Tony Taylor, HPE | CUBE Conversation, August 2022
>>Hey everyone. Lisa Martin here with you. I'm with HPE right now. Tony Taylor joins me the director global test and supply chain cybersecurity at HPE. Tony. It's great to have you on the cube. >>Hi, thank you. Lisa's please, please, to be here. >>Tell me a little bit about your role and your background. >>I've been in the computer industry for about 33 years. Done a variety of roles throughout operations, fulfillment, R and D doing different things. My current role here at HPE is to lead in the organization, responsible for developing test solutions and our PCA manufacturing process and our systems integration team. And then we implement a supply chain cybersecurity process. That's focused on internal aspects of development, activities, and strategies, and then how we will drive our supply chain, our suppliers, to make sure that they adhere to these guidelines. >>And your background is engineering. I saw LinkedIn a little bit of science in there. Tell me a little bit about your background and how you got to where you are now. >>Oh, that's a, that's a long story going through school and doing that type of work. I, I, I got a phone call too many years ago and got involved in the computer industry, going from a, a user and working on those processes and then changing that to building product, introducing new product, developing new solutions and ideas, working on innovation and design of new products, new, new hardware, working on new software processes did heuristics level customer testing. So it's just a wide variety of activities. I've spanned a lot of different things over the years, been very fortunate to travel the world live in different parts of the world to bring up these activities. >>I always love to hear people's back stories on how they got to where they were. If it was a zigzaggy path or kind a path >>Was get a phone call from buddy one day, Hey, we're doing this. You wanna do it. Then that's where I ended up. >>And the rest is history. So a lot of dynamics in the last couple of years, obviously we've been hearing so much about the supply chain in the news for various reasons, but what are you seeing in the marketplace where with regards to security and the trusted supply chain, obviously a big focus there. What are you seeing? >>A lot of changes that have been occurring over time and especially in the last couple years with the things that we're seeing geopolitically is changing our, our environments, the threat vectors that we're seeing in, in cybersecurity are changing. They're becoming more sophisticated. They're coming in in different areas. What we're seeing is greater penetration and our customers. We're seeing a greater number of incidences in the, in the field where that, that I told you I'd stumble. The we're seeing a greater number of instances in the field and it's becoming a bigger impact for our customers and, and the supply chain. So we we've seen a tax at the root of the cause where neon gas, we're no longer having those activities that are coming into the, into the space. You're seeing greater ransomware processes and additional challenges associated with the cost associated with these programs. The, the infiltration from a hardware perspective, we've looked at those types of processes going through the supply chain processes are getting hacked more with that increased sophistication, even at the user level with phishing and Sping, those kind of things. And then you're seeing the, the changes in the geopolitical market. That's beginning to drive, you know, governmental aspects and things like that are coming in. So we we've seen roughly about what 10 and a half trillion worth of cybersecurity estimated in 2025, our loss on an annual perspective across the globe is right around a hundred billion, 45% of organizations have experienced or will be experiencing an attack. And by, so it it's just on the rise and it's creating a lot of concern with, with our customers. >>Yeah, it's really not a matter of these days. If we get hit it's when, when, so organizations right across every industry have to be prepared, what is HPE? What is HPE C as opportunities, obviously the threat landscape changing dramatically, but there's opportunities there for your customers truly tighten security. What are some of those opportunities through the HPE lens? >>The, the opportunities as we're looking at it is from an internal perspective, we need to begin focusing on all the activities and work that we're doing. How do we at hard in our environments, how do we, how do we grow those things? And then begin to investigate the things that we need to do at, at the, in the supply base, as those customers are beginning to look at things, hardening their environments, looking at their it systems, where are the areas for penetration within their environments? When you look at the process, we, we think cyber security a lot of times is just about it. Attacks counterfeit is a big aspect associated with this, and that can impact many of the different types of organizations. So what we've done is we created a, a heat map, looking at the different places where we believe those penetrations can take place internal. And that's our, our communication back out to our customers, look at the areas where you can be penetrated. And then where do you think are the, the areas that you really need to focus on? And then look for that remediation plan? I think that's the opportunity for our, our customers is to harden, you know, have a zero trust, but verified type process, >>Right? That's critical these days, as we know that threat landscape has changed so much recently and is only going to continue to change. As we said, it's not a matter of if it's now a matter of when an organizations need to be ready for that. So then you talked about the heat map from a technology. What is to help organizations really achieve a 360 degree approach to security >>From an H focus starts with our chief technology office, right? So we're looking at all the strategies as are coming down. They, we look at designing our hardware solutions to be able to support those activities. We're designing our systems and, and the integration programs around like GreenLake as services that we're able to provide to our customers to support that. And, and then, you know, as we continue to do that, we, we will, you know, look at, look within the supply chain and what are the things that we can do there to help, you know, drive, you know, the, the improvements there to really ensure that the products that are being delivered will make those customers requirements. >>And I understand you might have a teaser for me in terms of what we can expect going forward with HPE, with respect to cybersecurity in the supply chain, >>Lots of really good things that are coming up. And from a supply chain perspective, look for an announcement coming up in October for cybersecurity month, about what our next steps are and how we're really going to attack this problem. >>Excellent. And we'll be waiting for cybersecurity month in October. And to hear that announced from, from HPE, Tony, thanks so much for joining me on the queue today. Talking a little bit about your background, how you got to where you are now, the trusted supply chain and what HPE is doing there to really help customers mitigate the risk. We appreciate your insights and your time. >>Thank you. I appreciate your time. >>All Tony Taylor. I'm Lisa Martin. Thank you so much for watching this conversation. We'll see you next time.
SUMMARY :
It's great to have you on the cube. Lisa's please, please, to be here. And then we implement a supply And your background is engineering. on those processes and then changing that to building product, I always love to hear people's back stories on how they got to where they were. Then that's where I ended So a lot of dynamics in the last couple of years, That's beginning to drive, you know, governmental aspects and things like that are coming in. What is HPE C as opportunities, obviously the threat landscape changing dramatically, our customers, look at the areas where you can be penetrated. So then you talked about the heat map from a technology. We're designing our systems and, and the integration programs around like GreenLake And from a supply chain perspective, look for And to hear that announced from, I appreciate your time. Thank you so much for watching this conversation.
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
Lisa Martin | PERSON | 0.99+ |
HPE | ORGANIZATION | 0.99+ |
Tony | PERSON | 0.99+ |
Tony Taylor | PERSON | 0.99+ |
August 2022 | DATE | 0.99+ |
2025 | DATE | 0.99+ |
October | DATE | 0.99+ |
360 degree | QUANTITY | 0.99+ |
10 and a half trillion | QUANTITY | 0.99+ |
today | DATE | 0.99+ |
ORGANIZATION | 0.99+ | |
about 33 years | QUANTITY | 0.98+ |
Lisa | PERSON | 0.97+ |
around a hundred billion | QUANTITY | 0.95+ |
GreenLake | ORGANIZATION | 0.94+ |
last couple of years | DATE | 0.91+ |
45% | QUANTITY | 0.91+ |
zero trust | QUANTITY | 0.87+ |
last couple years | DATE | 0.86+ |
years | DATE | 0.72+ |
day | QUANTITY | 0.61+ |