriting all over the documents, you know, and >> yeah, you know, you're a great example, Bob. Like you no way would ask the client, like, you know, is this document gonna scanned into the system so my algorithm can run and they're like, Yeah, everything is good. I mean, the deal is there, but when you then start scanning it, you realize there's handwriting and the information is in the handwriting. So all the algorithms breakdown now >> tribal knowledge striving Exactly. >> Exactly. So that's what we're seeing. You know, if I if we talk about the digital transformation in data in the city organization, it is this idea dart. Nothing is left unseen. Some algorithm or some technology, has seen everything that is coming into. The organization has has has a para 500. So you can tell you where the problems are. And this is what algorithms do. This scale beautifully. >> So the data quality approaches are evolving, sort of changing. So rather than heavy, heavy emphasis on masking or duplication and things like that, you would traditionally think of participating the difficult not that that goes away. But it's got to evolve to use machine >> intelligence. Exactly what kind of >> skill sets people need thio achieve that Is it Is it the same people or do we need to retrain them or bring in new skills. >> Yeah, great question. And I can talk from the inspector off. Where is disrupting every industry now that we know, right? But we knew when you look at what skills are >> required, all of the eye, including natural language processing, machine learning, still require human in the loop. And >> that is the training that goes in there. And who do you who are the >> people who have that knowledge? It is the business analyst. It's the data analyst who are the knowledge betters the C suite and the studios. They are able to make decisions. But the day today is still with the data analyst. >> Those s Emmys. Those sm >> means So we have to obscure them to really start >> interacting with these new technologies where they are the leaders, rather than just waiting for answers to come through. And >> when that happens now being as a data scientist, my job is easy because they're Siamese, are there? I deploy the technology. They're semi's trained algorithms on a regular basis. Then it is a fully fungible model which is evolving with the business. And no longer am I spending time re architect ing my rules. And like my, you know, what are the masking capabilities I need to have? It is evolving us. >> Does that change the >> number one problem that you hear from data scientists, which is the 80% of the time >> spent on wrangling cleaning data 10 15 20% run into sm. He's being concerned that they're gonna be replaced by the machine. Their training. >> I actually see them being really enabled now where they're spending 80% of the time doing boring job off, looking at data. Now they're spending 90% of their time looking at the elements future creative in which requires human intelligence to say, Hey, this is different because off X, >> y and Z so let's let's go out. It sounds like a lot of what machine learning is being used for now in your domain is clean things up its plumbing. It's basic foundation work. So go out. Three years after all that work has been done and the data is clean. Where are your clients talking about going next with machine learning? Bob, did you want? >> I mean, it's a whole. It varies by by industry, obviously, but, um but it covers the gamut from, you know, and it's generally tied to what's driving their strategies. So if you look at a financial service is organization as an example today, you're gonna have, you know, really a I driving a lot of the behind the scenes on the customer experience. It's, you know, today with your credit card company. It's behind the scenes doing fraud detection. You know, that's that's going to continue. So it's take the critical functions that were more data. It makes better models that, you know, that that's just going to explode. And I think they're really you can look across all the functions, from finance to to marketing to operations. I mean, it's it's gonna be pervasive across, you know all of that. >> So if I may, I don't top award. While Bob was saying, I think what's gonna what What our clients are asking is, how can I exhilarate the decision making? Because at the end of the day on Lee, all our leaders are focused on making decisions, and all of this data science is leading up to their decision, and today you see like you know what you brought up, like 80% of the time is wasted in cleaning the data. So only 20% time was spent in riel experimentation and analytics. So your decision making time was reduced to 20% off the effort that I put in the pipeline. What if now I can make it 80% of the time? They're I put in the pipeline, better decisions are gonna come on the train. So when I go into a meeting and I'm saying like, Hey, can you show me what happened in this particular region or in this particular part of the country? Previously, it would have been like, Oh, can you come back in two weeks? I will have the data ready, and I will tell you the answer. But in two weeks, the business has ran away and the CDO know or the C Street doesn't require the same answer. But where we're headed as as the data quality improves, you can get to really time questions and decisions. >> So decision, sport, business, intelligence. Well, we're getting better. Isn't interesting to me. Six months to build a cube, we'd still still not good enough. Moving too fast. As the saying goes, data is plentiful. Insights aren't Yes, you know, in your view, well, machine intelligence. Finally, close that gap. Get us closer to real time decision >> making. It will eventually. But there's there's so much that we need to. Our industry needs to understand first, and it really ingrained. And, you know, today there is still a fundamental trust issues with a I you know, it's we've done a lot of work >> watch Black box or a part of >> it. Part of it. I think you know, the research we've done. And some of this is nine countries, 2400 senior executives. And we asked some, ah, a lot of questions around their data and trusted analytics, and 92% of them came back with. They have some fundamental trust issues with their data and their analytics and and they feel like there's reputational risk material reputational risk. This isn't getting one little number wrong on one of the >> reports about some more of an >> issue, you know, we also do a CEO study, and we've done this many years in a row going back to 2017. We started asked them okay, making a lot of companies their data driven right. When it comes to >> what they say they're doing well, They say they're day driven. That's the >> point. At the end of the day, they making strategic decisions where you have an insight that's not intuitive. Do you trust your gut? Go with the analytics back then. You know, 67% said they go with their gut, So okay, this is 2017. This industry's moving quickly. There's tons and tons of investment. Look at it. 2018 go down. No, went up 78%. So it's not aware this issue there is something We're fundamentally wrong and you hit it on. It's a part of its black box, and part of it's the date equality and part of its bias. And there's there's all of these things flowing around it. And so when we dug into that, we said, Well, okay, if that exists, how are we going to help organizations get their arms around this issue and start digging into that that trust issue and really it's the front part is, is exactly what we're talking about in terms of data quality, both structured more traditional approaches and unstructured, using the handwriting example in those types of techniques. But then you get into the models themselves, and it's, you know, the critical thing she had to worry about is, you know, lineage. So from an integrity perspective, where's the data coming from? Whether the sources for the change controls on some of that, they need to look at explain ability, gain at the black box part where you can you tell me the inferences decisions are those documented. And this is important for this me, the human in the loop to get confidence in the algorithm as well as you know, that executive group. So they understand there's a structure set of processes around >> Moneyball. Problem is actually pretty confined. It's pretty straightforward. Dono 32 teams are throwing minor leagues, but the data models pretty consistent through the problem with organizations is I didn't know data model is consistent with the organization you mentioned, Risk Bob. The >> other problem is organizational inertia. If they don't trust it, what is it? What is a P and l manage to do when he or she wants to preserve? Yeah, you know, their exit position. They attacked the data. You know, I don't believe that well, which which is >> a fundamental point, which is culture. Yes. I mean, you can you can have all the data, science and all the governance that you want. But if you don't work culture in parallel with all this, it's it's not gonna stick. And and that's, I think the lot of the leading organisations, they're starting to really dig into this. We hear a lot of it literacy. We hear a lot about, you know, top down support. What does that really mean? It means, you know, senior executives are placing bats around and linking demonstrably linking the data and the role of data days an asset into their strategies and then messaging it out and being specific around the types of investments that are going to reinforce that business strategy. So that's absolutely critical. And then literacy absolutely fundamental is well, because it's not just the executives and the data scientists that have to get this. It's the guy in ops that you're trying to get you. They need to understand, you know, not only tools, but it's less about the tools. But it's the techniques, so it's not. The approach is being used, are more transparent and and that you know they're starting to also understand, you know, the issues of privacy and data usage rights. That's that's also something that we can't leave it the curb. With all this >> innovation, it's also believing that there's an imperative. I mean, there's a lot of for all the talk about digital transformation hear it everywhere. Everybody's trying to get digital, right? But there's still a lot of complacency in the organization in the lines of business in operation to save. We're actually doing really well. You know, we're in financial service is health care really hasn't been disrupted. This is Oh, it's coming, it's coming. But there's still a lot of I'll be retired by then or hanging. Actually, it's >> also it's also the fact that, you know, like in the previous generation, like, you know, if I had to go to a shopping, I would go into a shop and if I wanted by an insurance product, I would call my insurance agent. But today the New world, it's just a top off my screen. I have to go from Amazon, so some other some other app, and this is really this is what is happening to all of our kind. Previously that they start their customers, pocketed them in different experience. Buckets. It's not anymore that's real in front of them. So if you don't get into their digital transformation, a customer is not going to discount you by saying, Oh, you're not Amazon. So I'm not going to expect that you're still on my phone and you're only two types of here, so you have to become really digital >> little surprises that you said you see the next. The next stage is being decision support rather than customer experience, because we hear that for CEOs, customer experience is top of mind right now. >> No natural profile. There are two differences, right? One is external facing is absolutely the customer internal facing. It's absolutely the decision making, because that's how they're separating. The internal were, says the external, and you know most of the meetings that we goto Customer insight is the first place where analytics is starting where data is being cleaned up. Their questions are being asked about. Can I master my customer records? Can I do a good master off my vendor list? That is where they start. But all of that leads to good decision making to support the customers. So it's like that external towards internal view well, back >> to the offense versus defense and the shift. I mean, it absolutely is on the offense side. So it is with the customer, and that's a more directly to the business strategy. So it's get That's the area that's getting the money, the support and people feel like it's they're making an impact with it there. When it's it's down here in some admin area, it's below the water line, and, you know, even though it's important and it flows up here, it doesn't get the VIN visibility. So >> that's great conversation. You coming on? You got to leave it there. Thank you for watching right back with our next guest, Dave Lot. Paul Gillen from M I t CDO I Q Right back. You're watching the Cube
SUMMARY :
Brought to you by We here covering the M I t CDO conference M I t CEO Day to wrapping Let's start with your So, Bob, where do you focus And so I'm the advisory chief date officer. I also have a second hat, and I also serve financial service is si Dios as well. I got sales guys in What was your role? Yeah, You know, I focus a lot on data science, artificial intelligence and I mean, you know, I were a horizontal within the form, So we help customers. seeing in terms of that shift from From the defense data to the offensive? Yeah, and it's it's really you know, when you think about it and let me define sort of offense versus respond because of getting a handle on the data they're actually finding. getting the customer experience, you know, really exploring. if you could comment Is that seems like many CBO's air not directly involved in And this is when you become more often they were proactive with data and the digital officers seen taking the reins in machine learning in machine learning projects and cos you work with. So we are seeing, like, you know, different. And you know, the work that you're doing around, um, anomaly detection is So it's I mean, you know, you developed a technology for one off our clients and pretty and the rules generation the way you would with standard data. I mean, the deal is there, but when you then start scanning it, So you can tell you where the problems are. So the data quality approaches are evolving, Exactly what kind of do we need to retrain them or bring in new skills. And I can talk from the inspector off. machine learning, still require human in the loop. And who do you who are the But the day today is still with the data Those s Emmys. And And like my, you know, what are the masking capabilities I need to have? He's being concerned that they're gonna be replaced by the machine. 80% of the time doing boring job off, looking at data. the data is clean. And I think they're really you and all of this data science is leading up to their decision, and today you see like you know what you brought Insights aren't Yes, you know, fundamental trust issues with a I you know, it's we've done a lot of work I think you know, the research we've done. issue, you know, we also do a CEO study, and we've done this many years That's the in the algorithm as well as you know, that executive group. is I didn't know data model is consistent with the organization you mentioned, Yeah, you know, science and all the governance that you want. the organization in the lines of business in operation to save. also it's also the fact that, you know, like in the previous generation, little surprises that you said you see the next. The internal were, says the external, and you know most of the meetings it's below the water line, and, you know, even though it's important and it flows up here, Thank you for
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
Barbara | PERSON | 0.99+ |
KPMG | ORGANIZATION | 0.99+ |
Bob | PERSON | 0.99+ |
20% | QUANTITY | 0.99+ |
Amazon | ORGANIZATION | 0.99+ |
90% | QUANTITY | 0.99+ |
80% | QUANTITY | 0.99+ |
Bob Parr | PERSON | 0.99+ |
2017 | DATE | 0.99+ |
Silicon Angle Media | ORGANIZATION | 0.99+ |
Dave Lot | PERSON | 0.99+ |
2018 | DATE | 0.99+ |
67% | QUANTITY | 0.99+ |
nine countries | QUANTITY | 0.99+ |
92% | QUANTITY | 0.99+ |
Cambridge, Massachusetts | LOCATION | 0.99+ |
2400 senior executives | QUANTITY | 0.99+ |
Six months | QUANTITY | 0.99+ |
three offense | QUANTITY | 0.99+ |
first | QUANTITY | 0.99+ |
Paul Gillen | PERSON | 0.99+ |
Lee | PERSON | 0.99+ |
today | DATE | 0.99+ |
78% | QUANTITY | 0.99+ |
Sreekar Krishna | PERSON | 0.99+ |
two types | QUANTITY | 0.99+ |
One | QUANTITY | 0.98+ |
32 teams | QUANTITY | 0.98+ |
second hat | QUANTITY | 0.98+ |
Three years | QUANTITY | 0.98+ |
two differences | QUANTITY | 0.98+ |
10 | DATE | 0.98+ |
both | QUANTITY | 0.97+ |
two | QUANTITY | 0.97+ |
two weeks | QUANTITY | 0.97+ |
this week | DATE | 0.96+ |
one | QUANTITY | 0.95+ |
M I t CDO | EVENT | 0.95+ |
C Street | ORGANIZATION | 0.93+ |
M I t CEO Day | EVENT | 0.93+ |
Streetcar Krishna | PERSON | 0.92+ |
about a year and | DATE | 0.91+ |
2019 | DATE | 0.9+ |
Cuban | OTHER | 0.9+ |
CBO | ORGANIZATION | 0.88+ |
first year | QUANTITY | 0.88+ |
Si Dios | ORGANIZATION | 0.87+ |
12 years ago | DATE | 0.86+ |
10 | QUANTITY | 0.84+ |
Risk | PERSON | 0.81+ |
1,000,000,000 data points | QUANTITY | 0.8+ |
CDO | TITLE | 0.8+ |
Parr | PERSON | 0.79+ |
Cube | ORGANIZATION | 0.79+ |
1/2 ago | DATE | 0.78+ |
CDO | ORGANIZATION | 0.78+ |
tons and | QUANTITY | 0.76+ |
dual | QUANTITY | 0.72+ |
15 | QUANTITY | 0.71+ |
Dono | ORGANIZATION | 0.7+ |
one little number | QUANTITY | 0.69+ |
MIT | ORGANIZATION | 0.67+ |
three | QUANTITY | 0.64+ |
500 | OTHER | 0.63+ |
box | TITLE | 0.61+ |
M I T. | EVENT | 0.6+ |
Cube Bob | ORGANIZATION | 0.59+ |
Lars Toomre, Brass Rat Capital | MIT CDOIQ 2019
>> from Cambridge, Massachusetts. It's the Cube covering M I T. Chief data officer and information quality Symposium 2019. Brought to you by Silicon Angle Media. >> Welcome back to M I. T. Everybody. This is the Cube. The leader in live coverage. My name is David wanted. I'm here with my co host, Paul Gill, in this day to coverage of the M I t cdo I Q conference. A lot of acronym stands for M I. T. Of course, the great institution. But Chief Data officer information quality event is his 13th annual event. Lars to Maria's here is the managing partner of Brass Rat Capital. Cool name Lars. Welcome to the Cube. Great. Very much. Glad I start with a name brass around Capitol was That's >> rat is reference to the M I t school. Okay, Beaver? Well, he is, but the students call it a brass rat, and I'm third generation M i t. So it's just seen absolutely appropriate. That is a brass rods and capital is not a reference to money, but is actually referenced to the intellectual capital. They if you have five or six brass rats in the same company, you know, we Sometimes engineers arrive and they could do some things. >> And it Boy, if you put in some data data capital in there, you really explosions. We cause a few problems. So we're gonna talk about some new regulations that are coming down. New legislation that's coming down that you exposed me to yesterday, which is gonna have downstream implications. You get ahead of this stuff and understand it. You can really first of all, prepare, make sure you're in compliance, but then potentially take advantage for your business. So explain to us this notion of open government act. >> Um, in the last five years, six years or so, there's been an effort going on to increase the transparency across all levels of government. Okay, State, local and federal government. The first of federal government laws was called the the Open Data Act of 2014 and that was an act. They was acted unanimously by Congress and signed by Obama. They was taking the departments of the various agencies of the United States government and trying to roll up all the expenses into one kind of expense. This is where we spent our money and who got the money and doing that. That's what they were trying to do. >> Big picture type of thing. >> Yeah, big picture type thing. But unfortunately, it didn't work, okay? Because they forgot to include this odd word called mentalities. So the same departments meant the same thing. Data problem. They have a really big data problem. They still have it. So they're to G et o reports out criticizing how was done, and the government's gonna try and correct it. Then in earlier this year, there was another open government date act which said in it was signed by Trump. Now, this time you had, like, maybe 25 negative votes, but essentially otherwise passed Congress completely. I was called the Open as all capital O >> P E >> n Government Data act. Okay, and that's not been implemented yet. But there's live talking around this conference today in various Chief date officers are talking about this requirement that every single non intelligence defense, you know, vital protection of the people type stuff all the like, um, interior, treasury, transportation, those type of systems. If you produce a report these days, which is machine, I mean human readable. You must now in two years or three years. I forget the exact invitation date. Have it also be machine readable. Now, some people think machine riddle mil means like pdf formats, but no, >> In fact, what the government did is it >> said it must be machine readable. So you must be able to get into the reports, and you have to be able to extract out the information and attach it to the tree of knowledge. Okay, so we're all of sudden having context like they're currently machine readable, Quote unquote, easy reports. But you can get into those SEC reports. You pull out the net net income information and says its net income, but you don't know what it attaches to on the tree of knowledge. So, um, we are helping the government in some sense able, machine readable type reporting that weaken, do machine to machine without people being involved. >> Would you say the tree of knowledge You're talking about the constant >> man tick semantic tree of knowledge so that, you know, we all come from one concept like the human is example of a living thing living beast, a living Beeston example Living thing. So it also goes back, and they're serving as you get farther and farther out the tree, there's more distance or semantic distance, but you can attach it back to concept so you can attach context to the various data. Is this essentially metadata? That's what people call it. But if I would go over see sale here at M I t, they would turn around. They call it the Tree of Knowledge or semantic data. Okay, it's referred to his semantic dated, So you are passing not only the data itself, but the context that >> goes along with the data. Okay, how does this relate to the financial transparency? >> Well, Financial Transparency Act was introduced by representative Issa, who's a Republican out of California. He's run the government Affairs Committee in the House. He retired from Congress this past November, but in 2017 he introduced what's got referred to his H R 15 30 Um, and the 15 30 is going to dramatically change the way, um, financial regulators work in the United States. Um, it is about it was about to be introduced two weeks ago when the labor of digital currency stuff came up. So it's been delayed a little bit because they're trying to add some of the digital currency legislation to that law. >> A front run that Well, >> I don't know exactly what the remember soul coming out of Maxine Waters Committee. So the staff is working on a bunch of different things at once. But, um, we own g was asked to consult with them on looking at the 15 30 act and saying, How would we improve quote unquote, given our technical, you know, not doing policy. We just don't have the technical aspects of the act. How would we want to see it improved? So one of the things we have advised is that for the first time in the United States codes history, they're gonna include interesting term called ontology. You know what intelligence? Well, everyone gets scared by the word. And when I read run into people, they say, Are you a doctor? I said, no, no, no. I'm just a date. A guy. Um, but an intolerant tea is like a taxonomy, but it had order has important, and an ontology allows you to do it is ah, kinda, you know, giving some context of linking something to something else. And so you're able Thio give Maur information with an intolerant that you're able to you with a tax on it. >> Okay, so it's a taxonomy on steroids? >> Yes, exactly what? More flexible, >> Yes, but it's critically important for artificial intelligence machine warning because if I can give them until ology of sort of how it goes up and down the semantics, I can turn around, do a I and machine learning problems on the >> order of 100 >> 1000 even 10,000 times faster. And it has context. It has contacts in just having a little bit of context speeds up these problems so dramatically so and it is that what enables the machine to machine? New notion? No, the machine to machine is coming in with son called SP R M just standard business report model. It's a OMG sophistication of way of allowing the computers or machines, as we call them these days to get into a standard business report. Okay, so let's say you're ah drug company. You have thio certify you >> drugged you manufactured in India, get United States safely. Okay, you have various >> reporting requirements on the way. You've got to give extra easy the FDA et cetera that will always be a standard format. The SEC has a different format. FERC has a different format. Okay, so what s p r m does it allows it to describe in an intolerant he what's in the report? And then it also allows one to attach an ontology to the cells in the report. So if you like at a sec 10 Q 10 k report, you can attach a US gap taxonomy or ontology to it and say, OK, net income annual. That's part of the income statement. You should never see that in a balance sheet type item. You know his example? Okay. Or you can for the first time by having that context you can say are solid problem, which suggested that you can file these machine readable reports that air wrong. So they believe or not, There were about 50 cases in the last 10 years where SEC reports have been filed where the assets don't equal total liabilities, plus cheryl equity, you know, just they didn't add >> up. So this to, >> you know, to entry accounting doesn't work. >> Okay, so so you could have the machines go and check scale. Hey, we got a problem We've >> got a problem here, and you don't have to get humans evolved. So we're gonna, um uh, Holland in Australia or two leaders ahead of the United States. In this area, they seem dramatic pickups. I mean, Holland's reporting something on the order of 90%. Pick up Australia's reporting 60% pickup. >> We say pick up. You're talking about pickup of errors. No efficiency, productivity, productivity. Okay, >> you're taking people out of the whole cycle. It's dramatic. >> Okay, now what's the OMG is rolling on the hoof. Explain the OMG >> Object Management Group. I'm not speaking on behalf of them. It's a membership run organization. You remember? I am a >> member of cold. >> I'm a khalid of it. But I don't represent omg. It's the membership has to collectively vote that this is what we think. Okay, so I can't speak on them, right? I have a pretty significant role with them. I run on behalf of OMG something called the Federated Enterprise Risk Management Group. That's the group which is focusing on risk management for large entities like the federal government's Veterans Affairs or Department offense upstairs. I think talking right now is the Chief date Officer for transportation. OK, that's a large organization, which they, they're instructed by own be at the, um, chief financial officer level. The one number one thing to do for the government is to get an effective enterprise worst management model going in the government agencies. And so they come to own G let just like NIST or just like DARPA does from the defense or intelligence side, saying we need to have standards in this area. So not only can we talk thio you effectively, but we can talk with our industry partners effectively on space. Programs are on retail, on medical programs, on finance programs, and so they're at OMG. There are two significant financial programs, or Sanders, that exist once called figgy financial instrument global identifier, which is a way of identifying a swap. Its way of identifying a security does not have to be used for a que ce it, but a worldwide. You can identify that you know, IBM stock did trade in Tokyo, so it's a different identifier has different, you know, the liberals against the one trading New York. Okay, so those air called figgy identifiers them. There are attributes associated with that security or that beast the being identified, which is generally comes out of 50 which is the financial industry business ontology. So you know, it says for a corporate bond, it has coupon maturity, semi annual payment, bullets. You know, it is an example. So that gives you all the information that you would need to go through to the calculation, assuming you could have a calculation routine to do it, then you need thio. Then turn around and set up your well. Call your environment. You know where Ford Yield Curves are with mortgage backed securities or any portable call. Will bond sort of probabilistic lee run their numbers many times and come up with effective duration? Um, And then you do your Vader's analytics. No aggregating the portfolio and looking at Shortfalls versus your funding. Or however you're doing risk management and then finally do reporting, which is where the standardized business reporting model comes in. So that kind of the five parts of doing a full enterprise risk model and Alex So what >> does >> this mean for first? Well, who does his impact on? What does it mean for organizations? >> Well, it's gonna change the world for basically everyone because it's like doing a clue ends of a software upgrade. Conversion one's version two point. Oh, and you know how software upgrades Everyone hates and it hurts because everyone's gonna have to now start using the same standard ontology. And, of course, that Sarah Ontology No one completely agrees with the regulators have agreed to it. The and the ultimate controlling authority in this thing is going to be F sock, which is the Dodd frank mandated response to not ever having another chart. So the secretary of Treasury heads it. It's Ah, I forget it's the, uh, federal systemic oversight committee or something like that. All eight regulators report into it. And, oh, if our stands is being the adviser Teff sock for all the analytics, what these laws were doing, you're getting over farm or more power to turn around and look at how we're going to find data across the three so we can come up consistent analytics and we can therefore hopefully take one day. Like Goldman, Sachs is pre payment model on mortgages. Apply it to Citibank Portfolio so we can look at consistency of analytics as well. It is only apply to regulated businesses. It's gonna apply to regulated financial businesses. Okay, so it's gonna capture all your mutual funds, is gonna capture all your investment adviser is gonna catch her. Most of your insurance companies through the medical air side, it's gonna capture all your commercial banks is gonna capture most of you community banks. Okay, Not all of them, because some of they're so small, they're not regularly on a federal basis. The one regulator which is being skipped at this point, is the National Association Insurance Commissioners. But they're apparently coming along as well. Independent federal legislation. Remember, they're regulated on the state level, not regularly on the federal level. But they've kind of realized where the ball's going and, >> well, let's make life better or simply more complex. >> It's going to make life horrible at first, but we're gonna take out incredible efficiency gains, probably after the first time you get it done. Okay, is gonna be the problem of getting it done to everyone agreeing. We use the same definitions >> of the same data. Who gets the efficiency gains? The regulators, The companies are both >> all everyone. Can you imagine that? You know Ah, Goldman Sachs earnings report comes out. You're an analyst. Looking at How do I know what Goldman? Good or bad? You have your own equity model. You just give the model to the semantic worksheet and all turn around. Say, Oh, those numbers are all good. This is what expected. Did it? Did it? Didn't you? Haven't. You could do that. There are examples of companies here in the United States where they used to have, um, competitive analysis. Okay. They would be taking somewhere on the order of 600 to 7. How 100 man hours to do the competitive analysis by having an available electronically, they cut those 600 hours down to five to do a competitive analysis. Okay, that's an example of the type of productivity you're gonna see both on the investment side when you're doing analysis, but also on the regulatory site. Can you now imagine you get a regulatory reports say, Oh, there's they're out of their way out of whack. I can tell you this fraud going on here because their numbers are too much in X y z. You know, you had to fudge numbers today, >> and so the securities analyst can spend Mme. Or his or her time looking forward, doing forecasts exactly analysis than having a look back and reconcile all this >> right? And you know, you hear it through this conference, for instance, something like 80 to 85% of the time of analysts to spend getting the data ready. >> You hear the same thing with data scientists, >> right? And so it's extent that we can helped define the data. We're going thio speed things up dramatically. But then what's really instinct to me, being an M I t engineer is that we have great possibilities. An A I I mean, really great possibilities. Right now, most of the A miles or pattern matching like you know, this idea using face shield technology that's just really doing patterns. You can do wonderful predictive analytics of a I and but we just need to give ah lot of the a m a. I am a I models the contact so they can run more quickly. OK, so we're going to see a world which is gonna found funny, But we're going to see a world. We talk about semantic analytics. Okay. Semantic analytics means I'm getting all the inputs for the analysis with context to each one of the variables. And when I and what comes out of it will be a variable results. But you also have semantics with it. So one in the future not too distant future. Where are we? We're in some of the national labs. Where are you doing it? You're doing pipelines of one model goes to next model goes the next mile. On it goes Next model. So you're gonna software pipelines, Believe or not, you get them running out of an Excel spreadsheet. You know, our modern Enhanced Excel spreadsheet, and that's where the future is gonna be. So you really? If you're gonna be really good in this business, you're gonna have to be able to use your brain. You have to understand what data means You're going to figure out what your modeling really means. What happens if we were, You know, normally for a lot of the stuff we do bell curves. Okay, well, that doesn't have to be the only distribution you could do fat tail. So if you did fat tail descriptions that a bell curve gets you much different results. Now, which one's better? I don't know, but, you know, and just using example >> to another cut in the data. So our view now talk about more about the tech behind this. He's mentioned a I What about math? Machine learning? Deep learning. Yeah, that's a color to that. >> Well, the tech behind it is, believe or not, some relatively old tech. There is a technology called rd F, which is kind of turned around for a long time. It's a science kind of, ah, machine learning, not machine wearing. I'm sorry. Machine code type. Fairly simplistic definitions. Lots of angle brackets and all this stuff there is a higher level. That was your distracted, I think put into standard in, like, 2000 for 2005. Called out. Well, two point. Oh, and it does a lot at a higher level. The same stuff that already f does. Okay, you could also create, um, believer, not your own special ways of a communicating and ontology just using XML. Okay, So, uh, x b r l is an enhanced version of XML, okay? And so some of these older technologies, quote unquote old 20 years old, are essentially gonna be driving a lot of this stuff. So you know you know Corbett, right? Corba? Is that what a maid omg you know, on the communication and press thing, do you realize that basically every single device in the world has a corpus standard at okay? Yeah, omg Standard isn't all your smartphones and all your computers. And and that's how they communicate. It turns out that a lot of this old stuff quote unquote, is so rigidly well defined. Well done that you can build modern stuff that takes us to the Mars based on these old standards. >> All right, we got to go. But I gotta give you the award for the most acronyms >> HR 15 30 fi G o m g s b r >> m fsoc tarp. Oh, fr already halfway. We knew that Owl XML ex brl corba, Which of course >> I do. But that's well done. Like thanks so much for coming. Everyone tried to have you. All right, keep it right there, everybody, We'll be back with our next guest from M i t cdo I Q right after this short, brief short message. Thank you
SUMMARY :
Brought to you by A lot of acronym stands for M I. T. Of course, the great institution. in the same company, you know, we Sometimes engineers arrive and they could do some things. And it Boy, if you put in some data data capital in there, you really explosions. of the United States government and trying to roll up all the expenses into one kind So they're to G et o reports out criticizing how was done, and the government's I forget the exact invitation You pull out the net net income information and says its net income, but you don't know what it attaches So it also goes back, and they're serving as you get farther and farther out the tree, Okay, how does this relate to the financial and the 15 30 is going to dramatically change the way, So one of the things we have advised is that No, the machine to machine is coming in with son Okay, you have various So if you like at a sec Okay, so so you could have the machines go and check scale. I mean, Holland's reporting something on the order of 90%. We say pick up. you're taking people out of the whole cycle. Explain the OMG You remember? go through to the calculation, assuming you could have a calculation routine to of you community banks. gains, probably after the first time you get it done. of the same data. You just give the model to the semantic worksheet and all turn around. and so the securities analyst can spend Mme. And you know, you hear it through this conference, for instance, something like 80 to 85% of the time You have to understand what data means You're going to figure out what your modeling really means. to another cut in the data. on the communication and press thing, do you realize that basically every single device But I gotta give you the award for the most acronyms We knew that Owl Thank you
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
Paul Gill | PERSON | 0.99+ |
Obama | PERSON | 0.99+ |
Trump | PERSON | 0.99+ |
IBM | ORGANIZATION | 0.99+ |
Lars | PERSON | 0.99+ |
India | LOCATION | 0.99+ |
2017 | DATE | 0.99+ |
David | PERSON | 0.99+ |
five | QUANTITY | 0.99+ |
Goldman | ORGANIZATION | 0.99+ |
Issa | PERSON | 0.99+ |
Federated Enterprise Risk Management Group | ORGANIZATION | 0.99+ |
80 | QUANTITY | 0.99+ |
600 hours | QUANTITY | 0.99+ |
Financial Transparency Act | TITLE | 0.99+ |
Congress | ORGANIZATION | 0.99+ |
60% | QUANTITY | 0.99+ |
Maxine Waters Committee | ORGANIZATION | 0.99+ |
Silicon Angle Media | ORGANIZATION | 0.99+ |
Tokyo | LOCATION | 0.99+ |
90% | QUANTITY | 0.99+ |
20 years | QUANTITY | 0.99+ |
United States | LOCATION | 0.99+ |
Maria | PERSON | 0.99+ |
600 | QUANTITY | 0.99+ |
National Association Insurance Commissioners | ORGANIZATION | 0.99+ |
Brass Rat Capital | ORGANIZATION | 0.99+ |
California | LOCATION | 0.99+ |
Citibank | ORGANIZATION | 0.99+ |
Goldman Sachs | ORGANIZATION | 0.99+ |
Excel | TITLE | 0.99+ |
FERC | ORGANIZATION | 0.99+ |
Lars Toomre | PERSON | 0.99+ |
15 30 | TITLE | 0.99+ |
2005 | DATE | 0.99+ |
two leaders | QUANTITY | 0.99+ |
Cambridge, Massachusetts | LOCATION | 0.99+ |
SEC | ORGANIZATION | 0.99+ |
Australia | LOCATION | 0.99+ |
three years | QUANTITY | 0.99+ |
three | QUANTITY | 0.99+ |
7 | QUANTITY | 0.99+ |
NIST | ORGANIZATION | 0.99+ |
Open Data Act of 2014 | TITLE | 0.99+ |
25 negative votes | QUANTITY | 0.99+ |
85% | QUANTITY | 0.99+ |
today | DATE | 0.99+ |
50 | QUANTITY | 0.99+ |
two years | QUANTITY | 0.99+ |
Sarah | PERSON | 0.99+ |
yesterday | DATE | 0.99+ |
Veterans Affairs | ORGANIZATION | 0.99+ |
five parts | QUANTITY | 0.99+ |
both | QUANTITY | 0.98+ |
first time | QUANTITY | 0.98+ |
Republican | ORGANIZATION | 0.98+ |
one | QUANTITY | 0.98+ |
two weeks ago | DATE | 0.98+ |
one concept | QUANTITY | 0.98+ |
DARPA | ORGANIZATION | 0.98+ |
10,000 times | QUANTITY | 0.98+ |
first | QUANTITY | 0.98+ |
New York | LOCATION | 0.98+ |
Alex | PERSON | 0.98+ |
United States government | ORGANIZATION | 0.98+ |
Vader | PERSON | 0.98+ |
one day | QUANTITY | 0.98+ |
about 50 cases | QUANTITY | 0.98+ |
Treasury | ORGANIZATION | 0.97+ |
government Affairs Committee | ORGANIZATION | 0.97+ |
Mars | LOCATION | 0.97+ |
Object Management Group | ORGANIZATION | 0.97+ |
Government Data act | TITLE | 0.96+ |
earlier this year | DATE | 0.96+ |
OMG | ORGANIZATION | 0.96+ |
Teff | PERSON | 0.96+ |
100 | QUANTITY | 0.96+ |
six years | QUANTITY | 0.96+ |
Beaver | PERSON | 0.95+ |
two significant financial programs | QUANTITY | 0.94+ |
two point | QUANTITY | 0.94+ |
third generation | QUANTITY | 0.94+ |